Virus Bulletin
视频
|
2024-3-4 18:20
|
2024-12-26 03:55
|
56
|
8.26 GB
|
293
|
- VB 2007 Vienna/A different look at the VB2007 Conference in Vienna.mp46.11MB
- VB 2008 Ottawa/Interview with John Hawes of Virus Bulletin.mp43.5MB
- VB 2008 Ottawa/Security experts answer key questions at Virus Bulletin 2008.mp42.53MB
- VB 2009 Geneva/The Virus Bulletin yodelling competition.mp41.72MB
- VB 2010 Vancouver/Costin Raiu on Virus Bulletin 2010.mp47.02MB
- VB 2010 Vancouver/Stuxnet demo in Virus Bulletin 2010 conference.mp42.39MB
- VB 2010 Vancouver/VB2010 Social Network and Computer Security Panel Discussion.mp411.87MB
- VB 2012 Dallas/Flashback OS X malware - VB2012 presentation by Broderick Aquilino (F-Secure).mp429.15MB
- VB 2012 Dallas/Virus Bulletin 2012 Conference Overview.mp47.23MB
- VB 2013 Berlin/An automatic analysis and detection tool for Java exploits.mp421.33MB
- VB 2013 Berlin/Analysis of Android in-app advertisement kits.mp418.8MB
- VB 2013 Berlin/Back channels and bitcoins ZeroAccess' secret C&C communications.mp413.45MB
- VB 2013 Berlin/Hacking Team and Gamma International in 'business-to-government malware'.mp418.29MB
- VB 2013 Berlin/Hypervisor-based, hardware-assisted system monitoring.mp419.36MB
- VB 2013 Berlin/PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file).mp417.49MB
- VB 2013 Berlin/Statistically effective protection against APT attacks.mp421.34MB
- VB 2013 Berlin/Surviving 0-days - reducing the window of exposure.mp415.64MB
- VB 2013 Berlin/VB2013 Keynote - Ethics and the AV industry in the age of WikiLeaks.mp433.06MB
- VB 2014 Seattle/.NET malware dynamic instrumentation for automated and manual analysis.mp421.2MB
- VB 2014 Seattle/An in-depth analysis of abuse on Twitter.mp423.6MB
- VB 2014 Seattle/Attack points in health apps & wearable devices - how safe is your quantified self.mp425.24MB
- VB 2014 Seattle/Attack surface analysis of Tizen devices.mp425.14MB
- VB 2014 Seattle/Back in BlackEnergy 2014 targeted attacks in the Ukraine and Poland.mp418.58MB
- VB 2014 Seattle/Bootkits past, present & future.mp423.85MB
- VB 2014 Seattle/Caphaw - the advanced persistent pluginer.mp419.91MB
- VB 2014 Seattle/Design to discover security analytics with 3D visualization engine.mp423.97MB
- VB 2014 Seattle/DMARC - how to use it to improve your email reputation.mp412.39MB
- VB 2014 Seattle/DNSSEC - how far have we come.mp417.38MB
- VB 2014 Seattle/Duping the machine - malware strategies, post sandbox detection.mp418.72MB
- VB 2014 Seattle/Early launch Android malware your phone is 0wned (demo).mp41.53MB
- VB 2014 Seattle/Early launch Android malware your phone is 0wned.mp43.13MB
- VB 2014 Seattle/Hiding the network behind the network. Botnet proxy business model.mp421.77MB
- VB 2014 Seattle/Labelling spam through the analysis of protocol patterns.mp418.49MB
- VB 2014 Seattle/Leaving our ZIP undone how to abuse ZIP to deliver malware apps.mp421.56MB
- VB 2014 Seattle/Methods of malware persistence on Mac OS X.mp423.88MB
- VB 2014 Seattle/OPSEC for security researchers.mp432.39MB
- VB 2014 Seattle/Optimized mal-ops. Hack the ad network like a boss.mp421.68MB
- VB 2014 Seattle/P0wned by a barcode stealing money from offline users.mp430.68MB
- VB 2014 Seattle/Quantifying maliciousness in Alexa top-ranked domains.mp422.87MB
- VB 2014 Seattle/Smart home appliance security & malware.mp434.82MB
- VB 2014 Seattle/Sweeping the IP space the hunt for evil on the Internet.mp424.4MB
- VB 2014 Seattle/Swipe away, we're watching you.mp429.53MB
- VB 2014 Seattle/The evolution of webinjects.mp420.05MB
- VB 2014 Seattle/Unveiling the kernel rootkit discovery using selective automated kernel memory differencing.mp422.85MB
- VB 2014 Seattle/We know it before you do predicting malicious domains.mp416.44MB
- VB 2014 Seattle/Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists.mp419.8MB
- VB 2015 Prague/A quantitative examination of the current state of corporate security practices.mp424.34MB
- VB 2015 Prague/Android ransomware turning CryptoLocker into CryptoUnlocker.mp428.37MB
- VB 2015 Prague/Anonymity is king.mp426.94MB
- VB 2015 Prague/Attack on the drones security vulnerabilities of unmanned aerial vehicles.mp429.33MB
- VB 2015 Prague/Breaking the bank(er) automated configuration data extraction for banking malware.mp428.67MB
- VB 2015 Prague/Building a malware lab in the age of Big Data.mp423.38MB
- VB 2015 Prague/C&C-as-a-Service abusing third-party web services as C&C channels.mp426.73MB
- VB 2015 Prague/Dare 'DEVIL' beyond your senses with Dex Visualizer.mp424.71MB
- VB 2015 Prague/DDoS trojan a malicious concept that conquered the ELF format.mp429.08MB
- VB 2015 Prague/Dead and buried in their crypts defeating modern ransomware.mp425.43MB
- VB 2015 Prague/Does prevalence matter Ranking anti-malware products by potential victim impact.mp426.41MB
- VB 2015 Prague/Doing more with less a study of file-less infection attacks.mp426.26MB
- VB 2015 Prague/Economic sanctions on malware.mp430.91MB
- VB 2015 Prague/From Asia with love Smartphones with pre-installed malware.mp427.2MB
- VB 2015 Prague/Inside recent FQDN (Fully Qualified Domain Name) surges on the Internet.mp423.72MB
- VB 2015 Prague/It's a file infector it's ransomware it's Virlock.mp428.13MB
- VB 2015 Prague/Keynote address One man's anti-malware researcher is.mp437.57MB
- VB 2015 Prague/Labeless - no more.mp418.88MB
- VB 2015 Prague/Last-minute paper Operation Potao Express analysis of a cyber-espionage toolkit.mp430.89MB
- VB 2015 Prague/Last-minute paper The mysterious case of Linux.Wifatch.mp431.09MB
- VB 2015 Prague/Linux Moose endangered or extinct An update on this atypical embedded Linux botnet.mp427.97MB
- VB 2015 Prague/Modelling the network behaviour of malware to block malicious patterns.mp428.42MB
- VB 2015 Prague/POS fraud - trends and counter-actions to mass fraud.mp427.32MB
- VB 2015 Prague/ROSCO Repository Of Signed COde.mp430.38MB
- VB 2015 Prague/Sizing cybercrime incidents and accidents, hints and allegations.mp426.46MB
- VB 2015 Prague/Solving the (in)security of home networked devices.mp426.36MB
- VB 2015 Prague/Speaking Dyreza protocol. Advantages of 'learning' a new language.mp425.28MB
- VB 2015 Prague/The elephant in the room.mp426.56MB
- VB 2015 Prague/The evolution of ransomware from CryptoLocker to CryptoWall.mp422.17MB
- VB 2015 Prague/The Kobayashi Maru dilemma.mp431.78MB
- VB 2015 Prague/The TAO of .NET and PowerShell malware analysis.mp426.79MB
- VB 2015 Prague/The Unbearable Lightness of APTing.mp427.61MB
- VB 2015 Prague/The Volatility Bot-Excavator.mp413.98MB
- VB 2015 Prague/TurlaSat The Fault in our Stars.mp424.67MB
- VB 2015 Prague/Ubiquity, security and you - malware, security and the Internet of Things.mp424.44MB
- VB 2015 Prague/WaveAtlas surfing through the landscape of current malware packers.mp426.01MB
- VB 2015 Prague/We know what you did this summer Android banking trojan exposing its sins in the cloud.mp426.41MB
- VB 2015 Prague/Will Android trojan, worm or rootkit survive in SEAndroid and containerization.mp424.51MB
- VB 2016 Denver/Anti-malware Testing Undercover.mp430.72MB
- VB 2016 Denver/APT Reports and OPSEC Evolution, or These Are Not the APT Reports You Are Looking For.mp426.48MB
- VB 2016 Denver/Building a Local PassiveDNS Capability for Malware Incident Response.mp422.17MB
- VB 2016 Denver/Debugging and Monitoring Malware Network Activities with Haka.mp421.1MB
- VB 2016 Denver/Defeating Sandbox Evasion How to Increase Successful Emulation Rate in your Virtualized Environment.mp424.13MB
- VB 2016 Denver/Getting Duped Piggybacking on Webcam Streams for Surreptitious Recordings.mp424.19MB
- VB 2016 Denver/Great Crypto Failures.mp425.01MB
- VB 2016 Denver/Last-minute paper A Malicious OS X Cocktail Served from a Tain'ted Bottle.mp428.16MB
- VB 2016 Denver/Malicious Proxy auto-configs An Easy Way to Harvest Banking Credentials.mp423.3MB
- VB 2016 Denver/Mobile Applications a Backdoor into Internet of Things.mp419.76MB
- VB 2016 Denver/Modern Attacks on Russian Financial Institutions.mp429.81MB
- VB 2016 Denver/Neverquest Crime as a Service and On the Hunt for the Big Bucks.mp425.4MB
- VB 2016 Denver/Nymaim the Untold Story.mp421.65MB
- VB 2016 Denver/On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users.mp418.19MB
- VB 2016 Denver/One-Click Fileless Infection.mp416.26MB
- VB 2016 Denver/Open Source Malware Lab.mp418.9MB
- VB 2016 Denver/The Beginning of the End(point) Where we are now and where we'll be in five years.mp426.63MB
- VB 2016 Denver/Wave Your False Flags Deception Tactics Muddying Attribution in Targeted Attacks.mp422.22MB
- VB 2016 Denver/Wild Android Collusions.mp415.21MB
- VB 2017 Madrid/Android reverse engineering tools not the usual suspects.mp420.57MB
- VB 2017 Madrid/Battlefield Ukraine finding patterns behind summer cyber attacks.mp418.1MB
- VB 2017 Madrid/Beyond lexical and PDNS using signals on graphs to uncover online threats at scale.mp427.62MB
- VB 2017 Madrid/Browser attack points still abused by banking trojans.mp422.3MB
- VB 2017 Madrid/Client Maximus raises the bar.mp423.95MB
- VB 2017 Madrid/Consequences of bad security in health care.mp423.97MB
- VB 2017 Madrid/Crypton - exposing malware's deepest secrets.mp428.35MB
- VB 2017 Madrid/Exploring the virtual worlds of advergaming.mp421.02MB
- VB 2017 Madrid/Gábor Szappanos wins fourth Peter Szőr Award.mp48.39MB
- VB 2017 Madrid/Industroyer biggest threat to industrial control systems since Stuxnet.mp424.68MB
- VB 2017 Madrid/Last-minute paper FinFisher New techniques and infection vectors revealed.mp421.28MB
- VB 2017 Madrid/Last-minute paper Spora the saga continues a.k.a. how to ruin your research in a week.mp425.25MB
- VB 2017 Madrid/Modern reconnaissance phase on APT - protection layer.mp426.08MB
- VB 2017 Madrid/Nine circles of Cerber.mp426.34MB
- VB 2017 Madrid/Offensive malware analysis dissecting OSX FruitFly via a custom C&C server.mp423.42MB
- VB 2017 Madrid/The life story of an IPT - Inept Persistent Threat actor.mp428.7MB
- VB 2017 Madrid/The router of all evil more than just default passwords and silly scripts.mp418.51MB
- VB 2017 Madrid/The sprawling market of consumer spyware.mp419.1MB
- VB 2017 Madrid/The state of cybersecurity in Africa Kenya.mp413.72MB
- VB 2017 Madrid/Turning Trickbot decoding an encrypted command-and-control channel.mp421.89MB
- VB 2017 Madrid/VB2017 paper VirusTotal tips, tricks and myths.mp431.18MB
- VB 2017 Madrid/Walking in your enemy's shadow when fourth-party collection becomes attribution hell.mp430.42MB
- VB 2018 Montreal/Adware is just malware with a legal department.mp463.73MB
- VB 2018 Montreal/Analysing compiled binaries using logic.mp421.71MB
- VB 2018 Montreal/Anatomy of an attack detecting and defeating CRASHOVERRIDE.mp436.64MB
- VB 2018 Montreal/Android app deobfuscation using static-dynamic cooperation.mp433.95MB
- VB 2018 Montreal/Behind the scenes of the SamSam investigation.mp432.33MB
- VB 2018 Montreal/Botception hire a botnet to spread one's own botnet.mp417.58MB
- VB 2018 Montreal/Draw me like one of your French APTs - expanding our descriptive palette for digital threat actors.mp435.63MB
- VB 2018 Montreal/Fake News, Inc.mp444.64MB
- VB 2018 Montreal/Foreverdays tracking and mitigating threats targeting civil society orgs.mp446.39MB
- VB 2018 Montreal/From drive-by download to drive-by mining understanding the new paradigm.mp437.65MB
- VB 2018 Montreal/From Hacking Team to hacked team to.mp435.23MB
- VB 2018 Montreal/Hide'n'Seek an adaptive peer-to-peer IoT botnet.mp420.01MB
- VB 2018 Montreal/Internet balkanization why are we raising borders online.mp428.5MB
- VB 2018 Montreal/Lazarus Group one mahjong game played with different sets of tiles.mp437.54MB
- VB 2018 Montreal/Levelling up why sharing threat intelligence makes you more competitive.mp426.54MB
- VB 2018 Montreal/Little Brother is watching - we know all your secrets.mp435.63MB
- VB 2018 Montreal/Now you see it, now you don't wipers in the wild.mp428.9MB
- VB 2018 Montreal/Office bugs on the rise.mp443.57MB
- VB 2018 Montreal/Shedding skin - Turla's fresh faces.mp437.99MB
- VB 2018 Montreal/The Big Bang Theory by APT-C-23.mp433.88MB
- VB 2018 Montreal/The modality of mortality in domain names.mp429.63MB
- VB 2018 Montreal/The wolf in sheep's clothing - undressed.mp430.54MB
- VB 2018 Montreal/Triada the past, the present and the (hopefully not existing) future.mp432.44MB
- VB 2018 Montreal/Under the hood - the automotive challenge.mp425.44MB
- VB 2018 Montreal/Unpacking the packed unpacker reversing an Android anti-analysis library.mp431.12MB
- VB 2018 Montreal/Where have all the good hires gone.mp422.48MB
- VB 2018 Montreal/Who wasn’t responsible for Olympic Destroyer (Paul Rascagnères & Warren Mercer).mp433.37MB
- VB 2019 London/2,000 reactions to a malware attack - accidental study.mp426.38MB
- VB 2019 London/A deep dive into iPhone exploit chains.mp420.21MB
- VB 2019 London/A vine climbing over the Great Firewall a long-term attack against China.mp426.5MB
- VB 2019 London/Absolutely routed Why routers are the new bullseye in cyber attacks.mp424.45MB
- VB 2019 London/Abusing third-party cloud services in targeted attacks.mp423.11MB
- VB 2019 London/APT cases exploiting vulnerabilities in region-specific software.mp427.03MB
- VB 2019 London/Attor spy platform with curious GSM fingerprinting.mp422.91MB
- VB 2019 London/Attribution is in the object using RTF object dimensions to track APT phishing weaponizers.mp430.22MB
- VB 2019 London/Buhtrap metamorphosis from cybercrime to cyber espionage.mp423.09MB
- VB 2019 London/Catch me if you can detection of injection exploitation by validating query and API integrity.mp418.46MB
- VB 2019 London/Cyber espionage in the Middle East unravelling OSX.WindTail.mp427.44MB
- VB 2019 London/Defeating APT10 compiler-level obfuscations.mp422.67MB
- VB 2019 London/Exploring Emotet, an elaborate everyday enigma.mp425.43MB
- VB 2019 London/Exploring the Chinese DDoS landscape.mp412.98MB
- VB 2019 London/Finding drive-by rookies using an automated active observation platform.mp420.14MB
- VB 2019 London/Geost botnet. The discovery story of a new Android banking trojan from an OpSec error.mp422.49MB
- VB 2019 London/Keynote address The security products we deserve.mp441.01MB
- VB 2019 London/Medical IoT for diabetes and cybercrime.mp426.87MB
- VB 2019 London/Never before had Stierlitz been so close to failure.mp428.64MB
- VB 2019 London/Oops It happened again.mp426.8MB
- VB 2019 London/Play fuzzing machine - hunting iOS and macOS kernel vulnerabilities automatically and smartly.mp425.06MB
- VB 2019 London/Pulling the PKPLUG the adversary playbook for the long-standing espionage activity of.mp426.37MB
- VB 2019 London/Rich headers leveraging the mysterious artifact of the PE format.mp428.31MB
- VB 2019 London/Shinigami's revenge the long tail of Ryuk malware.mp423.9MB
- VB 2019 London/Spoofing in the reeds with Rietspoof.mp423.26MB
- VB 2019 London/Static analysis methods for detection of Microsoft Office exploits.mp428.65MB
- VB 2019 London/The Bagsu banker case.mp435.13MB
- VB 2019 London/The cake is a lie Uncovering the secret world of malware-like cheats in video games.mp424.04MB
- VB 2019 London/Thwarting Emotet email conversation thread hijacking with clustering.mp421.41MB
- VB 2019 London/TIPS Keynote Building secure sharing systems that treat humans as features not bugs.mp417.26MB
- VB 2019 London/TIPS Keynote Nexus between OT and IT threat intelligence.mp418.58MB
- VB 2019 London/Webcam interception and protection in kernel mode in Windows.mp425.63MB
- VB 2020 Virtual/2030 backcasting the potential rise and fall of cyber threat intelligence.mp420.08MB
- VB 2020 Virtual/A new open-source hypervisor-level malware monitoring and extraction system .mp420.84MB
- VB 2020 Virtual/Advanced Pasta Threat mapping threat actor usage of open-source offensive security tools.mp427.8MB
- VB 2020 Virtual/Anchor, Bazar, and the Trickbot Connection.mp415.17MB
- VB 2020 Virtual/Another threat actor day.mp422.31MB
- VB 2020 Virtual/Behind the Black Mirror Simulating attacks with mock C2 servers.mp424.72MB
- VB 2020 Virtual/Business Email Compromise - Scalable Attribution Powering Industry and Law Enforcement Collaboration.mp421.52MB
- VB 2020 Virtual/Chasing the Digital Pirates Unveiling the Container Threats.mp415.02MB
- VB 2020 Virtual/Clandestine hunter two strategies for supply chain attack.mp420.18MB
- VB 2020 Virtual/Closing Keynote Threatscaping like a CERT.mp418.9MB
- VB 2020 Virtual/Compromising IOT C&C Panels for Unearthing Infections.mp424.58MB
- VB 2020 Virtual/Context Aware Detection The future of cybersecurity.mp412.72MB
- VB 2020 Virtual/Creating Network Effects Intelligence Sharing for Supply Chain Security.mp424.25MB
- VB 2020 Virtual/Dancing samba with Dolphins tracking a Brazilian threat actor moving to Europe.mp413.17MB
- VB 2020 Virtual/Dissecting fleeceware apps the million-dollar money-making machine in Android and iOS.mp422MB
- VB 2020 Virtual/Emerging trends in malware downloaders.mp434.54MB
- VB 2020 Virtual/Emissary (Pandas) in the Middle East.mp423.48MB
- VB 2020 Virtual/Evolution of Excel 4.0 Macro Weaponization.mp439MB
- VB 2020 Virtual/Fireside Chat Comfortably Numb.mp444.84MB
- VB 2020 Virtual/German Angst - Cybercrime Ecosystem in the DACH Region.mp421.35MB
- VB 2020 Virtual/Ghost Mach-O an analysis of Lazarus’ Mac-malware innovations.mp420.33MB
- VB 2020 Virtual/GuLoader No, CloudEyE. Flattening the attack curve of the top malicious dropper.mp419.95MB
- VB 2020 Virtual/Hidden risks of advertisements.mp428.98MB
- VB 2020 Virtual/Just in time, deception to detect Credential Stuffing Bot.mp412.43MB
- VB 2020 Virtual/Lightweight emulation based IoC extraction for Gafgyt botnets.mp423.95MB
- VB 2020 Virtual/Like bees to a honeypot - a journey through honeypots.mp418.39MB
- VB 2020 Virtual/Most sophisticated technique of the year goes to.mp414.59MB
- VB 2020 Virtual/NetWalking on Sunshine.mp423.04MB
- VB 2020 Virtual/One year later Challenges for young anti-malware products today.mp415.8MB
- VB 2020 Virtual/Opening Keynote Collaborating with Competitors A Better Strategy to Beat Adversaries.mp427.48MB
- VB 2020 Virtual/Operation LagTime IT colourful Panda footprint.mp427.08MB
- VB 2020 Virtual/Panel Flattening the Curve of Cyber-Risks.mp438.45MB
- VB 2020 Virtual/Payment required rare HTTP statuses and air-gaps avoidance from the authors of COMPFun.mp422.63MB
- VB 2020 Virtual/Ramsay A cyber-espionage toolkit tailored for air-gapped networks.mp431.09MB
- VB 2020 Virtual/Ransomware Evolution in LATAM.mp431.26MB
- VB 2020 Virtual/She sells root shells by the C() shore.mp417.51MB
- VB 2020 Virtual/Standardized reporting with the Malware Behavior Catalog.mp416.9MB
- VB 2020 Virtual/Stealthy WastedLocker eluding behavior blockers, but not only.mp411.92MB
- VB 2020 Virtual/TA505 attacking industries around the world.mp417.15MB
- VB 2020 Virtual/Take care, spyware is slipping into your phones through Operation Poisoned News.mp425.71MB
- VB 2020 Virtual/The (f)utility of indicators.mp431.25MB
- VB 2020 Virtual/The NExt Big Sur(ge) on macOS.mp45.87MB
- VB 2020 Virtual/The rise of the info stealers.mp414.81MB
- VB 2020 Virtual/Tracking Rapid Evolution Copycat of An APT RAT in Asia.mp419.09MB
- VB 2020 Virtual/Transparency, Trust and Intention What dismantling the heart of cyberattack public attribution.mp412.19MB
- VB 2020 Virtual/Unveiling the CryptoMimic.mp424.73MB
- VB 2021 Threat Intelligence Practitioner Summit/Fireside chat Good times, bad times, you know I’ve had my share.mp445.54MB
- VB 2021 Threat Intelligence Practitioner Summit/Incident response with an XDR.mp421.03MB
- VB 2021 Threat Intelligence Practitioner Summit/Keynote Learning from failure ransomware and future conflicts.mp428.37MB
- VB 2021 Threat Intelligence Practitioner Summit/Keynote The Community Effect.mp412.3MB
- VB 2021 Threat Intelligence Practitioner Summit/New PlugX Fingerprint-THOR.mp431.4MB
- VB 2021 Threat Intelligence Practitioner Summit/Now you see me, now you don’t.mp440.77MB
- VB 2021 Threat Intelligence Practitioner Summit/Operation Diànxùn a cyberespionage campaign targeting telecommunication companies.mp427.7MB
- VB 2021 Threat Intelligence Practitioner Summit/Panel A tale of two companies.mp430.92MB
- VB 2021 Threat Intelligence Practitioner Summit/Peak Analyzer an automated malware campaign detector.mp429.35MB
- VB 2021 Threat Intelligence Practitioner Summit/The use of dark patterns and psychological tricks in Android malware.mp426.74MB
- VB 2021 Threat Intelligence Practitioner Summit/Where’s your data Ransomware protecting your ICS environment.mp424.17MB
- VB 2021 Virtual/A deep dive into Water Roc, one of the most relentless ransomware groups.mp450.93MB
- VB 2021 Virtual/A detailed analysis of a new version of Darkside Ransomware (V. 2.1.2.3).mp432.15MB
- VB 2021 Virtual/All roads lead to Rome the Conti manual leak dissection.mp446.56MB
- VB 2021 Virtual/Android stalkerware hunting automation, analysis and detection.mp419.31MB
- VB 2021 Virtual/Bugs in malware - uncovering vulnerabilities found in malware payloads.mp445.74MB
- VB 2021 Virtual/CTO (Call Tree Overviewer) yet another function call tree viewer.mp458.4MB
- VB 2021 Virtual/Endpoint security checkbox a stealthy approach to cyberdefence.mp453.05MB
- VB 2021 Virtual/Evolution after prosecution Psychedelic APT41.mp445.57MB
- VB 2021 Virtual/From match fixing to data exfiltration - a story of Messaging as a Service (MaaS).mp451.46MB
- VB 2021 Virtual/Hunting web skimmers with VirusTotal and YARA.mp439.91MB
- VB 2021 Virtual/LazyScripter from Empire to double RAT.mp428.27MB
- VB 2021 Virtual/Operation Bookcodes - targeting South Korea.mp425.77MB
- VB 2021 Virtual/Operation Newton Hi Kimsuky Did an Apple(seed) really fall on Newton’s head.mp425.91MB
- VB 2021 Virtual/Pay2Key - the newly discovered ransomware traced all the way to Iran.mp447.42MB
- VB 2021 Virtual/Ransomware a correlation between infection vectors and victims.mp426.42MB
- VB 2021 Virtual/Reverse Android malware like a Jedi Master.mp439.07MB
- VB 2021 Virtual/Sandworm reading the indictment between the lines.mp423.41MB
- VB 2021 Virtual/Security the hidden cost of Android stalkerware.mp430.82MB
- VB 2021 Virtual/Shades of Red RedXOR Linux backdoor and its Chinese origins.mp415.48MB
- VB 2021 Virtual/ShadowPad the masterpiece of privately sold malware in Chinese espionage.mp441.65MB
- VB 2021 Virtual/STK, A-OK Stopping messaging attacks on vulnerable SIMs.mp447.62MB
- VB 2021 Virtual/SubCrawl - a framework for the analysis and clustering of hacking tools found using open directories.mp437.42MB
- VB 2021 Virtual/The baffling Berserk Bear a decade’s activity targeting critical infrastructure.mp431.17MB
- VB 2021 Virtual/The keksec botnets we observed in the past year.mp442.65MB
- VB 2021 Virtual/The ‘Ghost Hand’ attack.mp441.73MB
- VB 2021 Virtual/Threat hunting from SolarWinds to Hafnium APT.mp425.37MB
- VB 2021 Virtual/UNC788 Iran’s decade of credential harvesting and surveillance operations.mp440.42MB
- VB 2021 Virtual/Uncovering automatic Obfuscation-as-a-Service for malicious Android applications.mp433.45MB
- VB 2021 Virtual/VB2021 localhost Day #1 live track.mp4423.67MB
- VB 2021 Virtual/VB2021 localhost Day #2 live track.mp4407.84MB
- VB 2021 Virtual/When malware changed its mind an empirical study of variable program behaviours in the real world.mp438.6MB
- VB 2021 Virtual/Where is the cuckoo egg.mp439.69MB
- VB 2021 Virtual/Your five most critical M365 vulnerabilities revealed and how to fix them (Partner Content).mp435.52MB
- VB 2022 Prague/Combating control flow flattening in - NET malware Georgy Kucherin Kaspersky.mp428.26MB
- VB 2022 Prague/Creepy things that glow in the dark a deep look @ POLONIUM's undocumented tools Robert Lipovsky ESET.mp424MB
- VB 2022 Prague/Encryption time flies when you're having fun the case of the exotic BlackCat ransomware Aleksandar M.mp426.33MB
- VB 2022 Prague/Exploit archaeology a forensic history of in the wild NSO Group exploits Donncha Ó Cearbhaill Amnest.mp433.28MB
- VB 2022 Prague/Hunting the AndroidBianLian botnet Axelle Apvrille Fortinet.mp437.12MB
- VB 2022 Prague/Keynote address Why are you telling me this Hakan Tanriverdi Bayerischer Rundfunk.mp446.64MB
- VB 2022 Prague/Lazarus & BYOVD evil to the Windows core Peter Kalnai & Matěj Havránek ESET.mp430.35MB
- VB 2022 Prague/Lessons learned from six Lapsus$ incident responses Gabriela Nicolao & Santiago Abastante Deloitte.mp439.94MB
- VB 2022 Prague/Not Safe for Windows NSFW a China based threat with a lot to say Jono Davis PwC.mp435.33MB
- VB 2022 Prague/Operation Dragon Castling suspected APT group hijacks WPS Office updater to target East Asian bettin.mp429.77MB
- VB 2022 Prague/Russian wipers in the cyberwar against Ukraine Alexander Adamov NioGuard Security Lab.mp438.3MB
- VB 2022 Prague/Sha Zhu Pan cocktail of cryptocurrency, social engineering and fake apps targeting Android and iPhon.mp431.09MB
- VB 2022 Prague/SHAREM shellcode analysis framework with emulation, a disassembler, and timeless debugging VERONA La.mp441.05MB
- VB 2022 Prague/The long arm of the prisoner social engineering from Kenyan prisons Patricia Musomba.mp426.68MB
- VB 2022 Prague/Tracking the entire iceberg - long term APT malware C2 protocol emulation and scanning Takahiro Haru.mp426.18MB
- VB 2022 Prague/Uncovering a broad criminal ecosystem powered by one of the largest botnets, Glupteba Luca Nagy Goog.mp427.97MB
- VB 2022 Prague/Unmasking WindTape Patrick Wardle Objective See.mp441.09MB
- VB 2022 Prague/You OTA know combating malicious Android system updaters Łukasz Siewierski & Alec Guertin Google.mp431.99MB
- VB 2022 Prague/Zeroing in on XENOTIME analysis of the entities responsible for the Triton event Joe Slowik Gigamon.mp434.29MB
不会用的朋友看这里
把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载!
亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:[email protected]
概述
838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题
它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息
838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪
838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统