Veronica Valeros

Logo

I'm verovaleros, a hacker, researcher, and artist. I work at the Stratosphere Cybersecurity Research Laboratory at the AIC, FEL, Czech Technical University in Prague.

About me

I am a cybersecurity researcher from Patagonia, Argentina, with over a decade of experience in threat intelligence, malware traffic analysis, and data-driven security. I work as a senior researcher and co-director of the Stratosphere Research Laboratory at the Czech Technical University in Prague, where I also teach the Introduction to Security course, both in a physical class and as a large-scale MOOC. I have presented at international conferences, including Black Hat, EkoParty, Botconf, and Virus Bulletin, and I serve on review boards for Black Hat and academic events. I am the co-founder of MatesLab hackerspace in Argentina and the Independent Fund for Women in Tech. I deliver intensive, hands-on training in network traffic and malware analysis, drawing on over 18,000 hours of real-world traffic investigation experience. Since 2025, I have been pursuing a PhD in Computer Science and AI at the Czech Technical University in Prague while completing a master’s degree in Intelligence and Security Studies at Liverpool John Moores University.

Advising
Teaching
Trainings
  • 2018-ongoing
    BlackHat (USA, Asia, Europe)
    Trainer --- Advanced Malware Traffic Analysis (various editions)
  • 2021
    NorthSec
    Trainer --- Getting Your Hands Dirty: Understanding & Hunting Down Malware Attacks in Your Network
  • 2019
    Ekoparty
    Trainer --- Getting Your Hands Dirty: Understanding & Hunting Down Malware Attacks in Your Network
  • 2019
    OWASP Czech Republic
    Trainer --- Getting Your Hands Dirty: IoT Botnet Analysis
  • 2019
    Internet Freedom Festival
    Trainer --- Emergency VPN: Analyzing mobile network traffic to detect digital threats
  • 2019
    Troopers
    Trainer --- Machine Learning for Network Security and Malware Detection
  • 2018
    HackLu
    Trainer --- Getting Your Hands Dirty: How to Analyze the Behavior of Malware Traffic and Web Connections
  • 2018
    Ekoparty
    Trainer --- Advanced Malware Attacks In Your Network
  • 2016
    Botconf
    Trainer --- Getting your hands dirty: How to Analyze the Behavior of Malware Traffic and Web Connections
Contributions
  • Civilsphere AI VPN, Core researcher and developer, 2021-2023, AIC, FEL, CTU in Prague, Czech Republic
  • Slips, supporter, 2018-2024, AIC, FEL, CTU in Prague, Czech Republic
Awards & Scholarships
  • Outstanding Teaching Assistant Award, Winter Semester 2023/2024, AI Center, FEE, Czech Technical University in Prague, Czech Republic
  • Career Trajectory Award 2021, Ekoparty Security Conference, Argentina
  • Information Security Undergraduate Scholarship 2011, (ISC)² Foundation, United States
  • Full University Scholarship 2010-2013, FASTA University, Argentina
  • Student scholarship 2010-2011, Chubut Province’s Department of Scholarships and Compensation Policies, Argentina
  • Partial University Scholarship 2007-2009, FASTA University, Argentina
  • Special Mention 2002, Instituto Balseiro, Argentina
  • Best Technological Project Idea 1999, Ministry of Education of Chubut Province, Argentina
Initiatives
  • Co-founder of the Independent Fund for Women in Tech, a global initiative to foster the participation of women in cybersecurity conferences, in 2018.
  • Co-founder of the MatesLab hackerspace in Mar del Plata, Argentina, in 2009.
Review Boards
  • BlackHat Arsenal Review Board, 2024-Ongoing
  • BlackHat Trainings Review Board, 2022-2025
  • Workshop on Attackers and Cyber-Crime Operations Program Committee, IEEE European Symposium on Security and Privacy, 2021-2025
  • Ekoparty Security Conference Review Board, 2018-2025
  • BlackHat Briefings EU Review Board, 2018
Publications

Peer-reviewed Conferences and Journals

Reports

Conferences

  • ARACNE: A Multi-Agent LLM Framework for Comprehensive Autonomous Linux Shell Security Testing, Ekoparty (Argentina), 2025
  • Innovating Cybersecurity Education through Hands-On Learning, Democratized Knowledge, and Safe Experimentation, 1st Teaching Europe Conference (Virtual), 2024
  • AI VPN: A Free-Software AI-Powered Network Forensics Tool, BlackHat Asia Arsenal (Virtual), 2024
  • AI VPN: A Free-Software AI-Powered Network Forensics Tool, BlackHat Europe Arsenal (UK), 2023
  • Four Key Problems in OSINT for Cyber Threat Intelligence, ENISA CTI (Greece), 2023
  • AI VPN: A Free-Software AI-Powered Network Forensics Tool, DIMVA Arsenal (Germany), 2023
  • Un análisis global de la privacidad en tráfico celular y cómo estás en riesgo de vigilancia, Ekoparty (Argentina), 2022
  • Spy vs. Spy: A Modern Study Of Microphone Bugs Operation And Detection, BSides BUD (Hungary), 2018
  • Spy vs. Spy: A Modern Study Of Microphone Bugs Operation And Detection, 34C3 (Germany), 2017
  • Knock Knock… Who’s there? admin admin, Get In! An Overview of the CMS Brute-Forcing Malware Landscape, Botconf (France), 2017
  • América Latina, blanco de un grupo avanzado de cyber espionaje, TandilSec (Argentina), 2017
  • Panel: Mujeres en Tecnología y Ciencia, UNICEN (Argentina), 2017
  • Five days in the life of a CMS brute forcing malware, BSides Vienna (Austria), 2017
  • An overview of the CMS brute-forcing malware landscape, BruCON (Belgium), 2017
  • A new twist on the APT targeting Latin America, GoSec (Canada), 2017
  • Spy vs. Spy: A modern study of microphone bugs operation and detection, Hack in the Box (Singapore), 2017
  • Are You The Lucky One? Sometimes Luck Can Bring You Malware, Cisco Blogs, 2017
  • The Future of Cybersecurity Needs You: Here is Why, PyData Berlin (Germany), 2017
  • Threat Hunting En Masse: The 9 Circles of Evil, Copenhagen CyberCrime Conference (Denmark), 2017
  • Hunting Them All, Troopers (Germany), 2017
  • Closing One Learning Loop: Using Decision Forests to Detect Advanced Threats, Cisco Blogs, 2017
  • In plain sight: Credential and data stealing adware, Cisco Blogs, 2016
  • Getting your hands dirty: How to Analyze the Behavior of Malware Traffic and Web Connections, Botconf (France), 2016
  • 50 Thousand Needles in 5 Million Haystacks: Understanding Old Malware Tricks to Find New Malware Families, BlackHat EU (UK), 2016
  • DNS Changer Lighting-talk, Secure PL (Poland), 2016
  • Trickeries of a giant: a long term study on malicious adware networks, Secure PL (Poland), 2016
  • Network Analysis for Threat Intelligence Workshop, Czech Technical University (Czech Republic), 2016
  • Piecing Together Malicious Behavior in Encrypted Traffic, Cisco Blogs, 2016
  • Cognitive Threat Analytics: Turn Your Proxy Into Security Device, Cisco Blogs, 2016
  • Threat Hunting En Masse: Challenges And Discoveries, Security Automation World (France), 2016
  • Adware landscape: what you didn’t want to hear, University of Luxembourg (Luxembourg), 2016
  • The Dark Side of Adware: Malware and Data Exfiltration, BSides Tel Aviv (Israel), 2016
  • Adware’s new upsell: malware, BSides Calgary (Canada), 2016
  • DNSChanger Outbreak Linked to Adware Install Base, Cisco Blogs, 2016
  • Insights of a brute-forcing botnet, Security Session (Czech Republic) , 2015
  • Make It Count: an Analysis of a Brute-forcing Botnet, Botconf (France), 2015
  • Angler for Beginners in 34 Seconds, Cisco Blogs, 2015
  • Bad Browser Plug-ins Gone Wild: Malvertising, Data Exfiltration, and Malware, Oh my!, Cisco Blogs, 2015
  • How bluetooth may jeopardize your privacy. An analysis of people behavioral patterns in the street, DeepSec (Austria), 2014
  • Uncovering your trails Privacy issues of bluetooth devices, Ekoparty (Argentina), 2013
  • Análisis de anomalías en protocolos web para la detección de ataques, FASTA University, 2012

Datasets

  • Valeros, V., & Sebastian, G. (2024). CTU Hornet 65 Niner: A Network Dataset of Geographically Distributed Low-Interaction Honeypots (Version 1) [Data set]. Mendeley Data. https://doi.org/10.17632/nt4p9zsv5k.1
  • Valeros, V., & Shirokova, A. (2024). CTU-Hacktivist-RU_EN-1: A Dataset with Russian English Translation, Zenodo, doi: 10.5281/zenodo.10782757
  • Bendl, Š., Valeros, V., & Garcia, S. (2023). CTU-SME-11: a labeled dataset with real benign and malicious network traffic mimicking a small medium-size enterprise environment, Zenodo, doi: 10.5281/zenodo.7958259
  • García, Sebastián; Čejka, Tomáš; Valeros, Veronica (2021), “Dataset of DNS over HTTPS (DoH) Internet Servers”, Mendeley Data, V2, doi: 10.17632/ny4m53g6bw.2
  • Valeros, Veronica; Garcia, Sebastian (2021), “Dataset of 50 Online Services Advertised in the Internet Marketing Forum searchengines.guru”, Mendeley Data, V2, doi: 10.17632/48gyrs6y37.2
  • Valeros, Veronica (2021), “Hornet 40: Network Dataset of Geographically Placed Honeypots”, Mendeley Data, V3, doi: 10.17632/tcfzkbpw46.3
  • Valeros, Veronica (2021), “Hornet 15: Network Dataset of Geographically Placed Honeypots”, Mendeley Data, V2, doi: 10.17632/rry7bhc2f2.2
  • Valeros, Veronica (2021), “Hornet 7: Network Dataset of Geographically Placed Honeypots”, Mendeley Data, V3, doi: 10.17632/w6yskg3ffy.3