2022-01-14 | Malware, Penny Stocks, Pharma Spam Necurs Delivers Jaeson Schultz | 28:54 | 7 | |
|
2022-01-14 | Automation Of Internet Of Things Botnets Takedown By An ISP Sébastien Mériot | 25:09 | 4 | |
|
2022-01-14 | Malware Uncertainty Principle Maria Jose Erquiaga | 14:24 | 2 | |
|
2022-01-14 | An Overview of the CMS Brute Forcing Malware Landscape Anna Shirokova | 29:45 | 1 | |
|
2022-01-14 | RetDec An Open Source Machine Code Decompiler Jakub Kroustek, Peter Matula | 37:16 | 21 | |
|
2022-01-14 | PWS, Common, Ugly but Effective Paul Jung | 26:42 | 1 | |
|
2022-01-14 | Malpedia A Collaborative Effort to Inventorize the Malware Landscape Daniel Plohmann | 58:36 | 2 | |
|
2022-01-14 | Advanced Threat Hunting Robert Simmons | 47:12 | 7 | |
|
2022-01-14 | The makes me Wannacry Investigation Alan Neville | 26:38 | 3 | |
|
2022-01-14 | Malware, Penny Stocks, Pharma Spam Necurs Delivers Jaeson Schultz | 28:54 | 2 | |
|
2022-01-14 | Hunting Attacker Activities Keisuke Muda Shusei Tomonaga | 28:14 | 4 | |
|
2022-01-14 | BlueHat v18 False Flag Foibles | 46:41 | 0 | |
|
2022-01-14 | BlueHat v18 Mstic threat intelligence year in review | 30:26 | 11 | Review |
|
2022-01-14 | BlueHat v18 Tales from the SOC | 48:17 | 1 | |
|
2022-01-14 | BlueHat v18 Overt Command & Control The Art of Blending In | 41:40 | 1 | |
|
2022-01-14 | Attacking Linux Moose 2 0 Unraveled an EGO MARKET Masarah Paquet Clouston, Olivier Bilodeau | 42:24 | 2 | |
|
2022-01-14 | LURK The Story about Five Years of Activity Vladimir Kropotov | 29:05 | 2 | |
|
2022-01-14 | Tracking Exploit Kits John Bambenek | 44:48 | 2 | |
|
2022-01-14 | Browser based Malware Evolution and Prevention Andrey Kovalev, Evgeny Sidorov | 31:59 | 2 | |
|
2022-01-14 | MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration | 3:13:53 | 0 | |
|
2022-01-14 | Vawtrak Banking Trojan A Threat to the Banking Ecosystem Raashid Bhat, Victor Acin | 45:48 | 10 | |
|
2022-01-14 | Detecting the Behavioral Relationships of Malware Connections Sebastián Garcia | 22:42 | 0 | |
|
2022-01-14 | Snoring Is Optional The Economics of Cyber Insurance and Malware Wayne Crowder | 48:01 | 0 | |
|
2022-01-14 | Function Identification and Recovery Signature Tool Angel Villegas | 39:19 | 0 | |
|
2022-01-14 | Takedown client server botnets the ISP way Quảng Trần | 32:16 | 3 | |
|
2022-01-14 | Advanced Incident Detection and Threat Hunting using Sysmon and Splunk Tom Ueltschi | 39:05 | 29 | |
|
2022-01-14 | Analysis of Free Movies and Series Websites Guided by Users Search Terms Luis A Benthin Sanguino | 25:27 | 3 | Guide |
|
2022-01-14 | Preventing File Based Botnet Persistence and Growth Kurtis Armour | 32:09 | 3 | |
|
2022-01-14 | How Does Dridex Hide Friends Sébastien Larinier, Alexandra Toussaint | 25:44 | 9 | |
|
2022-01-14 | Improve DDoS Botnet Tracking With Honeypots Ya Liu | 29:55 | 8 | |
|
2022-01-14 | ISFB, Still Live and Kicking Maciej Kotowicz | 37:40 | 6 | |
|
2022-01-14 | BoxBotNet | 29:00 | 1 | |
|
2022-01-14 | Mobile botnet malware collection | 23:12 | 1 | |
|
2022-01-14 | The missing piece in threat intelligence | 50:32 | 2 | |
|
2022-01-14 | Building a better botnet DGA mousetrap separating mice, rats and cheese in DNS data | 18:41 | 5 | |
|
2022-01-14 | Mostly Polish threat landscape not only VBKlip | 29:06 | 1 | |
|
2022-01-14 | Building a hybrid experimental platform for mobile botnet research | 33:09 | 2 | |
|
2022-01-14 | The Story of Cryptowall | 32:37 | 6 | |
|
2022-01-14 | Powered by JavaScript | 26:34 | 0 | |
|
2022-01-14 | DGA clustering and analysis mastering modern, evolving threats | 26:02 | 2 | |
|
2022-01-14 | Practical Experiences of Building an IPFIX Based Open Source Botnet Detector | 37:24 | 3 | |
|
2022-01-14 | Travelling to the far side of Andromeda | 36:27 | 3 | |
|
2022-01-14 | A moose once bit my honeypot A story of an embedded Linux botnet | 43:56 | 1 | |
|
2022-01-14 | Sality | 30:51 | 2 | |
|
2022-01-14 | DGArchive A deep dive into domain generating malware | 50:28 | 1 | |
|
2022-01-14 | Air gap limitations and bypass techniques | 45:22 | 1 | |
|
2022-01-14 | Sandbox detection for the masses leak, abuse, test | 20:21 | 2 | |
|
2022-01-14 | Inside traffic exchange networks | 28:35 | 3 | |
|
2022-01-14 | Takedowns case studies and what we all could be doing better | 49:28 | 0 | |
|
2022-01-14 | Automatically classifying unknown bots by the register messages | 23:14 | 1 | |
|
2022-01-14 | Make It count An analysis of a brute forcing botnet | 24:57 | 4 | |
|
2022-01-14 | Behavior driven development in malware analysis | 33:47 | 0 | |
|
2022-01-14 | Malware Instrumentation Application to Regin Analysis | 38:05 | 14 | |
|
2022-01-14 | Paul Jung Bypassing Sandboxes for Fun | 32:44 | 3 | |
|
2022-01-14 | Peter Kalnai & Jaromir Horejsi Chinese Chicken Multiplatform DDoS Botnets | 30:39 | 2 | |
|
2022-01-14 | Pedro Camelo & Joao Moura CONDENSER A Graph Based Approach for Detecting Botnets | 26:28 | 1 | |
|
2022-01-14 | Peter Kleissner Virus Tracker | 45:57 | 31 | |
|
2022-01-14 | Dennis Schwarz The Russian DDoS One Booters to Botnets | 33:12 | 2 | |
|
2022-01-14 | Osama Kamal DNS Analytics, Case Study | 14:46 | 3 | |
|
2022-01-14 | Dennis Schwarz The Russian DDoS One Booters to Botnets 1 | 33:12 | 3 | |
|
2022-01-14 | Martijn Grooten and Joao Gouveia The Many Faces of Mevade | 39:06 | 2 | |
|
2022-01-14 | Karine e Silva How to Dismantle a Botnet the Legal Behind the Scenes | 33:49 | 3 | Guide |
|
2022-01-14 | Maciej Kotowicz Malware Calling | 17:41 | 8 | |
|
2022-01-14 | Julien Lavesque Perdix a framework for realtime behavioral evaluation of security threats in cloud | 23:26 | 1 | |
|
2022-01-14 | Thomas Chopitea The hunter becomes the hunted analyzing network traffic to track down botnets | 37:26 | 3 | |
|
2022-01-14 | Enrico Branca Using cyber intelligence to detect and localize botnets | 23:42 | 6 | |
|
2022-01-14 | Thanh Dinh Ta Efficient Program Exploration by Input Fuzzing | 17:27 | 1 | |
|
2022-01-14 | Jason Jones BladeRunner Adventures in Tracking Botnets | 51:25 | 5 | |
|
2022-01-14 | David D He Reputation based Life course Trajectories of Illicit Forum Members | 30:05 | 0 | |
|
2022-01-14 | Botconf 2013 live stream | 1:50 | 5 | |
|
2022-01-14 | S Larinier and Guillaume Arcas Exploit Krawler New Weapon againt Exploits Kits | 33:37 | 0 | |
|
2022-01-14 | Vasileios Friligkos Back to life, back to correlation | 19:14 | 6 | |
|
2022-01-14 | S Duquette The Home and CDorked campaigns Widespread Malicious Modification of Webservers for Mass | 50:59 | 0 | |
|
2022-01-14 | Jaap van Oss Europol and European law enforcement action against botnets | 39:31 | 3 | |
|
2022-01-14 | Ivan Fontarensky Disass | 11:41 | 8 | |
|
2022-01-14 | Ronan Mouchoux DNS Resolution Traffic Analysis Applied to Bot Detection | 28:44 | 7 | |
|
2022-01-14 | Hendrik Adrian and Dhia Mahjoub The power of a team work Management of Dissecting a Fast Flux Bo | 34:09 | 10 | |
|
2022-01-14 | Prakhar Prasad and Himanshu Sharma Zombies in your browser | 20:54 | 9 | |
|
2022-01-14 | Tom Ueltschi My Name is Hunter, Ponmocup Hunter | 59:26 | 4 | |
|
2022-01-14 | Thomas Siebert Advanced Techniques in Modern Banking Trojans | 39:07 | 5 | |
|
2022-01-14 | Paul Rascagne APT1 Technical Backstage | 29:28 | 3 | |
|
2022-01-14 | Etienne Stalmans Spatial Statistics as a Metric for Detecting Botnet C2 Servers | 48:36 | 9 | |
|
2022-01-13 | Ramón Soto Mathiesen Hacking on PKF files | 50:31 | 4 | |
|
2022-01-13 | rand niseq rethinking how live visual art is made | 46:41 | 0 | |
|
2022-01-13 | Electronic conference badges | 37:13 | 0 | |
|
2022-01-13 | Kameraer og ansigtsgenkendelse i det offentlige rum og hjælp til politikere | 1:54:07 | 0 | |
|
2022-01-13 | Jenny List Emergency Manufacturing Coordination As A Legacy of COVID 19 | 44:05 | 12 | |
|
2022-01-13 | Christian Panton Open Banking how open | 52:29 | 0 | |
|
2022-01-13 | Anders Kjærulff Money Talks | 54:51 | 3 | |
|
2022-01-13 | Rasmus Malver Privacy 2020 What's happening and what can we do 2 | 49:12 | 0 | |
|
2022-01-13 | Christian Panton ALPR in Denmark | 51:33 | 2 | |
|
2022-01-13 | Asbjørn W A Flügge COVID 19 and the digital Future of Work in Job Placement | 28:56 | 1 | |
|
2022-01-13 | Lasse Leegaard Networking at Roskilde Festival | 56:35 | 5 | |
|
2022-01-13 | Bornhack 2020 Kickoff | 1:24:52 | 1 | |
|
2022-01-13 | Mike Mikjær Made in Denmark | 51:47 | 5 | |
|
2022-01-13 | Rasmus Malver Privacy 2020 What's happening and what can we do | 42:57 | 3 | |
|
2022-01-13 | Niels G W S Failed Projects Just Move On | 39:11 | 1 | |
|
2022-01-13 | Hello World | 54:47 | 1 | |
|
2022-01-13 | Poul Henning Kamp Datamuseum dk Lokaler søges | 56:41 | 20 | |
|
2022-01-13 | Janus Troelsen Utreexo A dynamic hash based accumulator data structure | 39:07 | 9 | |
|