ANGLER EK |
2016-08-31 | Deborah Hale | Angler Exploit Kits Reported |
2016-04-21 | Daniel Wesemann | Decoding Pseudo-Darkleech (#1) |
2016-04-21 | Daniel Wesemann | Decoding Pseudo-Darkleech (Part #2) |
2015-07-27 | Daniel Wesemann | Angler's best friends |
2015-04-02 | Brad Duncan | Angler Exploit Kit - Recent Traffic Patterns |
ANGLER |
2016-08-31/a> | Deborah Hale | Angler Exploit Kits Reported |
2016-04-21/a> | Daniel Wesemann | Decoding Pseudo-Darkleech (#1) |
2016-04-21/a> | Daniel Wesemann | Decoding Pseudo-Darkleech (Part #2) |
2015-07-27/a> | Daniel Wesemann | Angler's best friends |
2015-04-02/a> | Brad Duncan | Angler Exploit Kit - Recent Traffic Patterns |
EK |
2025-02-13/a> | Guy Bruneau | DShield SIEM Docker Updates |
2024-11-26/a> | Jesse La Grew | [Guest Diary] Using Zeek, Snort, and Grafana to Detect Crypto Mining Malware |
2023-03-28/a> | Jesse La Grew | Network Data Collector Placement Makes a Difference |
2023-02-12/a> | Jesse La Grew | PCAP Data Analysis with Zeek |
2022-08-14/a> | Johannes Ullrich | Realtek SDK SIP ALG Vulnerability: A Big Deal, but not much you can do about it. CVE 2022-27255 |
2022-02-03/a> | Johannes Ullrich | Keeping Track of Your Attack Surface for Cheap |
2021-04-10/a> | Guy Bruneau | Building an IDS Sensor with Suricata & Zeek with Logs to ELK |
2021-01-15/a> | Brad Duncan | Throwback Friday: An Example of Rig Exploit Kit |
2020-11-16/a> | Jan Kopriva | Heartbleed, BlueKeep and other vulnerabilities that didn't disappear just because we don't talk about them anymore |
2019-11-10/a> | Jan Kopriva | Did the recent malicious BlueKeep campaign have any positive impact when it comes to patching? |
2019-11-05/a> | Rick Wanner | Bluekeep exploitation causing Bluekeep vulnerability scan to fail |
2019-08-14/a> | Brad Duncan | Recent example of MedusaHTTP malware |
2019-08-05/a> | Rick Wanner | Scanning for Bluekeep vulnerable RDP instances |
2019-05-22/a> | Johannes Ullrich | An Update on the Microsoft Windows RDP "Bluekeep" Vulnerability (CVE-2019-0708) [now with pcaps] |
2017-02-09/a> | Brad Duncan | CryptoShield Ransomware from Rig EK |
2016-08-31/a> | Deborah Hale | Angler Exploit Kits Reported |
2016-04-21/a> | Daniel Wesemann | Decoding Pseudo-Darkleech (#1) |
2016-04-21/a> | Daniel Wesemann | Decoding Pseudo-Darkleech (Part #2) |
2015-07-27/a> | Daniel Wesemann | Angler's best friends |
2015-05-03/a> | Russ McRee | VolDiff, for memory image differential analysis |
2015-04-02/a> | Brad Duncan | Angler Exploit Kit - Recent Traffic Patterns |
2015-04-01/a> | Brad Duncan | Rig Exploit Kit Changes Traffic Patterns |
2014-03-07/a> | Tom Webb | Linux Memory Dump with Rekall |
2014-03-02/a> | Stephen Hall | Sunday Reading |
2009-10-02/a> | Stephen Hall | New SysInternal fun for the weekend |