zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
Virus Bulletin
magnet:?xt=urn:btih:2c1771c3e3fc39cfb82586a3010399d340df1474&dn=Virus Bulletin
磁力链接详情
Hash值:
2c1771c3e3fc39cfb82586a3010399d340df1474
点击数:
75
文件大小:
5.12 GB
文件数量:
195
创建日期:
2021-11-14 02:28
最后访问:
2024-10-26 12:49
访问标签:
Virus
Bulletin
文件列表详情
VB 2007 Vienna/A different look at the VB2007 Conference in Vienna .mp4 9.04 MB
VB 2008 Ottawa/Interview with John Hawes of Virus Bulletin.mp4 5.2 MB
VB 2008 Ottawa/Security experts answer key questions at Virus Bulletin 2008.mp4 3.8 MB
VB 2009 Geneva/The Virus Bulletin yodelling competition.mp4 1.72 MB
VB 2010 Vancouver/Costin Raiu on Virus Bulletin 2010.mp4 11.36 MB
VB 2010 Vancouver/Stuxnet demo in Virus Bulletin 2010 conference.mp4 3.46 MB
VB 2010 Vancouver/VB2010 Social Network and Computer Security Panel Discussion.mp4 15.56 MB
VB 2012 Dallas/Flashback OS X malware - VB2012 presentation by Broderick Aquilino (F-Secure).mp4 29.15 MB
VB 2012 Dallas/Virus Bulletin 2012 Conference Overview.mp4 12.46 MB
VB 2013 Berlin/An automatic analysis and detection tool for Java exploits.mp4 33.27 MB
VB 2013 Berlin/Analysis of Android in-app advertisement kits.mp4 16.43 MB
VB 2013 Berlin/Back channels and bitcoins - ZeroAccess' secret C&C communications.mp4 13.47 MB
VB 2013 Berlin/Hacking Team and Gamma International in 'business-to-government malware'.mp4 17.95 MB
VB 2013 Berlin/How to test properly - comparative web filter tests.mp4 40.81 MB
VB 2013 Berlin/Hypervisor-based, hardware-assisted system monitoring.mp4 28.48 MB
VB 2013 Berlin/PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file).mp4 16.28 MB
VB 2013 Berlin/Statistically effective protection against APT attacks.mp4 20.52 MB
VB 2013 Berlin/Surviving 0-days - reducing the window of exposure.mp4 14.95 MB
VB 2013 Berlin/VB2013 Keynote - Ethics and the AV industry in the age of WikiLeaks.mp4 46.33 MB
VB 2014 Seattle/.NET malware dynamic instrumentation for automated and manual analysis.mp4 19.58 MB
VB 2014 Seattle/An in-depth analysis of abuse on Twitter.mp4 22.94 MB
VB 2014 Seattle/Android packer - facing the challenges, building solutions.mp4 21.55 MB
VB 2014 Seattle/Attack points in health apps & wearable devices - how safe is your quantified self.mp4 24.76 MB
VB 2014 Seattle/Attack surface analysis of Tizen devices.mp4 26.32 MB
VB 2014 Seattle/Back in BlackEnergy - 2014 targeted attacks in the Ukraine and Poland.mp4 17.64 MB
VB 2014 Seattle/Bootkits - past, present & future.mp4 21.99 MB
VB 2014 Seattle/Caphaw - the advanced persistent pluginer.mp4 19.52 MB
VB 2014 Seattle/DMARC - how to use it to improve your email reputation.mp4 10.31 MB
VB 2014 Seattle/DNSSEC - how far have we come.mp4 15.22 MB
VB 2014 Seattle/Design to discover - security analytics with 3D visualization engine.mp4 19.89 MB
VB 2014 Seattle/Duping the machine - malware strategies, post sandbox detection.mp4 16.64 MB
VB 2014 Seattle/Early launch Android malware - your phone is 0wned (demo).mp4 2.14 MB
VB 2014 Seattle/Early launch Android malware - your phone is 0wned.mp4 2.61 MB
VB 2014 Seattle/Hiding the network behind the network. Botnet proxy business model.mp4 18.46 MB
VB 2014 Seattle/Labelling spam through the analysis of protocol patterns.mp4 14.61 MB
VB 2014 Seattle/Leaving our ZIP undone - how to abuse ZIP to deliver malware apps.mp4 19.75 MB
VB 2014 Seattle/Methods of malware persistence on Mac OS X.mp4 23.85 MB
VB 2014 Seattle/OPSEC for security researchers.mp4 30.5 MB
VB 2014 Seattle/Optimized mal-ops. Hack the ad network like a boss.mp4 20.76 MB
VB 2014 Seattle/P0wned by a barcode - stealing money from offline users.mp4 25.2 MB
VB 2014 Seattle/Presentation of the 1st Peter Szor Award.mp4 6.75 MB
VB 2014 Seattle/Protecting financial institutions from banking malware's man-in-the-browser attacks.mp4 21.74 MB
VB 2014 Seattle/Quantifying maliciousness in Alexa top-ranked domains.mp4 20.42 MB
VB 2014 Seattle/Smart home appliance security & malware.mp4 31.51 MB
VB 2014 Seattle/Sweeping the IP space - the hunt for evil on the Internet.mp4 23.99 MB
VB 2014 Seattle/Swipe away, we're watching you.mp4 30.3 MB
VB 2014 Seattle/The evolution of webinjects.mp4 17.88 MB
VB 2014 Seattle/Unveiling the kernel - rootkit discovery using selective automated kernel memory differencing.mp4 22.43 MB
VB 2014 Seattle/We know it before you do - predicting malicious domains.mp4 12.9 MB
VB 2014 Seattle/Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists.mp4 17.53 MB
VB 2015 Prague/A quantitative examination of the current state of corporate security practices.mp4 32.96 MB
VB 2015 Prague/Android ransomware - turning CryptoLocker into CryptoUnlocker.mp4 39.43 MB
VB 2015 Prague/Anonymity is king.mp4 37.45 MB
VB 2015 Prague/Attack on the drones - security vulnerabilities of unmanned aerial vehicles.mp4 41.14 MB
VB 2015 Prague/Breaking the bank(er) - automated configuration data extraction for banking malware.mp4 37.11 MB
VB 2015 Prague/Building a malware lab in the age of Big Data.mp4 33.68 MB
VB 2015 Prague/C&C-as-a-Service - abusing third-party web services as C&C channels.mp4 36.88 MB
VB 2015 Prague/Can we trust a trustee An in-depth look into the digitally signed malware industry.mp4 20.23 MB
VB 2015 Prague/DDoS trojan - a malicious concept that conquered the ELF format.mp4 44.58 MB
VB 2015 Prague/Dare 'DEVIL' - beyond your senses with Dex Visualizer.mp4 32.9 MB
VB 2015 Prague/Dead and buried in their crypts - defeating modern ransomware.mp4 36.25 MB
VB 2015 Prague/Digital 'Bian Lian' (face changing) - the skeleton key malware.mp4 45.15 MB
VB 2015 Prague/Does prevalence matter Ranking anti-malware products by potential victim impact.mp4 36.02 MB
VB 2015 Prague/Doing more with less - a study of file-less infection attacks.mp4 38.49 MB
VB 2015 Prague/Economic sanctions on malware.mp4 40.64 MB
VB 2015 Prague/Effectively testing APT defences.mp4 39.24 MB
VB 2015 Prague/Evolution of Android exploits from a static analysis tools perspective.mp4 17.96 MB
VB 2015 Prague/From Asia with love Smartphones with pre-installed malware.mp4 39.98 MB
VB 2015 Prague/How they're getting the data out of your network.mp4 8.85 MB
VB 2015 Prague/It has a EULA, it must be legit.mp4 17.32 MB
VB 2015 Prague/It's a file infector... it's ransomware... it's Virlock.mp4 42.11 MB
VB 2015 Prague/Keynote address - One man's anti-malware researcher is....mp4 55.1 MB
VB 2015 Prague/Labeless - no more.mp4 24.97 MB
VB 2015 Prague/Last-minute paper - Operation Potao Express - analysis of a cyber-espionage toolkit.mp4 45.38 MB
VB 2015 Prague/Last-minute paper - The mysterious case of Linux.Wifatch.mp4 45.97 MB
VB 2015 Prague/Linux Moose endangered or extinct An update on this atypical embedded Linux botnet.mp4 39.27 MB
VB 2015 Prague/Making a dent in Russian mobile banking phishing.mp4 35.87 MB
VB 2015 Prague/Mobile banking fraud via SMS in North America - who's doing it and how.mp4 38.47 MB
VB 2015 Prague/Modelling the network behaviour of malware to block malicious patterns.mp4 39.43 MB
VB 2015 Prague/Notes on click fraud - American story.mp4 19.9 MB
VB 2015 Prague/POS fraud - trends and counter-actions to mass fraud.mp4 37.85 MB
VB 2015 Prague/ROSCO - Repository Of Signed COde.mp4 40.19 MB
VB 2015 Prague/Sizing cybercrime - incidents and accidents, hints and allegations.mp4 34.34 MB
VB 2015 Prague/Solving the (in)security of home networked devices.mp4 36.02 MB
VB 2015 Prague/Speaking Dyreza protocol. Advantages of 'learning' a new language.mp4 34.49 MB
VB 2015 Prague/Tech Support Scams 2.0 - an inside look into the evolution of the classic Microsoft tech support scam.mp4 15.6 MB
VB 2015 Prague/The Internet of Bad Things, Observed.mp4 56.93 MB
VB 2015 Prague/The Kobayashi Maru dilemma.mp4 41.46 MB
VB 2015 Prague/The TAO of .NET and PowerShell malware analysis.mp4 39.62 MB
VB 2015 Prague/The Unbearable Lightness of APTing.mp4 41.02 MB
VB 2015 Prague/The Volatility Bot-Excavator.mp4 18.67 MB
VB 2015 Prague/The elephant in the room.mp4 39.53 MB
VB 2015 Prague/The ethics and perils of APT research - an unexpected transition into intelligence brokerage.mp4 44.78 MB
VB 2015 Prague/TurlaSat - The Fault in our Stars.mp4 36.55 MB
VB 2015 Prague/Ubiquity, security and you - malware, security and the Internet of Things.mp4 34.87 MB
VB 2015 Prague/WaveAtlas - surfing through the landscape of current malware packers.mp4 38.83 MB
VB 2015 Prague/We know what you did this summer - Android banking trojan exposing its sins in the cloud.mp4 39.12 MB
VB 2015 Prague/Will Android trojan, worm or rootkit survive in SEAndroid and containerization.mp4 33.51 MB
VB 2016 Denver/APT Reports and OPSEC Evolution, or - These Are Not the APT Reports You Are Looking For.mp4 20.94 MB
VB 2016 Denver/Defeating Sandbox Evasion - How to Increase Successful Emulation Rate in your Virtualized Environment.mp4 21.61 MB
VB 2016 Denver/Getting Duped - Piggybacking on Webcam Streams for Surreptitious Recordings.mp4 20.75 MB
VB 2016 Denver/Great Crypto Failures.mp4 21.98 MB
VB 2016 Denver/Mobile Applications - a Backdoor into Internet of Things.mp4 16.78 MB
VB 2016 Denver/Modern Attacks on Russian Financial Institutions.mp4 25.45 MB
VB 2016 Denver/Neverquest - Crime as a Service and On the Hunt for the Big Bucks.mp4 21.36 MB
VB 2016 Denver/Nymaim - the Untold Story.mp4 17.96 MB
VB 2016 Denver/On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users.mp4 15.42 MB
VB 2016 Denver/One-Click Fileless Infection.mp4 13.5 MB
VB 2016 Denver/Open Source Malware Lab.mp4 16.05 MB
VB 2016 Denver/Wave Your False Flags Deception Tactics Muddying Attribution in Targeted Attacks.mp4 18.71 MB
VB 2017 Madrid/Battlefield Ukraine - finding patterns behind summer cyber attacks.mp4 18.43 MB
VB 2017 Madrid/Beyond lexical and PDNS - using signals on graphs to uncover online threats at scale.mp4 24.23 MB
VB 2017 Madrid/Consequences of bad security in health care.mp4 25.96 MB
VB 2017 Madrid/Crypton - exposing malware's deepest secrets.mp4 29.95 MB
VB 2017 Madrid/Gabor Szappanos wins fourth Peter Szor Award.mp4 9.2 MB
VB 2017 Madrid/Industroyer - biggest threat to industrial control systems since Stuxnet.mp4 24.28 MB
VB 2017 Madrid/Last-minute paper - FinFisher - New techniques and infection vectors revealed.mp4 20.32 MB
VB 2017 Madrid/Last-minute paper - Spora - the saga continues a.k.a. how to ruin your research in a week.mp4 27.62 MB
VB 2017 Madrid/Modern reconnaissance phase on APT - protection layer.mp4 25.1 MB
VB 2017 Madrid/Nine circles of Cerber.mp4 27.88 MB
VB 2017 Madrid/Offensive malware analysis - dissecting OSX FruitFly via a custom C&C server.mp4 23.25 MB
VB 2017 Madrid/The router of all evil - more than just default passwords and silly scripts.mp4 17.37 MB
VB 2017 Madrid/The sprawling market of consumer spyware.mp4 21.92 MB
VB 2017 Madrid/The state of cybersecurity in Africa - Kenya.mp4 11.83 MB
VB 2017 Madrid/Turning Trickbot - decoding an encrypted command-and-control channel.mp4 25.69 MB
VB 2017 Madrid/VB2017 paper - VirusTotal tips, tricks and myths.mp4 28.15 MB
VB 2017 Madrid/Walking in your enemy's shadow - when fourth-party collection becomes attribution hell.mp4 33.95 MB
VB 2018 Montreal/Analysing compiled binaries using logic.mp4 18.66 MB
VB 2018 Montreal/Behind the scenes of the SamSam investigation.mp4 28.41 MB
VB 2018 Montreal/Botception - hire a botnet to spread one's own botnet.mp4 14.97 MB
VB 2018 Montreal/Draw me like one of your French APTs - expanding o.mp4 31.59 MB
VB 2018 Montreal/Foreverdays - tracking and mitigating threats targeting civil society orgs.mp4 41.15 MB
VB 2018 Montreal/From Hacking Team to hacked team to….mp4 30.82 MB
VB 2018 Montreal/From drive-by download to drive-by mining - understanding the new paradigm.mp4 32.69 MB
VB 2018 Montreal/Hide'n'Seek - an adaptive peer-to-peer IoT botnet.mp4 16.66 MB
VB 2018 Montreal/Internet balkanization why are we raising borders.mp4 24.96 MB
VB 2018 Montreal/Little Brother is watching - we know all your secrets.mp4 31.74 MB
VB 2018 Montreal/Now you see it, now you don't - wipers in the wild.mp4 24.94 MB
VB 2018 Montreal/Office bugs on the rise.mp4 38.76 MB
VB 2018 Montreal/Shedding skin - Turla's fresh faces.mp4 33.44 MB
VB 2018 Montreal/The Big Bang Theory by APT-C-23.mp4 29.52 MB
VB 2018 Montreal/The modality of mortality in domain names.mp4 24.59 MB
VB 2018 Montreal/The wolf in sheep's clothing - undressed.mp4 26.23 MB
VB 2018 Montreal/Triada - the past, the present and the (hopefully not existing) future.mp4 28.32 MB
VB 2018 Montreal/Unpacking the packed unpacker reversing an Android.mp4 27.55 MB
VB 2018 Montreal/Where have all the good hires gone.mp4 19.47 MB
VB 2018 Montreal/Who wasn't responsible for Olympic Destroyer (Paul Rascagneres & Warren Mercer).mp4 29.06 MB
VB 2019 London/A vine climbing over the Great Firewall a long-term attack against China.mp4 21.9 MB
VB 2019 London/Absolutely routed Why routers are the new bullseye in cyber attacks.mp4 23.62 MB
VB 2019 London/Buhtrap metamorphosis from cybercrime to cyber espionage.mp4 22.97 MB
VB 2019 London/Exploring Emotet, an elaborate everyday enigma.mp4 24.47 MB
VB 2019 London/Geost botnet. The discovery story of a new Android banking trojan from an OpSec error.mp4 22.07 MB
VB 2019 London/Keynote address The security products we deserve.mp4 40.05 MB
VB 2019 London/Oops It happened again.mp4 25.28 MB
VB 2019 London/Shinigami's revenge the long tail of Ryuk malware.mp4 23.21 MB
VB 2019 London/Thwarting Emotet email conversation thread hijacking with clustering.mp4 20.78 MB
VB 2019 London/Webcam interception and protection in kernel mode in Windows.mp4 36.97 MB
VB 2020 Virtual/2030 backcasting the potential rise and fall of cyber threat intelligence.mp4 28.78 MB
VB 2020 Virtual/A new open-source hypervisor-level malware monitoring and extraction system.mp4 27.52 MB
VB 2020 Virtual/Advanced Pasta Threat mapping threat actor usage of open-source offensive security tools.mp4 37.99 MB
VB 2020 Virtual/Anchor, Bazar, and the Trickbot Connection.mp4 20.43 MB
VB 2020 Virtual/Another threat actor day.mp4 30.07 MB
VB 2020 Virtual/Behind the Black Mirror Simulating attacks with mock C2 servers.mp4 35.22 MB
VB 2020 Virtual/Chasing the Digital Pirates Unveiling the Container Threats.mp4 19.57 MB
VB 2020 Virtual/Clandestine hunter two strategies for supply chain attack.mp4 28.1 MB
VB 2020 Virtual/Compromising IOT C&C Panels for Unearthing Infections.mp4 32.22 MB
VB 2020 Virtual/Context Aware Detection The future of cybersecurity.mp4 17.03 MB
VB 2020 Virtual/Dancing samba with Dolphins tracking a Brazilian threat actor moving to Europe.mp4 17.35 MB
VB 2020 Virtual/Dissecting fleeceware apps the million-dollar money-making machine in Android and iOS.mp4 33.7 MB
VB 2020 Virtual/Emerging trends in malware downloaders.mp4 51.16 MB
VB 2020 Virtual/Emissary (Pandas) in the Middle East.mp4 34.95 MB
VB 2020 Virtual/Evolution of Excel 4.0 Macro Weaponization.mp4 58.42 MB
VB 2020 Virtual/Ghost Mach-O an analysis of Lazarus’ Mac-malware innovations.mp4 29.54 MB
VB 2020 Virtual/GuLoader No, CloudEyE. Flattening the attack curve of the top malicious dropper.mp4 31.52 MB
VB 2020 Virtual/Hidden risks of advertisements.mp4 38.79 MB
VB 2020 Virtual/Just in time, deception to detect Credential Stuffing Bot.mp4 16.26 MB
VB 2020 Virtual/Lightweight emulation based IoC extraction for Gafgyt botnets.mp4 38.09 MB
VB 2020 Virtual/Like bees to a honeypot - a journey through honeypots.mp4 24.87 MB
VB 2020 Virtual/Most sophisticated technique of the year goes to.mp4 22.46 MB
VB 2020 Virtual/NetWalking on Sunshine.mp4 39.96 MB
VB 2020 Virtual/One year later Challenges for young anti-malware products today.mp4 21.89 MB
VB 2020 Virtual/Operation LagTime IT colourful Panda footprint.mp4 37.51 MB
VB 2020 Virtual/Payment required rare HTTP statuses and air-gaps avoidance from the authors of COMPFun.mp4 31.4 MB
VB 2020 Virtual/Ramsay A cyber-espionage toolkit tailored for air-gapped networks.mp4 45.18 MB
VB 2020 Virtual/She sells root shells by the C() shore.mp4 23.62 MB
VB 2020 Virtual/Standardized reporting with the Malware Behavior Catalog.mp4 23.66 MB
VB 2020 Virtual/Stealthy WastedLocker eluding behavior blockers, but not only.mp4 18.44 MB
VB 2020 Virtual/TA505 attacking industries around the world.mp4 22.05 MB
VB 2020 Virtual/Take care, spyware is slipping into your phones through Operation Poisoned News.mp4 38.31 MB
VB 2020 Virtual/The (f)utility of indicators.mp4 49.21 MB
VB 2020 Virtual/The NExt Big Sur(ge) on macOS.mp4 8.08 MB
VB 2020 Virtual/The rise of the info stealers.mp4 22.46 MB
VB 2020 Virtual/Tracking Rapid Evolution Copycat of An APT RAT in Asia.mp4 23.51 MB
VB 2020 Virtual/Transparency, Trust and Intention What dismantling the heart of cyberattack public attribution.mp4 16.18 MB
VB 2020 Virtual/Unveiling the CryptoMimic.mp4 35.83 MB
其他位置