InfoconDB
Toggle navigation
Support
About
InfoconDB
Virus Bulletin
VB2019
VB2019
VB2019
took place Oct. 2, 2019 through Oct. 4, 2019 (3 years, 7 months ago) in London, UK.
https://www.virusbulletin.com/conference/vb2019/
Presentations
Wednesday, Oct. 2, 2019
10:30 -
VB2019 opening address
10:50 -
Keynote address: Tales from the NCSC: the daily battle to defend a country in cyberspace
11:30 -
A vine climbing over the Great Firewall: a long-term attack against China
11:30 -
From industry report to classroom arrest
11:30 -
RetroMal: analysing malware on the earliest computing platforms
12:00 -
Inside Magecart: the history behind the covert card-skimming assault on the e-commerce industry
12:00 -
APT cases exploiting vulnerabilities in region-specific software
14:00 -
Absolutely routed!! Why routers are the new bullseye in cyber attacks
14:00 -
Domestic Kitten: an Iranian surveillance program
14:30 -
Problem child: common patterns in malicious parent-child relationships
14:30 -
DNS on fire
15:00 -
Thwarting Emotet email conversation thread hijacking with clustering
15:00 -
Geost botnet. The discovery story of a new Android banking trojan from an OpSec error
16:00 -
Operation Soft Cell - a worldwide campaign against telecommunication providers
16:00 -
Never before had Stierlitz been so close to failure
16:00 -
Countering tech abuse together
16:30 -
Static analysis methods for detection of Microsoft Office exploits
16:30 -
Abusing third-party cloud services in targeted attacks
17:00 -
Fantastic information and where to find it: a guidebook to open-source OT reconnaissance
17:00 -
The push for increased surveillance from fiction and its impact on privacy
Thursday, Oct. 3, 2019
09:00 -
Shinigami's revenge: the long tail of Ryuk malware
09:00 -
Simjacker - the next frontier in mobile espionage
09:00 -
Threat Intelligence Practitioners' Summit - welcome & opening remarks followed by keynote: Fuelling AI with threat intelligence
09:30 -
Attor: spy platform with curious GSM fingerprinting
09:30 -
Defeating APT10 compiler-level obfuscations
10:00 -
Chinese cyber espionage and the Belt & Road Initiative
10:00 -
Buhtrap metamorphosis: from cybercrime to cyber espionage (partner presentation)
10:00 -
Panel: How can you operationalize threat intelligence?
11:00 -
Who is SandCat: an unveiling of a lesser-known threat actor
11:00 -
Catch me if you can: detection of injection exploitation by validating query and API integrity
11:00 -
Keynote: Technical developments in sharing - a discussion of STIX 2.0 and MITRE's ATT&CK Framework
11:30 -
Fireside chat: Being a CISO at a cybersecurity company: a view from the hot seat
11:30 -
Spoofing in the reeds with Rietspoof
11:30 -
HELO, is that you? New challenges tracking Winnti activity
12:00 -
Targeted attacks through ISPs
12:00 -
Keynote: Nexus between OT and IT threat intelligence
12:00 -
Webcam interception and protection in kernel mode in Windows (partner presentation)
14:00 -
Finding drive-by rookies using an automated active observation platform
14:00 -
The art of the cashout: the evolution of attacks on payment systems
14:00 -
Panel: Bursting the myths about threat intelligence sharing
14:30 -
Keynote: Building secure sharing systems that treat humans as features not bugs
14:30 -
Discretion in APT: recent APT attack on crypto exchange employees
14:30 -
Exploring Emotet, an elaborate everyday enigma
15:00 -
The Bagsu banker case
15:00 -
Curious tale of 8.t used by multiple campaigns against South Asia
15:00 -
Panel: Where is threat intelligence headed?
16:00 -
Cyber espionage in the Middle East: unravelling OSX.WindTail
16:00 -
The cake is a lie! Uncovering the secret world of malware-like cheats in video games
16:00 -
A deep dive into iPhone exploit chains
16:30 -
Oops! It happened again!
16:30 -
Medical IoT for diabetes and cybercrime
Friday, Oct. 4, 2019
09:30 -
Play fuzzing machine - hunting iOS and macOS kernel vulnerabilities automatically and smartly
09:30 -
2,000 reactions to a malware attack - accidental study
09:30 -
I'm not going to die during this conference call: reflections on availability and burnout
10:00 -
Challenges for young anti-malware products today
10:00 -
Attribution is in the object: using RTF object dimensions to track APT phishing weaponizers
11:00 -
Rich headers: leveraging the mysterious artifact of the PE format
11:00 -
Politically targeted DNS in 2016 and 2020
11:00 -
Call the shots! Let's fight crime together
11:30 -
Why companies need to focus on a problem they do not know they have
11:30 -
A study of Machete cyber espionage operations in Latin America
12:00 -
Joining forces: transforming the Industry through diversity and data
12:00 -
Asterisk: a targeted VOIPspionage campaign
14:00 -
We need to talk - opening a discussion about ethics in infosec
14:00 -
Pulling the PKPLUG: the adversary playbook for the long-standing espionage activity of a Chinese nation state adversary
14:00 -
Kimsuky group: tracking the king of the spear-phishing
14:30 -
King of the hill: nation-state counterintelligence for victim deconfliction
14:30 -
Different ways to cook a Crab...
14:30 -
Exploring the Chinese DDoS landscape
15:30 -
Keynote address: The security products we deserve
16:10 -
Conference closing session
Presenters
Aamir Lakhani
Abhishek Singh
Adam Haertlé
Adolf Středa
Adrian Sanabria
Alexandre Mundo
Alex Hinchliffe
Amit Serper
Andrea Kaiser
Andrea Limbago
Andrei Bogdan Brad
Andrew Brandt
Anna Shirokova
Anton Cherepanov
Anurag Shandilya
Aseel Kayal
Assaf Dahan
Axelle Apvrille
Benoît Ancel
Bobby Filar
Bowen Pan
Brian Bartholomew
Cathal Mc Daid
Chester Wisniewski
Chintan Shah
Daniel Kapellmann Zafra
Daniel Lunghi
Dan Saunders
David Rodriguez
Debalina Ghosh
Denis Legezo
Derek Manky
Dhia Mahjoub
Eddy Willems
Gabriela Nicolao
Ghareeb Saad
Haroon Meer
Heather King
HeungSoo Kang
Hiroshi Soeda
Iris Haenen
Irving Méreau
Ivan Kwiatkowski
Ivan Macalintal
Jaeki Kim
Jamie Tomasello
Jan Sirmer
Jaromir Horejsi
Jason Zhang
Jean-Ian Boutin
Jeannette Jarvis
John Bambenek
John Cunniff
John Fokker
Juan Andrés Guerrero-Saade
Kamila Babayeva
Kathi Whitbey
Kathleen Whitbey
Kyoung-ju Kwak
Lilang Wu
Lion Gu
Lotem Finkelstein
Loucif Kharouni
Luca Nagy
Luciano Martins
Luigino Camastra
María José Erquiaga
Maria Rigaki
Marijn Schuurbiers (NHTCU)
Mark Kennedy
Martijn Grooten
Michael Maltsev
Michael Raggi
Michal Poslušný
Mika Ståhlberg
Min-Chang Jang
Miriam Cihodariu
Moony Li
Mor Levi
Nacho Sanmillan
Niranjan Jayanand
Oded Awaskar
Olivier Coutu
Pascal Geenens
Patrick Wardle
Paul Chichester
Paul Rascagnères
Peter Kálnai
Pierre-Luc Vaudry
Rachel G.
Ramesh Mani
Richard Matti
Richard Struse
Righard Zwienenberg
Rintaro Koike
Ross McKerchar
Saher Naumaan
Samir Mody
Santiago Martin Pontiroli
Sebastián García
Selena Larson
Sergei Shevchenko
Shusei Tomonaga
Sorin Mustaca
Speaker TBA
Stefano Ortolani
Takahiro Haruyama
Thomas Thomasen
Tomoaki Tani
Veronica Valeros
Vyacheslav Zakorzhevsky
Warren Mercer
Wataru Takahashi
Yonathan Klijnsma
Yosuke Chubachi
Zuzana Hromcová