Parent directory/ | - | - |
VB2017 paper VirusTotal tips, tricks and myths.mp4 | 31.2 MiB | 2022 Jan 19 03:14 |
Walking in your enemy's shadow when fourth-party collection becomes attribution hell.mp4 | 30.4 MiB | 2022 Jan 19 03:14 |
The life story of an IPT - Inept Persistent Threat actor.mp4 | 28.7 MiB | 2022 Jan 19 03:14 |
Crypton - exposing malware's deepest secrets.mp4 | 28.3 MiB | 2022 Jan 19 03:14 |
Beyond lexical and PDNS using signals on graphs to uncover online threats at scale.mp4 | 27.6 MiB | 2022 Jan 19 03:14 |
Nine circles of Cerber.mp4 | 26.3 MiB | 2022 Jan 19 03:14 |
Modern reconnaissance phase on APT - protection layer.mp4 | 26.1 MiB | 2022 Jan 19 03:14 |
Last-minute paper Spora the saga continues a.k.a. how to ruin your research in a week.mp4 | 25.2 MiB | 2022 Jan 19 03:14 |
Industroyer biggest threat to industrial control systems since Stuxnet.mp4 | 24.7 MiB | 2022 Jan 19 03:14 |
Consequences of bad security in health care.mp4 | 24.0 MiB | 2022 Jan 19 03:14 |
Client Maximus raises the bar.mp4 | 24.0 MiB | 2022 Jan 19 03:14 |
Offensive malware analysis dissecting OSX FruitFly via a custom C&C server.mp4 | 23.4 MiB | 2022 Jan 19 03:14 |
Browser attack points still *****d by banking trojans.mp4 | 22.3 MiB | 2022 Jan 19 03:14 |
Turning Trickbot decoding an encrypted command-and-control channel.mp4 | 21.9 MiB | 2022 Jan 19 03:14 |
Last-minute paper FinFisher New techniques and infection vectors revealed.mp4 | 21.3 MiB | 2022 Jan 19 03:14 |
Exploring the virtual worlds of advergaming.mp4 | 21.0 MiB | 2022 Jan 19 03:14 |
Android reverse engineering tools not the usual suspects.mp4 | 20.6 MiB | 2022 Jan 19 03:14 |
The sprawling market of consumer spyware.mp4 | 19.1 MiB | 2022 Jan 19 03:14 |
The router of all evil more than just default passwords and silly scripts.mp4 | 18.5 MiB | 2022 Jan 19 03:14 |
Battlefield Ukraine finding patterns behind summer cyber attacks.mp4 | 18.1 MiB | 2022 Jan 19 03:14 |
The state of cybersecurity in Africa Kenya.mp4 | 13.7 MiB | 2022 Jan 19 03:14 |
Gábor Szappanos wins fourth Peter Szőr Award.mp4 | 8.4 MiB | 2022 Jan 19 03:14 |
Walking in your enemy's shadow when fourth-party collection becomes attribution hell.eng.srt | 61.9 KiB | 2021 Apr 05 15:49 |
Offensive malware analysis dissecting OSX FruitFly via a custom C&C server.eng.srt | 60.9 KiB | 2021 Apr 05 15:47 |
Modern reconnaissance phase on APT - protection layer.eng.srt | 56.3 KiB | 2021 Apr 05 15:47 |
Beyond lexical and PDNS using signals on graphs to uncover online threats at scale.eng.srt | 53.8 KiB | 2021 Apr 05 15:43 |
Exploring the virtual worlds of advergaming.eng.srt | 52.6 KiB | 2021 Apr 05 15:50 |
Turning Trickbot decoding an encrypted command-and-control channel.eng.srt | 48.2 KiB | 2021 Apr 05 15:44 |
Nine circles of Cerber.eng.srt | 47.6 KiB | 2021 Apr 05 15:43 |
The life story of an IPT - Inept Persistent Threat actor.eng.srt | 42.2 KiB | 2021 Apr 05 15:52 |
Client Maximus raises the bar.eng.srt | 42.1 KiB | 2021 Apr 05 15:52 |
Last-minute paper Spora the saga continues a.k.a. how to ruin your research in a week.eng.srt | 41.9 KiB | 2021 Apr 05 15:43 |
Industroyer biggest threat to industrial control systems since Stuxnet.eng.srt | 41.2 KiB | 2021 Apr 05 15:43 |
The sprawling market of consumer spyware.eng.srt | 39.4 KiB | 2021 Apr 05 15:48 |
VB2017 paper VirusTotal tips, tricks and myths.eng.srt | 37.8 KiB | 2021 Apr 05 15:46 |
Browser attack points still *****d by banking trojans.eng.srt | 37.7 KiB | 2021 Apr 05 15:49 |
Android reverse engineering tools not the usual suspects.eng.srt | 33.8 KiB | 2021 Apr 05 15:51 |
The router of all evil more than just default passwords and silly scripts.eng.srt | 33.0 KiB | 2021 Apr 05 15:46 |
Last-minute paper FinFisher New techniques and infection vectors revealed.eng.srt | 31.7 KiB | 2021 Apr 05 15:42 |
Gábor Szappanos wins fourth Peter Szőr Award.eng.srt | 13.3 KiB | 2021 Apr 05 15:51 |