Tag: vb2018
-
VB2018 paper: Anatomy of an attack: detecting and defeating CRASHOVERRIDE
At VB2017 in Madrid, ESET researchers Anton Cherepanov and Robert Lipovsky presented a last-minute paper on Industroyer, a malware framework that was responsible for the December 2016 blackout in Ukraine. The attack was perhaps less noteworthy for what it achieved (a relatively short blackout) than for the potential it signalled. Such was the premise of…
-
VB2018 paper: Anatomy of an attack: detecting and defeating CRASHOVERRIDE
At VB2017 in Madrid, ESET researchers Anton Cherepanov and Robert Lipovsky presented a last-minute paper on Industroyer, a malware framework that was responsible for the December 2016 blackout in Ukraine. The attack was perhaps less noteworthy for what it achieved (a relatively short blackout) than for the potential it signalled. Such was the premise of…
-
VB2018 presentation: Levelling up: why sharing threat intelligence makes you more competitive
Here at VB we often talk about the importance of sharing intelligence, and many of us coming into the industry for the first time have been genuinely surprised by the willingness to share information among competitors. Yet even within this relatively open industry, there are still barriers to sharing threat intelligence data, be they technical,…
-
VB2018 presentation: Levelling up: why sharing threat intelligence makes you more competitive
Here at VB we often talk about the importance of sharing intelligence, and many of us coming into the industry for the first time have been genuinely surprised by the willingness to share information among competitors. Yet even within this relatively open industry, there are still barriers to sharing threat intelligence data, be they technical,…
-
VB2018 paper: The modality of mortality in domain names
The current generation of security professionals is probably more familiar with the way DNS works than they are with phone books, which are still often used as an analogy to explain DNS. Domains play a crucial role in most cyber attacks, from the very advanced to the very mundane; being able to take down or…
-
VB2018 paper: The modality of mortality in domain names
The current generation of security professionals is probably more familiar with the way DNS works than they are with phone books, which are still often used as an analogy to explain DNS. Domains play a crucial role in most cyber attacks, from the very advanced to the very mundane; being able to take down or…
-
VB2018 paper: Analysing compiled binaries using logic
Static analysis of malware is usually “done by a person (a security analyst) who will stare at one binary code for hours, searching for patterns – the signatures,” writes Thaís Moreira Hamasaki in her VB2018 paper. To make the analysis process faster and more effective, analysts tend to use various tools and techniques. One lesser…
-
VB2018 paper: Analysing compiled binaries using logic
Static analysis of malware is usually “done by a person (a security analyst) who will stare at one binary code for hours, searching for patterns – the signatures,” writes Thaís Moreira Hamasaki in her VB2018 paper. To make the analysis process faster and more effective, analysts tend to use various tools and techniques. One lesser…
-
VB2018 paper: Internet balkanization: why are we raising borders online?
Sir Tim Berners-Lee, inventor of the world wide web, said “I hope we use the Net to cross barriers and connect cultures”. Yet increasingly we are seeing barriers being raised not only in the real world, but on the Internet as well. The Great Firewall of China is widely known, but the Chinese goverment is…
-
VB2018 paper: Internet balkanization: why are we raising borders online?
Sir Tim Berners-Lee, inventor of the world wide web, said “I hope we use the Net to cross barriers and connect cultures”. Yet increasingly we are seeing barriers being raised not only in the real world, but on the Internet as well. The Great Firewall of China is widely known, but the Chinese goverment is…