vb2020.vblocalhost.com
Open in
urlscan Pro
165.22.18.111
Public Scan
Submitted URL: https://vb2020.vblocalhost.com/
Effective URL: https://vb2020.vblocalhost.com/conference/
Submission: On December 22 via manual from NL — Scanned from NL
Effective URL: https://vb2020.vblocalhost.com/conference/
Submission: On December 22 via manual from NL — Scanned from NL
Form analysis
0 forms found in the DOMText Content
Cookie Policy Our site uses cookies We use cookies to give you the best possible experience on our website. By continuing to browse this site, you give consent for cookies to be used. For more details, please read ourCookie Policy Got It CONFERENCE VB2020 localhost is over, thank you for having joined us! * Home * Watch live * Watch on demand * Chat * Contact us * VB2021 CTA TIPS VB2020 localhost is over, thank you for having joined us! WELCOME TO VB2020 LOCALHOST! The 30th VB Conference is HERE - it’s free, it’s online and it’s packed with features. Welcome to VB2020 localhost, the annual and world-renowned Virus Bulletin international conference gone virtual! Like any VB conference, VB localhost features the latest and best research on malware, malicious actors and threat intelligence, but this time we bring you both live streamed and on-demand content for 3 days, as well as the company of your fellow security researchers from around the world, in the comfort of your own home. The live programme of the conference will be broadcast live from 16:00 to 20:00 UTC each day. You can join anytime, and re-watch, rewind or pause the live stream. Meanwhile, in the on-demand programme you will fine a wide selection of presentations that you can watch at your leisure, and our co-host, CTA, brings you eight presentations in the Threat Intelligence Practitioners' Summit (TIPS). What's more, you can join us and your fellow attendees on Discord for discussion, networking, QA and fun! Programme All Live Day 1 Live Day 2 Live Day 3 On Demand TIPS CATEGORY TIME (UTC) TITLE SPEAKER(S) Live Day 1 WEDNESDAY 30 SEPTEMBER 16:00 UTC 16:30 UTC A new Chinese APT ‘Evasive Panda’ group targets India and Hong Kong using a new variant of MgBot malware Hossein Jazi (Malwarebytes) & Jérôme Segura (Malwarebytes) Live Day 1 WEDNESDAY 30 SEPTEMBER 16:30 UTC 17:00 UTC The eye on the Nile: Egypt’s civil society under attack Aseel Kayal (Check Point Software Technologies) Live Day 1 WEDNESDAY 30 SEPTEMBER 17:00 UTC 17:30 UTC The fall of Domino – a preinstalled hostile downloader Łukasz Siewierski (Google) Live Day 1 WEDNESDAY 30 SEPTEMBER 17:45 UTC 18:15 UTC The days before R-Day: ransomware toolsets Gabor Szappanos (Sophos) & Vikas Singh (Sophos) Live Day 1 WEDNESDAY 30 SEPTEMBER 18:15 UTC 18:45 UTC To catch a Banshee: how Kimsuky’s tradecraft betrays its complementary campaigns and mission Sveva Vittoria Scenarelli (PwC) Live Day 1 WEDNESDAY 30 SEPTEMBER 19:00 UTC 19:30 UTC Attribution: a puzzle Paul Rascagneres (Cisco Talos) & Vitor Ventura (Cisco Talos) Live Day 1 WEDNESDAY 30 SEPTEMBER 19:30 UTC 20:00 UTC Why the security world should take stalkerware seriously David Ruiz (Malwarebytes) Live Day 2 THURSDAY 01 OCTOBER 16:00 UTC 16:30 UTC Hunting for Android 1-days: analysis of rooting ecosystem Eugene Rodionov (Google), Richard Neal (Google) & Lin Chen (Google) Live Day 2 THURSDAY 01 OCTOBER 16:30 UTC 17:00 UTC Who stole my 100,000 dollars’ worth of Bitcoin wallets – catch them all with new deceptive bait Tan Kean Siong (The Honeynet Project) Live Day 2 THURSDAY 01 OCTOBER 17:00 UTC 17:30 UTC SilentFade: unveiling Chinese malware abusing Facebook ad platform Sanchit Karve (Facebook) & Jennifer Urgilez (Facebook) Live Day 2 THURSDAY 01 OCTOBER 17:45 UTC 18:15 UTC LATAM financial cybercrime: competitors in crime sharing TTPs Jakub Souček (ESET) & Martin Jirkal (ESET) Live Day 2 THURSDAY 01 OCTOBER 18:15 UTC 18:45 UTC Hello from the OT side! Daniel Kapellmann Zafra (FireEye) Live Day 2 THURSDAY 01 OCTOBER 19:00 UTC 19:30 UTC Growth and commoditization of remote access trojans Veronica Valeros (Czech Technical University in Prague) & Sebastian García (Czech Technical University in Prague) Live Day 2 THURSDAY 01 OCTOBER 19:30 UTC 20:00 UTC A true virus on macOS Patrick Wardle (Jamf) Live Day 3 FRIDAY 02 OCTOBER 16:00 UTC 16:30 UTC Graphology of an exploit – hunting for exploits by looking for the author’s fingerprints Itay Cohen (Check Point Research) & Eyal Itkin (Check Point Research) Live Day 3 FRIDAY 02 OCTOBER 16:30 UTC 17:00 UTC ML Security Evasion Competition 2020 Zoltan Balazs (CUJO AI) & Hyrum Anderson (Microsoft) Live Day 3 FRIDAY 02 OCTOBER 17:00 UTC 17:30 UTC Hunting for malware with command line logging and process trees Ivan Vanja Svajcer (Cisco Talos) Live Day 3 FRIDAY 02 OCTOBER 17:45 UTC 18:15 UTC Tonto Team: exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (Trend Micro) & Jaromir Horejsi (Trend Micro) Live Day 3 FRIDAY 02 OCTOBER 18:15 UTC 18:45 UTC XDSpy: stealing government secrets since 2011 Matthieu Faou (ESET) & Francis Labelle (ESET) Live Day 3 FRIDAY 02 OCTOBER 19:00 UTC 19:30 UTC InvisiMole: first-class persistence through second-class exploits Zuzana Hromcová (ESET) Live Day 3 FRIDAY 02 OCTOBER 19:30 UTC 20:00 UTC Clippy left some traces Christiaan Beek (McAfee) On Demand 2030: backcasting the potential rise and fall of cyber threat intelligence Jamie Collier (FireEye) On Demand A new open-source hypervisor-level malware monitoring and extraction system – current state and further challenges Michał Leszczyński (CERT Polska) & Krzysztof Stopczański (CERT Polska (Former)) On Demand Advanced Pasta Threat: mapping threat actor usage of open-source offensive security tools Paul Litvak (Intezer) On Demand Anchor, Bazar, and the Trickbot connection Daniel Frank (Cybereason) & Lior Rochberger (Cybereason) On Demand Another threat actor day… Paul Jung (Excellium Services) On Demand APT Hackers-for-Hire: Time to update your Threat Models (Partner Content) Liviu Arsene (Bitdefender) & Andra Cazacu (Bitdefender) On Demand Behind the Black Mirror: simulating attacks with mock C2 servers Scott Knight (VMware) On Demand Chasing the digital pirates: unveiling the container threats Tejas Girme (Qualys) On Demand Clandestine hunter: two strategies for supply chain attack Byeongjae Kim (Korea Internet & Security Agency), Taewoo Lee (Korea Internet & Security Agency), Sojun Ryu (Korea Internet & Security Agency) & Dongwook Kim (Korea Internet & Security Agency) On Demand Compromising IoT C&C panels for unearthing infections Dr Aditya K. Sood (F5 Networks) & Rohit Bansal (SecNiche Security Labs) On Demand Context-aware detection: the future of cybersecurity? Rohit Satpathy (The PC Security Channel) On Demand Dancing samba with Dolphins: tracking a Brazilian threat actor moving to Europe Carlos Rubio (Blueliv) On Demand Dissecting fleeceware apps: the million-dollar money-making machine in Android and iOS Jagadeesh Chandraiah (Sophos) On Demand Emerging trends in malware downloaders Dr. Nirmal Singh (Zscaler), Deepen Desai (Zscaler) & Avinash Kumar (Zscaler) On Demand Emissary (Pandas) in the Middle East James Shank (Team Cymru) & Jacomo Piccolini (Team Cymru) On Demand Evolution of Excel 4.0 macro weaponization James Haughom (VMware), Stefano Ortolani (VMware) & Baibhav Singh (VMware) On Demand Ghost Mach-O: an analysis of Lazarus’ Mac-malware innovations Dinesh Devadoss (K7 Computing) On Demand GuLoader? No, CloudEyE. Flattening the attack curve of the top malicious dropper Alexey Bukhteyev (Check Point Software Technologies) & Arie Olshtein (Check Point Software Technologies) On Demand Hidden risks of advertisements Doina Cosovan (Security Scorecard) & Cătălin Liță (Security Scorecard) On Demand Just-in-time deception to detect credential-stuffing bots Abhishek Singh (Prismo Systems), Manish Sardiwal (Prismo Systems) & Ramesh Mani (Prismo Systems) On Demand Lightweight emulation based IoC extraction for Gafgyt botnets Ya Liu (Qihoo 360) On Demand Like bees to a honeypot – a journey through honeypots Matthias Meidinger (VMRay) On Demand Most sophisticated technique of the year goes to… Kalpesh Mantri (Quick Heal) On Demand NetWalking on sunshine Thibault Seret (McAfee) & Jeffrey Sman (McAfee) On Demand One year later: challenges for young anti-malware products today Sorin Mustaca (Endpoint Cybersecurity) On Demand Operation LagTime IT: colourful Panda footprint Fumio Ozawa (NTT Security), Shogo Hayashi (NTT Security) & Rintaro Koike (NTT Security) On Demand Payment required: rare HTTP statuses and air-gaps avoidance from the authors of COMPFun Denis Legezo (Kaspersky) On Demand Ramsay: a cyber-espionage toolkit tailored for air-gapped networks Ignacio Sanmillan (ESET) On Demand She sells root shells by the C(++) shore Costin Ionescu (Broadcom) On Demand Standardized reporting with the Malware Behavior Catalog Desiree Beck (MITRE) On Demand Stealthy WastedLocker: eluding behaviour blockers, but not only Alexander Adamov (NioGuard Security Lab) On Demand TA505: attacking industries around the world Minhee Lee (Financial Security Institute) & Daegyu Kang (Financial Security Institute) On Demand Take care, spyware is slipping into your phones through Operation Poisoned News Nelson William Gamazo Sanchez (Trend Micro), Lilang Wu (Trend Micro), Elliot Cao (Trend Micro) & Ecular Xu (Trend Micro) On Demand The (f)utility of indicators Gabriela Nicolao (Deloitte) On Demand The NExt Big Sur(ge) on macOS Abhijit Kulkarni (Incrux Technologies) & Prakash Jagdale (Incrux Technologies) On Demand The rise of the info stealers Shai Alfasi (Reason Security) & Dana Yosifovich (Reason Security) On Demand Tracking rapid evolution? Copycat? Of an APT RAT in Asia Hiroshi Takeuchi (Macnica Networks) On Demand Transparency, trust and intention: what dismantling the heart of cyberattack public attribution reveals about warring minds Monica Lopez (LPNP) On Demand Unveiling the CryptoMimic Hajime Takai (NTT Security), Shogo Hayashi (NTT Security) & Rintaro Koike (NTT Security) TIPS TIPS #1 Opening Keynote: Collaborating with Competitors: A Better Strategy to Beat Adversaries Joe Levy (Sophos) TIPS TIPS #2 Business Email Compromise – Scalable Attribution Powering Industry and Law Enforcement Collaboration Pete Renals (Palo Alto Networks) TIPS TIPS #3 Creating Network Effects: Intelligence Sharing for Supply Chain Security Andrea Little Limbago (Interos) TIPS TIPS #4 Fireside Chat: Comfortably Numb Kathi Whitbey (Palo Alto Networks), Jeannette Jarvis (CTA) & Selena Larson (Dragos) TIPS TIPS #5 German Angst : Cybercrime Ecosystem in the DACH Region Abdelkader Cornelius (Recorded Future) TIPS TIPS #6 Panel: Flattening the Curve of Cyber-Risks Kathi Whitbey (Palo Alto Networks), Derek Manky (Fortinet), Righard Zwienenberg (ESET) & Noortje Henrichs (NCSC) TIPS TIPS #7 Ransomware Evolution in LATAM Fernando Cajeme Acosta Zertuche (TELMEX Scitum) & Imelda Flores (TELMEX Scitum) TIPS TIPS #8 Closing Keynote: Threatscaping like a CERT Noortje Henrichs (NCSC) Day 1 16:00-16:30 UTC A new Chinese APT ‘Evasive Panda’ group targets India and Hong Kong using a new variant of MgBot malware Hossein Jazi (Malwarebytes) & Jérôme Segura (Malwarebytes) Day 1 16:30-17:00 UTC The eye on the Nile: Egypt’s civil society under attack Aseel Kayal (Check Point Software Technologies) Day 1 17:00-17:30 UTC The fall of Domino – a preinstalled hostile downloader Łukasz Siewierski (Google) Day 1 17:45-18:15 UTC The days before R-Day: ransomware toolsets Gabor Szappanos (Sophos) & Vikas Singh (Sophos) Day 1 18:15-18:45 UTC To catch a Banshee: how Kimsuky’s tradecraft betrays its complementary campaigns and mission Sveva Vittoria Scenarelli (PwC) Day 1 19:00-19:30 UTC Attribution: a puzzle Paul Rascagneres (Cisco Talos) & Vitor Ventura (Cisco Talos) Day 1 19:30-20:00 UTC Why the security world should take stalkerware seriously David Ruiz (Malwarebytes) Day 2 16:00-16:30 UTC Hunting for Android 1-days: analysis of rooting ecosystem Eugene Rodionov (Google), Richard Neal (Google) & Lin Chen (Google) Day 2 16:30-17:00 UTC Who stole my 100,000 dollars’ worth of Bitcoin wallets – catch them all with new deceptive bait Tan Kean Siong (The Honeynet Project) Day 2 17:00-17:30 UTC SilentFade: unveiling Chinese malware abusing Facebook ad platform Sanchit Karve (Facebook) & Jennifer Urgilez (Facebook) Day 2 17:45-18:15 UTC LATAM financial cybercrime: competitors in crime sharing TTPs Jakub Souček (ESET) & Martin Jirkal (ESET) Day 2 18:15-18:45 UTC Hello from the OT side! Daniel Kapellmann Zafra (FireEye) Day 2 19:00-19:30 UTC Growth and commoditization of remote access trojans Veronica Valeros (Czech Technical University in Prague) & Sebastian García (Czech Technical University in Prague) Day 2 19:30-20:00 UTC A true virus on macOS Patrick Wardle (Jamf) Day 3 16:00-16:30 UTC Graphology of an exploit – hunting for exploits by looking for the author’s fingerprints Itay Cohen (Check Point Research) & Eyal Itkin (Check Point Research) Day 3 16:30-17:00 UTC ML Security Evasion Competition 2020 Zoltan Balazs (CUJO AI) & Hyrum Anderson (Microsoft) Day 3 17:00-17:30 UTC Hunting for malware with command line logging and process trees Ivan Vanja Svajcer (Cisco Talos) Day 3 17:45-18:15 UTC Tonto Team: exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (Trend Micro) & Jaromir Horejsi (Trend Micro) Day 3 18:15-18:45 UTC XDSpy: stealing government secrets since 2011 Matthieu Faou (ESET) & Francis Labelle (ESET) Day 3 19:00-19:30 UTC InvisiMole: first-class persistence through second-class exploits Zuzana Hromcová (ESET) Day 3 19:30-20:00 UTC Clippy left some traces Christiaan Beek (McAfee) On Demand 2030: backcasting the potential rise and fall of cyber threat intelligence Jamie Collier (FireEye) On Demand A new open-source hypervisor-level malware monitoring and extraction system – current state and further challenges Michał Leszczyński (CERT Polska) & Krzysztof Stopczański (CERT Polska (Former)) On Demand Advanced Pasta Threat: mapping threat actor usage of open-source offensive security tools Paul Litvak (Intezer) On Demand Anchor, Bazar, and the Trickbot connection Daniel Frank (Cybereason) & Lior Rochberger (Cybereason) On Demand Another threat actor day… Paul Jung (Excellium Services) On Demand APT Hackers-for-Hire: Time to update your Threat Models (Partner Content) Liviu Arsene (Bitdefender) & Andra Cazacu (Bitdefender) On Demand Behind the Black Mirror: simulating attacks with mock C2 servers Scott Knight (VMware) On Demand Chasing the digital pirates: unveiling the container threats Tejas Girme (Qualys) On Demand Clandestine hunter: two strategies for supply chain attack Byeongjae Kim (Korea Internet & Security Agency), Taewoo Lee (Korea Internet & Security Agency), Sojun Ryu (Korea Internet & Security Agency) & Dongwook Kim (Korea Internet & Security Agency) On Demand Compromising IoT C&C panels for unearthing infections Dr Aditya K. Sood (F5 Networks) & Rohit Bansal (SecNiche Security Labs) On Demand Context-aware detection: the future of cybersecurity? Rohit Satpathy (The PC Security Channel) On Demand Dancing samba with Dolphins: tracking a Brazilian threat actor moving to Europe Carlos Rubio (Blueliv) On Demand Dissecting fleeceware apps: the million-dollar money-making machine in Android and iOS Jagadeesh Chandraiah (Sophos) On Demand Emerging trends in malware downloaders Dr. Nirmal Singh (Zscaler), Deepen Desai (Zscaler) & Avinash Kumar (Zscaler) On Demand Emissary (Pandas) in the Middle East James Shank (Team Cymru) & Jacomo Piccolini (Team Cymru) On Demand Evolution of Excel 4.0 macro weaponization James Haughom (VMware), Stefano Ortolani (VMware) & Baibhav Singh (VMware) On Demand Ghost Mach-O: an analysis of Lazarus’ Mac-malware innovations Dinesh Devadoss (K7 Computing) On Demand GuLoader? No, CloudEyE. Flattening the attack curve of the top malicious dropper Alexey Bukhteyev (Check Point Software Technologies) & Arie Olshtein (Check Point Software Technologies) On Demand Hidden risks of advertisements Doina Cosovan (Security Scorecard) & Cătălin Liță (Security Scorecard) On Demand Just-in-time deception to detect credential-stuffing bots Abhishek Singh (Prismo Systems), Manish Sardiwal (Prismo Systems) & Ramesh Mani (Prismo Systems) On Demand Lightweight emulation based IoC extraction for Gafgyt botnets Ya Liu (Qihoo 360) On Demand Like bees to a honeypot – a journey through honeypots Matthias Meidinger (VMRay) On Demand Most sophisticated technique of the year goes to… Kalpesh Mantri (Quick Heal) On Demand NetWalking on sunshine Thibault Seret (McAfee) & Jeffrey Sman (McAfee) On Demand One year later: challenges for young anti-malware products today Sorin Mustaca (Endpoint Cybersecurity) On Demand Operation LagTime IT: colourful Panda footprint Fumio Ozawa (NTT Security), Shogo Hayashi (NTT Security) & Rintaro Koike (NTT Security) On Demand Payment required: rare HTTP statuses and air-gaps avoidance from the authors of COMPFun Denis Legezo (Kaspersky) On Demand Ramsay: a cyber-espionage toolkit tailored for air-gapped networks Ignacio Sanmillan (ESET) On Demand She sells root shells by the C(++) shore Costin Ionescu (Broadcom) On Demand Standardized reporting with the Malware Behavior Catalog Desiree Beck (MITRE) On Demand Stealthy WastedLocker: eluding behaviour blockers, but not only Alexander Adamov (NioGuard Security Lab) On Demand TA505: attacking industries around the world Minhee Lee (Financial Security Institute) & Daegyu Kang (Financial Security Institute) On Demand Take care, spyware is slipping into your phones through Operation Poisoned News Nelson William Gamazo Sanchez (Trend Micro), Lilang Wu (Trend Micro), Elliot Cao (Trend Micro) & Ecular Xu (Trend Micro) On Demand The (f)utility of indicators Gabriela Nicolao (Deloitte) On Demand The NExt Big Sur(ge) on macOS Abhijit Kulkarni (Incrux Technologies) & Prakash Jagdale (Incrux Technologies) On Demand The rise of the info stealers Shai Alfasi (Reason Security) & Dana Yosifovich (Reason Security) On Demand Tracking rapid evolution? Copycat? Of an APT RAT in Asia Hiroshi Takeuchi (Macnica Networks) On Demand Transparency, trust and intention: what dismantling the heart of cyberattack public attribution reveals about warring minds Monica Lopez (LPNP) On Demand Unveiling the CryptoMimic Hajime Takai (NTT Security), Shogo Hayashi (NTT Security) & Rintaro Koike (NTT Security) TIPS TIPS #1 Opening Keynote: Collaborating with Competitors: A Better Strategy to Beat Adversaries Joe Levy (Sophos) TIPS TIPS #2 Business Email Compromise – Scalable Attribution Powering Industry and Law Enforcement Collaboration Pete Renals (Palo Alto Networks) TIPS TIPS #3 Creating Network Effects: Intelligence Sharing for Supply Chain Security Andrea Little Limbago (Interos) TIPS TIPS #4 Fireside Chat: Comfortably Numb Kathi Whitbey (Palo Alto Networks), Jeannette Jarvis (CTA) & Selena Larson (Dragos) TIPS TIPS #5 German Angst : Cybercrime Ecosystem in the DACH Region Abdelkader Cornelius (Recorded Future) TIPS TIPS #6 Panel: Flattening the Curve of Cyber-Risks Kathi Whitbey (Palo Alto Networks), Derek Manky (Fortinet), Righard Zwienenberg (ESET) & Noortje Henrichs (NCSC) TIPS TIPS #7 Ransomware Evolution in LATAM Fernando Cajeme Acosta Zertuche (TELMEX Scitum) & Imelda Flores (TELMEX Scitum) TIPS TIPS #8 Closing Keynote: Threatscaping like a CERT Noortje Henrichs (NCSC) * Home * Watch live * Watch on demand * Chat * Contact us * VB2021 CTA TIPS #vblocalhost Copyright © 1989-2020 Virus Bulletin Privacy Policy Code of Conduct Cookie Policy Terms of Use VB Conference Archives VB Certification Services