Watch on demand
Watch on demand

Watch on demand
  • Home
  • Watch live
  • Watch on demand
  • Chat
  • Contact us
  • VB2021
CTA TIPS

ON DEMAND

2030: backcasting the potential rise and fall of cyber threat intelligence

Programme Separator
Jamie Collier (FireEye)
26:48
ON DEMAND

A new open-source hypervisor-level malware monitoring and extraction system – current state and further challenges

Programme Separator
Michał Leszczyński (CERT Polska) & Krzysztof Stopczański (CERT Polska (Former))
33:32
ON DEMAND

Advanced Pasta Threat: mapping threat actor usage of open-source offensive security tools

Programme Separator
Paul Litvak (Intezer)
39:04
ON DEMAND

Anchor, Bazar, and the Trickbot connection

Programme Separator
Daniel Frank (Cybereason) & Lior Rochberger (Cybereason)
22:00
ON DEMAND

Another threat actor day…

Programme Separator
Paul Jung (Excellium Services)
31:36
ON DEMAND

APT Hackers-for-Hire: Time to update your Threat Models (Partner Content)

Programme Separator
Liviu Arsene (Bitdefender) & Andra Cazacu (Bitdefender)
31:39
ON DEMAND

Behind the Black Mirror: simulating attacks with mock C2 servers

Programme Separator
Scott Knight (VMware)
27:30
ON DEMAND

Chasing the digital pirates: unveiling the container threats

Programme Separator
Tejas Girme (Qualys)
23:44
ON DEMAND

Clandestine hunter: two strategies for supply chain attack

Programme Separator
Byeongjae Kim (Korea Internet & Security Agency), Taewoo Lee (Korea Internet & Security Agency), Sojun Ryu (Korea Internet & Security Agency) & Dongwook Kim (Korea Internet & Security Agency)
26:17
ON DEMAND

Compromising IoT C&C panels for unearthing infections

Programme Separator
Dr Aditya K. Sood (F5 Networks) & Rohit Bansal (SecNiche Security Labs)
35:06
ON DEMAND

Context-aware detection: the future of cybersecurity?

Programme Separator
Rohit Satpathy (The PC Security Channel)
21:28
ON DEMAND

Dancing samba with Dolphins: tracking a Brazilian threat actor moving to Europe

Programme Separator
Carlos Rubio (Blueliv)
19:43
ON DEMAND

Dissecting fleeceware apps: the million-dollar money-making machine in Android and iOS

Programme Separator
Jagadeesh Chandraiah (Sophos)
27:17
ON DEMAND

Emerging trends in malware downloaders

Programme Separator
Dr. Nirmal Singh (Zscaler), Deepen Desai (Zscaler) & Avinash Kumar (Zscaler)
38:17
ON DEMAND

Emissary (Pandas) in the Middle East

Programme Separator
James Shank (Team Cymru) & Jacomo Piccolini (Team Cymru)
22:25
ON DEMAND

Evolution of Excel 4.0 macro weaponization

Programme Separator
James Haughom (VMware), Stefano Ortolani (VMware) & Baibhav Singh (VMware)
35:00
ON DEMAND

Ghost Mach-O: an analysis of Lazarus’ Mac-malware innovations

Programme Separator
Dinesh Devadoss (K7 Computing)
24:49
ON DEMAND

GuLoader? No, CloudEyE. Flattening the attack curve of the top malicious dropper

Programme Separator
Alexey Bukhteyev (Check Point Software Technologies) & Arie Olshtein (Check Point Software Technologies)
24:03
ON DEMAND

Hidden risks of advertisements

Programme Separator
Doina Cosovan (Security Scorecard) & Cătălin Liță (Security Scorecard)
40:56
ON DEMAND

Just-in-time deception to detect credential-stuffing bots

Programme Separator
Abhishek Singh (Prismo Systems), Manish Sardiwal (Prismo Systems) & Ramesh Mani (Prismo Systems)
19:38
ON DEMAND

Lightweight emulation based IoC extraction for Gafgyt botnets

Programme Separator
Ya Liu (Qihoo 360)
23:37
ON DEMAND

Like bees to a honeypot – a journey through honeypots

Programme Separator
Matthias Meidinger (VMRay)
30:01
ON DEMAND

Most sophisticated technique of the year goes to…

Programme Separator
Kalpesh Mantri (Quick Heal)
16:23
ON DEMAND

NetWalking on sunshine

Programme Separator
Thibault Seret (McAfee) & Jeffrey Sman (McAfee)
29:23
ON DEMAND

One year later: challenges for young anti-malware products today

Programme Separator
Sorin Mustaca (Endpoint Cybersecurity)
19:31
ON DEMAND

Operation LagTime IT: colourful Panda footprint

Programme Separator
Fumio Ozawa (NTT Security), Shogo Hayashi (NTT Security) & Rintaro Koike (NTT Security)
35:15
ON DEMAND

Payment required: rare HTTP statuses and air-gaps avoidance from the authors of COMPFun

Programme Separator
Denis Legezo (Kaspersky)
26:25
ON DEMAND

Ramsay: a cyber-espionage toolkit tailored for air-gapped networks

Programme Separator
Ignacio Sanmillan (ESET)
41:41
ON DEMAND

She sells root shells by the C(++) shore

Programme Separator
Costin Ionescu (Broadcom)
27:23
ON DEMAND

Standardized reporting with the Malware Behavior Catalog

Programme Separator
Desiree Beck (MITRE)
20:15
ON DEMAND

Stealthy WastedLocker: eluding behaviour blockers, but not only

Programme Separator
Alexander Adamov (NioGuard Security Lab)
10:03
ON DEMAND

TA505: attacking industries around the world

Programme Separator
Minhee Lee (Financial Security Institute) & Daegyu Kang (Financial Security Institute)
28:06
ON DEMAND

Take care, spyware is slipping into your phones through Operation Poisoned News

Programme Separator
Nelson William Gamazo Sanchez (Trend Micro), Lilang Wu (Trend Micro), Elliot Cao (Trend Micro) & Ecular Xu (Trend Micro)
27:45
ON DEMAND

The (f)utility of indicators

Programme Separator
Gabriela Nicolao (Deloitte)
31:12
ON DEMAND

The NExt Big Sur(ge) on macOS

Programme Separator
Abhijit Kulkarni (Incrux Technologies) & Prakash Jagdale (Incrux Technologies)
09:08
ON DEMAND

The rise of the info stealers

Programme Separator
Shai Alfasi (Reason Security) & Dana Yosifovich (Reason Security)
18:07
ON DEMAND

Tracking rapid evolution? Copycat? Of an APT RAT in Asia

Programme Separator
Hiroshi Takeuchi (Macnica Networks)
29:22
ON DEMAND

Transparency, trust and intention: what dismantling the heart of cyberattack public attribution reveals about warring minds

Programme Separator
Monica Lopez (LPNP)
20:58
ON DEMAND

Unveiling the CryptoMimic

Programme Separator
Hajime Takai (NTT Security), Shogo Hayashi (NTT Security) & Rintaro Koike (NTT Security)
28:43
TIPS

TIPS #1 Opening Keynote: Collaborating with Competitors: A Better Strategy to Beat Adversaries

Programme Separator
Joe Levy (Sophos)
33:45
TIPS

TIPS #2 Business Email Compromise – Scalable Attribution Powering Industry and Law Enforcement Collaboration

Programme Separator
Pete Renals (Palo Alto Networks)
26:01
TIPS

TIPS #3 Creating Network Effects: Intelligence Sharing for Supply Chain Security

Programme Separator
Andrea Little Limbago (Interos)
29:04
TIPS

TIPS #4 Fireside Chat: Comfortably Numb

Programme Separator
Kathi Whitbey (Palo Alto Networks), Jeannette Jarvis (CTA) & Selena Larson (Dragos)
39:32
TIPS

TIPS #5 German Angst : Cybercrime Ecosystem in the DACH Region

Programme Separator
Abdelkader Cornelius (Recorded Future)
28:10
TIPS

TIPS #6 Panel: Flattening the Curve of Cyber-Risks

Programme Separator
Kathi Whitbey (Palo Alto Networks), Derek Manky (Fortinet), Righard Zwienenberg (ESET) & Noortje Henrichs (NCSC)
27:14
TIPS

TIPS #7 Ransomware Evolution in LATAM

Programme Separator
Fernando Cajeme Acosta Zertuche (TELMEX Scitum) & Imelda Flores (TELMEX Scitum)
40:20
TIPS

TIPS #8 Closing Keynote: Threatscaping like a CERT

Programme Separator
Noortje Henrichs (NCSC)
24:52
  • Home
  • Watch live
  • Watch on demand
  • Chat
  • Contact us
  • VB2021
CTA TIPS
Watch on demand

#vblocalhost

Copyright © 1989-2020 Virus Bulletin
Privacy Policy Code of Conduct Cookie Policy Terms of Use VB Conference Archives VB Certification Services