KILL CHAIN |
2016-11-23 | Tom Webb | Mapping Attack Methodology to Controls |
KILL |
2017-12-27/a> | Guy Bruneau | What are your Security Challenges for 2018? |
2017-05-13/a> | Guy Bruneau | Has anyone Tested WannaCry Killswitch? - https://blog.didierstevens.com/2017/05/13/quickpost-wcry-killswitch-check-is-not-proxy-aware/ |
2016-11-23/a> | Tom Webb | Mapping Attack Methodology to Controls |
2016-01-05/a> | Guy Bruneau | What are you Concerned the Most in 2016? |
2011-08-30/a> | Johannes Ullrich | Apache patch out for "byte range" DoS vulnerability http://www.apache.org/dist/httpd/Announcement2.2.html |
2011-08-25/a> | Kevin Shortt | Revival of an Unpatched Apache HTTPD DoS |
2009-07-13/a> | Adrien de Beaupre | Vulnerability in Microsoft Office Web Components Control Could Allow Remote Code Execution |
2008-08-15/a> | Jim Clausing | Another MS update that may have escaped notice |
2008-07-07/a> | Scott Fendley | Microsoft Snapshot Viewer Security Advisory |
2006-09-30/a> | Robert Danford | *WebViewFolderIcon ActiveX control exploit(s) in the wild |
2006-09-28/a> | Tom Liston | Setslice Killbit Apps |
CHAIN |
2024-07-16/a> | Jan Kopriva | "Reply-chain phishing" with a twist |
2023-07-18/a> | Johannes Ullrich | Exploit Attempts for "Stagil navigation for Jira Menus & Themes" CVE-2023-26255 and CVE-2023-26256 |
2022-09-19/a> | Russ McRee | Chainsaw: Hunt, search, and extract event log records |
2019-10-24/a> | Johannes Ullrich | Your Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment? |
2017-06-02/a> | Xavier Mertens | Phishing Campaigns Follow Trends |
2016-11-23/a> | Tom Webb | Mapping Attack Methodology to Controls |