VB2024 paper: Android Flutter malware, Axelle Apvrille
VB2024 paper: CeranaKeeper: a relentless shape-shifting group targeting Thailand, Romain Dumont
VB2024 paper: A wild RAT appears: reversing DinodasRAT on Linux, Anderson Leite & Fabio Marenghi
VB2024 paper: Reviewing the 2022 KA-SAT incident & implications for distributed communication environments, Joe Slowik
VB2024 paper: Dark deals: unveiling the underground market of exploits, Anna Pavlovskaia
VB2024 presentation: SO that looks suspicious: leveraging process memory and kernel/usermode probes to detect Shared Object injection at scale on Linux, Daniel Jary
VB2024 paper: P-wave of malicious code signing, Yuta Sawabe, Shogo Hayashi & Rintaro Koike
VB2024 paper: Project 0xA11C: deoxidizing the Rust malware ecosystem, Nicole Fishbein & Juan Andrés Guerrero-Saade
VB2024 paper: Sugarcoating KANDYKORN: a sweet dive into a sophisticated MacOS backdoor, Salim Bitam
VB2024 paper: Leveraging AI to enhance the capabilities of SHAREM Shellcode Analysis Framework, Bramwell Brizendine
VB2024 paper: Automatically detect and support against anti-debug with IDA/Ghidra to streamline debugging process, Takahiro Takeda
VB2024 paper: Go-ing arsenal: a closer look at Kimsuky’s Go strategic advancement, Jiho Kim, Sebin Lee & Sojun Ryu
VB2024 paper: Cybercrime turned cyber espionage: the many faces of the RomCom group, Vlad Stolyarov & Dan Black
VB2024 paper: Don't be a PUP-pet: exposing pay-per-install networks, Dmitrij Lenz & James Wyke
VB2024 paper: Ghosts from the past: become Gh0stbusters in 2024, Hiroshi Takeuchi
VB2024 paper: Shadow play: WildCard's malware campaigns amidst Israel-Hamas conflict, Nicole Fishbein & Ryan Robinson
VB2024 paper: Supercharge your malware analysis workflow, Kevin Hardy-Cooper & Ryan Samaroo
VB2024 paper: From code to crime: exploring threats in GitHub Codespaces, Jaromir Horejsi & Nitesh Surana
VB2024 paper: The Mask has been unmasked again, Georgy Kucherin & Marc Rivero López
VB2024 paper: CrackedCantil: a malware symphony delivered by cracked software; performed by loaders, infostealers, ransomware, et al., Lena Yu
VB2024 paper: Who plays on AZORult? An unknown attacker collects various data and spreads additional payloads with AZORult for around 5 years, Masaki Kasuya
VB2024 paper: Confronting the surge of macOS stealers in 2024, Kseniia Yamburh & Mykhailo Hrebeniuk
VB2024 paper: Code blue: energy, Righard Zwienenberg & Josep Albors
VB2024 paper: Marketplace scams: neanderthals hunting mammoths with Telekopye, Jakub Souček & Radek Jizba
VB2024 paper: Multimodal AI: the sixth sense for cyber defence, Younghoo Lee
VB2024 paper: Down the GRAYRABBIT hole - exposing UNC3569 and its mastermind, Steve Su, Aragorn Tseng, Chi-Yu You (YCY) & Cristiana Brafman Kittner
VB2024 paper: Hospitals, airports and telcos - modern approach to attributing hacktivism attacks, Itay Cohen
VB2024 paper: Breaking boundaries: investigating vulnerable drivers and mitigating risks, Jiří Vinopal
VB2024 paper: Life and DEaTH: building detection, forensics, and intelligence at scale, Selena Larson & Konstantin Klinger
VB2024 Workshop: Writing malware configuration parsers, Mark Lim & Zong-Yu Wu
VB2024 paper: Unveiling shadows: key tactics for tracking cyber threat actors, attribution, and infrastructure analysis
VB2024 paper: Open by default: the hidden cost of convenience in network security, Aurelio Picon
VB2024 paper: Octopus Prime: it didn't turn into a truck, but a widely spread Android botnet, Thibault Seret
VB2024 paper: Modern-day witchcraft: a new breed of hybrid attacks by ransomware operators, Vaibhav Deshmukh, Ashutosh Raina & Sudhanshu Dubey
VB2024 paper: Unveiling the dark side of set-top boxes: the Bigpanzi cybercrime syndicate, Alex Turing
VB2024 paper: The deck is stacked: analysis of OracleBamboo's SPYDEALER Android backdoor, Paul Rascagneres & Charles Gardner
VB2024 paper: Arming WinRAR: deep dive into APTs exploiting WinRAR’s 0-day vulnerability - a SideCopy case study, Sathwik Ram Prakki
VB2024 paper: Over the cassowary’s nest - dissecting Turla’s latest revision of the Kazuar backdoor, Daniel Frank & Tom Fakterman
VB2924 paper: TA577 walked just past you: indirect syscalls in Pikabot, Emre Güler
VB2024 paper: An open-source cloud DFIR kit - Dredge!, Santiago Abastante
VB2024 paper: Byteing back: detection, dissection and protection against macOS stealers, Patrick Wardle
VB2024 paper: Extending STIX 2.1 to capture malware incidents, Desiree Beck
VB2024 paper: Spot the difference: Earth Kasha's new LODEINFO campaign and the correlation analysis with APT10 umbrella, Hiroaki Hara
VB2024 paper: How to hunt geopolitically driven Bitter APT operations, Shengbin Bao
VB2024 TIPS presentation: Certified malware: a case for industry TI sharing of DigSig metadata, Samir Mody
VB2024 TIPS presentation: Bye Bye WarZone RAT (for now); Capturing Cybercriminals through #CoordindatedDisruption, Part 2, Sara Eberle & Mike Bordini
VB2024 TIPS presentation: Fireside chat: Achtung Baby! Cybersecurity insights with U2 (you too), Jeannette Jarvis, Selena Larson, Jeanette Miller-Osborn & Kathi Whitbey
VB2024 TIPS presentation: Unveiling cybersecurity impact: the role of published security findings in strengthening internet defence strategies, Slawek Grzonkowsi
VB2024 TIPS presentation: Panel: Briskets or biscuits: how to construct your CTI team, Noortje Henrichs, Hossein Hadian Jazi, Kathi Whitbey, Righard Zwienenberg
VB2024 TIPS presentation: Building resilience through collaboration: a data-driven and data-informed cyber threat intelligence sharing style guide based on STIX 2.1, Linda Beverly
VB2024 TIPS presentation: Indicator wranglin’ - an approach to dynamically typing IOCs with poor data context, Noah Dunn
VB2024 TIPS presentation: Adaptive protection put to the test, Zsomber Kovacs, Liam O'Murchu
VB2024 TIPS presentation: Stix and stones: enabling faster intelligence gathering with GenAI and OASIS, Kieran Hughes
VB2024 TIPS presentation: Operation Endgame, Marijn Schuurbiers
VB2024 opening keynote: Solving puzzles: protecting high-risk communities, Runa Sandvik
VB2024 closing keynote: May you live in interesting times, Brian Honan
VB2024 TIPS presentation: Radical transparency in cyber, Suzanne Spaulding
VB2024 presentation: Threat intelligence for high-risk communities, Martijn Grooten
VB2024 paper: IcePeony with the '996' work culture, Rintaro Koike & Shota Nakajima
VB2024 paper: Unmasking DarkPlum: inside the operations of DPRK’s elite cyber espionage group, Amata Anantaprayoon & Rintaro Koike
VB2024 paper: The Impersonators, Gabor Szappanos & Steeve Gaudreault
VB2024 paper: The dark dream of the Lumma malware developer, Raman Ladutska
VB2024 paper: RevivalStone: new puzzle posed by Winnti group, Yoshihiro Ishikawa & Takuma Matsumoto
VB2024 presentation: Mind the (air) gap: GoldenJackal gooses government guardrails, Matias Porolli
VB2024 paper: The Phantom Syndicate: a hacking collective with a North Korean allegiance, Youjin Lee
VB2024 paper: Tracking FIN7 malware honeypots, new AI deepfake lures, Zach Edwards
VB2024 paper: BEC and phishing targets local election candidate (me!), Andrew Brandt
VB2024 paper: All quiet on the signalling front? Dispatches from the front-line of telecom network security, Cathal Mc Daid
VB2024 paper: Proactively hunting for low-reputed infrastructure used by large cybercrimes and APTs, Mohamed Nabeel, Keerthiraj Nagaraj & Alex Starov
VB2024 paper: Origins of a logger - Agent Tesla, Berk Albayrak & Utku Çorbacı
VB2024 paper: A web of surveillance, Jurre van Bergen
VB2024 presentation: Getting cozy with milk and WARMCOOKIES, Daniel Stepanic
VB2024 TIPS presentation: Wrap-up, Michael Daniel