FLASHBACK G |
2012-02-24 | Guy Bruneau | Flashback Trojan in the Wild |
FLASHBACK |
2012-04-14/a> | Rick Wanner | Flashback Trojan Removal Tool Released |
2012-04-12/a> | Guy Bruneau | Apple Java Updates for Mac OS X |
2012-03-05/a> | Johannes Ullrich | Flashback Malware now with Twitter C&C |
2012-02-24/a> | Guy Bruneau | Flashback Trojan in the Wild |
G |
2025-04-29/a> | Guy Bruneau | Web Scanning Sonicwall for CVE-2021-20016 |
2025-04-25/a> | Xavier Mertens | Example of a Payload Delivered Through Steganography |
2025-04-21/a> | Jan Kopriva | It's 2025... so why are obviously malicious advertising URLs still going strong? |
2025-04-16/a> | Guy Bruneau | RedTail, Remnux and Malware Management [Guest Diary] |
2025-04-15/a> | Xavier Mertens | Online Services Again Abused to Exfiltrate Data |
2025-04-12/a> | Johannes Ullrich | Exploit Attempts for Recent Langflow AI Vulnerability (CVE-2025-3248) |
2025-04-02/a> | Guy Bruneau | Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive [Guest Diary] |
2025-03-26/a> | Jesse La Grew | [Guest Diary] Leveraging CNNs and Entropy-Based Feature Selection to Identify Potential Malware Artifacts of Interest |
2025-03-20/a> | Johannes Ullrich | Some new Data Feeds, and a little "incident". |
2025-03-18/a> | Xavier Mertens | Python Bot Delivered Through DLL Side-Loading |
2025-02-27/a> | Xavier Mertens | Njrat Campaign Using Microsoft Dev Tunnels |
2025-02-24/a> | Jim Clausing | Unfurl v2025.02 released |
2025-02-20/a> | Guy Bruneau | Using ES|QL in Kibana to Queries DShield Honeypot Logs |
2025-02-14/a> | Xavier Mertens | Fake BSOD Delivered by Malicious Python Script |
2025-02-12/a> | Yee Ching Tok | An ontology for threats, cybercrime and digital forensic investigation on Smart City Infrastructure |
2025-02-06/a> | Xavier Mertens | The Unbreakable Multi-Layer Anti-Debugging System |
2025-02-06/a> | Johannes Ullrich | My Very Personal Guidance and Strategies to Protect Network Edge Devices |
2025-02-05/a> | Johannes Ullrich | Phishing via "com-" prefix domains |
2025-01-30/a> | Guy Bruneau | PCAPs or It Didn't Happen: Exposing an Old Netgear Vulnerability Still Active in 2025 [Guest Diary] |
2025-01-28/a> | Xavier Mertens | Fileless Python InfoStealer Targeting Exodus |
2025-01-21/a> | Johannes Ullrich | Geolocation and Starlink |
2025-01-17/a> | Guy Bruneau | Leveraging Honeypot Data for Offensive Security Operations [Guest Diary] |
2025-01-16/a> | Jesse La Grew | Extracting Practical Observations from Impractical Datasets |
2025-01-09/a> | Guy Bruneau | Examining Redtail Analyzing a Sophisticated Cryptomining Malware and its Advanced Tactics [Guest Diary] |
2025-01-06/a> | Xavier Mertens | Make Malware Happy |
2025-01-02/a> | Xavier Mertens | Goodware Hash Sets |
2024-12-27/a> | Guy Bruneau | Phishing for Banking Information |
2024-12-20/a> | Xavier Mertens | Christmas "Gift" Delivered Through SSH |
2024-12-17/a> | Guy Bruneau | Command Injection Exploit For PHPUnit before 4.8.28 and 5.x before 5.6.3 [Guest Diary] |
2024-12-05/a> | Jesse La Grew | [Guest Diary] Business Email Compromise |
2024-11-26/a> | Jesse La Grew | [Guest Diary] Using Zeek, Snort, and Grafana to Detect Crypto Mining Malware |
2024-11-19/a> | Xavier Mertens | Detecting the Presence of a Debugger in Linux |
2024-11-07/a> | Xavier Mertens | Steam Account Checker Poisoned with Infostealer |
2024-10-31/a> | Guy Bruneau | October 2024 Activity with Username chenzilong |
2024-10-15/a> | Johannes Ullrich | Angular-base64-update Demo Script Exploited (CVE-2024-42640) |
2024-10-14/a> | Xavier Mertens | Phishing Page Delivered Through a Blob URL |
2024-10-03/a> | Guy Bruneau | Kickstart Your DShield Honeypot [Guest Diary] |
2024-09-25/a> | Guy Bruneau | OSINT - Image Analysis or More Where, When, and Metadata [Guest Diary] |
2024-09-18/a> | Guy Bruneau | Time-to-Live Analysis of DShield Data with Vega-Lite |
2024-09-17/a> | Xavier Mertens | 23:59, Time to Exfiltrate! |
2024-09-16/a> | Xavier Mertens | Managing PE Files With Overlays |
2024-09-11/a> | Guy Bruneau | Hygiene, Hygiene, Hygiene! [Guest Diary] |
2024-09-04/a> | Guy Bruneau | Attack Surface [Guest Diary] |
2024-08-30/a> | Jesse La Grew | Simulating Traffic With Scapy |
2024-08-29/a> | Xavier Mertens | Live Patching DLLs with Python |
2024-08-27/a> | Guy Bruneau | Vega-Lite with Kibana to Parse and Display IP Activity over Time |
2024-08-20/a> | Guy Bruneau | Mapping Threats with DNSTwist and the Internet Storm Center [Guest Diary] |
2024-08-16/a> | Jesse La Grew | [Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools |
2024-08-14/a> | Xavier Mertens | Multiple Malware Dropped Through MSI Package |
2024-08-07/a> | Guy Bruneau | Same Scripts, Different Day: What My DShield Honeypot Taught Me About the Importance of Security Fundamentals [Guest Diary] |
2024-08-01/a> | Johannes Ullrich | Tracking Proxy Scans with IPv4.Games |
2024-07-25/a> | Xavier Mertens | XWorm Hidden With Process Hollowing |
2024-07-24/a> | Xavier Mertens | "Mouse Logger" Malicious Python Script |
2024-07-23/a> | Johannes Ullrich | New Exploit Variation Against D-Link NAS Devices (CVE-2024-3273) |
2024-07-16/a> | Jan Kopriva | "Reply-chain phishing" with a twist |
2024-07-16/a> | Guy Bruneau | Who You Gonna Call? AndroxGh0st Busters! [Guest Diary] |
2024-07-13/a> | Didier Stevens | 16-bit Hash Collisions in .xls Spreadsheets |
2024-07-10/a> | Jesse La Grew | Finding Honeypot Data Clusters Using DBSCAN: Part 1 |
2024-07-08/a> | Xavier Mertens | Kunai: Keep an Eye on your Linux Hosts Activity |
2024-07-01/a> | Johannes Ullrich | SSH "regreSSHion" Remote Code Execution Vulnerability in OpenSSH. |
2024-06-26/a> | Guy Bruneau | What Setting Live Traps for Cybercriminals Taught Me About Security [Guest Diary] |
2024-06-20/a> | Guy Bruneau | No Excuses, Free Tools to Help Secure Authentication in Ubuntu Linux [Guest Diary] |
2024-06-17/a> | Xavier Mertens | New NetSupport Campaign Delivered Through MSIX Packages |
2024-06-13/a> | Guy Bruneau | The Art of JQ and Command-line Fu [Guest Diary] |
2024-06-06/a> | Xavier Mertens | Malicious Python Script with a "Best Before" Date |
2024-06-04/a> | Johannes Ullrich | No-Defender, Yes-Defender |
2024-05-31/a> | Xavier Mertens | "K1w1" InfoStealer Uses gofile.io for Exfiltration |
2024-05-30/a> | Xavier Mertens | Feeding MISP with OSSEC |
2024-05-28/a> | Guy Bruneau | Is that It? Finding the Unknown: Correlations Between Honeypot Logs & PCAPs [Guest Diary] |
2024-05-27/a> | Jan Kopriva | Files with TXZ extension used as malspam attachments |
2024-05-22/a> | Guy Bruneau | Analysis of ?redtail? File Uploads to ICS Honeypot, a Multi-Architecture Coin Miner [Guest Diary] |
2024-05-15/a> | Rob VandenBrink | Got MFA? If not, Now is the Time! |
2024-05-08/a> | Xavier Mertens | Analyzing Synology Disks on Linux |
2024-05-06/a> | Johannes Ullrich | Detecting XFinity/Comcast DNS Spoofing |
2024-04-23/a> | Johannes Ullrich | Struts "devmode": Still a problem ten years later? |
2024-04-17/a> | Xavier Mertens | Malicious PDF File Used As Delivery Mechanism |
2024-04-15/a> | Johannes Ullrich | Quick Palo Alto Networks Global Protect Vulnerablity Update (CVE-2024-3400) |
2024-04-13/a> | Johannes Ullrich | Critical Palo Alto GlobalProtect Vulnerability Exploited (CVE-2024-3400) |
2024-04-11/a> | Yee Ching Tok | Evolution of Artificial Intelligence Systems and Ensuring Trustworthiness |
2024-04-07/a> | Guy Bruneau | A Use Case for Adding Threat Hunting to Your Security Operations Team. Detecting Adversaries Abusing Legitimate Tools in A Customer Environment. [Guest Diary] |
2024-03-29/a> | Xavier Mertens | Quick Forensics Analysis of Apache logs |
2024-03-19/a> | Johannes Ullrich | Attacker Hunting Firewalls |
2024-03-17/a> | Guy Bruneau | Gamified Learning: Using Capture the Flag Challenges to Supplement Cybersecurity Training [Guest Diary] |
2024-03-15/a> | Yee Ching Tok | 5Ghoul Revisited: Three Months Later |
2024-03-14/a> | Jan Kopriva | Increase in the number of phishing messages pointing to IPFS and to R2 buckets |
2024-03-13/a> | Xavier Mertens | Using ChatGPT to Deobfuscate Malicious Scripts |
2024-03-10/a> | Guy Bruneau | What happens when you accidentally leak your AWS API keys? [Guest Diary] |
2024-03-06/a> | Bojan Zdrnja | Scanning and abusing the QUIC protocol |
2024-02-29/a> | Jesse La Grew | [Guest Diary] Dissecting DarkGate: Modular Malware Delivery and Persistence as a Service. |
2024-02-28/a> | Johannes Ullrich | Exploit Attempts for Unknown Password Reset Vulnerability |
2024-02-22/a> | Johannes Ullrich | Large AT&T Wireless Network Outage #att #outage |
2024-02-21/a> | Jan Kopriva | Phishing pages hosted on archive.org |
2024-02-15/a> | Jesse La Grew | [Guest Diary] Learning by doing: Iterative adventures in troubleshooting |
2024-02-08/a> | Xavier Mertens | A Python MP3 Player with Builtin Keylogger Capability |
2024-02-03/a> | Guy Bruneau | DShield Sensor Log Collection with Elasticsearch |
2024-01-25/a> | Xavier Mertens | Facebook AdsManager Targeted by a Python Infostealer |
2024-01-19/a> | Xavier Mertens | macOS Python Script Replacing Wallet Applications with Rogue Apps |
2024-01-12/a> | Xavier Mertens | One File, Two Payloads |
2024-01-08/a> | Jesse La Grew | What is that User Agent? |
2024-01-06/a> | Xavier Mertens | Are you sure of your password? |
2024-01-02/a> | Johannes Ullrich | Fingerprinting SSH Identification Strings |
2023-12-31/a> | Tom Webb | Pi-Hole Pi4 Docker Deployment |
2023-12-23/a> | Xavier Mertens | Python Keylogger Using Mailtrap.io |
2023-12-22/a> | Xavier Mertens | Shall We Play a Game? |
2023-12-10/a> | Guy Bruneau | Honeypots: From the Skeptical Beginner to the Tactical Enthusiast |
2023-12-07/a> | Yee Ching Tok | 5Ghoul: Impacts, Implications and Next Steps |
2023-12-06/a> | Guy Bruneau | Revealing the Hidden Risks of QR Codes [Guest Diary] |
2023-11-22/a> | Guy Bruneau | CVE-2023-1389: A New Means to Expand Botnets |
2023-11-20/a> | Jesse La Grew | Overflowing Web Honeypot Logs |
2023-11-17/a> | Jan Kopriva | Phishing page with trivial anti-analysis features |
2023-11-15/a> | Xavier Mertens | Redline Dropped Through MSIX Package |
2023-11-09/a> | Guy Bruneau | Routers Targeted for Gafgyt Botnet [Guest Diary] |
2023-11-08/a> | Xavier Mertens | Example of Phishing Campaign Project File |
2023-10-29/a> | Guy Bruneau | Spam or Phishing? Looking for Credentials & Passwords |
2023-10-28/a> | Xavier Mertens | Size Matters for Many Security Controls |
2023-10-16/a> | Jan Kopriva | Are typos still relevant as an indicator of phishing? |
2023-09-26/a> | Jan Kopriva | A new spin on the ZeroFont phishing technique |
2023-09-23/a> | Guy Bruneau | Scanning for Laravel - a PHP Framework for Web Artisants |
2023-09-18/a> | Johannes Ullrich | Internet Wide Multi VPN Search From Single /24 Network |
2023-09-03/a> | Didier Stevens | Analysis of a Defective Phishing PDF |
2023-08-31/a> | Jan Kopriva | The low, low cost of (committing) cybercrime |
2023-08-31/a> | Guy Bruneau | Potential Weaponizing of Honeypot Logs [Guest Diary] |
2023-08-25/a> | Xavier Mertens | Python Malware Using Postgresql for C2 Communications |
2023-08-23/a> | Xavier Mertens | More Exotic Excel Files Dropping AgentTesla |
2023-08-23/a> | Guy Bruneau | How I made a qwerty ?keyboard walk? password generator with ChatGPT [Guest Diary] |
2023-08-22/a> | Xavier Mertens | Have You Ever Heard of the Fernet Encryption Algorithm? |
2023-08-21/a> | Xavier Mertens | Quick Malware Triage With Inotify Tools |
2023-08-20/a> | Guy Bruneau | SystemBC Malware Activity |
2023-08-18/a> | Xavier Mertens | From a Zalando Phishing to a RAT |
2023-08-17/a> | Jesse La Grew | Command Line Parsing - Are These Really Unique Strings? |
2023-08-11/a> | Xavier Mertens | Show me All Your Windows! |
2023-07-28/a> | Xavier Mertens | ShellCode Hidden with Steganography |
2023-07-23/a> | Guy Bruneau | Install & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs |
2023-07-18/a> | Johannes Ullrich | Exploit Attempts for "Stagil navigation for Jira Menus & Themes" CVE-2023-26255 and CVE-2023-26256 |
2023-07-07/a> | Xavier Mertens | DSSuite (Didier's Toolbox) Docker Image Update |
2023-07-01/a> | Russ McRee | Sandfly Security |
2023-06-29/a> | Brad Duncan | GuLoader- or DBatLoader/ModiLoader-style infection for Remcos RAT |
2023-06-27/a> | Xavier Mertens | The Importance of Malware Triage |
2023-06-21/a> | Yee Ching Tok | Analyzing a YouTube Sponsorship Phishing Mail and Malware Targeting Content Creators |
2023-06-16/a> | Xavier Mertens | Another RAT Delivered Through VBS |
2023-06-15/a> | Yee Ching Tok | Supervision and Verification in Vulnerability Management |
2023-05-30/a> | Brad Duncan | Malspam pushes ModiLoader (DBatLoader) infection for Remcos RAT |
2023-05-28/a> | Guy Bruneau | We Can no Longer Ignore the Cost of Cybersecurity |
2023-05-26/a> | Xavier Mertens | Using DFIR Techniques To Recover From Infrastructure Outages |
2023-05-24/a> | Tom Webb | IR Case/Alert Management |
2023-05-20/a> | Xavier Mertens | Phishing Kit Collecting Victim's IP Address |
2023-05-19/a> | Xavier Mertens | When the Phisher Messes Up With Encoding |
2023-05-16/a> | Jesse La Grew | Signals Defense With Faraday Bags & Flipper Zero |
2023-05-15/a> | Jan Kopriva | Ongoing Facebook phishing campaign without a sender and (almost) without links |
2023-05-14/a> | Guy Bruneau | VMware Aria Operations addresses multiple Local Privilege Escalations and a Deserialization issue |
2023-05-14/a> | Guy Bruneau | DShield Sensor Update |
2023-05-09/a> | Russ McRee | Exploratory Data Analysis with CISSM Cyber Attacks Database - Part 2 |
2023-05-07/a> | Didier Stevens | Quickly Finding Encoded Payloads in Office Documents |
2023-05-03/a> | Xavier Mertens | Increased Number of Configuration File Scans |
2023-05-01/a> | Jan Kopriva | "Passive" analysis of a phishing attachment |
2023-04-26/a> | Yee Ching Tok | Strolling through Cyberspace and Hunting for Phishing Sites |
2023-04-18/a> | Johannes Ullrich | UDDIs are back? Attackers rediscovering old exploits. |
2023-04-09/a> | Didier Stevens | Chrome's Download Tab: Dangerous Files |
2023-04-08/a> | Xavier Mertens | Microsoft Netlogon: Potential Upcoming Impacts of CVE-2022-38023 |
2023-04-07/a> | Xavier Mertens | Detecting Suspicious API Usage with YARA Rules |
2023-04-03/a> | Johannes Ullrich | Tax Season Risks |
2023-03-31/a> | Guy Bruneau | Using Linux grep and Windows findstr to Manipulate Files |
2023-03-31/a> | Jan Kopriva | Use of X-Frame-Options and CSP frame-ancestors security headers on 1 million most popular domains |
2023-03-25/a> | Guy Bruneau | Microsoft Released an Update for Windows Snipping Tool Vulnerability |
2023-03-22/a> | Didier Stevens | Windows 11 Snipping Tool Privacy Bug: Inspecting PNG Files |
2023-03-20/a> | Xavier Mertens | From Phishing Kit To Telegram... or Not! |
2023-03-15/a> | Jan Kopriva | IPFS phishing and the need for correctly set HTTP security headers |
2023-03-12/a> | Guy Bruneau | AsynRAT Trojan - Bill Payment (Pago de la factura) |
2023-03-11/a> | Xavier Mertens | Overview of a Mirai Payload Generator |
2023-03-09/a> | Rob VandenBrink | Today I Learned .. a new thing about GREP |
2023-03-01/a> | Xavier Mertens | Python Infostealer Targeting Gamers |
2023-02-28/a> | Brad Duncan | BB17 distribution Qakbot (Qbot) activity |
2023-02-27/a> | Xavier Mertens | Phishing Again and Again |
2023-02-21/a> | Xavier Mertens | Phishing Page Branded with Your Corporate Website |
2023-02-18/a> | Guy Bruneau | Spear Phishing Handlers for Username/Password |
2023-02-16/a> | Jan Kopriva | HTML phishing attachment with browser-in-the-browser technique |
2023-02-10/a> | Xavier Mertens | Obfuscated Deactivation of Script Block Logging |
2023-01-21/a> | Guy Bruneau | DShield Sensor JSON Log to Elasticsearch |
2023-01-17/a> | Rob VandenBrink | Finding that one GPO Setting in a Pool of Hundreds of GPOs |
2023-01-16/a> | Johannes Ullrich | PSA: Why you must run an ad blocker when using Google |
2023-01-12/a> | Russ McRee | Prowler v3: AWS & Azure security assessments |
2023-01-08/a> | Guy Bruneau | DShield Sensor JSON Log Analysis |
2023-01-05/a> | Brad Duncan | More Brazil malspam pushing Astaroth (Guildma) in January 2023 |
2022-12-22/a> | Guy Bruneau | Exchange OWASSRF Exploited for Remote Code Execution |
2022-12-21/a> | Guy Bruneau | DShield Sensor Setup in Azure |
2022-12-20/a> | Xavier Mertens | Linux File System Monitoring & Actions |
2022-12-19/a> | Xavier Mertens | Hunting for Mastodon Servers |
2022-12-10/a> | Didier Stevens | Open Now: 2022 SANS Holiday Hack Challenge & KringleCon |
2022-12-04/a> | Didier Stevens | Finger.exe LOLBin |
2022-12-02/a> | Brad Duncan | obama224 distribution Qakbot tries .vhd (virtual hard disk) images |
2022-11-24/a> | Xavier Mertens | Attackers Keep Phishing Victims Under Stress |
2022-11-19/a> | Guy Bruneau | McAfee Fake Antivirus Phishing Campaign is Back! |
2022-11-10/a> | Xavier Mertens | Do you collect "Observables" or "IOCs"? |
2022-10-27/a> | Tom Webb | Supersizing your DUO and 365 Integration |
2022-10-23/a> | Didier Stevens | Video: PNG Analysis |
2022-10-22/a> | Didier Stevens | rtfdump's Find Option |
2022-10-16/a> | Didier Stevens | Video: Analysis of a Malicious HTML File (QBot) |
2022-10-15/a> | Guy Bruneau | Malware - Covid Vaccination Supplier Declaration |
2022-10-13/a> | Didier Stevens | Analysis of a Malicious HTML File (QBot) |
2022-10-07/a> | Xavier Mertens | Powershell Backdoor with DGA Capability |
2022-10-07/a> | Xavier Mertens | Critical Fortinet Vulnerability Ahead |
2022-10-04/a> | Johannes Ullrich | Credential Harvesting with Telegram API |
2022-09-29/a> | Didier Stevens | PNG Analysis |
2022-09-21/a> | Xavier Mertens | Phishing Campaigns Use Free Online Resources |
2022-09-18/a> | Didier Stevens | Video: Grep & Tail -f With Notepad++ |
2022-09-10/a> | Guy Bruneau | Phishing Word Documents with Suspicious URL |
2022-09-05/a> | Didier Stevens | Quickie: Grep & Tail -f With Notepad++ |
2022-09-03/a> | Didier Stevens | Video: James Webb JPEG With Malware |
2022-09-02/a> | Didier Stevens | James Webb JPEG With Malware |
2022-09-01/a> | Johannes Ullrich | Jolokia Scans: Possible Hunt for Vulnerable Apache Geode Servers (CVE-2022-37021) |
2022-08-26/a> | Xavier Mertens | Paypal Phishing/Coinbase in One Image |
2022-08-26/a> | Guy Bruneau | HTTP/2 Packet Analysis with Wireshark |
2022-08-23/a> | Xavier Mertens | Who's Looking at Your security.txt File? |
2022-08-19/a> | Brad Duncan | Brazil malspam pushes Astaroth (Guildma) malware |
2022-08-14/a> | Johannes Ullrich | Realtek SDK SIP ALG Vulnerability: A Big Deal, but not much you can do about it. CVE 2022-27255 |
2022-08-13/a> | Guy Bruneau | Phishing HTML Attachment as Voicemail Audio Transcription |
2022-07-28/a> | Johannes Ullrich | Exfiltrating Data With Bookmarks |
2022-07-23/a> | Guy Bruneau | Analysis of SSH Honeypot Data with PowerBI |
2022-07-22/a> | Yee Ching Tok | An Analysis of a Discerning Phishing Website |
2022-07-20/a> | Xavier Mertens | Malicious Python Script Behaving Like a Rubber Ducky |
2022-07-20/a> | Johannes Ullrich | Apple Patches Everything Day |
2022-07-13/a> | Xavier Mertens | Using Referers to Detect Phishing Attacks |
2022-07-09/a> | Didier Stevens | 7-Zip Editing & MoW |
2022-07-08/a> | Johannes Ullrich | ISC Website Redesign |
2022-06-24/a> | Xavier Mertens | Python (ab)using The Windows GUI |
2022-06-23/a> | Xavier Mertens | FLOSS 2.0 Has Been Released |
2022-06-02/a> | Johannes Ullrich | Quick Answers in Incident Response: RECmd.exe |
2022-06-01/a> | Jan Kopriva | HTML phishing attachments - now with anti-analysis features |
2022-05-29/a> | Didier Stevens | Extracting The Overlay Of A PE File |
2022-05-28/a> | Didier Stevens | Huge Signed PE File: Keeping The Signature |
2022-05-26/a> | Didier Stevens | Huge Signed PE File |
2022-05-18/a> | Jan Kopriva | Do you want 30 BTC? Nothing is easier (or cheaper) in this phishing campaign... |
2022-05-14/a> | Didier Stevens | Quick Analysis Of Phishing MSG |
2022-05-13/a> | Johannes Ullrich | From 0-Day to Mirai: 7 days of BIG-IP Exploits |
2022-05-08/a> | Johannes Ullrich | F5 BIG-IP Unauthenticated RCE Vulnerability (CVE-2022-1388) |
2022-05-07/a> | Guy Bruneau | Phishing PDF Received in my ISC Mailbox |
2022-04-25/a> | Xavier Mertens | Simple PDF Linking to Malicious Content |
2022-04-24/a> | Didier Stevens | Analyzing a Phishing Word Document |
2022-04-23/a> | Guy Bruneau | Are Roku Streaming Devices Safe from Exploitation? |
2022-04-19/a> | Johannes Ullrich | Resetting Linux Passwords with U-Boot Bootloaders |
2022-04-11/a> | Johannes Ullrich | Spring: It isn't just about Spring4Shell. Spring Cloud Function Vulnerabilities are being probed too. |
2022-04-10/a> | Didier Stevens | Video: Method For String Extraction Filtering |
2022-04-09/a> | Didier Stevens | Method For String Extraction Filtering |
2022-04-07/a> | Johannes Ullrich | What is BIMI and how is it supposed to help with Phishing. |
2022-04-05/a> | Johannes Ullrich | WebLogic Crypto Miner Malware Disabling Alibaba Cloud Monitoring Tools |
2022-04-04/a> | Johannes Ullrich | Emptying the Phishtank: Are WordPress sites the Mosquitoes of the Internet? |
2022-03-31/a> | Johannes Ullrich | Spring Vulnerability Update - Exploitation Attempts CVE-2022-22965 |
2022-03-30/a> | Johannes Ullrich | Possible new Java Spring Framework Vulnerability (Updated: not a Spring problem) |
2022-03-30/a> | Johannes Ullrich | Java Springtime Confusion: What Vulnerability are We Talking About |
2022-03-29/a> | Johannes Ullrich | More Fake/Typosquatting Twitter Accounts Asking for Ukraine Crytocurrency Donations |
2022-03-24/a> | Xavier Mertens | Malware Delivered Through Free Sharing Tool |
2022-03-15/a> | Xavier Mertens | Clean Binaries with Suspicious Behaviour |
2022-03-02/a> | Johannes Ullrich | The More Often Something is Repeated, the More True It Becomes: Dealing with Social Media |
2022-02-23/a> | Johannes Ullrich | The Rise and Fall of log4shell |
2022-02-18/a> | Xavier Mertens | Remcos RAT Delivered Through Double Compressed Archive |
2022-02-16/a> | Brad Duncan | Astaroth (Guildma) infection |
2022-02-13/a> | Guy Bruneau | DHL Spear Phishing to Capture Username/Password |
2022-02-05/a> | Didier Stevens | Power over Ethernet and Thermal Imaging |
2022-02-01/a> | Xavier Mertens | Automation is Nice But Don't Replace Your Knowledge |
2022-01-31/a> | Xavier Mertens | Be careful with RPMSG files |
2022-01-29/a> | Guy Bruneau | SIEM In this Decade, Are They Better than the Last? |
2022-01-28/a> | Xavier Mertens | Malicious ISO Embedded in an HTML Page |
2022-01-18/a> | Jan Kopriva | Phishing e-mail with...an advertisement? |
2022-01-17/a> | Johannes Ullrich | Log4Shell Attacks Getting "Smarter" |
2022-01-06/a> | Xavier Mertens | Malicious Python Script Targeting Chinese People |
2022-01-03/a> | Xavier Mertens | McAfee Phishing Campaign with a Nice Fake Scan |
2022-01-02/a> | Guy Bruneau | Exchange Server - Email Trapped in Transport Queues |
2022-01-01/a> | Didier Stevens | Expect Regressions |
2021-12-31/a> | Jan Kopriva | Do you want your Agent Tesla in the 300 MB or 8 kB package? |
2021-12-30/a> | Brad Duncan | Agent Tesla Updates SMTP Data Exfiltration Technique |
2021-12-29/a> | Russ McRee | Log4j 2 Security Vulnerabilities Update Guide |
2021-12-28/a> | Russ McRee | LotL Classifier tests for shells, exfil, and miners |
2021-12-23/a> | Xavier Mertens | Nicely Crafted indeed.com Login Page |
2021-12-23/a> | Johannes Ullrich | log4shell and cloud provider internal meta data services (IMDS) |
2021-12-23/a> | Johannes Ullrich | Defending Cloud IMDS Against log4shell (and more) |
2021-12-22/a> | Brad Duncan | December 2021 Forensic Contest: Answers and Analysis |
2021-12-21/a> | Xavier Mertens | More Undetected PowerShell Dropper |
2021-12-20/a> | Jan Kopriva | PowerPoint attachments, Agent Tesla and code reuse in malware |
2021-12-16/a> | Brad Duncan | How the "Contact Forms" campaign tricks people |
2021-12-14/a> | Johannes Ullrich | Log4j: Getting ready for the long haul (CVE-2021-44228) |
2021-12-11/a> | Johannes Ullrich | Log4j / Log4Shell Followup: What we see and how to defend (and how to access our data) |
2021-12-10/a> | Bojan Zdrnja | RCE in log4j, Log4Shell, or how things can get bad quickly |
2021-12-09/a> | Yee Ching Tok | Phishing Direct Messages via Discord |
2021-12-08/a> | Brad Duncan | December 2021 Forensic Challenge |
2021-12-06/a> | Xavier Mertens | The Importance of Out-of-Band Networks |
2021-12-04/a> | Guy Bruneau | A Review of Year 2021 |
2021-11-25/a> | Didier Stevens | YARA's Private Strings |
2021-11-24/a> | Jan Kopriva | Phishing page hiding itself using dynamically adjusted IP-based allow list |
2021-11-18/a> | Xavier Mertens | JavaScript Downloader Delivers Agent Tesla Trojan |
2021-11-15/a> | Rob VandenBrink | Changing your AD Password Using the Clipboard - Not as Easy as You'd Think! |
2021-11-10/a> | Xavier Mertens | Shadow IT Makes People More Vulnerable to Phishing |
2021-11-04/a> | Tom Webb | Xmount for Disk Images |
2021-10-30/a> | Guy Bruneau | Remote Desktop Protocol (RDP) Discovery |
2021-10-26/a> | Yee Ching Tok | Hunting for Phishing Sites Masquerading as Outlook Web Access |
2021-10-21/a> | Brad Duncan | "Stolen Images Evidence" campaign pushes Sliver-based malware |
2021-10-14/a> | Xavier Mertens | Port-Forwarding with Windows for the Win |
2021-10-13/a> | Johannes Ullrich | Please fix your E-Mail Brute forcing tool! |
2021-10-11/a> | Johannes Ullrich | Things that go "Bump" in the Night: Non HTTP Requests Hitting Web Servers |
2021-10-09/a> | Guy Bruneau | Scanning for Previous Oracle WebLogic Vulnerabilities |
2021-10-04/a> | Johannes Ullrich | Facebook Outage: Yes, its DNS (sort of). A super quick analysis of what is going on. |
2021-09-29/a> | Yee Ching Tok | Keeping Track of Time: Network Time Protocol and a GPSD Bug |
2021-09-25/a> | Didier Stevens | Strings Analysis: VBA & Excel4 Maldoc |
2021-09-25/a> | Didier Stevens | Video: Strings Analysis: VBA & Excel4 Maldoc |
2021-09-24/a> | Xavier Mertens | Keep an Eye on Your Users Mobile Devices (Simple Inventory) |
2021-09-20/a> | Johannes Ullrich | #OMIGOD Exploits Captured in the Wild. Researchers responsible for half of scans for related ports. |
2021-09-16/a> | Jan Kopriva | Phishing 101: why depend on one suspicious message subject when you can use many? |
2021-09-15/a> | Brad Duncan | Hancitor campaign abusing Microsoft's OneDrive |
2021-09-11/a> | Guy Bruneau | Shipping to Elasticsearch Microsoft DNS Logs |
2021-09-02/a> | Xavier Mertens | Attackers Will Always Abuse Major Events in our Lifes |
2021-08-24/a> | Johannes Ullrich | Attackers Hunting For Twilio Credentials |
2021-08-20/a> | Xavier Mertens | Waiting for the C2 to Show Up |
2021-08-19/a> | Johannes Ullrich | When Lightning Strikes. What works and doesn't work. |
2021-08-17/a> | Johannes Ullrich | Laravel (<=v8.4.2) exploit attempts for CVE-2021-3129 (debug mode: Remote code execution) |
2021-08-13/a> | Guy Bruneau | Scanning for Microsoft Exchange eDiscovery |
2021-08-04/a> | Yee Ching Tok | Pivoting and Hunting for Shenanigans from a Reported Phishing Domain |
2021-08-03/a> | Johannes Ullrich | Is this the Weirdest Phishing (SMishing?) Attempt Ever? |
2021-07-30/a> | Xavier Mertens | Infected With a .reg File |
2021-07-29/a> | Xavier Mertens | Malicious Content Delivered Through archive.org |
2021-07-28/a> | Jan Kopriva | A sextortion e-mail from...IT support?! |
2021-07-24/a> | Xavier Mertens | Agent.Tesla Dropped via a .daa Image and Talking to Telegram |
2021-07-16/a> | Xavier Mertens | Multiple BaseXX Obfuscations |
2021-07-14/a> | Jan Kopriva | One way to fail at malspam - give recipients the wrong password for an encrypted attachment |
2021-07-13/a> | Johannes Ullrich | USPS Phishing Using Telegram to Collect Data |
2021-07-10/a> | Guy Bruneau | Scanning for Microsoft Secure Socket Tunneling Protocol |
2021-07-08/a> | Xavier Mertens | Using Sudo with Python For More Security Controls |
2021-07-06/a> | Xavier Mertens | Python DLL Injection Check |
2021-07-03/a> | Didier Stevens | Finding Strings With oledump.py |
2021-06-30/a> | Johannes Ullrich | CVE-2021-1675: Incomplete Patch and Leaked RCE Exploit |
2021-06-30/a> | Brad Duncan | June 2021 Forensic Contest: Answers and Analysis |
2021-06-28/a> | Didier Stevens | CFBF Files Strings Analysis |
2021-06-26/a> | Guy Bruneau | CVE-2019-9670: Zimbra Collaboration Suite XXE vulnerability |
2021-06-22/a> | Jan Kopriva | Phishing asking recipients not to report abuse |
2021-06-18/a> | Daniel Wesemann | Network Forensics on Azure VMs (Part #2) |
2021-06-18/a> | Daniel Wesemann | Open redirects ... and why Phishers love them |
2021-06-12/a> | Guy Bruneau | Fortinet Targeted for Unpatched SSL VPN Discovery Activity |
2021-06-11/a> | Xavier Mertens | Keeping an Eye on Dangerous Python Modules |
2021-06-04/a> | Xavier Mertens | Russian Dolls VBS Obfuscation |
2021-05-29/a> | Guy Bruneau | Spear-phishing Email Targeting Outlook Mail Clients |
2021-05-28/a> | Xavier Mertens | Malicious PowerShell Hosted on script.google.com |
2021-05-27/a> | Jan Kopriva | All your Base are...nearly equal when it comes to AV evasion, but 64-bit executables are not |
2021-05-22/a> | Xavier Mertens | "Serverless" Phishing Campaign |
2021-05-21/a> | Xavier Mertens | Locking Kernel32.dll As Anti-Debugging Technique |
2021-05-08/a> | Guy Bruneau | Who is Probing the Internet for Research Purposes? |
2021-05-07/a> | Daniel Wesemann | Exposed Azure Storage Containers |
2021-05-06/a> | Xavier Mertens | Alternative Ways To Perform Basic Tasks |
2021-05-02/a> | Didier Stevens | PuTTY And FileZilla Use The Same Fingerprint Registry Keys |
2021-04-30/a> | Remco Verhoef | Qiling: A true instrumentable binary emulation framework |
2021-04-26/a> | Didier Stevens | CAD: .DGN and .MVBA Files |
2021-04-24/a> | Guy Bruneau | Base64 Hashes Used in Web Scanning |
2021-04-22/a> | Xavier Mertens | How Safe Are Your Docker Images? |
2021-04-19/a> | Jan Kopriva | Hunting phishing websites with favicon hashes |
2021-04-10/a> | Guy Bruneau | Building an IDS Sensor with Suricata & Zeek with Logs to ELK |
2021-03-18/a> | Xavier Mertens | Simple Python Keylogger |
2021-03-17/a> | Xavier Mertens | Defenders, Know Your Operating System Like Attackers Do! |
2021-03-12/a> | Guy Bruneau | Microsoft DHCP Logs Shipped to ELK |
2021-03-11/a> | Johannes Ullrich | Piktochart - Phishing with Infographics |
2021-03-04/a> | Xavier Mertens | From VBS, PowerShell, C Sharp, Process Hollowing to RAT |
2021-03-03/a> | Johannes Ullrich | Microsoft Releases Exchange Emergency Patch to Fix Actively Exploited Vulnerability |
2021-02-26/a> | Guy Bruneau | Pretending to be an Outlook Version Update |
2021-02-24/a> | Brad Duncan | Malspam pushes GuLoader for Remcos RAT |
2021-02-17/a> | Xavier Mertens | The new "LinkedInSecureMessage" ? |
2021-02-13/a> | Guy Bruneau | Using Logstash to Parse IPtables Firewall Logs |
2021-02-12/a> | Xavier Mertens | AgentTesla Dropped Through Automatic Click in Microsoft Help File |
2021-02-11/a> | Jan Kopriva | Agent Tesla hidden in a historical anti-malware tool |
2021-02-10/a> | Brad Duncan | Phishing message to the ISC handlers email distro |
2021-01-30/a> | Guy Bruneau | PacketSifter as Network Parsing and Telemetry Tool |
2021-01-30/a> | Guy Bruneau | Wireshark 3.2.11 is now available which contains Bug Fixes - https://www.wireshark.org |
2021-01-19/a> | Russ McRee | Gordon for fast cyber reputation checks |
2021-01-17/a> | Didier Stevens | New Release of Sysmon Adding Detection for Process Tampering |
2021-01-15/a> | Brad Duncan | Throwback Friday: An Example of Rig Exploit Kit |
2021-01-10/a> | Didier Stevens | Maldoc Analysis With CyberChef |
2021-01-09/a> | Didier Stevens | Maldoc Strings Analysis |
2021-01-05/a> | Johannes Ullrich | Netfox Detective: An Alternative Open-Source Packet Analysis Tool |
2021-01-01/a> | Didier Stevens | Strings 2021 |
2020-12-26/a> | Didier Stevens | base64dump.py Supported Encodings |
2020-12-22/a> | Xavier Mertens | Malware Victim Selection Through WiFi Identification |
2020-12-14/a> | Johannes Ullrich | SolarWinds Breach Used to Infiltrate Customer Networks (Solarigate) |
2020-12-13/a> | Didier Stevens | KringleCon 2020 |
2020-12-10/a> | Xavier Mertens | Python Backdoor Talking to a C2 Through Ngrok |
2020-12-08/a> | Johannes Ullrich | December 2020 Microsoft Patch Tuesday: Exchange, Sharepoint, Dynamics and DNS Spoofing |
2020-12-05/a> | Guy Bruneau | Is IP 91.199.118.137 testing Access to aahwwx.52host.xyz? |
2020-12-04/a> | Guy Bruneau | Detecting Actors Activity with Threat Intel |
2020-11-12/a> | Daniel Wesemann | Exposed Blob Storage in Azure |
2020-11-12/a> | Daniel Wesemann | Preventing Exposed Azure Blob Storage |
2020-11-07/a> | Guy Bruneau | Cryptojacking Targeting WebLogic TCP/7001 |
2020-11-06/a> | Johannes Ullrich | Rediscovering Limitations of Stateful Firewalls: "NAT Slipstreaming" ? Implications, Detections and Mitigations |
2020-10-29/a> | Johannes Ullrich | PATCH NOW: CVE-2020-14882 Weblogic Actively Exploited Against Honeypots |
2020-10-28/a> | Jan Kopriva | SMBGhost - the critical vulnerability many seem to have forgotten to patch |
2020-10-25/a> | Didier Stevens | Video: Pascal Strings |
2020-10-24/a> | Guy Bruneau | An Alternative to Shodan, Censys with User-Agent CensysInspect/1.1 |
2020-10-22/a> | Jan Kopriva | BazarLoader phishing lures: plan a Halloween party, get a bonus and be fired in the same afternoon |
2020-10-21/a> | Daniel Wesemann | Shipping dangerous goods |
2020-10-12/a> | Didier Stevens | Nested .MSGs: Turtles All The Way Down |
2020-10-11/a> | Didier Stevens | Analyzing MSG Files With plugin_msg_summary |
2020-10-09/a> | Jan Kopriva | Phishing kits as far as the eye can see |
2020-10-03/a> | Guy Bruneau | Scanning for SOHO Routers |
2020-10-02/a> | Xavier Mertens | Analysis of a Phishing Kit |
2020-10-01/a> | Daniel Wesemann | Making sense of Azure AD (AAD) activity logs |
2020-09-28/a> | Xavier Mertens | Some Tyler Technologies Customers Targeted with The Installation of a Bomgar Client |
2020-09-24/a> | Xavier Mertens | Party in Ibiza with PowerShell |
2020-09-21/a> | Jan Kopriva | Slightly broken overlay phishing |
2020-09-20/a> | Guy Bruneau | Analysis of a Salesforce Phishing Emails |
2020-09-09/a> | Johannes Ullrich | A First Look at macOS 11 Big Sur Network Traffic (New! Now with more GREASE!) |
2020-08-30/a> | Johannes Ullrich | CenturyLink Outage Causing Internet Wide Problems |
2020-08-25/a> | Xavier Mertens | Keep An Eye on LOLBins |
2020-08-24/a> | Xavier Mertens | Tracking A Malware Campaign Through VT |
2020-08-22/a> | Guy Bruneau | Remote Desktop (TCP/3389) and Telnet (TCP/23), What might they have in Common? |
2020-08-20/a> | Rob VandenBrink | Office 365 Mail Forwarding Rules (and other Mail Rules too) |
2020-08-14/a> | Jan Kopriva | Definition of 'overkill' - using 130 MB executable to hide 24 kB malware |
2020-08-10/a> | Bojan Zdrnja | Scoping web application and web service penetration tests |
2020-08-08/a> | Guy Bruneau | Scanning Activity Include Netcat Listener |
2020-08-03/a> | Johannes Ullrich | A Word of Caution: Helping Out People Being Stalked Online |
2020-08-02/a> | Didier Stevens | Small Challenge: A Simple Word Maldoc |
2020-07-27/a> | Johannes Ullrich | In Memory of Donald Smith |
2020-07-26/a> | Didier Stevens | Cracking Maldoc VBA Project Passwords |
2020-07-23/a> | Xavier Mertens | Simple Blocklisting with MISP & pfSense |
2020-07-19/a> | Guy Bruneau | Scanning Activity for ZeroShell Unauthenticated Access |
2020-07-16/a> | John Bambenek | Hunting for SigRed Exploitation |
2020-07-15/a> | Johannes Ullrich | PATCH NOW - SIGRed - CVE-2020-1350 - Microsoft DNS Server Vulnerability |
2020-07-12/a> | Didier Stevens | Maldoc: VBA Purging Example |
2020-07-11/a> | Guy Bruneau | VMware XPC Client validation privilege escalation vulnerability - https://www.vmware.com/security/advisories/VMSA-2020-0017.html |
2020-07-11/a> | Guy Bruneau | Scanning Home Internet Facing Devices to Exploit |
2020-07-06/a> | Johannes Ullrich | Summary of CVE-2020-5902 F5 BIG-IP RCE Vulnerability Exploits |
2020-07-05/a> | Didier Stevens | CVE-2020-5902 F5 BIG-IP Exploitation Attempt |
2020-07-04/a> | Russ McRee | Happy FouRth of July from the Internet Storm Center |
2020-06-19/a> | Remco Verhoef | Sigma rules! The generic signature format for SIEM systems. |
2020-06-18/a> | Jan Kopriva | Broken phishing accidentally exploiting Outlook zero-day |
2020-06-15/a> | Rick Wanner | HTML based Phishing Run |
2020-06-13/a> | Guy Bruneau | Mirai Botnet Activity |
2020-06-11/a> | Xavier Mertens | Anti-Debugging JavaScript Techniques |
2020-06-08/a> | Didier Stevens | Translating BASE64 Obfuscated Scripts |
2020-06-04/a> | Xavier Mertens | Anti-Debugging Technique based on Memory Protection |
2020-06-01/a> | Jim Clausing | Stackstrings, type 2 |
2020-05-29/a> | Johannes Ullrich | The Impact of Researchers on Our Data |
2020-05-27/a> | Jan Kopriva | Frankenstein's phishing using Google Cloud Storage |
2020-05-23/a> | Xavier Mertens | AgentTesla Delivered via a Malicious PowerPoint Add-In |
2020-05-22/a> | Didier Stevens | Some Strings to Remember |
2020-05-21/a> | Xavier Mertens | Malware Triage with FLOSS: API Calls Based Behavior |
2020-05-16/a> | Guy Bruneau | Scanning for Outlook Web Access (OWA) & Microsoft Exchange Control Panel (ECP) |
2020-05-14/a> | Rob VandenBrink | Patch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe |
2020-05-06/a> | Xavier Mertens | Keeping an Eye on Malicious Files Life Time |
2020-05-05/a> | Russ McRee | Cloud Security Features Don't Replace the Need for Personnel Security Capabilities |
2020-05-02/a> | Guy Bruneau | Phishing PDF with Unusual Hostname |
2020-04-30/a> | Xavier Mertens | Collecting IOCs from IMAP Folder |
2020-04-29/a> | Johannes Ullrich | Privacy Preserving Protocols to Trace Covid19 Exposure |
2020-04-28/a> | Jan Kopriva | Agent Tesla delivered by the same phishing campaign for over a year |
2020-04-27/a> | Xavier Mertens | Powershell Payload Stored in a PSCredential Object |
2020-04-18/a> | Guy Bruneau | Maldoc Falsely Represented as DOCX Invoice Redirecting to Fake Apple Store |
2020-04-17/a> | Xavier Mertens | Weaponized RTF Document Generator & Mailer in PowerShell |
2020-04-16/a> | Johannes Ullrich | Using AppLocker to Prevent Living off the Land Attacks |
2020-04-13/a> | Jan Kopriva | Look at the same phishing campaign 3 months apart |
2020-04-07/a> | Johannes Ullrich | Increase in RDP Scanning |
2020-04-03/a> | Xavier Mertens | Obfuscated with a Simple 0x0A |
2020-03-27/a> | Xavier Mertens | Malicious JavaScript Dropping Payload in the Registry |
2020-03-24/a> | Russ McRee | Another Critical COVID-19 Shortage: Digital Security |
2020-03-21/a> | Guy Bruneau | Honeypot - Scanning and Targeting Devices & Services |
2020-03-15/a> | Guy Bruneau | VPN Access and Activity Monitoring |
2020-03-14/a> | Didier Stevens | Phishing PDF With Incremental Updates. |
2020-03-11/a> | Xavier Mertens | Agent Tesla Delivered via Fake Canon EOS Notification on Free OwnCloud Account |
2020-03-05/a> | Xavier Mertens | Will You Put Your Password in a Survey? |
2020-02-29/a> | Guy Bruneau | Hazelcast IMDG Discover Scan |
2020-02-28/a> | Xavier Mertens | Show me Your Clipboard Data! |
2020-02-16/a> | Guy Bruneau | SOAR or not to SOAR? |
2020-02-14/a> | Xavier Mertens | Keep an Eye on Command-Line Browsers |
2020-02-12/a> | Rob VandenBrink | March Patch Tuesday is Coming - the LDAP Changes will Change Your Life! |
2020-02-10/a> | Jan Kopriva | Current PayPal phishing campaign or "give me all your personal information" |
2020-02-05/a> | Brad Duncan | Fake browser update pages are "still a thing" |
2020-02-03/a> | Jan Kopriva | Analysis of a triple-encrypted AZORult downloader |
2020-02-02/a> | Didier Stevens | Video: Stego & Cryptominers |
2020-01-25/a> | Guy Bruneau | Is Threat Hunting the new Fad? |
2020-01-24/a> | Xavier Mertens | Why Phishing Remains So Popular? |
2020-01-21/a> | Russ McRee | DeepBlueCLI: Powershell Threat Hunting |
2020-01-16/a> | Jan Kopriva | Picks of 2019 malware - the large, the small and the one full of null bytes |
2020-01-12/a> | Guy Bruneau | ELK Dashboard and Logstash parser for tcp-honeypot Logs |
2020-01-06/a> | Johannes Ullrich | Increase in Number of Sources January 3rd and 4th: spoofed |
2020-01-05/a> | Didier Stevens | etl2pcapng: Convert .etl Capture Files To .pcapng Format |
2020-01-04/a> | Didier Stevens | KringleCon 2019 |
2019-12-26/a> | Xavier Mertens | Bypassing UAC to Install a Cryptominer |
2019-12-22/a> | Didier Stevens | Extracting VBA Macros From .DWG Files |
2019-12-16/a> | Didier Stevens | Malicious .DWG Files? |
2019-12-13/a> | Jan Kopriva | Internet banking sites and their use of TLS... and SSLv3... and SSLv2?! |
2019-12-07/a> | Guy Bruneau | Integrating Pi-hole Logs in ELK with Logstash |
2019-12-06/a> | Jan Kopriva | Phishing with a self-contained credentials-stealing webpage |
2019-12-05/a> | Jan Kopriva | E-mail from Agent Tesla |
2019-12-04/a> | Jan Kopriva | Analysis of a strangely poetic malware |
2019-11-27/a> | Brad Duncan | Finding an Agent Tesla malware sample |
2019-11-26/a> | Jan Kopriva | Lessons learned from playing a willing phish |
2019-11-23/a> | Guy Bruneau | Local Malware Analysis with Malice |
2019-11-22/a> | Xavier Mertens | Abusing Web Filters Misconfiguration for Reconnaissance |
2019-11-03/a> | Didier Stevens | You Too? "Unusual Activity with Double Base64 Encoding" |
2019-11-01/a> | Didier Stevens | Tip: Password Managers and 2FA |
2019-10-31/a> | Jan Kopriva | EML attachments in O365 - a recipe for phishing |
2019-10-30/a> | Xavier Mertens | Keep an Eye on Remote Access to Mailboxes |
2019-10-29/a> | Xavier Mertens | Generating PCAP Files from YAML |
2019-10-27/a> | Guy Bruneau | Unusual Activity with Double Base64 Encoding |
2019-10-27/a> | Didier Stevens | Using scdbg to Find Shellcode |
2019-10-24/a> | Johannes Ullrich | Your Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment? |
2019-10-20/a> | Guy Bruneau | Scanning Activity for NVMS-9000 Digital Video Recorder |
2019-10-17/a> | Jan Kopriva | Phishing e-mail spoofing SPF-enabled domain |
2019-10-16/a> | Xavier Mertens | Security Monitoring: At Network or Host Level? |
2019-10-10/a> | Rob VandenBrink | Mining Live Networks for OUI Data Oddness |
2019-09-27/a> | Xavier Mertens | New Scans for Polycom Autoconfiguration Files |
2019-09-19/a> | Xavier Mertens | Agent Tesla Trojan Abusing Corporate Email Accounts |
2019-09-19/a> | Xavier Mertens | Blocklisting or Whitelisting in the Right Way |
2019-09-17/a> | Rob VandenBrink | Investigating Gaps in your Windows Event Logs |
2019-09-07/a> | Guy Bruneau | Unidentified Scanning Activity |
2019-09-03/a> | Johannes Ullrich | [Guest Diary] Tricky LNK points to TrickBot |
2019-08-15/a> | Didier Stevens | Analysis of a Spearphishing Maldoc |
2019-08-14/a> | Brad Duncan | Recent example of MedusaHTTP malware |
2019-08-09/a> | Xavier Mertens | 100% JavaScript Phishing Page |
2019-08-08/a> | Johannes Ullrich | [Guest Diary] The good, the bad and the non-functional, or "how not to do an attack campaign" |
2019-07-25/a> | Rob VandenBrink | When Users Attack! Users (and Admins) Thwarting Security Controls |
2019-07-17/a> | Xavier Mertens | Analyzis of DNS TXT Records |
2019-07-13/a> | Guy Bruneau | Guidance to Protect DNS Against Hijacking & Scanning for Version.BIND Still a Thing |
2019-07-09/a> | John Bambenek | Solving the WHOIS and Privacy Problem: A Draft of Implementing WHOIS in DNS |
2019-06-27/a> | Rob VandenBrink | Finding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell |
2019-06-25/a> | Brad Duncan | Rig Exploit Kit sends Pitou.B Trojan |
2019-06-24/a> | Johannes Ullrich | Extensive BGP Issues Affecting Cloudflare and possibly others |
2019-06-20/a> | Xavier Mertens | Using a Travel Packing App for Infosec Purpose |
2019-06-19/a> | Johannes Ullrich | Critical Actively Exploited WebLogic Flaw Patched CVE-2019-2729 |
2019-06-17/a> | Brad Duncan | An infection from Rig exploit kit |
2019-06-14/a> | Jim Clausing | A few Ghidra tips for IDA users, part 4 - function call graphs |
2019-06-06/a> | Xavier Mertens | Keep an Eye on Your WMI Logs |
2019-05-30/a> | Didier Stevens | Analyzing First Stage Shellcode |
2019-05-19/a> | Guy Bruneau | Is Metadata Only Approach, Good Enough for Network Traffic Analysis? |
2019-05-13/a> | Xavier Mertens | From Phishing To Ransomware? |
2019-05-06/a> | Didier Stevens | Text and Text |
2019-05-03/a> | Jim Clausing | A few Ghidra tips for IDA users, part 3 - conversion, labels, and comments |
2019-05-01/a> | Xavier Mertens | Another Day, Another Suspicious UDF File |
2019-04-28/a> | Johannes Ullrich | Update about Weblogic CVE-2019-2725 (Exploits Used in the Wild, Patch Status) |
2019-04-25/a> | Rob VandenBrink | Unpatched Vulnerability Alert - WebLogic Zero Day |
2019-04-17/a> | Jim Clausing | A few Ghidra tips for IDA users, part 2 - strings and parameters |
2019-04-17/a> | Xavier Mertens | Malware Sample Delivered Through UDF Image |
2019-04-08/a> | Jim Clausing | A few Ghidra tips for IDA users, part 1 - the decompiler/unreachable code |
2019-04-05/a> | Russ McRee | Beagle: Graph transforms for DFIR data & logs |
2019-04-03/a> | Jim Clausing | A few Ghidra tips for IDA users, part 0 - automatic comments for API call parameters |
2019-03-27/a> | Xavier Mertens | Running your Own Passive DNS Service |
2019-03-14/a> | Didier Stevens | Tip: Ghidra & ZIP Files |
2019-03-08/a> | Remco Verhoef | Analysing meterpreter payload with Ghidra |
2019-02-28/a> | Tom Webb | Phishing impersonations |
2019-02-21/a> | Xavier Mertens | Simple Powershell Keyloggers are Back |
2019-02-18/a> | Didier Stevens | Know What You Are Logging |
2019-02-14/a> | Xavier Mertens | Old H-Worm Delivered Through GitHub |
2019-02-07/a> | Xavier Mertens | Phishing Kit with JavaScript Keylogger |
2019-02-06/a> | Brad Duncan | Hancitor malspam and infection traffic from Tuesday 2019-02-05 |
2019-02-05/a> | Rob VandenBrink | Mitigations against Mimikatz Style Attacks |
2019-02-03/a> | Didier Stevens | Video: Analyzing a Simple HTML Phishing Attachment |
2019-01-31/a> | Xavier Mertens | Tracking Unexpected DNS Changes |
2019-01-29/a> | Johannes Ullrich | A Not So Well Done Phish (Why Attackers need to Implement IPv6 Now! ;-) ) |
2019-01-28/a> | Bojan Zdrnja | Relaying Exchange?s NTLM authentication to domain admin (and more) |
2019-01-21/a> | Didier Stevens | Suspicious GET Request: Do You Know What This Is? |
2019-01-16/a> | Brad Duncan | Emotet infections and follow-up malware |
2019-01-14/a> | Rob VandenBrink | Microsoft LAPS - Blue Team / Red Team |
2019-01-10/a> | Brad Duncan | Heartbreaking Emails: "Love You" Malspam |
2019-01-09/a> | Russ McRee | gganimate: Animate YouR Security Analysis |
2019-01-05/a> | Didier Stevens | A Malicious JPEG? Second Example |
2019-01-04/a> | Didier Stevens | A Malicious JPEG? |
2019-01-02/a> | Lorna Hutcheson | Gift Card Scams on the rise |
2018-12-27/a> | Didier Stevens | Matryoshka Phish |
2018-12-23/a> | Guy Bruneau | Scanning Activity, end Goal is to add Hosts to Mirai Botnet |
2018-12-22/a> | Didier Stevens | KringleCon 2018 |
2018-12-21/a> | Lorna Hutcheson | Phishing Attempts That Bypass 2FA |
2018-12-19/a> | Xavier Mertens | Using OSSEC Active-Response as a DFIR Framework |
2018-12-16/a> | Guy Bruneau | Random Port Scan for Open RDP Backdoor |
2018-12-13/a> | Xavier Mertens | Phishing Attack Through Non-Delivery Notification |
2018-12-09/a> | Didier Stevens | Quickie: String Analysis is Still Useful |
2018-11-20/a> | Xavier Mertens | Querying DShield from Cortex |
2018-11-19/a> | Xavier Mertens | The Challenge of Managing Your Digital Library |
2018-11-18/a> | Guy Bruneau | Multipurpose PCAP Analysis Tool |
2018-11-17/a> | Xavier Mertens | Quickly Investigating Websites with Lookyloo |
2018-11-15/a> | Brad Duncan | Emotet infection with IcedID banking Trojan |
2018-11-11/a> | Pasquale Stirparo | Community contribution: joining forces or multiply solutions? |
2018-10-21/a> | Didier Stevens | MSG Files: Compressed RTF |
2018-10-17/a> | Russ McRee | RedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence |
2018-09-24/a> | Didier Stevens | Analyzing Encoded Shellcode with scdbg |
2018-09-20/a> | Xavier Mertens | Hunting for Suspicious Processes with OSSEC |
2018-09-08/a> | Didier Stevens | Video: Using scdbg to analyze shellcode |
2018-09-03/a> | Didier Stevens | Another quickie: Using scdbg to analyze shellcode |
2018-08-26/a> | Didier Stevens | Identifying numeric obfuscation |
2018-08-23/a> | Xavier Mertens | Simple Phishing Through formcrafts.com |
2018-08-19/a> | Didier Stevens | Video: Peeking into msg files - revisited |
2018-08-12/a> | Didier Stevens | A URL shortener handy for phishers |
2018-08-11/a> | Didier Stevens | Peeking into msg files - revisited |
2018-08-10/a> | Remco Verhoef | Hunting SSL/TLS clients using JA3 |
2018-08-06/a> | Didier Stevens | Numeric obfuscation: another example |
2018-08-04/a> | Didier Stevens | Dealing with numeric obfuscation in malicious scripts |
2018-08-02/a> | Brad Duncan | DHL-themed malspam reveals embedded malware in animated gif |
2018-07-30/a> | Xavier Mertens | Exploiting the Power of Curl |
2018-07-29/a> | Guy Bruneau | Using RITA for Threat Analysis |
2018-07-23/a> | Didier Stevens | Analyzing MSG files |
2018-07-20/a> | Kevin Liston | Weblogic Exploit Code Made Public (CVE-2018-2893) |
2018-07-17/a> | Xavier Mertens | Searching for Geographically Improbable Login Attempts |
2018-07-03/a> | Didier Stevens | Progress indication for scripts on Windows |
2018-07-02/a> | Guy Bruneau | Hello Peppa! - PHP Scans |
2018-07-01/a> | Didier Stevens | Video: Analyzing XPS Files |
2018-06-30/a> | Didier Stevens | XPS samples |
2018-06-26/a> | Didier Stevens | Analyzing XPS files |
2018-06-22/a> | Lorna Hutcheson | XPS Attachment Used for Phishing |
2018-06-21/a> | Xavier Mertens | Are Your Hunting Rules Still Working? |
2018-06-19/a> | Xavier Mertens | PowerShell: ScriptBlock Logging... Or Not? |
2018-06-13/a> | Xavier Mertens | A Bunch of Compromized Wordpress Sites |
2018-06-07/a> | Remco Verhoef | Automated twitter loot collection |
2018-06-06/a> | Xavier Mertens | Converting PCAP Web Traffic to Apache Log |
2018-06-04/a> | Rob VandenBrink | Digging into Authenticode Certificates |
2018-05-27/a> | Guy Bruneau | Capture and Analysis of User Agents |
2018-05-24/a> | Xavier Mertens | "Blocked" Does Not Mean "Forget It" |
2018-05-20/a> | Didier Stevens | DASAN GPON home routers exploits in-the-wild |
2018-05-16/a> | Mark Hofman | EFAIL, a weakness in openPGP and S\MIME |
2018-05-09/a> | Xavier Mertens | Nice Phishing Sample Delivering Trickbot |
2018-05-03/a> | Renato Marinho | WebLogic Exploited in the Wild (Again) |
2018-04-25/a> | Johannes Ullrich | Yet Another Drupal RCE Vulnerability |
2018-03-12/a> | Xavier Mertens | Payload delivery via SMB |
2018-03-06/a> | Mark Hofman | The joys of changing Privacy Laws |
2018-03-02/a> | Xavier Mertens | Common Patterns Used in Phishing Campaigns Files |
2018-02-25/a> | Guy Bruneau | Blackhole Advertising Sites with Pi-hole |
2018-02-25/a> | Didier Stevens | Retrieving malware over Tor on Windows |
2018-02-01/a> | Xavier Mertens | Adaptive Phishing Kit |
2018-01-31/a> | Tom Webb | Tax Phishing Time |
2018-01-23/a> | John Bambenek | Life after GDPR: Implications for Cybersecurity |
2018-01-20/a> | Didier Stevens | An RTF phish |
2018-01-18/a> | Xavier Mertens | Comment your Packet Captures! |
2018-01-12/a> | Bojan Zdrnja | Those pesky registry keys required by critical security patches |
2018-01-11/a> | Xavier Mertens | Mining or Nothing! |
2018-01-10/a> | Russ McRee | GitHub InfoSec Threepeat: HELK, ptf, and VulnWhisperer |
2018-01-07/a> | Guy Bruneau | SSH Scans by Clients Types |
2018-01-03/a> | John Bambenek | Phishing to Rural America Leads to Six-figure Wire Fraud Losses |
2018-01-02/a> | Didier Stevens | PDF documents & URLs: video |
2018-01-01/a> | Didier Stevens | What is new? |
2017-12-27/a> | Guy Bruneau | What are your Security Challenges for 2018? |
2017-12-13/a> | Xavier Mertens | Tracking Newly Registered Domains |
2017-12-02/a> | Xavier Mertens | Using Bad Material for the Good |
2017-12-01/a> | Xavier Mertens | Phishing Kit (Ab)Using Cloud Services |
2017-11-28/a> | Xavier Mertens | Apple High Sierra Uses a Passwordless Root Account |
2017-11-25/a> | Guy Bruneau | Benefits associated with the use of Open Source Software |
2017-11-23/a> | Xavier Mertens | Proactive Malicious Domain Search |
2017-11-17/a> | Xavier Mertens | Top-100 Malicious IP STIX Feed |
2017-11-15/a> | Xavier Mertens | If you want something done right, do it yourself! |
2017-11-13/a> | Guy Bruneau | jsonrpc Scanning for root account |
2017-11-10/a> | Bojan Zdrnja | Battling e-mail phishing |
2017-11-05/a> | Didier Stevens | Extracting the text from PDF documents |
2017-11-04/a> | Didier Stevens | PDF documents & URLs |
2017-11-01/a> | Rob VandenBrink | Securing SSH Services - Go Blue Team!! |
2017-10-30/a> | Johannes Ullrich | Critical Patch For Oracle's Identity Manager |
2017-10-24/a> | Xavier Mertens | Stop relying on file extensions |
2017-10-18/a> | Renato Marinho | Baselining Servers to Detect Outliers |
2017-10-15/a> | Didier Stevens | Peeking into .msg files |
2017-10-12/a> | Xavier Mertens | Version control tools aren't only for Developers |
2017-10-08/a> | Didier Stevens | A strange JPEG file |
2017-10-06/a> | Johannes Ullrich | What's in a cable? The dangers of unauthorized cables |
2017-10-02/a> | Xavier Mertens | Investigating Security Incidents with Passive DNS |
2017-09-29/a> | Lorna Hutcheson | Good Analysis = Understanding(tools + logs + normal) |
2017-09-25/a> | Renato Marinho | XPCTRA Malware Steals Banking and Digital Wallet User's Credentials |
2017-09-22/a> | Russell Eubanks | What is the State of Your Union? |
2017-09-18/a> | Xavier Mertens | Getting some intelligence from malspam |
2017-09-18/a> | Johannes Ullrich | SANS Securingthehuman posted a follow up to their Equifax breach webcast: https://securingthehuman.sans.org/blog/2017/09/15/equifax-webcast-follow-up |
2017-09-11/a> | Russ McRee | Windows Auditing with WINspect |
2017-09-10/a> | Didier Stevens | Analyzing JPEG files |
2017-09-06/a> | Adrien de Beaupre | Modern Web Application Penetration Testing , Hash Length Extension Attacks |
2017-09-02/a> | Xavier Mertens | AutoIT based malware back in the wild |
2017-08-22/a> | Xavier Mertens | Defang all the things! |
2017-08-18/a> | Renato Marinho | EngineBox Malware Supports 10+ Brazilian Banks |
2017-08-16/a> | Xavier Mertens | Analysis of a Paypal phishing kit |
2017-08-15/a> | Brad Duncan | Malspam pushing Trickbot banking Trojan |
2017-08-15/a> | Renato Marinho | (Banker(GoogleChromeExtension)).targeting("Brazil") |
2017-08-13/a> | Didier Stevens | The Good Phishing Email |
2017-07-30/a> | Guy Bruneau | Text Banking Scams |
2017-07-16/a> | Renato Marinho | SMS Phishing induces victims to photograph its own token card |
2017-07-12/a> | Xavier Mertens | Backup Scripts, the FIM of the Poor |
2017-07-09/a> | Russ McRee | Adversary hunting with SOF-ELK |
2017-07-05/a> | Didier Stevens | Selecting domains with random names |
2017-06-28/a> | Brad Duncan | Catching up with Blank Slate: a malspam campaign still going strong |
2017-06-27/a> | Brad Duncan | A Tale of Two Phishies |
2017-06-17/a> | Guy Bruneau | Mapping Use Cases to Logs. Which Logs are the Most Important to Collect? |
2017-06-15/a> | Bojan Zdrnja | Uberscammers |
2017-06-14/a> | Xavier Mertens | Systemd Could Fallback to Google DNS? |
2017-06-08/a> | Tom Webb | Summer STEM for Kids |
2017-06-02/a> | Xavier Mertens | Phishing Campaigns Follow Trends |
2017-06-01/a> | Xavier Mertens | Sharing Private Data with Webcast Invitations |
2017-05-31/a> | Pasquale Stirparo | Analysis of Competing Hypotheses, WCry and Lazarus (ACH part 2) |
2017-05-28/a> | Pasquale Stirparo | Analysis of Competing Hypotheses (ACH part 1) |
2017-05-28/a> | Guy Bruneau | CyberChef a Must Have Tool in your Tool bag! |
2017-05-20/a> | Xavier Mertens | Typosquatting: Awareness and Hunting |
2017-05-17/a> | Richard Porter | Wait What? We don?t have to change passwords every 90 days? |
2017-05-13/a> | Guy Bruneau | Has anyone Tested WannaCry Killswitch? - https://blog.didierstevens.com/2017/05/13/quickpost-wcry-killswitch-check-is-not-proxy-aware/ |
2017-05-06/a> | Xavier Mertens | The story of the CFO and CEO... |
2017-05-03/a> | Bojan Zdrnja | OAUTH phishing against Google Docs ? beware! |
2017-04-27/a> | Johannes Ullrich | BGP Hijacking: The Internet is Still/Again Broken |
2017-04-22/a> | Jim Clausing | WTF tcp port 81 |
2017-04-20/a> | Xavier Mertens | DNS Query Length... Because Size Does Matter |
2017-04-18/a> | Johannes Ullrich | Yet Another Apple Phish and Some DNS Lessons Learned From It |
2017-04-16/a> | Johannes Ullrich | Tool to Detect Active Phishing Attacks Using Unicode Look-Alike Domains |
2017-04-13/a> | Rob VandenBrink | Packet Captures Filtered by Process |
2017-04-02/a> | Guy Bruneau | IPFire - A Household Multipurpose Security Gateway |
2017-03-28/a> | Xavier Mertens | Logical & Physical Security Correlation |
2017-03-24/a> | Xavier Mertens | Nicely Obfuscated JavaScript Sample |
2017-03-19/a> | Xavier Mertens | Searching for Base64-encoded PE Files |
2017-03-15/a> | Xavier Mertens | Retro Hunting! |
2017-03-10/a> | Xavier Mertens | The Side Effect of GeoIP Filters |
2017-03-06/a> | Renato Marinho | A very convincing Typosquatting + Social Engineering campaign is targeting Santander corporate customers in Brazil |
2017-02-28/a> | Xavier Mertens | Amazon S3 Outage |
2017-02-25/a> | Guy Bruneau | Unpatched Microsoft Edge and IE Bug |
2017-02-09/a> | Brad Duncan | CryptoShield Ransomware from Rig EK |
2017-02-01/a> | Xavier Mertens | Quick Analysis of Data Left Available by Attackers |
2017-01-24/a> | Xavier Mertens | Malicious SVG Files in the Wild |
2017-01-11/a> | Johannes Ullrich | January 2017 Edition of Ouch! Security Awareness Newsletter Released: https://securingthehuman.sans.org/ouch |
2017-01-10/a> | Johannes Ullrich | Realtors Be Aware: You Are a Target |
2017-01-10/a> | Johannes Ullrich | Port 37777 "MapTable" Requests |
2017-01-06/a> | John Bambenek | Great Misadventures of Security Vendors: Absurd Sandboxing Edition |
2017-01-05/a> | John Bambenek | New Year's Resolution: Build Your Own Malware Lab? |
2017-01-04/a> | John Bambenek | Mixed Messages : Novel Phishing Attempts Trying to Steal Your E-mail Password Goes Wrong |
2016-12-29/a> | Rick Wanner | More on Protocol 47 denys |
2016-12-29/a> | Rick Wanner | Increase in Protocol 47 denys |
2016-12-27/a> | Guy Bruneau | Using daemonlogger as a Software Tap |
2016-12-11/a> | Russ McRee | Steganography in Action: Image Steganography & StegExpose |
2016-12-09/a> | Rick Wanner | Mirai - now with DGA |
2016-12-06/a> | Bojan Zdrnja | Attacking NoSQL applications |
2016-11-16/a> | Xavier Mertens | Example of Getting Analysts & Researchers Away |
2016-11-02/a> | Rob VandenBrink | What Does a Pentest Look Like? |
2016-10-25/a> | Xavier Mertens | Another Day, Another Spam... |
2016-10-10/a> | Didier Stevens | Radare2: rahash2 |
2016-10-08/a> | Russell Eubanks | Unauthorized Change Detected! |
2016-10-02/a> | Guy Bruneau | Is there an Infosec Cybersecurity Talent Shortage? |
2016-09-25/a> | Pasquale Stirparo | Defining Threat Intelligence Requirements |
2016-09-04/a> | Russ McRee | Kali Linux 2016.2 Release: https://www.kali.org/news/kali-linux-20162-release/ |
2016-09-01/a> | Xavier Mertens | Maxmind.com (Ab)used As Anti-Analysis Technique |
2016-08-31/a> | Deborah Hale | Angler Exploit Kits Reported |
2016-08-29/a> | Russ McRee | Recommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs |
2016-08-23/a> | Xavier Mertens | Voice Message Notifications Deliver Ransomware |
2016-08-21/a> | Rick Wanner | Cisco ASA SNMP Remote Code Execution Vulnerability |
2016-08-01/a> | Daniel Wesemann | Are you getting I-CANNED ? |
2016-07-31/a> | Pasquale Stirparo | Sharing (intel) is caring... or not? |
2016-07-27/a> | Xavier Mertens | Critical Xen PV guests vulnerabilities |
2016-07-21/a> | Didier Stevens | Practice ntds.dit File |
2016-07-15/a> | Xavier Mertens | Name All the Things! |
2016-07-12/a> | Xavier Mertens | Hunting for Malicious Files with MISP + OSSEC |
2016-07-03/a> | Guy Bruneau | Is Data Privacy part of your Company's Culture? |
2016-06-29/a> | Xavier Mertens | Phishing Campaign with Blurred Images |
2016-06-23/a> | Russell Eubanks | An Approach to Vulnerability Management |
2016-06-20/a> | Xavier Mertens | Using Your Password Manager to Monitor Data Leaks |
2016-06-18/a> | Rob VandenBrink | Controlling JavaScript Malware Before it Runs |
2016-06-15/a> | Richard Porter | Warp Speed Ahead, L7 Open Source Packet Generator: Warp17 |
2016-06-03/a> | Tom Liston | MySQL is YourSQL |
2016-06-01/a> | Xavier Mertens | Docker Containers Logging |
2016-05-22/a> | Pasquale Stirparo | The strange case of WinZip MRU Registry key |
2016-05-18/a> | Russ McRee | Resources: Windows Auditing & Monitoring, Linux 2FA |
2016-05-12/a> | Xavier Mertens | Another Day, Another Wave of Phishing Emails |
2016-05-02/a> | Rick Wanner | Lean Threat Intelligence |
2016-04-21/a> | Daniel Wesemann | Decoding Pseudo-Darkleech (#1) |
2016-04-21/a> | Daniel Wesemann | Decoding Pseudo-Darkleech (Part #2) |
2016-04-02/a> | Russell Eubanks | Why Can't We Be Friends? |
2016-03-30/a> | Xavier Mertens | What to watch with your FIM? |
2016-03-21/a> | Xavier Mertens | IP Addresses Triage |
2016-03-07/a> | Xavier Mertens | OSX Ransomware Spread via a Rogue BitTorrent Client Installer |
2016-02-28/a> | Guy Bruneau | RFC 6598 - Carrier Grade NAT |
2016-02-27/a> | Guy Bruneau | Wireshark Fixes Several Bugs and Vulnerabilities |
2016-02-07/a> | Xavier Mertens | More Malicious JavaScript Obfuscation |
2016-02-02/a> | Johannes Ullrich | Targeted IPv6 Scans Using pool.ntp.org . |
2016-01-29/a> | Xavier Mertens | Scripting Web Categorization |
2016-01-23/a> | Didier Stevens | Sigcheck and VirusTotal for Offline Machine |
2016-01-21/a> | Jim Clausing | Scanning for Fortinet ssh backdoor |
2016-01-20/a> | Xavier Mertens | /tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters! |
2016-01-13/a> | Alex Stanford | You Have Got a New Audio Message - Guest Diary by Pasquale Stirparo |
2016-01-11/a> | Didier Stevens | BlackEnergy .XLS Dropper |
2016-01-05/a> | Guy Bruneau | What are you Concerned the Most in 2016? |
2015-12-24/a> | Xavier Mertens | Unity Makes Strength |
2015-12-13/a> | Didier Stevens | Use The Privilege |
2015-12-12/a> | Russell Eubanks | What Signs Are You Missing? |
2015-12-10/a> | Rob VandenBrink | New Burp Feature - ClickBandit |
2015-12-04/a> | Tom Webb | Automating Phishing Analysis using BRO |
2015-11-21/a> | Didier Stevens | Maldoc Social Engineering Trick |
2015-11-09/a> | John Bambenek | ICYMI: Widespread Unserialize Vulnerability in Java |
2015-10-20/a> | Bojan Zdrnja | When encoding saves the day |
2015-10-12/a> | Guy Bruneau | Data Visualization,What is your Tool of Choice? |
2015-10-11/a> | Tony Carothers | GnuPG (GPG) 2.1.9 release announced |
2015-09-23/a> | Daniel Wesemann | Making our users unlearn what we taught them |
2015-09-21/a> | Xavier Mertens | Detecting XCodeGhost Activity |
2015-09-08/a> | Lenny Zeltser | A Close Look at PayPal Overpayment Scams That Target Craigslist Sellers |
2015-09-03/a> | Xavier Mertens | Querying the DShield API from RTIR |
2015-09-01/a> | Daniel Wesemann | How to hack |
2015-08-19/a> | Bojan Zdrnja | Outsourcing critical infrastructure (such as DNS) |
2015-08-16/a> | Guy Bruneau | Are you a "Hunter"? |
2015-08-06/a> | Didier Stevens | Sigcheck and virustotal-search |
2015-07-31/a> | Russ McRee | Tech tip: Invoke a system command in R |
2015-07-31/a> | Russ McRee | Tech tip follow-up: Using the data Invoked with R's system command |
2015-07-28/a> | Rick Wanner | Android Stagefright multimedia viewer prone to remote exploitation |
2015-07-27/a> | Daniel Wesemann | Angler's best friends |
2015-07-23/a> | Mark Hofman | Some more 0-days from ZDI |
2015-07-18/a> | Russell Eubanks | The Value a "Fresh Set Of Eyes" (FSOE) |
2015-07-17/a> | Didier Stevens | Sigcheck and VirusTotal |
2015-06-22/a> | Johannes Ullrich | SMTP Brute Forcing |
2015-06-01/a> | Tom Webb | Submit Dshield ASA Logs |
2015-05-30/a> | Russell Eubanks | Weekend Learning - Spoofer Project |
2015-05-23/a> | Guy Bruneau | Business Value in "Big Data" |
2015-05-20/a> | Brad Duncan | Logjam - vulnerabilities in Diffie-Hellman key exchange affect browsers and servers using TLS |
2015-05-10/a> | Didier Stevens | Wireshark TCP Flags: How To Install On Windows Video |
2015-04-27/a> | Richard Porter | When Prevention Fails, Incident Response Begins |
2015-04-23/a> | Bojan Zdrnja | When automation does not help |
2015-04-17/a> | Didier Stevens | Memory Forensics Of Network Devices |
2015-04-05/a> | Didier Stevens | Wireshark TCP Flags |
2015-04-03/a> | Didier Stevens | SSH Fingerprints Are Important |
2015-04-02/a> | Brad Duncan | Angler Exploit Kit - Recent Traffic Patterns |
2015-04-01/a> | Brad Duncan | Rig Exploit Kit Changes Traffic Patterns |
2015-03-26/a> | Daniel Wesemann | Pin-up on your Smartphone! |
2015-03-11/a> | Rob VandenBrink | Syslog Skeet Shooting - Targetting Real Problems in Event Logs |
2015-03-11/a> | Rob VandenBrink | Apple iTunes Store is seeing an extended outage (11 Mar) - watch https://www.apple.com/support/systemstatus/ for status changes. (12 Mar) - service restored, all green! |
2015-03-01/a> | Rick Wanner | Advisory: Seagate NAS Remote Code Execution |
2015-02-19/a> | Daniel Wesemann | DNS-based DDoS |
2015-02-12/a> | Johannes Ullrich | Did You Remove That Debug Code? Netatmo Weather Station Sending WPA Passphrase in the Clear |
2015-02-11/a> | Johannes Ullrich | Microsoft Hardens GPO by Fixing Two Serious Vulnerabilities. |
2015-02-03/a> | Johannes Ullrich | What is using this library? |
2015-02-01/a> | Rick Wanner | Improving SSL Warnings |
2015-01-31/a> | Guy Bruneau | Beware of Phishing and Spam Super Bowl Fans! |
2015-01-27/a> | Johannes Ullrich | New Critical GLibc Vulnerability CVE-2015-0235 (aka GHOST) |
2014-12-23/a> | John Bambenek | How I learned to stop worrying and love malware DGAs.... |
2014-12-06/a> | Rick Wanner | Google App Engine Java Security Sandbox bypasses |
2014-11-27/a> | Russ McRee | Syrian Electronic Army attack leads to malvertising |
2014-11-19/a> | Rob VandenBrink | "Big Data" Needs a Trip to the Security Chiropracter! |
2014-11-04/a> | Daniel Wesemann | Whois someone else? |
2014-09-27/a> | Guy Bruneau | What has Bash and Heartbleed Taught Us? |
2014-09-26/a> | Richard Porter | Why We Have Moved to InfoCon:Yellow |
2014-09-22/a> | Johannes Ullrich | Fake LogMeIn Certificate Update with Bad AV Detection Rate |
2014-09-19/a> | Guy Bruneau | Web Scan looking for /info/whitelist.pac |
2014-09-19/a> | Guy Bruneau | PHP Fixes Several Bugs in Version 5.4 and 5.5 |
2014-09-16/a> | Daniel Wesemann | https://yourfakebank.support -- TLD confusion starts! |
2014-09-15/a> | Johannes Ullrich | Google DNS Server IP Address Spoofed for SNMP reflective Attacks |
2014-09-12/a> | Chris Mohan | Are credential dumps worth reviewing? |
2014-09-03/a> | Johannes Ullrich | F5 BigIP Unauthenticated rsync Vulnerability |
2014-08-27/a> | Rob VandenBrink | One More Day of Trolling in POS Memory |
2014-08-22/a> | Richard Porter | OCLHashCat 1.30 Released |
2014-08-20/a> | Kevin Shortt | Social Engineering Alive and Well |
2014-08-15/a> | Tom Webb | AppLocker Event Logs with OSSEC 2.8 |
2014-08-09/a> | Adrien de Beaupre | Complete application ownage via Multi-POST XSRF |
2014-08-05/a> | Johannes Ullrich | Legal Threat Spam: Sometimes it Gets Personal |
2014-08-05/a> | Johannes Ullrich | Synolocker: Why OFFLINE Backups are important |
2014-08-04/a> | Russ McRee | Threats & Indicators: A Security Intelligence Lifecycle |
2014-07-30/a> | Rick Wanner | Symantec Endpoint Protection Privilege Escalation Zero Day |
2014-07-23/a> | Johannes Ullrich | New Feature: "Live" SSH Brute Force Logs and New Kippo Client |
2014-07-18/a> | Russ McRee | Gameover Zeus reported as "returned from the dead" |
2014-07-15/a> | Daniel Wesemann | Oracle July 2014 CPU (patch bundle) |
2014-07-14/a> | Johannes Ullrich | The Internet of Things: How do you "on-board" devices? |
2014-07-14/a> | Daniel Wesemann | E-ZPass phishing scam |
2014-07-11/a> | Rob VandenBrink | Egress Filtering? What - do we have a bird problem? |
2014-07-09/a> | Daniel Wesemann | Who owns your typo? |
2014-07-09/a> | Daniel Wesemann | Who inherits your IP address? |
2014-07-08/a> | Johannes Ullrich | Hardcoded Netgear Prosafe Switch Password |
2014-07-02/a> | Johannes Ullrich | July Ouch! Security Awareness Newsletter Released. E-mail Do's and Don'ts http://www.securingthehuman.org/resources/newsletters/ouch/2014#july2014 |
2014-06-13/a> | Richard Porter | A welcomed response, PF Chang's |
2014-06-04/a> | Richard Porter | p0f, Got Packets? |
2014-06-02/a> | Rick Wanner | Using nmap to scan for DDOS reflectors |
2014-06-02/a> | John Bambenek | Gameover Zeus and Cryptolocker Takedowns |
2014-05-30/a> | Johannes Ullrich | Fake Australian Electric Bill Leads to Cryptolocker |
2014-05-23/a> | Richard Porter | Highlights from Cisco Live 2014 - The Internet of Everything |
2014-05-22/a> | Rob VandenBrink | Another Site Breached - Time to Change your Passwords! (If you can that is) |
2014-05-18/a> | Russ McRee | sed and awk will always rock |
2014-05-07/a> | Johannes Ullrich | De-Clouding your Life: Things that should not go into the cloud. |
2014-05-01/a> | Johannes Ullrich | Busybox Honeypot Fingerprinting and a new DVR scanner |
2014-04-27/a> | Tony Carothers | The Dreaded "D" Word of IT |
2014-04-26/a> | Guy Bruneau | Android Users - Beware of Bitcoin Mining Malware |
2014-04-21/a> | Daniel Wesemann | Finding the bleeders |
2014-04-12/a> | Guy Bruneau | Interested in a Heartbleed Challenge? |
2014-04-08/a> | Guy Bruneau | OpenSSL CVE-2014-0160 Fixed |
2014-04-05/a> | Jim Clausing | Those strange e-mails with URLs in them can lead to Android malware |
2014-04-04/a> | Rob VandenBrink | Dealing with Disaster - A Short Malware Incident Response |
2014-04-01/a> | Johannes Ullrich | cmd.so Synology Scanner Also Found on Routers |
2014-03-31/a> | Johannes Ullrich | More Device Malware: This is why your DVR attacked my Synology Disk Station (and now with Bitcoin Miner!) |
2014-03-28/a> | Johannes Ullrich | War of the Bots: When DVRs attack NASs |
2014-03-27/a> | Alex Stanford | Apple Credential Phishing via appleidconfirm.net |
2014-03-26/a> | Johannes Ullrich | Let's Finally "Nail" This Port 5000 Traffic - Synology owners needed. |
2014-03-17/a> | Johannes Ullrich | Scans for FCKEditor File Manager |
2014-03-13/a> | Daniel Wesemann | Web server logs containing RS=^ ? |
2014-03-12/a> | Johannes Ullrich | Wordpress "Pingback" DDoS Attacks |
2014-03-04/a> | Daniel Wesemann | Triple Handshake Cookie Cutter |
2014-03-02/a> | Stephen Hall | Sunday Reading |
2014-02-28/a> | Daniel Wesemann | Oversharing |
2014-02-19/a> | Russ McRee | Threat modeling in the name of security |
2014-02-18/a> | Johannes Ullrich | More Details About "TheMoon" Linksys Worm |
2014-02-15/a> | Rob VandenBrink | More on HNAP - What is it, How to Use it, How to Find it |
2014-02-14/a> | Chris Mohan | Scanning activity for /siemens/bootstrapping/JnlpBrowser/Development/ |
2014-02-13/a> | Johannes Ullrich | Linksys Worm ("TheMoon") Captured |
2014-02-12/a> | Johannes Ullrich | Suspected Mass Exploit Against Linksys E1000 / E1200 Routers |
2014-02-10/a> | Rob VandenBrink | A Tale of Two Admins (and no Change Control) |
2014-02-09/a> | Basil Alawi S.Taher | Mandiant Highlighter 2 |
2014-02-04/a> | Johannes Ullrich | Odd ICMP Echo Request Payload |
2014-01-30/a> | Johannes Ullrich | New gTLDs appearing in the root zone |
2014-01-27/a> | Basil Alawi S.Taher | Log Parsing with Mandiant Highlighter (1) |
2014-01-24/a> | Johannes Ullrich | How to send mass e-mail the right way |
2014-01-24/a> | Chris Mohan | Phishing via Social Media |
2014-01-23/a> | Chris Mohan | Learning from the breaches that happens to others Part 2 |
2014-01-17/a> | Russ McRee | Massive RFI scans likely a free web app vuln scanner rather than bots |
2014-01-14/a> | Chris Mohan | Spamming and scanning botnets - is there something I can do to block them from my site? |
2014-01-11/a> | Guy Bruneau | tcpflow 1.4.4 and some of its most Interesting Features |
2014-01-04/a> | Tom Webb | Monitoring Windows Networks Using Syslog (Part One) |
2014-01-02/a> | John Bambenek | OpenSSL.org Defaced by Attackers Gaining Access to Hypervisor |
2014-01-01/a> | Russ McRee | Six degrees of celebration: Juniper, ANT, Shodan, Maltego, Cisco, and Tails |
2013-12-28/a> | Russ McRee | Weekend Reading List 27 DEC |
2013-12-28/a> | Bojan Zdrnja | DRG online challenge(s) |
2013-12-23/a> | Rob VandenBrink | How-To's for the Holidays - Java Whitelisting using AD Group Policy |
2013-12-21/a> | Daniel Wesemann | Adobe phishing underway |
2013-12-19/a> | Rob VandenBrink | Passive Scanning Two Ways - How-Tos for the Holidays |
2013-12-19/a> | Rob VandenBrink | Target US - Credit Card Data Breach |
2013-12-11/a> | Johannes Ullrich | Facebook Phishing and Malware via Tumblr Redirects |
2013-12-09/a> | Rob VandenBrink | Scanning without Scanning |
2013-12-07/a> | Guy Bruneau | Suspected Active Rovnix Botnet Controller |
2013-12-03/a> | Rob VandenBrink | Even in the Quietest Moments ... |
2013-11-29/a> | Russ McRee | MS Exchange update, includes failed backup fix: http://support.microsoft.com/kb/2892464 |
2013-11-27/a> | Rob VandenBrink | ATM Traffic + TCPDump + Video = Good or Evil? |
2013-11-22/a> | Rick Wanner | Port 0 DDOS |
2013-11-22/a> | Rick Wanner | Tales of Password Reuse |
2013-11-16/a> | Guy Bruneau | Sagan as a Log Normalizer |
2013-11-15/a> | Johannes Ullrich | The Security Impact of HTTP Caching Headers |
2013-11-11/a> | Johannes Ullrich | What Happened to the SANS Ads? |
2013-11-05/a> | Daniel Wesemann | TIFF images in MS-Office documents used in targeted attacks |
2013-11-04/a> | Manuel Humberto Santander Pelaez | When attackers use your DNS to check for the sites you are visiting |
2013-11-01/a> | Russ McRee | Secunia's PSI Country Report - Q3 2013 |
2013-10-30/a> | Russ McRee | SIR v15: Five good reasons to leave Windows XP behind |
2013-10-25/a> | Johannes Ullrich | PHP.net compromise aftermath: Why Code Signing Beats Hashes |
2013-10-25/a> | Rob VandenBrink | Kaspersky flags TCPIP.SYS as Malware |
2013-10-24/a> | Johannes Ullrich | False Positive: php.net Malware Alert |
2013-10-22/a> | Richard Porter | Greenbone and OpenVAS Scanner |
2013-10-21/a> | Johannes Ullrich | New tricks that may bring DNS spoofing back or: "Why you should enable DNSSEC even if it is a pain to do" |
2013-10-18/a> | Rob VandenBrink | CSAM - Why am I seeing DNS Requests to IANA.ORG in my Firewall Logs? |
2013-10-17/a> | Adrien de Beaupre | Internet wide DNS scanning |
2013-10-10/a> | Johannes Ullrich | google.com.my DNS hijack |
2013-10-10/a> | Mark Hofman | CSAM Some more unusual scans |
2013-10-04/a> | Pedro Bueno | CSAM: WebHosting BruteForce logs |
2013-10-02/a> | John Bambenek | Obamacare related domain registration spike, Government shutdown domain registration beginning |
2013-09-24/a> | Tom Webb | IDS, NSM, and Log Management with Security Onion 12.04.3 |
2013-09-11/a> | Alex Stanford | Getting Started with Rsyslog Filters |
2013-09-05/a> | Rob VandenBrink | Building Your Own GPU Enabled Private Cloud |
2013-09-02/a> | Guy Bruneau | Snort IDS Sensor with Sguil New ISO Released |
2013-08-26/a> | Alex Stanford | Stop, Drop and File Carve |
2013-08-22/a> | Russ McRee | Read of the Week: A Fuzzy Future in Malware Research |
2013-08-21/a> | Alex Stanford | Psst. Your Browser Knows All Your Secrets. |
2013-08-19/a> | Rob VandenBrink | ZMAP 1.02 released |
2013-08-15/a> | Johannes Ullrich | Microsoft Pulls MS013-061 due to problems with Exchange Server 2013 http://blogs.technet.com/b/exchange/archive/2013/08/14/exchange-2013-security-update-ms13-061-status-update.aspx |
2013-08-14/a> | Johannes Ullrich | .GOV zones may not resolve due to DNSSEC problems. |
2013-08-14/a> | Johannes Ullrich | Imaging LUKS Encrypted Drives |
2013-08-09/a> | Kevin Shortt | Copy Machines - Changing Scanned Content |
2013-08-05/a> | Chris Mohan | DMARC: another step forward in the fight against phishing? |
2013-07-31/a> | Johannes Ullrich | POP3 Server Brute Forcing Attempts Using Polycom Credentials |
2013-07-29/a> | Adrien de Beaupre | BGP multiple banking addresses hijacked |
2013-07-28/a> | Guy Bruneau | Wireshark 1.8.9 and 1.10.1 Security Update |
2013-07-21/a> | Guy Bruneau | Why use Regular Expressions? |
2013-07-20/a> | Manuel Humberto Santander Pelaez | Do you have rogue Internet gateways in your network? Check it with nmap |
2013-07-19/a> | Stephen Hall | Cyber Intelligence Tsunami |
2013-07-18/a> | Chris Mohan | Blog Spam - annoying junk or a source of intelligence? |
2013-07-16/a> | Johannes Ullrich | Why don't we see more examples of web app attacks via POST? |
2013-07-13/a> | Lenny Zeltser | Decoy Personas for Safeguarding Online Identity Using Deception |
2013-07-10/a> | Johannes Ullrich | .NL Registrar Compromisse |
2013-07-08/a> | Richard Porter | Why do we Click? |
2013-07-06/a> | Guy Bruneau | Is Metadata the Magic in Modern Network Security? |
2013-07-01/a> | Manuel Humberto Santander Pelaez | Using nmap scripts to enhance vulnerability asessment results |
2013-06-29/a> | Johannes Ullrich | Instagram "Fruit" Spam |
2013-06-22/a> | Guy Bruneau | Facebook Reports a Potential Leak of User Data |
2013-06-21/a> | Guy Bruneau | Sysinternals Updates for Autoruns, Strings & ZoomIt http://blogs.technet.com/b/sysinternals/archive/2013/06/20/updates-autoruns-v11-61-strings-v2-52-zoomit-v4-5.aspx |
2013-06-18/a> | Russ McRee | EMET 4.0 is now available for download |
2013-06-10/a> | Johannes Ullrich | When Google isn't Google |
2013-05-23/a> | Adrien de Beaupre | MoVP II |
2013-05-22/a> | Adrien de Beaupre | Privilege escalation, why should I care? |
2013-05-21/a> | Adrien de Beaupre | Moore, Oklahoma tornado charitable organization scams, malware, and phishing |
2013-05-20/a> | Guy Bruneau | Sysinternals Updates for Accesschk, Procdump, RAMMap and Strings http://blogs.technet.com/b/sysinternals/archive/2013/05/17/updates-accesschk-v5-11-procdump-v6-0-rammap-v1-22-strings-v2-51.aspx |
2013-05-19/a> | Kevin Shortt | Port 51616 - Got Packets? |
2013-05-17/a> | Johannes Ullrich | SSL: Another reason not to ignore IPv6 |
2013-05-16/a> | Daniel Wesemann | Extracting signatures from Apple .apps |
2013-05-08/a> | Chris Mohan | Syria drops from Internet 7th May 2013 |
2013-05-07/a> | Jim Clausing | Is there an epidemic of typo squatting? |
2013-05-07/a> | Jim Clausing | NGINX updates address buffer overflow (CVE-2013-2028) see http://nginx.org/en/CHANGES-1.4 |
2013-05-04/a> | Kevin Shortt | The Zero-Day Pendulum Swings |
2013-04-25/a> | Adam Swanger | Guest Diary: Dylan Johnson - A week in the life of some Perimeter Firewalls |
2013-04-23/a> | Russ McRee | Microsoft's Security Intelligence Report (SIRv14) released |
2013-04-21/a> | John Bambenek | A Chargen-based DDoS? Chargen is still a thing? |
2013-04-17/a> | Richard Porter | Apple iTunes Services Outage |
2013-04-16/a> | John Bambenek | Fake Boston Marathon Scams Update |
2013-04-15/a> | John Bambenek | Please send any spam (full headers), URLs or other suspicious content scamming off Boston Marathon explosions to handlers@sans.org |
2013-04-10/a> | Manuel Humberto Santander Pelaez | Massive Google scam sent by email to Colombian domains |
2013-04-04/a> | Johannes Ullrich | Postgresql Patches Critical Vulnerability |
2013-03-29/a> | Chris Mohan | Fake Link removal requests |
2013-03-27/a> | Adam Swanger | IPv6 Focus Month: Guest Diary: Stephen Groat - IPv6 moving target defense |
2013-03-19/a> | Johannes Ullrich | IPv6 Focus Month: The warm and fuzzy side of IPv6 |
2013-03-18/a> | Kevin Shortt | Spamhaus DDOS |
2013-03-07/a> | Guy Bruneau | Apple Blocking Java Web plug-in |
2013-03-06/a> | Adam Swanger | IPv6 Focus Month: Guest Diary: Stephen Groat - Geolocation Using IPv6 Addresses |
2013-03-02/a> | Scott Fendley | Apple Blocks Older Insecure Versions of Flash Player |
2013-02-28/a> | Daniel Wesemann | Parsing Windows Eventlogs in Powershell |
2013-02-27/a> | Adam Swanger | Guest Diary: Dylan Johnson - There's value in them there logs! |
2013-02-25/a> | Johannes Ullrich | Punkspider enumerates web application vulnerabilities |
2013-02-25/a> | Rob VandenBrink | Silent Traitors - Embedded Devices in your Datacenter |
2013-02-22/a> | Chris Mohan | PHP 5.4.12 and PHP 5.3.22 released http://www.php.net/ChangeLog-5.php |
2013-02-17/a> | Guy Bruneau | HP ArcSight Connector Appliance and Logger Vulnerabilities |
2013-02-11/a> | John Bambenek | Is This Chinese Registrar Really Trying to XSS Me? |
2013-02-06/a> | Johannes Ullrich | HTTP Range Header and Partial Downloads |
2013-02-06/a> | Johannes Ullrich | Are you losing system logging information (and don't know it)? |
2013-02-04/a> | Russ McRee | An expose of a recent SANS GIAC XSS vulnerability |
2013-02-04/a> | Adam Swanger | SAN Securing The Human Monthly Awareness Video - Advanced Persistent Threat (APT) http://www.securingthehuman.org/resources/ncsam |
2013-01-30/a> | Richard Porter | Getting Involved with the Local Community |
2013-01-25/a> | Johannes Ullrich | Vulnerability Scans via Search Engines (Request for Logs) |
2013-01-15/a> | Rob VandenBrink | When Disabling IE6 (or Java, or whatever) is not an Option... |
2013-01-10/a> | Rob VandenBrink | What Else runs Telnets? Or, Pentesters Love Video Conferencing Units Too! |
2013-01-09/a> | Rob VandenBrink | Hotmail seeing some temporary access issues |
2013-01-02/a> | Chris Mohan | Starting the New Year on the right foot |
2012-12-27/a> | John Bambenek | It's 3pm 2 days after Christmas, do you know where your unmanaged SSH keys are? |
2012-12-20/a> | Daniel Wesemann | White House strategy on security information sharing and safeguarding |
2012-12-18/a> | Dan Goldberg | Mitigating the impact of organizational change: a risk assessment |
2012-12-13/a> | Johannes Ullrich | What if Tomorrow Was the Day? |
2012-12-06/a> | Daniel Wesemann | Fake tech support calls - revisited |
2012-12-06/a> | Daniel Wesemann | Rich Quick Make Money! |
2012-12-03/a> | John Bambenek | John McAfee Exposes His Location in Photo About His Being on Run |
2012-12-02/a> | Guy Bruneau | Collecting Logs from Security Devices at Home |
2012-11-30/a> | Daniel Wesemann | Nmap 6.25 released - lots of new goodies, see http://nmap.org/changelog.html |
2012-11-29/a> | Kevin Shortt | New Apple Security Update: APPLE-SA-2012-11-29-1 Apple TV 5.1.1 |
2012-11-28/a> | Mark Hofman | McAfee releases extraDAT for W32/Autorun.worm.aaeb-h |
2012-11-28/a> | Mark Hofman | New version of wireshark is available (1.8.4), some security fixes included. |
2012-11-27/a> | Chris Mohan | Can users' phish emails be a security admin's catch of the day? |
2012-11-26/a> | John Bambenek | Online Shopping for the Holidays? Tips, News and a Fair Warning |
2012-11-23/a> | Rob VandenBrink | What's in Your Change Control Form? |
2012-11-20/a> | John Bambenek | Behind the Random NTP Bizarreness of Incorrect Year Being Set |
2012-11-20/a> | John Bambenek | Firefox v 17.0 just released, more here: http://www.mozilla.org/en-US/firefox/17.0/releasenotes/ |
2012-11-19/a> | John Bambenek | MoneyGram fined $100 million for aiding wire fraud - http://krebsonsecurity.com/2012/11/moneygram-fined-100-million-for-wire-fraud/ |
2012-11-19/a> | John Bambenek | New Poll: Top 5 Unresolved Security Problems of 2012 |
2012-11-17/a> | Manuel Humberto Santander Pelaez | New Sysinternal Updates: AdExplorer v1.44, Contig v1.7, Coreinfo v3.2, Procdump v5.1. See http://blogs.technet.com/b/sysinternals/archive/2012/11/16/updates-adexplorer-v1-44-contig-v1-7-coreinfo-v3-2-procdump-v5-1.aspx?Redirected=true |
2012-11-13/a> | Jim Clausing | Microsoft November 2012 Black Tuesday Update - Overview |
2012-11-12/a> | John Bambenek | Request for info: Robocall Phishing Against Local/Regional Banks |
2012-11-09/a> | Mark Baggett | Remote Diagnostics with PSR |
2012-11-09/a> | Mark Baggett | Fresh batch of Microsoft patches next week |
2012-11-08/a> | Daniel Wesemann | Get a 40% discount on your hotel room! |
2012-11-07/a> | Mark Baggett | Help eliminate unquoted path vulnerabilities |
2012-11-07/a> | Mark Baggett | Multiple 0-Days Reported! |
2012-11-07/a> | Mark Baggett | Cisco TACACS+ Authentication Bypass |
2012-11-05/a> | Johannes Ullrich | Reminder: Ongoing SMTP Brute Forcing Attacks |
2012-11-05/a> | Johannes Ullrich | Possible Fake-AV Ads from Doubleclick Servers |
2012-11-04/a> | Lorna Hutcheson | What's important on your network? |
2012-10-31/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 31 - Business Continuity and Disaster Recovery |
2012-10-30/a> | Mark Hofman | Cyber Security Awareness Month - Day 30 - DSD 35 mitigating controls |
2012-10-30/a> | Johannes Ullrich | Hurricane Sandy Update |
2012-10-30/a> | Richard Porter | Splunk 5.0 SP-CAAAHB4 http://www.splunk.com/view/SP-CAAAHB4 |
2012-10-28/a> | Tony Carothers | Firefox 16.02 Released |
2012-10-26/a> | Adam Swanger | Securing the Human Special Webcast - October 30, 2012 |
2012-10-26/a> | Russ McRee | Cyber Security Awareness Month - Day 26 - Attackers use trusted domain to propagate Citadel Zeus variant |
2012-10-25/a> | Richard Porter | Cyber Security Awareness Month - Day 25 - Pro Audio & Video Packets on the Wire |
2012-10-24/a> | Russ McRee | Ongoing Windstream outage in the midwest - https://twitter.com/search?q=windstream |
2012-10-23/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 23: Character Encoding Standards - ASCII and Successors |
2012-10-21/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 22: Connectors |
2012-10-21/a> | Lorna Hutcheson | Potential Phish for Regular Webmail Accounts |
2012-10-19/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 19: Standard log formats and CEE. |
2012-10-18/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide |
2012-10-17/a> | Mark Hofman | Oracle Critical Patch Update October |
2012-10-17/a> | Mark Hofman | New Acrobat release (including reader) available. Version 11. Some security improvements more here -->http://blogs.adobe.com/adobereader/ |
2012-10-16/a> | Richard Porter | CyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook. |
2012-10-16/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 16: W3C and HTML |
2012-10-14/a> | Pedro Bueno | Cyber Security Awareness Month - Day 14 - Poor Man's File Analysis System - Part 1 |
2012-10-09/a> | Johannes Ullrich | Microsoft October 2012 Black Tuesday Update - Overview |
2012-10-07/a> | Tony Carothers | Cyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1 |
2012-10-05/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 5: Standards Body Soup, So many Flavors in the bowl. |
2012-10-05/a> | Richard Porter | VMWare Security Advisory: VMSA-2012-0014 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html |
2012-10-05/a> | Richard Porter | Reports of a Distributed Injection Scan |
2012-10-04/a> | Mark Hofman | And the SHA-3 title goes to .....Keccak |
2012-10-04/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 4: Crypto Standards |
2012-10-03/a> | Kevin Shortt | Fake Support Calls Reported |
2012-10-02/a> | Russ McRee | Cyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines |
2012-10-01/a> | Johannes Ullrich | Cyber Security Awareness Month |
2012-09-28/a> | Joel Esler | Adobe certification revocation for October 4th |
2012-09-26/a> | Johannes Ullrich | Some Android phones can be reset to factory default by clicking on links |
2012-09-26/a> | Johannes Ullrich | More Java Woes |
2012-09-21/a> | Johannes Ullrich | iOS 6 Security Roundup |
2012-09-21/a> | Guy Bruneau | Storing your Collection of Malware Samples with Malwarehouse |
2012-09-20/a> | Russ McRee | Financial sector advisory: attacks and threats against financial institutions |
2012-09-19/a> | Russ McRee | Script kiddie scavenging with Shellbot.S |
2012-09-17/a> | Rob VandenBrink | What's on your iPad? |
2012-09-14/a> | Lenny Zeltser | Analyzing Malicious RTF Files Using OfficeMalScanner's RTFScan |
2012-09-14/a> | Lenny Zeltser | Scam Report - Fake Voice Mail Email Notification Redirects to Malicious Site |
2012-09-13/a> | Mark Baggett | TCP Fuzzing with Scapy |
2012-09-13/a> | Mark Baggett | Microsoft disrupts traffic associated with the Nitol botnet |
2012-09-13/a> | Mark Baggett | More SSL trouble |
2012-09-10/a> | Johannes Ullrich | Microsoft Patch Tuesday Pre-Release |
2012-09-10/a> | Johannes Ullrich | Godaddy DDoS Attack |
2012-09-10/a> | donald smith | Blue Toad publishing co compromise lead to UDID release. http://redtape.nbcnews.com/_news/2012/09/10/13781440-exclusive-the-real-source-of-apple-device-ids-leaked-by-anonymous-last-week?lite |
2012-09-09/a> | Guy Bruneau | Phishing/Spam Pretending to be from BBB |
2012-09-06/a> | Johannes Ullrich | SSL Requests sent to port 80 (request for help/input) |
2012-09-04/a> | Johannes Ullrich | Another round of "Spot the Exploit E-Mail" |
2012-09-02/a> | Lorna Hutcheson | Demonstrating the value of your Intrusion Detection Program and Analysts |
2012-09-01/a> | Russ McRee | Blackhole targeting Java vulnerability via fake Microsoft Services Agreement email phish |
2012-08-31/a> | Russ McRee | Not so fast: Java 7 Update 7 critical vulnerability discovered in less than 24 hours |
2012-08-30/a> | Bojan Zdrnja | Analyzing outgoing network traffic (part 2) |
2012-08-30/a> | Johannes Ullrich | Editorial: The Slumlord Approach to Network Security http://isc.sans.edu/j/editorial |
2012-08-29/a> | Johannes Ullrich | "Data" URLs used for in-URL phishing |
2012-08-27/a> | Johannes Ullrich | The Good, Bad and Ugly about Assigning IPv6 Addresses |
2012-08-27/a> | Johannes Ullrich | Malware Spam harvesting Facebook Information |
2012-08-26/a> | Lorna Hutcheson | Who ya gonna contact? |
2012-08-23/a> | Bojan Zdrnja | Analyzing outgoing network traffic |
2012-08-22/a> | Adrien de Beaupre | Apple Remote Desktop update fixes no encryption issue |
2012-08-22/a> | Adrien de Beaupre | Phishing/spam via SMS |
2012-08-21/a> | Adrien de Beaupre | YYABCAFU - Yes Yet Another Bleeping Critical Adobe Flash Update |
2012-08-21/a> | Adrien de Beaupre | RuggedCom fails key management 101 on Rugged Operating System (ROS) |
2012-08-20/a> | Manuel Humberto Santander Pelaez | Do we need test procedures in our companies before implementing Antivirus signatures? |
2012-08-19/a> | Manuel Humberto Santander Pelaez | Authentication Issues between entities during protocol message exchange in SCADA Systems |
2012-08-17/a> | Guy Bruneau | Suspicious eFax Spear Phishing Messages |
2012-08-14/a> | Rick Wanner | Microsoft August 2012 Black Tuesday Update - Overview |
2012-08-12/a> | Tony Carothers | Layers of the Defense-in-Depth Onion |
2012-08-12/a> | Tony Carothers | Oracle Security Alert for CVE-2012-3132 |
2012-08-09/a> | Mark Hofman | Zeus/Citadel variant causing issues in the Netherlands |
2012-08-09/a> | Mark Hofman | SQL Injection Lilupophilupop style, Part 2 |
2012-08-07/a> | Adrien de Beaupre | Who protects small business? |
2012-08-05/a> | Daniel Wesemann | Phishing for Payroll with unpatched Java |
2012-08-04/a> | Kevin Liston | Vendors: More Patch-Release Options Please |
2012-08-01/a> | Johannes Ullrich | Google Chrome 21 and getUserMedia API |
2012-07-27/a> | Daniel Wesemann | Cuckoo 0.4 is out - cool new features for malware analysis http://www.cuckoosandbox.org/ |
2012-07-25/a> | Johannes Ullrich | Microsoft Exchange/Sharepoint and others: Oracle Outside In Vulnerability |
2012-07-24/a> | Richard Porter | Wireshark 1.8.1 Released http://www.wireshark.org/ |
2012-07-24/a> | Richard Porter | Report of spike in DNS Queries gd21.net |
2012-07-21/a> | Rick Wanner | TippingPoint DNS Version Request increase |
2012-07-20/a> | Mark Baggett | Syria Internet connection cut? |
2012-07-19/a> | Mark Baggett | Diagnosing Malware with Resource Monitor |
2012-07-19/a> | Mark Baggett | A Heap of Overflows? |
2012-07-16/a> | Richard Porter | Sysinternals Update @ http://blogs.technet.com/b/sysinternals/archive/2012/07/16/updates-handle-v3-5-process-explorer-v15-22-process-monitor-v3-03-rammap-v1-21-zoomit-v4-3.aspx |
2012-07-16/a> | Jim Clausing | An analysis of the Yahoo! passwords |
2012-07-13/a> | Richard Porter | Yesterday (not as on the ball as Rob) at SANSFire |
2012-07-13/a> | Russ McRee | 2 for 1: SANSFIRE & MSRA presentations |
2012-07-13/a> | Russ McRee | Yahoo service SQL injection vuln leads to account exposure |
2012-07-12/a> | Rick Wanner | Cisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms |
2012-07-12/a> | Rick Wanner | Cisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Recording Server - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs |
2012-07-12/a> | Rick Wanner | Cisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts |
2012-07-12/a> | Rick Wanner | Cisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Manager - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman |
2012-07-11/a> | Rick Wanner | Excellent Security Education Resources |
2012-07-09/a> | Johannes Ullrich | The FBI will turn off the Internet on Monday (or not) |
2012-07-09/a> | Manuel Humberto Santander Pelaez | Internet Storm Center panel tonight at SANSFIRE 2012! |
2012-07-05/a> | Adrien de Beaupre | New OS X trojan backdoor MaControl variant reported |
2012-07-02/a> | Joel Esler | A rough guide to keeping your website up |
2012-07-02/a> | Joel Esler | Linux & Java leap second bug |
2012-06-29/a> | Jim Clausing | Updated SysInternals tools - Autoruns, Process Explorer, Process Monitor, PSKill -- http://blogs.technet.com/b/sysinternals/archive/2012/06/28/updates-autoruns-v11-32-process-explorer-v15-21-process-monitor-v3-02-pskill-v1-15-rammap-v1-2.aspx |
2012-06-28/a> | Chris Mohan | Massive spike in BGP traffic - Possible BGP poisoning? |
2012-06-27/a> | Daniel Wesemann | What's up with port 79 ? |
2012-06-25/a> | Rick Wanner | Targeted Malware for Industrial Espionage? |
2012-06-25/a> | Guy Bruneau | Issues with Windows Update Agent |
2012-06-22/a> | Kevin Liston | Updated Poll: Which Patch Delivery Schedule Works the Best for You? |
2012-06-21/a> | Russ McRee | Analysis of drive-by attack sample set |
2012-06-21/a> | Russ McRee | Wireshark 1.8.0 released 21 JUN 2012 http://www.wireshark.org/download.html |
2012-06-20/a> | Raul Siles | CVE-2012-0217 (from MS12-042) applies to other environments too |
2012-06-19/a> | Daniel Wesemann | Vulnerabilityqueerprocessbrittleness |
2012-06-15/a> | Johannes Ullrich | Authenticating E-Mail |
2012-06-14/a> | Johannes Ullrich | Spot the Phish: Verizon Wireless |
2012-06-10/a> | Scott Fendley | Preying on Users After Major Security Incidents |
2012-06-04/a> | Lenny Zeltser | Decoding Common XOR Obfuscation in Malicious Code |
2012-06-04/a> | Rob VandenBrink | vSphere 5.0 Hardening Guide Officially Released |
2012-05-30/a> | Rob VandenBrink | Too Big to Fail / Too Big to Learn? |
2012-05-30/a> | Rob VandenBrink | It's Phishing Season! In fact, it's ALWAYS Phishing Season! |
2012-05-25/a> | Guy Bruneau | Apple PGP Product Security key update - https://www.apple.com/support/security/pgp/ |
2012-05-25/a> | Guy Bruneau | Google Publish Transparency Report |
2012-05-23/a> | Mark Baggett | Problems with MS12-035 affecting XP, SBS and Windows 2003? |
2012-05-16/a> | Johannes Ullrich | New Version of Google Chrome released (19.0.1084.46) |
2012-05-14/a> | Chris Mohan | Laptops at Security Conferences |
2012-05-06/a> | Jim Clausing | Tool updates and Win 8 |
2012-05-02/a> | Bojan Zdrnja | Monitoring VMWare logs |
2012-04-30/a> | Rob VandenBrink | FCC posts Enquiry Documents on Google Wardriving |
2012-04-23/a> | Russ McRee | Emergency Operations Centers & Security Incident Management: A Correlation |
2012-04-21/a> | Guy Bruneau | WordPress Release Security Update |
2012-04-16/a> | Mark Baggett | Challenge: What can you do with Funky Directory Names (Part 2) |
2012-04-11/a> | Mark Baggett | Challenge: What can you do with funky directory names? |
2012-04-08/a> | Chris Mohan | Blog Log: More noise or a rich source of intelligence? |
2012-04-06/a> | Johannes Ullrich | Social Share Privacy |
2012-04-05/a> | Johannes Ullrich | Evil hides everywhere: Web Application Exploits in Headers |
2012-04-02/a> | Johannes Ullrich | SHA 1-2-3 |
2012-03-27/a> | Guy Bruneau | Wireshark 1.6.6 and 1.4.2 Released |
2012-03-27/a> | Guy Bruneau | Opera 11.62 for Windows patch several bugs and vulnerabilities - http://www.opera.com/docs/changelogs/windows/1162/ |
2012-03-16/a> | Swa Frantzen | INFOCON Yellow - Microsoft RDP - MS12-020 |
2012-02-29/a> | Johannes Ullrich | COX Network Outage |
2012-02-24/a> | Guy Bruneau | Flashback Trojan in the Wild |
2012-02-23/a> | donald smith | DNS-Changer "clean DNS" extension requested |
2012-02-20/a> | Johannes Ullrich | The Ultimate OS X Hardening Guide Collection |
2012-02-20/a> | Pedro Bueno | Simple Malware Research Tools |
2012-02-20/a> | Rick Wanner | DNSChanger resolver shutdown deadline is March 8th |
2012-01-31/a> | Russ McRee | OSINT tactics: parsing from FOCA for Maltego |
2012-01-24/a> | Bojan Zdrnja | Is it time to get rid of NetBIOS? |
2012-01-22/a> | Lorna Hutcheson | Mailbag - "Attacks" |
2012-01-13/a> | Guy Bruneau | New Generic Top-Level Domains (gTLDs) out for Sale |
2012-01-12/a> | Rob VandenBrink | Stuff I Learned Scripting - Fun with STDERR |
2011-12-25/a> | Deborah Hale | Merry Christmas, Happy Holidays |
2011-12-12/a> | Daniel Wesemann | You won 100$ or a free iPad! |
2011-11-28/a> | Tom Liston | A Puzzlement... |
2011-11-19/a> | Kevin Liston | Monitoring your Log Monitoring Process |
2011-11-16/a> | Adrien de Beaupre | GET BACK TO ME ASAP |
2011-11-11/a> | Rick Wanner | What's up with fbi.gov DNS? |
2011-11-10/a> | Rob VandenBrink | Stuff I Learned Scripting - - Parsing XML in a One-Liner |
2011-11-09/a> | Russ McRee | Operation Ghost Click: FBI bags crime ring responsible for $14 million in losses |
2011-11-07/a> | Rob VandenBrink | Juniper BGP issues causing locallized Internet Problems |
2011-10-28/a> | Russ McRee | Critical Control 19: Data Recovery Capability |
2011-10-26/a> | Rick Wanner | Critical Control 17:Penetration Tests and Red Team Exercises |
2011-10-26/a> | Rob VandenBrink | The Theoretical "SSL Renegotiation" Issue gets a Whole Lot More Real ! |
2011-10-25/a> | Chris Mohan | Recurring reporting made easy? |
2011-10-21/a> | Johannes Ullrich | New Flash Click Jacking Exploit |
2011-10-17/a> | Rob VandenBrink | Critical Control 11: Account Monitoring and Control |
2011-10-10/a> | Tom Liston | What's In A Name? |
2011-09-29/a> | Daniel Wesemann | The SSD dilemma |
2011-09-27/a> | donald smith | New feature in JUNOS to drop or ignore path attributes. |
2011-09-20/a> | Swa Frantzen | Diginotar declared bankrupt |
2011-09-19/a> | Guy Bruneau | MS Security Advisory Update - Fraudulent DigiNotar Certificates |
2011-09-18/a> | Guy Bruneau | Google Chrome Security Updates |
2011-09-15/a> | Swa Frantzen | DigiNotar looses their accreditation for qualified certificates |
2011-09-13/a> | Swa Frantzen | GlobalSign back in operation |
2011-09-13/a> | Swa Frantzen | More DigiNotar intermediate certificates blocklisted at Microsoft |
2011-09-09/a> | Johannes Ullrich | Large power outage in Southern California may last until Friday. http://www.sdge.com |
2011-09-07/a> | Lenny Zeltser | Analyzing Mobile Device Malware - Honeynet Forensic Challenge 9 and Some Tools |
2011-09-07/a> | Lenny Zeltser | GlobalSign Temporarily Stops Issuing Certificates to Investigate a Potential Breach |
2011-09-06/a> | Swa Frantzen | DigiNotar audit - intermediate report available |
2011-09-06/a> | Johannes Ullrich | Microsoft Releases Diginotar Related Patch and Advisory |
2011-09-01/a> | Swa Frantzen | DigiNotar breach - the story so far |
2011-08-31/a> | Johannes Ullrich | Firefox/Thunderbird 6.0.1 released to blocklist bad DigiNotar SSL certificates |
2011-08-31/a> | Johannes Ullrich | Phishing e-mail to custom e-mail addresses |
2011-08-31/a> | Johannes Ullrich | Kernel.org Compromise |
2011-08-26/a> | Daniel Wesemann | User Agent 007 |
2011-08-24/a> | Rob VandenBrink | Google Chrome 13.0.782.215 Released, several security updates ==> http://googlechromereleases.blogspot.com/2011/08/stable-channel-update_22.html |
2011-08-24/a> | Rob VandenBrink | Citrix Access Gateway Cross Site Scripting vulnerability and fix ==> http://support.citrix.com/article/CTX129971 |
2011-08-17/a> | Rob VandenBrink | Putting all of Your Eggs in One Basket - or How NOT to do Layoffs |
2011-08-16/a> | Scott Fendley | Phishing Scam Victim Response |
2011-08-15/a> | Rob VandenBrink | 8 Years since the Eastern Seaboard Blackout - Has it Been that Long? |
2011-08-08/a> | Rob VandenBrink | Ping is Bad (Sometimes) |
2011-08-05/a> | donald smith | New Mac Trojan: BASH/QHost.WB |
2011-08-03/a> | Johannes Ullrich | Malicious Images: What's a QR Code |
2011-07-21/a> | Mark Hofman | Lion Released |
2011-07-17/a> | Mark Hofman | SSH Brute Force |
2011-07-13/a> | Guy Bruneau | New Sguil HTTPRY Agent |
2011-07-09/a> | Tony Carothers | Copyright Alert System - What say you? |
2011-07-09/a> | Johannes Ullrich | Updated PGP key for blocklist added to https://isc.sans.edu/PGPKEYS.txt |
2011-07-07/a> | Rob VandenBrink | "There's a Patch for that" (or maybe not) |
2011-07-06/a> | Rob VandenBrink | "Too Important to Patch" - Wait? What? |
2011-07-03/a> | Deborah Hale | Business Continuation in the Face of Disaster |
2011-06-28/a> | Johannes Ullrich | Update: Google Chrome 12.0.742.112 released http://googlechromereleases.blogspot.com/2011/06/stable-channel-update_28.html |
2011-06-26/a> | Rick Wanner | Nagios script for ISC threat level http://www.aj-services.com/?p=275 |
2011-06-22/a> | Guy Bruneau | How Good is your Employee Termination Policy? |
2011-06-21/a> | Chris Mohan | Australian government security audit report shows tough love to agencies |
2011-06-20/a> | Chris Mohan | Log files - are you reviewing yours? |
2011-06-19/a> | Guy Bruneau | Sega Pass Compromised - 1.29 Million Customers Data Leaked |
2011-06-17/a> | Richard Porter | When do you stop owning Technology? |
2011-06-13/a> | Bojan Zdrnja | Harry Potter and the Rogue anti-virus: Part 1 |
2011-06-12/a> | Mark Hofman | Cloud thoughts |
2011-06-08/a> | Johannes Ullrich | Spam from compromised Hotmail accounts |
2011-06-06/a> | Manuel Humberto Santander Pelaez | Phishing: Same goal, same techniques and people still falling for such scams |
2011-05-25/a> | Lenny Zeltser | Monitoring Social Media for Security References to Your Organization |
2011-05-19/a> | Daniel Wesemann | Fake AV Bingo |
2011-05-17/a> | Johannes Ullrich | A Couple Days of Logs: Looking for the Russian Business Network |
2011-05-11/a> | Swa Frantzen | Time to disable WebGL ? |
2011-05-10/a> | Swa Frantzen | Changing MO in scamming our users ? |
2011-05-06/a> | Richard Porter | Updated Exploit Index for Microsoft |
2011-04-28/a> | Chris Mohan | Gathering and use of location information fears - or is it all a bit too late |
2011-04-26/a> | John Bambenek | Is the Insider Threat Really Over? |
2011-04-25/a> | Rob VandenBrink | Sony PlayStation Network Outage - Day 5 |
2011-04-23/a> | Manuel Humberto Santander Pelaez | Image search can lead to malware download |
2011-04-22/a> | Manuel Humberto Santander Pelaez | iPhoneMap: iPhoneTracker port to Linux |
2011-04-21/a> | Guy Bruneau | Silverlight Update Available |
2011-04-20/a> | Johannes Ullrich | iPhone GPS Data Storage |
2011-04-11/a> | Johannes Ullrich | GMail User Using 2FA Warned of Access From China |
2011-04-07/a> | Chris Mohan | Being a good internet neighbour |
2011-04-03/a> | Richard Porter | Extreme Disclosure? Not yet but a great trend! |
2011-03-29/a> | Daniel Wesemann | Making sense of RSA ACE server audit logs |
2011-03-22/a> | Chris Mohan | Read only USB stick trick |
2011-03-14/a> | Bojan Zdrnja | Tsunami in Japan and self modifying RogueAV code |
2011-03-11/a> | Guy Bruneau | Snort IDS Sensor with Sguil Framework ISO |
2011-03-09/a> | Kevin Shortt | AVG Anti-Virus 2011 False Positives - Luhe.Exploit.PDF.B |
2011-03-07/a> | Bojan Zdrnja | Oracle padding attacks (Codegate crypto 400 writeup) |
2011-03-03/a> | Manuel Humberto Santander Pelaez | Rogue apps inside Android Marketplace |
2011-02-28/a> | Deborah Hale | Possible Botnet Scanning |
2011-02-22/a> | Bojan Zdrnja | HBGary hack: lessons learned |
2011-02-11/a> | Kevin Johnson | Two-Factor Auth: Can we just Google the response? |
2011-02-09/a> | Mark Hofman | Adobe Patches (shockwave, Flash, Reader & Coldfusion) |
2011-02-08/a> | Johannes Ullrich | Tippingpoint Releases Details on Unpatched Bugs |
2011-02-07/a> | Richard Porter | Crime is still Crime! Pt 2 |
2011-02-02/a> | Johannes Ullrich | Having Phish on Friday |
2011-01-30/a> | Richard Porter | The Modern Dark Ages? |
2011-01-29/a> | Mark Hofman | Sourceforge attack |
2011-01-25/a> | Chris Mohan | Reviewing our preconceptions |
2011-01-24/a> | Rob VandenBrink | Where have all the COM Ports Gone? - How enumerating COM ports led to me finding a “misplaced” Microsoft tool |
2011-01-13/a> | Rob VandenBrink | Is Infosec seeing "Death by a Thousand Budget Cuts"? |
2011-01-13/a> | Rob VandenBrink | Google Chrome 8.0.552.237 and Chrome OS 8.0.552.334 released ==> http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html and http://www.kb.cert.org/vuls/id/258423 |
2011-01-12/a> | Richard Porter | Yet Another Data Broker? AOL Lifestream. |
2011-01-12/a> | Richard Porter | Has Big Brother gone Global? |
2011-01-10/a> | Manuel Humberto Santander Pelaez | VirusTotal VTzilla firefox/chrome plugin |
2010-12-30/a> | Rick Wanner | Obvious Lessons from the Skype outage |
2010-12-29/a> | Daniel Wesemann | Beware of strange web sites bearing gifts ... |
2010-12-24/a> | Daniel Wesemann | A question of class |
2010-12-23/a> | Mark Hofman | Skoudis' Annual Xmas Hacking Challenge - The Nightmare Before Charlie Brown's Christmas |
2010-12-23/a> | Mark Hofman | White house greeting cards |
2010-12-22/a> | John Bambenek | IIS 7.5 0-Day DoS (processing FTP requests) |
2010-12-15/a> | Manuel Humberto Santander Pelaez | HP StorageWorks P2000 G3 MSA hardcoded user |
2010-12-13/a> | Deborah Hale | Gawker Media Breach of Security |
2010-12-10/a> | Mark Hofman | Microsoft patches |
2010-12-03/a> | Mark Hofman | AVG Update Bricking windows 7 64 bit |
2010-11-29/a> | Stephen Hall | iPhone phishing - What you see, isn't what you get |
2010-11-26/a> | Mark Hofman | Using password cracking as metric/indicator for the organisation's security posture |
2010-11-24/a> | Bojan Zdrnja | Privilege escalation 0-day in almost all Windows versions |
2010-11-22/a> | Lenny Zeltser | Brand Impersonations On-Line: Brandjacking and Social Networks |
2010-11-19/a> | Jason Lam | Exchanging and sharing of assessment results |
2010-11-18/a> | Chris Carboni | Stopping the ZeroAccess Rootkit |
2010-11-17/a> | Guy Bruneau | Reference on Open Source Digital Forensics |
2010-11-17/a> | Guy Bruneau | Cisco Unified Videoconferencing Affected by Multiple Vulnerabilities |
2010-11-12/a> | Guy Bruneau | Honeynet Forensic Challenge - Analyzing Malicious Portable Destructive Files |
2010-11-11/a> | Johannes Ullrich | OS X 10.6.5 released with security patches. Careful: issues with PGP WDE! (see PGP support forums) |
2010-11-02/a> | Johannes Ullrich | Limited Malicious Search Engine Poisoning for Election |
2010-10-26/a> | Pedro Bueno | Be (even more) careful with public hotspots. Firesheep released yesterday. Brilliant and scary. |
2010-10-22/a> | Manuel Humberto Santander Pelaez | Intypedia project |
2010-10-20/a> | Jim Clausing | Tools updates - Oct 2010 |
2010-10-11/a> | Adrien de Beaupre | OT: Happy Thanksgiving Day Canada |
2010-10-04/a> | Mark Hofman | Online Voting |
2010-10-03/a> | Adrien de Beaupre | Canada's Cyber Security Strategy released today |
2010-09-28/a> | Daniel Wesemann | Supporting the economy (in Russia and Ukraine) |
2010-09-16/a> | Johannes Ullrich | Facebook "Like Pages" |
2010-09-14/a> | Adrien de Beaupre | BlackEnergy DDoS |
2010-09-07/a> | Bojan Zdrnja | SSH password authentication insight and analysis by DRG |
2010-08-27/a> | Mark Hofman | FTP Brute Password guessing attacks |
2010-08-23/a> | Manuel Humberto Santander Pelaez | Firefox plugins to perform penetration testing activities |
2010-08-23/a> | Bojan Zdrnja | DLL hijacking vulnerabilities |
2010-08-19/a> | Rob VandenBrink | Change is Good. Change is Bad. Change is Life. |
2010-08-17/a> | Bojan Zdrnja | Do you like Bing? So do the RogueAV guys! |
2010-08-16/a> | Raul Siles | Blind Elephant: A New Web Application Fingerprinting Tool |
2010-08-13/a> | Guy Bruneau | Shadowserver Binary Whitelisting Service |
2010-08-10/a> | Daniel Wesemann | SSH - new brute force tool? |
2010-08-07/a> | Stephen Hall | Countdown to Tuesday... |
2010-08-04/a> | Tom Liston | Incident Reporting - Liston's "How-To" Guide |
2010-08-03/a> | Johannes Ullrich | When Lightning Strikes |
2010-07-29/a> | Rob VandenBrink | Snort 2.8.6.1 and Snort 2.9 Beta Released |
2010-07-24/a> | Manuel Humberto Santander Pelaez | GnuPG gpgsm bug |
2010-07-24/a> | Manuel Humberto Santander Pelaez | Transmiting logon information unsecured in the network |
2010-07-20/a> | Manuel Humberto Santander Pelaez | Lowering infocon back to green |
2010-07-18/a> | Manuel Humberto Santander Pelaez | SAGAN: An open-source event correlation system - Part 1: Installation |
2010-07-18/a> | Manuel Humberto Santander Pelaez | New metasploit GUI written in Java |
2010-07-13/a> | Jim Clausing | Forensic challenge results |
2010-07-13/a> | Jim Clausing | VMware Studio Security Update |
2010-07-07/a> | Kevin Shortt | Facebook, Facebook, What Do YOU See? |
2010-07-04/a> | Manuel Humberto Santander Pelaez | Interesting analysis of the PHP SplObjectStorage Vulnerability |
2010-07-01/a> | Bojan Zdrnja | Down the RogueAV and Blackhat SEO rabbit hole (part 2) |
2010-06-29/a> | donald smith | Interesting idea to help prevent RogueAV from using SEO without being noticed:) |
2010-06-28/a> | Bojan Zdrnja | Down the RogueAV and Blackhat SEO rabbit hole |
2010-06-27/a> | Manuel Humberto Santander Pelaez | Study of clickjacking vulerabilities on popular sites |
2010-06-21/a> | Adrien de Beaupre | GoDaddy Scam/Phish/Spam |
2010-06-16/a> | Kevin Shortt | Maltego 3 |
2010-06-15/a> | Manuel Humberto Santander Pelaez | iPhone 4 Order Security Breach Exposes Private Information |
2010-06-14/a> | Manuel Humberto Santander Pelaez | New way of social engineering on IRC |
2010-06-14/a> | Manuel Humberto Santander Pelaez | Another way to get protection for application-level attacks |
2010-06-14/a> | Manuel Humberto Santander Pelaez | Rogue facebook application acting like a worm |
2010-06-11/a> | Mark Hofman | ollydbg your favourite debugger version 2.0 is released If you downloaded on 2 or 3 June you'll need the fixed version from June 4. 32 bit only at this stage. 64 bit is planned for 2.01 |
2010-06-10/a> | Deborah Hale | Top 5 Social Networking Media Risks |
2010-06-06/a> | Manuel Humberto Santander Pelaez | Nice OS X exploit tutorial |
2010-06-04/a> | Rick Wanner | New Honeynet Project Forensic Challenge |
2010-06-02/a> | Bojan Zdrnja | Clickjacking attacks on Facebook's Like plugin |
2010-05-25/a> | donald smith | Face book “joke” leads to firing. |
2010-05-22/a> | Rick Wanner | SANS 2010 Digital Forensics Summit - APT Based Forensic Challenge |
2010-05-21/a> | Rick Wanner | 2010 Digital Forensics and Incident Response Summit |
2010-05-19/a> | Jason Lam | EFF paper about browser tracking |
2010-05-15/a> | Deborah Hale | Google Acknowledges Grabbing Personal Data |
2010-05-07/a> | Rob VandenBrink | Security Awareness – Many Audiences, Many Messages (Part 2) |
2010-05-06/a> | Rick Wanner | Learn about web app hacking and defense |
2010-05-04/a> | Rick Wanner | SIFT review in the ISSA Toolsmith |
2010-05-02/a> | Mari Nichols | Zbot Social Engineering |
2010-04-29/a> | Bojan Zdrnja | Who needs exploits when you have social engineering? |
2010-04-21/a> | Guy Bruneau | Google Chrome Security Update v4.1.249.1059 Released: http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html |
2010-04-21/a> | Guy Bruneau | McAfee DAT 5958 Update Issues |
2010-04-20/a> | Raul Siles | Are You Ready for a Transportation Collapse...? |
2010-04-19/a> | Daniel Wesemann | Linked into scams? |
2010-04-14/a> | Mark Hofman | And let the patching games continue |
2010-04-13/a> | Adrien de Beaupre | Web App Testing Tools |
2010-04-13/a> | Johannes Ullrich | More Legal Threat Malware E-Mail |
2010-04-12/a> | Adrien de Beaupre | Get yer bogons out! |
2010-04-10/a> | Andre Ludwig | New bug/exploit for javaws |
2010-04-09/a> | Mark Hofman | Outage Update - isc.sans.org |
2010-04-07/a> | Johannes Ullrich | our primary datacenter is currently experiencing a network outage |
2010-04-06/a> | Daniel Wesemann | Application Logs |
2010-04-04/a> | Mari Nichols | Financial Management of Cyber Risk |
2010-03-30/a> | Marcus Sachs | Zigbee Analysis Tools |
2010-03-28/a> | Rick Wanner | Honeynet Project: 2010 Forensic Challenge #3 |
2010-03-27/a> | Guy Bruneau | Create a Summary of IP Addresses from PCAP Files using Unix Tools |
2010-03-24/a> | Kyle Haugsness | Wikipedia outage |
2010-03-18/a> | Bojan Zdrnja | Dangers of copy&paste |
2010-03-15/a> | Adrien de Beaupre | Spamassassin Milter Plugin Remote Root Attack |
2010-03-10/a> | Rob VandenBrink | What's My Firewall Telling Me? (Part 4) |
2010-03-06/a> | Tony Carothers | Integration and the Security of New Technologies |
2010-03-05/a> | Kyle Haugsness | What is your firewall log telling you - responses |
2010-02-26/a> | Rick Wanner | New version of FireBug Firefox plug-in - http://getfirebug.com/ |
2010-02-23/a> | Mark Hofman | What is your firewall telling you and what is TCP249? |
2010-02-22/a> | Rob VandenBrink | New Risks in Penetration Testing |
2010-02-20/a> | Mari Nichols | Is "Green IT" Defeating Security? |
2010-02-17/a> | Rob VandenBrink | Defining Clouds - " A Cloud by any Other Name Would be a Lot Less Confusing" |
2010-02-17/a> | Rob VandenBrink | Cisco Security Agent Security Updates: cisco-sa-20100217-csa |
2010-02-15/a> | Johannes Ullrich | Various Olympics Related Dangerous Google Searches |
2010-02-13/a> | Lorna Hutcheson | Network Traffic Analysis in Reverse |
2010-02-10/a> | Johannes Ullrich | Twitpic, EXIF and GPS: I Know Where You Did it Last Summer |
2010-02-06/a> | Guy Bruneau | Oracle WebLogic Server Security Alert |
2010-02-03/a> | Rob VandenBrink | Support for Legacy Browsers |
2010-02-02/a> | Johannes Ullrich | Twitter Mass Password Reset due to Phishing |
2010-02-01/a> | Rob VandenBrink | NMAP 5.21 - Is UDP Protocol Specific Scanning Important? Why Should I Care? |
2010-01-29/a> | Johannes Ullrich | Analyzing isc.sans.org weblogs, part 2, RFI attacks |
2010-01-27/a> | Raul Siles | European Union Security Challenge (Campus Party 2010) |
2010-01-26/a> | Rob VandenBrink | VMware vSphere Hardening Guide Draft posted for public review |
2010-01-20/a> | Johannes Ullrich | Weathering the Storm Part 1: An analysis of our SANS ISC weblogs http://appsecstreetfighter.com |
2010-01-19/a> | Jim Clausing | Forensic challenges |
2010-01-14/a> | Bojan Zdrnja | Rogue AV exploiting Haiti earthquake |
2010-01-14/a> | Bojan Zdrnja | DRG (Dragon Research Group) Distro available for general release |
2010-01-09/a> | G. N. White | What's Up With All The Port Scanning Using TCP/6000 As A Source Port? |
2010-01-06/a> | Guy Bruneau | Secure USB Flaw Exposed |
2009-12-30/a> | Guy Bruneau | Ready to use IDS Sensor with Sguil |
2009-12-28/a> | Johannes Ullrich | 8 Basic Rules to Implement Secure File Uploads http://jbu.me/48 (inspired by IIS ; bug) |
2009-12-17/a> | Daniel Wesemann | overlay.xul is back |
2009-12-16/a> | Rob VandenBrink | Beware the Attack of the Christmas Greeting Cards ! |
2009-12-09/a> | Swa Frantzen | OSSEC 2.3 released |
2009-12-04/a> | Daniel Wesemann | The economics of security advice (MSFT research paper) |
2009-11-29/a> | Patrick Nolan | A Cloudy Weekend |
2009-11-24/a> | John Bambenek | BIND Security Advisory (DNSSEC only) |
2009-11-24/a> | Johannes Ullrich | The ISC and DShield websites will be unavailable on Wednesday Nov 25th from 8-8:30 am EST. |
2009-11-13/a> | Adrien de Beaupre | TLS & SSLv3 renegotiation vulnerability explained |
2009-11-13/a> | Adrien de Beaupre | Flash Origin Policy Attack |
2009-11-09/a> | Chris Carboni | 80's Flashback on Jailbroken iPhones |
2009-11-08/a> | Kevin Liston | Even More Thoughts on Legacy Systems |
2009-11-05/a> | Swa Frantzen | Legacy systems |
2009-11-02/a> | Rob VandenBrink | Microsoft releases v1.02 of Enhanced Mitigation Evaluation Toolkit (EMET) |
2009-10-26/a> | Johannes Ullrich | Web honeypot Update |
2009-10-26/a> | Johannes Ullrich | Today: ISC Login bugfix day. If you have issues logging in using OpenID, please email a copy of your OpenID URL to jullrich\at\sans.edu |
2009-10-23/a> | donald smith | Cyber Security Awareness Month - Day 23 port 179 TCP - Border Gateway Protocol |
2009-10-19/a> | Daniel Wesemann | Scam Email |
2009-10-17/a> | Rick Wanner | Mozilla disables Microsoft plug-ins? |
2009-10-17/a> | Rick Wanner | Unusual traffic from Loopback to Unused ARIN address |
2009-10-16/a> | Adrien de Beaupre | Disable MS09-054 patch, or Firefox Plugin? |
2009-10-15/a> | Deborah Hale | Yet another round of Viral Spam |
2009-10-13/a> | Daniel Wesemann | Adobe Reader and Acrobat - Black Tuesday continues |
2009-10-08/a> | Johannes Ullrich | Firefox Plugin Collections |
2009-10-02/a> | Stephen Hall | New SysInternal fun for the weekend |
2009-09-27/a> | Stephen Hall | Use Emerging Threats signatures? READ THIS! |
2009-09-25/a> | Deborah Hale | Malware delivered over Google and Yahoo Ad's? |
2009-09-17/a> | Bojan Zdrnja | Why is Rogue/Fake AV so successful? |
2009-09-01/a> | Guy Bruneau | Gmail Down |
2009-08-31/a> | Pedro Bueno | Microsoft IIS 5/6 FTP 0Day released |
2009-08-28/a> | Adrien de Beaupre | apache.org compromised |
2009-08-26/a> | Johannes Ullrich | Cisco over-the-air-provisioning skyjacking exploit |
2009-08-19/a> | Daniel Wesemann | Checking your protection |
2009-08-18/a> | Deborah Hale | Domain tcpdump.org unavailable |
2009-08-18/a> | Deborah Hale | Website compromises - what's happening? |
2009-08-13/a> | Jim Clausing | New and updated cheat sheets |
2009-08-03/a> | Mark Hofman | Switch hardening on your network |
2009-07-31/a> | Deborah Hale | Google Safe Browsing |
2009-07-27/a> | Raul Siles | New Hacker Challenge: Prison Break - Breaking, Entering & Decoding |
2009-07-17/a> | John Bambenek | Cross-Platform, Cross-Browser DoS Vulnerability |
2009-07-13/a> | Adrien de Beaupre | Security Update available for Wyse Device Manager |
2009-07-11/a> | Marcus Sachs | Imageshack |
2009-07-02/a> | Daniel Wesemann | Time to update updating on PCs for 3rd party apps |
2009-07-02/a> | Daniel Wesemann | Unpatched Bloatware on new PCs |
2009-06-26/a> | Mark Hofman | PHPMYADMIN scans |
2009-06-24/a> | Kyle Haugsness | TCP scanning increase for 4899 |
2009-06-21/a> | Bojan Zdrnja | Apache HTTP DoS tool mitigation |
2009-06-16/a> | John Bambenek | Iran Internet Blackout: Using Twitter for Operational Intelligence |
2009-06-16/a> | John Bambenek | URL Shortening Service Cligs Hacked |
2009-06-12/a> | Adrien de Beaupre | Google updates for Chrome |
2009-06-12/a> | Adrien de Beaupre | Green Dam |
2009-06-11/a> | Rick Wanner | WHO Declares Flu A(H1N1) a Pandemic |
2009-06-11/a> | Rick Wanner | MIR-ROR Motile Incident Response - Respond Objectively Remediate |
2009-06-09/a> | Swa Frantzen | Adobe June Black Tuesday upgrades |
2009-06-04/a> | Raul Siles | Targeted e-mail attacks asking to verify wire transfer details |
2009-06-01/a> | G. N. White | Yet another "Digital Certificate" malware campaign |
2009-05-28/a> | Jim Clausing | Stego in TCP retransmissions |
2009-05-24/a> | Raul Siles | Facebook phising using Belgium (.be) domains |
2009-05-22/a> | Mark Hofman | Patching and Adobe |
2009-05-22/a> | Mark Hofman | Patching and Apple - Java issue |
2009-05-21/a> | Adrien de Beaupre | Gumblar analysis and writeup |
2009-05-19/a> | Rick Wanner | New Version of Mandiant Highlighter |
2009-05-18/a> | Rick Wanner | Cisco SAFE Security Reference Guide Updated |
2009-05-18/a> | Rick Wanner | JSRedir-R/Gumblar badness |
2009-05-12/a> | Swa Frantzen | Apple patches and updates |
2009-05-04/a> | Tom Liston | Facebook phishing malware |
2009-05-01/a> | Adrien de Beaupre | Incident Management |
2009-04-26/a> | Johannes Ullrich | Odd DNS Resolution for Google via OpenDNS |
2009-04-24/a> | Pedro Bueno | Did you check your conference goodies? |
2009-04-21/a> | Bojan Zdrnja | Web application vulnerabilities |
2009-04-20/a> | Jason Lam | Digital Content on TV |
2009-04-16/a> | Adrien de Beaupre | Incident Response vs. Incident Handling |
2009-04-16/a> | Adrien de Beaupre | Strange Windows Event Log entry |
2009-04-10/a> | Stephen Hall | Hosted javascript leading to .cn PDF malware |
2009-04-09/a> | Johannes Ullrich | Conficker update with payload |
2009-04-03/a> | Johannes Ullrich | Cyber Security Act of 2009 |
2009-04-02/a> | Handlers | A view from the CWG Trenches |
2009-03-27/a> | Mark Hofman | There is some SMiShing going on in the EU |
2009-03-26/a> | Mark Hofman | Webhoneypot fun |
2009-03-20/a> | donald smith | Stealthier then a MBR rootkit, more powerful then ring 0 control, it’s the soon to be developed SMM root kit. |
2009-03-11/a> | Bojan Zdrnja | Massive ARP spoofing attacks on web sites |
2009-03-10/a> | Swa Frantzen | Browser plug-ins, transparent proxies and same origin policies |
2009-03-01/a> | Jim Clausing | Cool combination of tools |
2009-02-25/a> | Swa Frantzen | Targeted link diversion attempts |
2009-02-24/a> | G. N. White | Gmail Access Issues Early This AM |
2009-02-20/a> | Mark Hofman | Phishing with a small twist |
2009-02-05/a> | Rick Wanner | Mandiant Memoryze review, Hilighter, other Mandiant tools! |
2009-02-01/a> | Chris Carboni | Scanning for Trixbox vulnerabilities |
2009-01-31/a> | Swa Frantzen | DNS DDoS - let's use a long term solution |
2009-01-31/a> | John Bambenek | Google Search Engine's Malware Detection Broken |
2009-01-20/a> | Adrien de Beaupre | Obamamania |
2009-01-18/a> | Maarten Van Horenbeeck | Targeted social engineering |
2009-01-12/a> | William Salusky | Web Application Firewalls (WAF) - Have you deployed WAF technology? |
2009-01-11/a> | Deborah Hale | The Frustration of Phishing Attacks |
2009-01-09/a> | Johannes Ullrich | SANS Log Management Survey |
2009-01-07/a> | William Salusky | BIND 9.x security patch - resolves potentially new DNS poisoning vector |
2009-01-04/a> | Rick Wanner | Twitter/Facebook Phishing Attempt |
2008-12-28/a> | Raul Siles | Level3 Outage? |
2008-12-28/a> | Raul Siles | AT&T Wireless Outage |
2008-12-12/a> | Swa Frantzen | Browser Security Handbook |
2008-12-02/a> | Deborah Hale | Sonicwall License Manager Failure |
2008-11-25/a> | Andre Ludwig | OS X Dns Changers part three |
2008-11-25/a> | Andre Ludwig | Tmobile G1 handsets having DNS problems? |
2008-11-25/a> | Andre Ludwig | The beginnings of a collaborative approach to IDS |
2008-11-12/a> | John Bambenek | Thoughts on Security Intelligence (McColo Corp alleged spam/malware host knocked offline) |
2008-11-11/a> | Swa Frantzen | Phishing for Google adwords |
2008-11-05/a> | donald smith | If you missed President Elect Obamas speech have some malware instead |
2008-11-02/a> | Adrien de Beaupre | Daylight saving time |
2008-10-31/a> | Rick Wanner | Sprint-Cogent Peering Issue |
2008-10-31/a> | Rick Wanner | Day 31 - Legal Awareness |
2008-10-30/a> | Kevin Liston | Making Intelligence Actionable: Part 2 |
2008-10-29/a> | Deborah Hale | Day 29 - Should I Switch Software Vendors? |
2008-10-29/a> | Deborah Hale | Enom Phishing - Caution Enom Registrars |
2008-10-20/a> | Raul Siles | Google Webmaster Tools warning about hackable sites |
2008-10-20/a> | Johannes Ullrich | Fraudulent ATM Reactivation Phone Calls. |
2008-10-17/a> | Patrick Nolan | Day 17 - Containing a DNS Hijacking |
2008-10-10/a> | Marcus Sachs | Fake Microsoft Update Email |
2008-10-08/a> | Johannes Ullrich | Domaincontrol (GoDaddy) Nameservers DNS Poisoning |
2008-10-07/a> | Kyle Haugsness | Cogent peering problems |
2008-09-22/a> | Maarten Van Horenbeeck | Data exfiltration and the use of anonymity providers |
2008-09-20/a> | Rick Wanner | New (to me) nmap Features |
2008-09-18/a> | Bojan Zdrnja | Monitoring HTTP User-Agent fields |
2008-09-16/a> | donald smith | Don't open that invoice.zip file its not from UPS |
2008-09-03/a> | donald smith | New bgp hijack isn't very new. |
2008-08-19/a> | Johannes Ullrich | A morning stroll through my web logs |
2008-08-15/a> | Jim Clausing | OMFW 2008 reflections |
2008-08-14/a> | Mari Nichols | SBC Outage? |
2008-08-09/a> | Deborah Hale | Cleveland Outage |
2008-08-05/a> | Daniel Wesemann | Watching those DNS logs |
2008-08-02/a> | Maarten Van Horenbeeck | A little of that human touch |
2008-07-29/a> | Kyle Haugsness | Google SSL cert expired for POP/IMAP users |
2008-07-18/a> | Adrien de Beaupre | Exit process? |
2008-07-11/a> | Jim Clausing | And you thought the DNS issue was an old one... |
2008-07-09/a> | Johannes Ullrich | Unpatched Word Vulnerability |
2008-07-08/a> | Swa Frantzen | Security implications in HVAC equipment |
2008-07-08/a> | Johannes Ullrich | Mulitple Vendors DNS Spoofing Vulnerability |
2008-07-07/a> | Pedro Bueno | Bad url classification |
2008-06-24/a> | Jason Lam | SQL Injection mitigation in ASP |
2008-06-23/a> | donald smith | Preventing SQL injection |
2008-06-18/a> | Chris Carboni | Cisco Security Advisory |
2008-06-17/a> | Kyle Haugsness | Why go high-tech? |
2008-06-10/a> | Swa Frantzen | Ransomware keybreaking |
2008-06-09/a> | Scott Fendley | So Where Are Those OpenSSH Key-based Attacks? |
2008-06-02/a> | Jim Clausing | Emergingthreats.net and ThePlanet |
2008-06-01/a> | Mark Hofman | Free Yahoo email account! Sign me up, Ok well maybe not. |
2008-06-01/a> | Swa Frantzen | The Planet outage - what can we all learn from it? |
2008-05-26/a> | Marcus Sachs | Predictable Response |
2008-05-22/a> | Chris Carboni | From the mailbag |
2008-05-19/a> | Maarten Van Horenbeeck | Text message and telephone aid scams |
2008-05-19/a> | Maarten Van Horenbeeck | Route filtering and its impact on the DNS fabric |
2008-05-15/a> | Bojan Zdrnja | Debian and Ubuntu users: fix your keys/certificates NOW |
2008-05-15/a> | Bojan Zdrnja | INFOCon yellow: update your Debian generated keys/certs ASAP |
2008-04-24/a> | Maarten Van Horenbeeck | Targeted attacks using malicious PDF files |
2008-04-23/a> | Mari Nichols | What's New, Old and Morphing? |
2008-04-16/a> | William Stearns | Passer, a aassive machine and service sniffer |
2008-04-14/a> | John Bambenek | A Federal Subpoena or Just Some More Spam & Malware? |
2008-04-11/a> | John Bambenek | ADSL Router / Cable Modem / Home Wireless AP Hardening in 5 Steps |
2008-04-10/a> | Deborah Hale | Symantec Threatcon Level 2 |
2008-04-08/a> | Swa Frantzen | Symantec's Global Internet Security Threat Report |
2008-04-07/a> | John Bambenek | Network Solutions Technical Difficulties? Enom too |
2008-04-06/a> | Tony Carothers | Happenings in the Northeast US |
2008-04-04/a> | Daniel Wesemann | Tax day scams |
2008-03-30/a> | Mark Hofman | Mail Anyone? |
2008-03-27/a> | Maarten Van Horenbeeck | Guarding the guardians: a story of PGP key ring theft |
2008-03-25/a> | Raul Siles | New Security Challenge - It Happened One Friday |
2008-03-23/a> | Johannes Ullrich | Finding hidden gems (easter eggs) in your logs (packet challenge!) |
2008-03-12/a> | Joel Esler | Don't use G-Archiver |
2008-03-12/a> | Joel Esler | Adobe security updates |
2007-01-03/a> | Toby Kohlenberg | VLC Media Player udp URL handler Format String Vulnerability |
2006-12-12/a> | Swa Frantzen | Offline Microsoft Patching |
2006-10-05/a> | John Bambenek | There are no more Passive Exploits |
2006-10-02/a> | Jim Clausing | Reader's tip of the day: ratios vs. raw counts |
2006-09-19/a> | Swa Frantzen | Yet another MSIE 0-day: VML |
2006-09-18/a> | Jim Clausing | Log analysis follow up |
2006-09-12/a> | Swa Frantzen | Adobe Flash player upgrade time |
2006-09-09/a> | Jim Clausing | Log Analysis tips? |
2006-09-09/a> | Jim Clausing | New feature at isc.sans.org |
2006-09-09/a> | Jim Clausing | A few preliminary log analysis thoughts |
2006-08-31/a> | Swa Frantzen | Mailbag grab |