本站已收录 番号和无损神作磁力链接/BT种子 

Virus Bulletin

种子简介

种子名称: Virus Bulletin
文件类型: 视频
文件数目: 195个文件
文件大小: 5.12 GB
收录时间: 2021-11-14 02:28
已经下载: 3
资源热度: 59
最近下载: 2024-6-9 00:41

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:2c1771c3e3fc39cfb82586a3010399d340df1474&dn=Virus Bulletin 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Virus Bulletin.torrent
  • VB 2007 Vienna/A different look at the VB2007 Conference in Vienna .mp49.04MB
  • VB 2008 Ottawa/Interview with John Hawes of Virus Bulletin.mp45.2MB
  • VB 2008 Ottawa/Security experts answer key questions at Virus Bulletin 2008.mp43.8MB
  • VB 2009 Geneva/The Virus Bulletin yodelling competition.mp41.72MB
  • VB 2010 Vancouver/Costin Raiu on Virus Bulletin 2010.mp411.36MB
  • VB 2010 Vancouver/Stuxnet demo in Virus Bulletin 2010 conference.mp43.46MB
  • VB 2010 Vancouver/VB2010 Social Network and Computer Security Panel Discussion.mp415.56MB
  • VB 2012 Dallas/Flashback OS X malware - VB2012 presentation by Broderick Aquilino (F-Secure).mp429.15MB
  • VB 2012 Dallas/Virus Bulletin 2012 Conference Overview.mp412.46MB
  • VB 2013 Berlin/An automatic analysis and detection tool for Java exploits.mp433.27MB
  • VB 2013 Berlin/Analysis of Android in-app advertisement kits.mp416.43MB
  • VB 2013 Berlin/Back channels and bitcoins - ZeroAccess' secret C&C communications.mp413.47MB
  • VB 2013 Berlin/Hacking Team and Gamma International in 'business-to-government malware'.mp417.95MB
  • VB 2013 Berlin/How to test properly - comparative web filter tests.mp440.81MB
  • VB 2013 Berlin/Hypervisor-based, hardware-assisted system monitoring.mp428.48MB
  • VB 2013 Berlin/PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file).mp416.28MB
  • VB 2013 Berlin/Statistically effective protection against APT attacks.mp420.52MB
  • VB 2013 Berlin/Surviving 0-days - reducing the window of exposure.mp414.95MB
  • VB 2013 Berlin/VB2013 Keynote - Ethics and the AV industry in the age of WikiLeaks.mp446.33MB
  • VB 2014 Seattle/.NET malware dynamic instrumentation for automated and manual analysis.mp419.58MB
  • VB 2014 Seattle/An in-depth analysis of abuse on Twitter.mp422.94MB
  • VB 2014 Seattle/Android packer - facing the challenges, building solutions.mp421.55MB
  • VB 2014 Seattle/Attack points in health apps & wearable devices - how safe is your quantified self.mp424.76MB
  • VB 2014 Seattle/Attack surface analysis of Tizen devices.mp426.32MB
  • VB 2014 Seattle/Back in BlackEnergy - 2014 targeted attacks in the Ukraine and Poland.mp417.64MB
  • VB 2014 Seattle/Bootkits - past, present & future.mp421.99MB
  • VB 2014 Seattle/Caphaw - the advanced persistent pluginer.mp419.52MB
  • VB 2014 Seattle/DMARC - how to use it to improve your email reputation.mp410.31MB
  • VB 2014 Seattle/DNSSEC - how far have we come.mp415.22MB
  • VB 2014 Seattle/Design to discover - security analytics with 3D visualization engine.mp419.89MB
  • VB 2014 Seattle/Duping the machine - malware strategies, post sandbox detection.mp416.64MB
  • VB 2014 Seattle/Early launch Android malware - your phone is 0wned (demo).mp42.14MB
  • VB 2014 Seattle/Early launch Android malware - your phone is 0wned.mp42.61MB
  • VB 2014 Seattle/Hiding the network behind the network. Botnet proxy business model.mp418.46MB
  • VB 2014 Seattle/Labelling spam through the analysis of protocol patterns.mp414.61MB
  • VB 2014 Seattle/Leaving our ZIP undone - how to abuse ZIP to deliver malware apps.mp419.75MB
  • VB 2014 Seattle/Methods of malware persistence on Mac OS X.mp423.85MB
  • VB 2014 Seattle/OPSEC for security researchers.mp430.5MB
  • VB 2014 Seattle/Optimized mal-ops. Hack the ad network like a boss.mp420.76MB
  • VB 2014 Seattle/P0wned by a barcode - stealing money from offline users.mp425.2MB
  • VB 2014 Seattle/Presentation of the 1st Peter Szor Award.mp46.75MB
  • VB 2014 Seattle/Protecting financial institutions from banking malware's man-in-the-browser attacks.mp421.74MB
  • VB 2014 Seattle/Quantifying maliciousness in Alexa top-ranked domains.mp420.42MB
  • VB 2014 Seattle/Smart home appliance security & malware.mp431.51MB
  • VB 2014 Seattle/Sweeping the IP space - the hunt for evil on the Internet.mp423.99MB
  • VB 2014 Seattle/Swipe away, we're watching you.mp430.3MB
  • VB 2014 Seattle/The evolution of webinjects.mp417.88MB
  • VB 2014 Seattle/Unveiling the kernel - rootkit discovery using selective automated kernel memory differencing.mp422.43MB
  • VB 2014 Seattle/We know it before you do - predicting malicious domains.mp412.9MB
  • VB 2014 Seattle/Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists.mp417.53MB
  • VB 2015 Prague/A quantitative examination of the current state of corporate security practices.mp432.96MB
  • VB 2015 Prague/Android ransomware - turning CryptoLocker into CryptoUnlocker.mp439.43MB
  • VB 2015 Prague/Anonymity is king.mp437.45MB
  • VB 2015 Prague/Attack on the drones - security vulnerabilities of unmanned aerial vehicles.mp441.14MB
  • VB 2015 Prague/Breaking the bank(er) - automated configuration data extraction for banking malware.mp437.11MB
  • VB 2015 Prague/Building a malware lab in the age of Big Data.mp433.68MB
  • VB 2015 Prague/C&C-as-a-Service - abusing third-party web services as C&C channels.mp436.88MB
  • VB 2015 Prague/Can we trust a trustee An in-depth look into the digitally signed malware industry.mp420.23MB
  • VB 2015 Prague/DDoS trojan - a malicious concept that conquered the ELF format.mp444.58MB
  • VB 2015 Prague/Dare 'DEVIL' - beyond your senses with Dex Visualizer.mp432.9MB
  • VB 2015 Prague/Dead and buried in their crypts - defeating modern ransomware.mp436.25MB
  • VB 2015 Prague/Digital 'Bian Lian' (face changing) - the skeleton key malware.mp445.15MB
  • VB 2015 Prague/Does prevalence matter Ranking anti-malware products by potential victim impact.mp436.02MB
  • VB 2015 Prague/Doing more with less - a study of file-less infection attacks.mp438.49MB
  • VB 2015 Prague/Economic sanctions on malware.mp440.64MB
  • VB 2015 Prague/Effectively testing APT defences.mp439.24MB
  • VB 2015 Prague/Evolution of Android exploits from a static analysis tools perspective.mp417.96MB
  • VB 2015 Prague/From Asia with love Smartphones with pre-installed malware.mp439.98MB
  • VB 2015 Prague/How they're getting the data out of your network.mp48.85MB
  • VB 2015 Prague/It has a EULA, it must be legit.mp417.32MB
  • VB 2015 Prague/It's a file infector... it's ransomware... it's Virlock.mp442.11MB
  • VB 2015 Prague/Keynote address - One man's anti-malware researcher is....mp455.1MB
  • VB 2015 Prague/Labeless - no more.mp424.97MB
  • VB 2015 Prague/Last-minute paper - Operation Potao Express - analysis of a cyber-espionage toolkit.mp445.38MB
  • VB 2015 Prague/Last-minute paper - The mysterious case of Linux.Wifatch.mp445.97MB
  • VB 2015 Prague/Linux Moose endangered or extinct An update on this atypical embedded Linux botnet.mp439.27MB
  • VB 2015 Prague/Making a dent in Russian mobile banking phishing.mp435.87MB
  • VB 2015 Prague/Mobile banking fraud via SMS in North America - who's doing it and how.mp438.47MB
  • VB 2015 Prague/Modelling the network behaviour of malware to block malicious patterns.mp439.43MB
  • VB 2015 Prague/Notes on click fraud - American story.mp419.9MB
  • VB 2015 Prague/POS fraud - trends and counter-actions to mass fraud.mp437.85MB
  • VB 2015 Prague/ROSCO - Repository Of Signed COde.mp440.19MB
  • VB 2015 Prague/Sizing cybercrime - incidents and accidents, hints and allegations.mp434.34MB
  • VB 2015 Prague/Solving the (in)security of home networked devices.mp436.02MB
  • VB 2015 Prague/Speaking Dyreza protocol. Advantages of 'learning' a new language.mp434.49MB
  • VB 2015 Prague/Tech Support Scams 2.0 - an inside look into the evolution of the classic Microsoft tech support scam.mp415.6MB
  • VB 2015 Prague/The Internet of Bad Things, Observed.mp456.93MB
  • VB 2015 Prague/The Kobayashi Maru dilemma.mp441.46MB
  • VB 2015 Prague/The TAO of .NET and PowerShell malware analysis.mp439.62MB
  • VB 2015 Prague/The Unbearable Lightness of APTing.mp441.02MB
  • VB 2015 Prague/The Volatility Bot-Excavator.mp418.67MB
  • VB 2015 Prague/The elephant in the room.mp439.53MB
  • VB 2015 Prague/The ethics and perils of APT research - an unexpected transition into intelligence brokerage.mp444.78MB
  • VB 2015 Prague/TurlaSat - The Fault in our Stars.mp436.55MB
  • VB 2015 Prague/Ubiquity, security and you - malware, security and the Internet of Things.mp434.87MB
  • VB 2015 Prague/WaveAtlas - surfing through the landscape of current malware packers.mp438.83MB
  • VB 2015 Prague/We know what you did this summer - Android banking trojan exposing its sins in the cloud.mp439.12MB
  • VB 2015 Prague/Will Android trojan, worm or rootkit survive in SEAndroid and containerization.mp433.51MB
  • VB 2016 Denver/APT Reports and OPSEC Evolution, or - These Are Not the APT Reports You Are Looking For.mp420.94MB
  • VB 2016 Denver/Defeating Sandbox Evasion - How to Increase Successful Emulation Rate in your Virtualized Environment.mp421.61MB
  • VB 2016 Denver/Getting Duped - Piggybacking on Webcam Streams for Surreptitious Recordings.mp420.75MB
  • VB 2016 Denver/Great Crypto Failures.mp421.98MB
  • VB 2016 Denver/Mobile Applications - a Backdoor into Internet of Things.mp416.78MB
  • VB 2016 Denver/Modern Attacks on Russian Financial Institutions.mp425.45MB
  • VB 2016 Denver/Neverquest - Crime as a Service and On the Hunt for the Big Bucks.mp421.36MB
  • VB 2016 Denver/Nymaim - the Untold Story.mp417.96MB
  • VB 2016 Denver/On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users.mp415.42MB
  • VB 2016 Denver/One-Click Fileless Infection.mp413.5MB
  • VB 2016 Denver/Open Source Malware Lab.mp416.05MB
  • VB 2016 Denver/Wave Your False Flags Deception Tactics Muddying Attribution in Targeted Attacks.mp418.71MB
  • VB 2017 Madrid/Battlefield Ukraine - finding patterns behind summer cyber attacks.mp418.43MB
  • VB 2017 Madrid/Beyond lexical and PDNS - using signals on graphs to uncover online threats at scale.mp424.23MB
  • VB 2017 Madrid/Consequences of bad security in health care.mp425.96MB
  • VB 2017 Madrid/Crypton - exposing malware's deepest secrets.mp429.95MB
  • VB 2017 Madrid/Gabor Szappanos wins fourth Peter Szor Award.mp49.2MB
  • VB 2017 Madrid/Industroyer - biggest threat to industrial control systems since Stuxnet.mp424.28MB
  • VB 2017 Madrid/Last-minute paper - FinFisher - New techniques and infection vectors revealed.mp420.32MB
  • VB 2017 Madrid/Last-minute paper - Spora - the saga continues a.k.a. how to ruin your research in a week.mp427.62MB
  • VB 2017 Madrid/Modern reconnaissance phase on APT - protection layer.mp425.1MB
  • VB 2017 Madrid/Nine circles of Cerber.mp427.88MB
  • VB 2017 Madrid/Offensive malware analysis - dissecting OSX FruitFly via a custom C&C server.mp423.25MB
  • VB 2017 Madrid/The router of all evil - more than just default passwords and silly scripts.mp417.37MB
  • VB 2017 Madrid/The sprawling market of consumer spyware.mp421.92MB
  • VB 2017 Madrid/The state of cybersecurity in Africa - Kenya.mp411.83MB
  • VB 2017 Madrid/Turning Trickbot - decoding an encrypted command-and-control channel.mp425.69MB
  • VB 2017 Madrid/VB2017 paper - VirusTotal tips, tricks and myths.mp428.15MB
  • VB 2017 Madrid/Walking in your enemy's shadow - when fourth-party collection becomes attribution hell.mp433.95MB
  • VB 2018 Montreal/Analysing compiled binaries using logic.mp418.66MB
  • VB 2018 Montreal/Behind the scenes of the SamSam investigation.mp428.41MB
  • VB 2018 Montreal/Botception - hire a botnet to spread one's own botnet.mp414.97MB
  • VB 2018 Montreal/Draw me like one of your French APTs - expanding o.mp431.59MB
  • VB 2018 Montreal/Foreverdays - tracking and mitigating threats targeting civil society orgs.mp441.15MB
  • VB 2018 Montreal/From Hacking Team to hacked team to….mp430.82MB
  • VB 2018 Montreal/From drive-by download to drive-by mining - understanding the new paradigm.mp432.69MB
  • VB 2018 Montreal/Hide'n'Seek - an adaptive peer-to-peer IoT botnet.mp416.66MB
  • VB 2018 Montreal/Internet balkanization why are we raising borders.mp424.96MB
  • VB 2018 Montreal/Little Brother is watching - we know all your secrets.mp431.74MB
  • VB 2018 Montreal/Now you see it, now you don't - wipers in the wild.mp424.94MB
  • VB 2018 Montreal/Office bugs on the rise.mp438.76MB
  • VB 2018 Montreal/Shedding skin - Turla's fresh faces.mp433.44MB
  • VB 2018 Montreal/The Big Bang Theory by APT-C-23.mp429.52MB
  • VB 2018 Montreal/The modality of mortality in domain names.mp424.59MB
  • VB 2018 Montreal/The wolf in sheep's clothing - undressed.mp426.23MB
  • VB 2018 Montreal/Triada - the past, the present and the (hopefully not existing) future.mp428.32MB
  • VB 2018 Montreal/Unpacking the packed unpacker reversing an Android.mp427.55MB
  • VB 2018 Montreal/Where have all the good hires gone.mp419.47MB
  • VB 2018 Montreal/Who wasn't responsible for Olympic Destroyer (Paul Rascagneres & Warren Mercer).mp429.06MB
  • VB 2019 London/A vine climbing over the Great Firewall a long-term attack against China.mp421.9MB
  • VB 2019 London/Absolutely routed Why routers are the new bullseye in cyber attacks.mp423.62MB
  • VB 2019 London/Buhtrap metamorphosis from cybercrime to cyber espionage.mp422.97MB
  • VB 2019 London/Exploring Emotet, an elaborate everyday enigma.mp424.47MB
  • VB 2019 London/Geost botnet. The discovery story of a new Android banking trojan from an OpSec error.mp422.07MB
  • VB 2019 London/Keynote address The security products we deserve.mp440.05MB
  • VB 2019 London/Oops It happened again.mp425.28MB
  • VB 2019 London/Shinigami's revenge the long tail of Ryuk malware.mp423.21MB
  • VB 2019 London/Thwarting Emotet email conversation thread hijacking with clustering.mp420.78MB
  • VB 2019 London/Webcam interception and protection in kernel mode in Windows.mp436.97MB
  • VB 2020 Virtual/2030 backcasting the potential rise and fall of cyber threat intelligence.mp428.78MB
  • VB 2020 Virtual/A new open-source hypervisor-level malware monitoring and extraction system.mp427.52MB
  • VB 2020 Virtual/Advanced Pasta Threat mapping threat actor usage of open-source offensive security tools.mp437.99MB
  • VB 2020 Virtual/Anchor, Bazar, and the Trickbot Connection.mp420.43MB
  • VB 2020 Virtual/Another threat actor day.mp430.07MB
  • VB 2020 Virtual/Behind the Black Mirror Simulating attacks with mock C2 servers.mp435.22MB
  • VB 2020 Virtual/Chasing the Digital Pirates Unveiling the Container Threats.mp419.57MB
  • VB 2020 Virtual/Clandestine hunter two strategies for supply chain attack.mp428.1MB
  • VB 2020 Virtual/Compromising IOT C&C Panels for Unearthing Infections.mp432.22MB
  • VB 2020 Virtual/Context Aware Detection The future of cybersecurity.mp417.03MB
  • VB 2020 Virtual/Dancing samba with Dolphins tracking a Brazilian threat actor moving to Europe.mp417.35MB
  • VB 2020 Virtual/Dissecting fleeceware apps the million-dollar money-making machine in Android and iOS.mp433.7MB
  • VB 2020 Virtual/Emerging trends in malware downloaders.mp451.16MB
  • VB 2020 Virtual/Emissary (Pandas) in the Middle East.mp434.95MB
  • VB 2020 Virtual/Evolution of Excel 4.0 Macro Weaponization.mp458.42MB
  • VB 2020 Virtual/Ghost Mach-O an analysis of Lazarus’ Mac-malware innovations.mp429.54MB
  • VB 2020 Virtual/GuLoader No, CloudEyE. Flattening the attack curve of the top malicious dropper.mp431.52MB
  • VB 2020 Virtual/Hidden risks of advertisements.mp438.79MB
  • VB 2020 Virtual/Just in time, deception to detect Credential Stuffing Bot.mp416.26MB
  • VB 2020 Virtual/Lightweight emulation based IoC extraction for Gafgyt botnets.mp438.09MB
  • VB 2020 Virtual/Like bees to a honeypot - a journey through honeypots.mp424.87MB
  • VB 2020 Virtual/Most sophisticated technique of the year goes to.mp422.46MB
  • VB 2020 Virtual/NetWalking on Sunshine.mp439.96MB
  • VB 2020 Virtual/One year later Challenges for young anti-malware products today.mp421.89MB
  • VB 2020 Virtual/Operation LagTime IT colourful Panda footprint.mp437.51MB
  • VB 2020 Virtual/Payment required rare HTTP statuses and air-gaps avoidance from the authors of COMPFun.mp431.4MB
  • VB 2020 Virtual/Ramsay A cyber-espionage toolkit tailored for air-gapped networks.mp445.18MB
  • VB 2020 Virtual/She sells root shells by the C() shore.mp423.62MB
  • VB 2020 Virtual/Standardized reporting with the Malware Behavior Catalog.mp423.66MB
  • VB 2020 Virtual/Stealthy WastedLocker eluding behavior blockers, but not only.mp418.44MB
  • VB 2020 Virtual/TA505 attacking industries around the world.mp422.05MB
  • VB 2020 Virtual/Take care, spyware is slipping into your phones through Operation Poisoned News.mp438.31MB
  • VB 2020 Virtual/The (f)utility of indicators.mp449.21MB
  • VB 2020 Virtual/The NExt Big Sur(ge) on macOS.mp48.08MB
  • VB 2020 Virtual/The rise of the info stealers.mp422.46MB
  • VB 2020 Virtual/Tracking Rapid Evolution Copycat of An APT RAT in Asia.mp423.51MB
  • VB 2020 Virtual/Transparency, Trust and Intention What dismantling the heart of cyberattack public attribution.mp416.18MB
  • VB 2020 Virtual/Unveiling the CryptoMimic.mp435.83MB