-
New
#VB2019 paper & presentation: Uncovering the secret world of malware-like cheats in video games -@spontiroli discusses the growing illegal economy around video game cheats https://www.virusbulletin.com/blog/2020/02/vb2019-paper-cake-lie-uncovering-secret-world-malware-cheats-video-games/ …pic.twitter.com/iY1OuMAP4A
-
New
#VB2019 paper & presentation: Rich headers: leveraging the mysterious artifact of the PE format - by@ESETresearch researchers Peter Kálnai and Michal Poslušný https://www.virusbulletin.com/blog/2020/01/vb2019-paper-rich-headers-leveraging-mysterious-artifact-pe-format/ …pic.twitter.com/C9dYSXTU5e
-
"Defeating APT10 compiler-level obfuscations"
#VB2019 slides https://www.virusbulletin.com/uploads/pdf/conference_slides/2019/VB2019-Haruyama.pdf … -
I am a little bit touched by the kind things G DATA's researchers said about
#VB2019 https://www.gdatasoftware.com/blog/2019/10/35363-the-place-to-be … -
#VB2019 has released the vid of our closing talk: “The Products we Deserve” https://youtu.be/GHuQC1qLnJ4 It’s light weekend watching & hopefully gets more ppl to see that we can push back against “the way things have been done” That we can build products & companies that suck less. pic.twitter.com/qkRG1rOE9b
-
It's our LAST home weekend of regular season! Come out to support your Beaver Volleyball squad and honor our lone upperclassmen, 2 seniors, Emily Ivey and Summer Goss! 7pm vs. Loras
#BuckUp#VB2019#SeniorNightpic.twitter.com/3Tmj74wAnX -
#Kimsuky group: tracking the king of the spear-phishing The slides of my#VB2019 talk are available! - PDF: http://bit.ly/VB2019_Kimsuky - PIC: http://bit.ly/VB2019_Kimsuky_Maltego … (White-paper coming later!) I hope that it'll be helpful to many researchers:) Thanks@virusbtn &@martijn_grooten -
The slides of our
#VB2019 talk are available! https://www.virusbulletin.com/uploads/pdf/conference_slides/2019/VB2019-LunghiHorejsi.pdf … The idea is to give examples of cloud service providers being abused by#APT actors, and how, as defenders, we can leverage it to get more information on such threat actors. Video and paper coming later!pic.twitter.com/75TsN0xIYb
-
Just posted slides from my VirusBulletin talk: "Cyber-espionage in the Middle East: Unravelling OSX.WindTail"


#VB2019#TalkingNerdy Link: https://www.patreon.com/posts/30491908 pic.twitter.com/GoL3hkADwF
-
It was a pleasure to present at
#VB2019 our research on 9 years of Machete activity. We looked at more than 176 campaigns! Thanks to my partners in this research@mrigaki@_kamifai_ and@eldracote!
pic.twitter.com/rlhyINvXyL
-
Nice talk by
@JusticeRage on Ethics in Security at#VB2019. A topic that should be more often and openly discussed! pic.twitter.com/u04tWFTOII
-
Great historical analysis on the Machete espionage framework by
@verovaleros and@mrigaki at#VB2019 pic.twitter.com/FCeSlaLveG
-
#RichHeaders and how do the#cybercriminals leverage this a bit mysterious artifact.@pkalnai and Michal Poslusny speaking right now at#VB2019. Thumbs up guys for using#ESETresearch Twitter logo on the big stage.pic.twitter.com/coGk2tP41d
-
I don't know what to write & my froglish does not help. But I am so happy. Winning Péter Szőr award is amazing. Years ago I discovered Péter & later this prize. I dreamt to get it & we received it. Thank you. Ty
#VB2019. Ty@martijn_grooten. Ty@SecurityBeard & ty@TalosSecuritypic.twitter.com/4XGH65gR1V
-
“This industry needs smart people. But even more, it needs kind people.”
@martijn_grooten in memory of Péter Szőr
#VB2019 -
Had a talk on
#Emotet at#VB2019 and I am still alive
What’s more I have so much fun here! I have huge fears from public speaking but I faced it!
Besides, I’m super grateful for being nominated to Péter Szőr award with my Matrix ransomware research! It’s an incredible honour!
pic.twitter.com/Dgx7cNnbAr
Prikaži ovu nit -
About to give my talk at
#VB2019 on using ML and graph theory to identify malicious process chains in event data. Slides here: https://docs.google.com/presentation/d/16lV9UZ7ox0YYTCyTPVVRLLoGmmHOdOs_pGJ5_2Tikmg/edit#slide=id.p1 … -
Sigma - the idea was to create an exchange format that allows you to write a rule before the speaker finishes his talk
#VB2019#BlueMashroom Rule https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_apt_bluemashroom.yml …pic.twitter.com/yD13RBxOdX
-
We are super proud and happy to be nominated for the Péter Szőr Award this year with our DNS hijacking research! See you in few hours for our
#VB2019 talk with@SecurityBeardpic.twitter.com/ve7zMmDXgO
-
The Thursday 3 October I'll discuss cybercrime at
#VB2019 I'll try to explain how the carding business works internally through different anecdotes and cool stories collected in 2019. The topic will cover botnets and the industry around and the money laundering networks CYA o/ pic.twitter.com/bsBGMFgiWE
Prikaži ovu nit
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.