We are excited to welcome our newest VB2025 partners!

Since our last announcement, the following companies have joined us:

๐ŸŒŸ Amazon as a Gold partner
๐Ÿฅˆ Gen as a Silver partner
๐Ÿฅ‰ Clean Software Alliance (CSA), Fortinet, and Varist as Bronze partners
๐Ÿค TotalAV in our Getting Connected tier

Join these industry leaders and showcase your brand among the global cybersecurity community at #VB2025.

Partnership opportunities are still available, find out more on our website! ๐Ÿ‘‰ https://tinyurl.com/sa2djyfc

How does Russiaโ€™s Sandworm unit exploit pirated software to target Ukraine?

Join Arda Buyukkaya from EclecticIQ at VB2025 in Berlin to uncover how cyber operations can turn everyday behaviour into large-scale threats.

๐Ÿ“… Sept 25 | 09:30โ€“10:00 | Green Room

Find out more about this talk ๐Ÿ‘‰ https://tinyurl.com/e9anehex

#VB2025 #cybersecurity #conference #networking

A little taste of whatโ€™s coming up at VB2025 ๐ŸŽฌ

We canโ€™t wait to see so many of you in Berlin this September.

If you havenโ€™t registered yet, nowโ€™s the time: Early Bird ends this week ๐ŸŽŸ๏ธ

Secure your place now ๐Ÿ‘‰https://tinyurl.com/4ujjvf7v

#vb2025 #cybersecurity #berlin

Early Bird ticket prices for VB2025 are ending soon!

If youโ€™re planning to join us in Berlin this September, nowโ€™s the time to grab your ticket before prices go up. ๐ŸŽŸ๏ธ

90+ speakers, 3 days of talks and networking with the global cybersecurity community. ๐ŸŒ

๐Ÿ—“๏ธ 24โ€“26 September 2025
๐Ÿ“JW Marriott Hotel, Berlin

๐Ÿ‘‰ Get your Early Bird ticket here: https://tinyurl.com/4ujjvf7v

#vb2025 #cybersecurity #conference #networking #berlin #earlybird

Later this year, I will be speaking at #VB2025 (link) about the full RE of Akirav2, a piece of ransomware written in Rust. For the many people who've asked me about methods and techniques that can go all the way to fully take apart an actual malicious Rust binary found ITW: congratulations, you've lived long enough to regret your wish.
Virus Bulletin :: VB2025

VB2025 Berlin 24-26 September 2025

The Super Early Bird has flown away - SOLD OUT!

But donโ€™t worryโ€ฆ you can still be an Early Bird ๐Ÿฆ

Join us at VB2025, the worldโ€™s leading cybersecurity conference, where global experts, top-tier researchers, and industry leaders come together.

๐Ÿ“… 24โ€“26 September 2025
๐Ÿ“ JW Marriott Hotel, Berlin

๐ŸŽŸ๏ธ Early Bird tickets now available โ€“ but for a limited time only!

๐Ÿ‘‰ Donโ€™t miss out: https://tinyurl.com/bdds3zmy

#vb2025 #cybersecurity #berlin #conference #earlybird #infosec

We are pleased to announce and welcome onboard the first four partners of #VB2025: @TalosSecurity, Fortect, ReasonLabs and the Cyber Threat Alliance. Find out how to join them and make your company visible among security peers: https://www.virusbulletin.com/conference/vb2025/partners/

Cybersecurity has no borders, and neither do we. ๐ŸŒ

From the Channel Islands in โ€™93 to Berlin in 2025, the Virus Bulletin Conference has brought together the cybersecurity world for over 30 years.

๐Ÿง  30+ conferences
๐ŸŒ 500+ companies
๐Ÿค Thousands of researchers, defenders, and thinkers

...and weโ€™re just getting started.

Will you be there for the next chapter?

๐Ÿ—“๏ธ 24โ€“26 September 2025
๐Ÿ“JW Marriott Hotel, Berlin

๐Ÿ‘‰https://tinyurl.com/mpfzxyj3

#vb2025 #cybersecurity #berlin #conference #networking

Virus Bulletin :: VB2025

VB2025 Berlin 24-26 September 2025

The wait is over: The VB2025 programme is here.

Three days of bold ideas, sharp minds, and real-world security insight - live in Berlin.

Weโ€™re incredibly proud of the speaker line-up and can't wait to welcome the VB community from around the world.

๐Ÿ‘€ Tickets? Coming very soon.

Follow us and be first to know when they go on sale!

๐Ÿ—“๏ธ 24โ€“26 September 2025
๐Ÿ“JW Marriott Hotel, Berlin

๐Ÿ‘‰ https://www.virusbulletin.com/conference/vb2025/programme

#VB2025 #Cybersecurity #Infosec #Berlin

Virus Bulletin :: VB2025 programme

VB2025, 24 - 26 September, Berlin, Germany

Looking forward to presenting at #VB2025 in Berlin this Sept! My colleague and I will dive into a Chinese state-sponsored attack, detailing its FUD XOML execution techniques & the novel use of Google Calendar for C2 communications in an #APT operation.