2024-05-22 | Rob VandenBrink | NMAP Scanning without Scanning (Part 2) - The ipinfo API |
2023-10-03 | Tom Webb | Are Local LLMs Useful in Incident Response? |
2023-06-30 | Yee Ching Tok | DShield pfSense Client Update |
2023-04-27 | Johannes Ullrich | SANS.edu Research Journal: Volume 3 |
2023-03-07 | Johannes Ullrich | Hackers Love This VSCode Extension: What You Can Do to Stay Safe |
2023-02-01 | Jesse La Grew | Rotating Packet Captures with pfSense |
2023-01-31 | Jesse La Grew | DShield Honeypot Setup with pfSense |
2023-01-26 | Tom Webb | Live Linux IR with UAC |
2022-06-15 | Johannes Ullrich | Terraforming Honeypots. Installing DShield Sensors in the Cloud |
2022-06-02 | Johannes Ullrich | Quick Answers in Incident Response: RECmd.exe |
2021-12-06 | Xavier Mertens | The Importance of Out-of-Band Networks |
2021-02-15 | Johannes Ullrich | Securing and Optimizing Networks: Using pfSense Traffic Shaper Limiters to Combat Bufferbloat |
2021-01-25 | Rob VandenBrink | Fun with NMAP NSE Scripts and DOH (DNS over HTTPS) |
2020-09-17 | Xavier Mertens | Suspicious Endpoint Containment with OSSEC |
2020-07-23 | Xavier Mertens | Simple Blocklisting with MISP & pfSense |
2020-05-08 | Xavier Mertens | Using Nmap As a Lightweight Vulnerability Scanner |
2020-05-07 | Bojan Zdrnja | Scanning with nmap?s NSE scripts |
2020-02-16 | Guy Bruneau | SOAR or not to SOAR? |
2019-08-25 | Guy Bruneau | Are there any Advantages of Buying Cyber Security Insurance? |
2018-12-19 | Xavier Mertens | Using OSSEC Active-Response as a DFIR Framework |
2017-12-05 | Tom Webb | IR using the Hive Project. |
2017-09-17 | Guy Bruneau | rockNSM as a Incident Response Package |
2017-06-17 | Guy Bruneau | Mapping Use Cases to Logs. Which Logs are the Most Important to Collect? |
2017-01-05 | John Bambenek | New Year's Resolution: Build Your Own Malware Lab? |
2016-08-24 | Tom Webb | Stay on Track During IR |
2016-02-11 | Tom Webb | Tomcat IR with XOR.DDoS |
2015-11-09 | John Bambenek | ICYMI: Widespread Unserialize Vulnerability in Java |
2015-03-07 | Guy Bruneau | Should it be Mandatory to have an Independent Security Audit after a Breach? |
2014-12-24 | Rick Wanner | Incident Response at Sony |
2014-12-01 | Guy Bruneau | Do you have a Data Breach Response Plan? |
2014-04-04 | Rob VandenBrink | Dealing with Disaster - A Short Malware Incident Response |
2014-01-23 | Chris Mohan | Learning from the breaches that happens to others Part 2 |
2014-01-22 | Chris Mohan | Learning from the breaches that happens to others |
2013-11-22 | Rick Wanner | Port 0 DDOS |
2013-10-05 | Richard Porter | Adobe Breach Notification, Notifications? |
2013-07-12 | Johannes Ullrich | Microsoft Teredo Server "Sunset" |
2013-03-18 | Kevin Shortt | Cisco IOS Type 4 Password Issue: http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20130318-type4 |
2013-03-02 | Scott Fendley | Evernote Security Issue |
2012-11-16 | Manuel Humberto Santander Pelaez | Information Security Incidents are now a concern for colombian government |
2012-04-23 | Russ McRee | Emergency Operations Centers & Security Incident Management: A Correlation |
2011-10-28 | Russ McRee | Critical Control 19: Data Recovery Capability |
2011-10-27 | Mark Baggett | Critical Control 18: Incident Response Capabilities |
2011-07-25 | Chris Mohan | Monday morning incident handler practice |
2011-07-09 | Chris Mohan | Safer Windows Incident Response |
2011-05-14 | Guy Bruneau | Websense Study Claims Canada Next Hotbed for Cybercrime Web Hosting Activity |
2011-04-25 | Rob VandenBrink | Sony PlayStation Network Outage - Day 5 |
2011-04-01 | John Bambenek | LizaMoon Mass SQL-Injection Attack Infected at least 500k Websites |
2011-03-25 | Kevin Liston | APT Tabletop Exercise |
2010-10-18 | Manuel Humberto Santander Pelaez | Cyber Security Awareness Month - Day 18 - What you should tell your boss when there's a crisis |
2010-09-04 | Kevin Liston | Investigating Malicious Website Reports |
2010-07-24 | Manuel Humberto Santander Pelaez | Transmiting logon information unsecured in the network |
2010-05-07 | Rob VandenBrink | Security Awareness – Many Audiences, Many Messages (Part 2) |
2010-03-25 | Kevin Liston | Responding to "Copyright Lawsuit filed against you" |
2010-03-21 | Chris Carboni | Responding To The Unexpected |
2010-01-22 | Mari Nichols | Pass-down for a Successful Incident Response |
2010-01-08 | Rob VandenBrink | Microsoft OfficeOnline, Searching for Trust and Malware |
2009-06-11 | Rick Wanner | MIR-ROR Motile Incident Response - Respond Objectively Remediate |
2009-05-01 | Adrien de Beaupre | Incident Management |
2009-04-16 | Adrien de Beaupre | Incident Response vs. Incident Handling |
2009-04-02 | Bojan Zdrnja | JavaScript insertion and log deletion attack tools |
2009-03-24 | G. N. White | CanSecWest Pwn2Own: Would IE8 have been exploitable had the event waited one more day? |
2009-03-19 | Mark Hofman | Browsers Tumble at CanSecWest |