41:24 Vietnamese Hacking Group : A Rising of Information Stealing Campaigns Going Global botconf eu 228 views - 9 months ago
26:54 A Taxonomic Overview of Prevalent Malware Communication Strategies botconf eu 329 views - 1 year ago
27:30 Malware distribution at scale – The ecosystem of TA577 - Fabian Marquardt botconf eu 792 views - 1 year ago
38:08 IoT Malware and Rookit Detections Using Electromagnetic Insights Unveiling the Unseen botconf eu 383 views - 1 year ago
36:00 Monitoring 1st stage samples used by APTs and crime actors using images - Jose Luis Sanchez Martinez botconf eu 652 views - 1 year ago
33:50 GenRex Demonstration Level Up Your Regex Game - Dominika Regéciová botconf eu 165 views - 1 year ago
31:03 Unveiling the Shadows The Dark Alliance between GuLoader and Remcos - Alexey Bukhteyev Arie Olshtein botconf eu 580 views - 1 year ago
27:08 The Supershell and its widespread Botnet - Chetan Raghuprasad botconf eu 383 views - 1 year ago
27:43 LightSpy2 feature rich mobile surveillance tool set - Victor Chebyshev botconf eu 258 views - 1 year ago
31:12 Evasions Fest of Korean Android Financial Menace – FakeCalls - Raman Ladutska and Bohdan Melnykov botconf eu 169 views - 1 year ago
22:18 Eastern Asian Android Assault – FluHorse - Alexandr Shamshur and Raman Ladutska botconf eu 219 views - 1 year ago
31:11 Unplugging PlugX Sinkholing the PlugX USB worm botnet - Félix Aimé and Charles Meslay botconf eu 738 views - 1 year ago
41:54 I'm a Bad Noodle! An Analysis of Noodle RAT Shared among China nexus Groups - Hiroaki Hara botconf eu 983 views - 1 year ago
40:16 When a botnet cries: detecting botnets infection chains - Erwan Chevalier; Guillaume Couchard botconf eu 390 views - 2 years ago
45:42 MCRIT: The MinHash-based Code Relationship & Investigation Toolkit botconf eu 551 views - 2 years ago
33:08 Perfect Smoke and Mirrors of Enemy: Following Lazarus group by tracking DeathNote... - Seongsu Park botconf eu 543 views - 2 years ago
24:03 The Plague of Advanced Bad Bots : Deconstructing the Malicious Bot Problem - Yohann Sillam botconf eu 232 views - 2 years ago
28:42 Asylum Ambuscade: Crimeware or cyberespionage? - Matthieu Faou botconf eu 246 views - 2 years ago
30:46 From Words to Intelligence: Leveraging the Cyber Operation Constraint Principle, Natural Language... botconf eu 257 views - 2 years ago
15:16 A student’s guide to free and open-source enterprise level malware analysis tooling - Max Kersten botconf eu 392 views - 2 years ago
22:26 The Case For Real Time Detection of Data Exchange Over the DNS Protocol - Yarin Ozery botconf eu 197 views - 2 years ago
44:27 Operation drIBAN: insight from modern banking frauds behind Ramnit - Federico Valentini botconf eu 317 views - 2 years ago
43:02 Yara Studies: A Deep Dive into Scanning Performance - Dominika Regéciová botconf eu 370 views - 2 years ago
34:01 From GhostNet to PseudoManuscrypt - The evolution of Gh0st RAT - Jorge Rodriguez; Souhail Hammou botconf eu 922 views - 2 years ago
29:47 Iron Tiger Enhances its TTPs and Targets Linux and MacOS Users - Daniel Lunghi botconf eu 305 views - 2 years ago
34:06 Syslogk Linux Kernel Rootkit - Executing Bots via “Magic Packets” - David Álvarez Pérez botconf eu 511 views - 2 years ago
24:31 Read The Manual Locker: A Private RaaS Provider - Max 'Libra' Kersten botconf eu 199 views - 2 years ago
24:33 Cyber Swachhta Bharat- India’s answer to botnet and malware ecosystems? - Pratiksha Ashok botconf eu 179 views - 2 years ago
30:35 Digital threats against civil society in the rest of the world - Martijn Grooten botconf eu 218 views - 2 years ago
41:25 You OTA Know: Combating Malicious Android System Updaters - Łukasz Siewierski; Alec Guertin; botconf eu 655 views - 2 years ago
25:52 A dissection of the KmsdBot - Larry W. Cashdollar; Allen West botconf eu 189 views - 2 years ago
26:03 RAT as a Ransomware - An Hybrid Approach - Nirmal Singh; Avinash Kumar; Niraj Shivtarkar (Co-author) botconf eu 337 views - 2 years ago
29:40 Privateloader – The Malware Behind A Havoc-Wreaking Pay-Per-Install Service botconf eu 905 views - 3 years ago
41:06 Proxychaos: A Year-In-Review Of Microsoft Exchange Exploitation botconf eu 155 views - 3 years ago
22:03 Detecting And Disrupting Compromised Devices Based On Their Communication Patterns To Legitimate Web botconf eu 151 views - 3 years ago