Date Author Title
2024-10-31Guy BruneauOctober 2024 Activity with Username chenzilong
2024-10-24Johannes UllrichDevelopment Features Enabled in Prodcution
2024-10-17Guy BruneauScanning Activity from Subnet 15.184.0.0/16
2024-10-16Johannes UllrichThe Top 10 Not So Common SSH Usernames and Passwords
2024-10-15Johannes UllrichAngular-base64-update Demo Script Exploited (CVE-2024-42640)
2024-10-15Johannes UllrichA Network Nerd's Take on Emergency Preparedness
2024-10-14Xavier MertensPhishing Page Delivered Through a Blob URL
2024-10-09Xavier MertensFrom Perfctl to InfoStealer
2024-10-08Johannes UllrichMicrosoft Patch Tuesday - October 2024
2024-10-07Xavier MertensmacOS Sequoia: System/Network Admins, Hold On!
2024-10-03Guy BruneauKickstart Your DShield Honeypot [Guest Diary]
2024-10-02Jim ClausingSecurity related Docker containers
2024-09-26Johannes UllrichPatch for Critical CUPS vulnerability: Don't Panic
2024-09-25Johannes UllrichDNS Reflection Update and Odd Corrupted DNS Requests
2024-09-25Guy BruneauOSINT - Image Analysis or More Where, When, and Metadata [Guest Diary]
2024-09-24Johannes UllrichExploitation of RAISECOM Gateway Devices Vulnerability CVE-2024-7120
2024-09-18Xavier MertensPython Infostealer Patching Windows Exodus App
2024-09-17Xavier Mertens23:59, Time to Exfiltrate!
2024-09-16Xavier MertensManaging PE Files With Overlays
2024-09-11Xavier MertensPython Libraries Used for Malicious Purposes
2024-09-11Guy BruneauHygiene, Hygiene, Hygiene! [Guest Diary]
2024-09-06Jesse La GrewEnrichment Data: Keeping it Fresh
2024-09-04Guy Bruneau Attack Surface [Guest Diary]
2024-08-30Jesse La GrewSimulating Traffic With Scapy
2024-08-29Xavier MertensLive Patching DLLs with Python
2024-08-27Xavier MertensWhy Is Python so Popular to Infect Windows Hosts?
2024-08-27Guy BruneauVega-Lite with Kibana to Parse and Display IP Activity over Time
2024-08-26Xavier MertensFrom Highly Obfuscated Batch File to XWorm and Redline
2024-08-23Jesse La GrewPandas Errors: What encoding are my logs in?
2024-08-22Johannes UllrichOpenAI Scans for Honeypots. Artificially Malicious? Action Abuse?
2024-08-20Johannes UllrichWhere are we with CVE-2024-38063: Microsoft IPv6 Vulnerability
2024-08-20Guy BruneauMapping Threats with DNSTwist and the Internet Storm Center [Guest Diary]
2024-08-19Xavier MertensDo you Like Donuts? Here is a Donut Shellcode Delivered Through PowerShell/Python
2024-08-16Jesse La Grew[Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools
2024-08-14Xavier MertensMultiple Malware Dropped Through MSI Package
2024-08-07Guy BruneauSame Scripts, Different Day: What My DShield Honeypot Taught Me About the Importance of Security Fundamentals [Guest Diary]
2024-07-26Xavier MertensExelaStealer Delivered "From Russia With Love"
2024-07-25Xavier MertensXWorm Hidden With Process Hollowing
2024-07-24Xavier Mertens"Mouse Logger" Malicious Python Script
2024-07-23Johannes UllrichNew Exploit Variation Against D-Link NAS Devices (CVE-2024-3273)
2024-07-22Johannes UllrichCrowdStrike: The Monday After
2024-07-19Johannes UllrichWidespread Windows Crashes Due to Crowdstrike Updates
2024-07-16Jan Kopriva"Reply-chain phishing" with a twist
2024-07-16Guy BruneauWho You Gonna Call? AndroxGh0st Busters! [Guest Diary]
2024-07-13Didier Stevens16-bit Hash Collisions in .xls Spreadsheets
2024-07-10Jesse La GrewFinding Honeypot Data Clusters Using DBSCAN: Part 1
2024-07-09Johannes UllrichMicrosoft Patch Tuesday July 2024
2024-07-08Xavier MertensKunai: Keep an Eye on your Linux Hosts Activity
2024-07-01Johannes UllrichSSH "regreSSHion" Remote Code Execution Vulnerability in OpenSSH.
2024-06-26Guy BruneauWhat Setting Live Traps for Cybercriminals Taught Me About Security [Guest Diary]
2024-06-20Guy BruneauNo Excuses, Free Tools to Help Secure Authentication in Ubuntu Linux [Guest Diary]
2024-06-17Xavier MertensNew NetSupport Campaign Delivered Through MSIX Packages
2024-06-13Guy BruneauThe Art of JQ and Command-line Fu [Guest Diary]
2024-06-11Johannes UllrichMicrosoft Patch Tuesday June 2024
2024-06-06Xavier MertensMalicious Python Script with a "Best Before" Date
2024-06-04Johannes UllrichNo-Defender, Yes-Defender
2024-06-03Didier StevensA Wireshark Lua Dissector for Fixed Field Length Protocols
2024-05-31Xavier Mertens"K1w1" InfoStealer Uses gofile.io for Exfiltration
2024-05-30Xavier MertensFeeding MISP with OSSEC
2024-05-28Guy BruneauIs that It? Finding the Unknown: Correlations Between Honeypot Logs & PCAPs [Guest Diary]
2024-05-27Jan KoprivaFiles with TXZ extension used as malspam attachments
2024-05-22Rob VandenBrinkNMAP Scanning without Scanning (Part 2) - The ipinfo API
2024-05-22Guy BruneauAnalysis of ?redtail? File Uploads to ICS Honeypot, a Multi-Architecture Coin Miner [Guest Diary]
2024-05-15Rob VandenBrinkGot MFA? If not, Now is the Time!
2024-05-08Xavier MertensAnalyzing Synology Disks on Linux
2024-04-29Guy BruneauLinux Trojan - Xorddos with Filename eyshcjdmzg
2024-04-25Jesse La GrewDoes it matter if iptables isn't running on my honeypot?
2024-04-23Johannes UllrichStruts "devmode": Still a problem ten years later?
2024-04-22Jan KoprivaIt appears that the number of industrial devices accessible from the internet has risen by 30 thousand over the past three years
2024-04-17Xavier MertensMalicious PDF File Used As Delivery Mechanism
2024-04-16Yee Ching TokRolling Back Packages on Ubuntu/Debian
2024-04-15Johannes UllrichQuick Palo Alto Networks Global Protect Vulnerablity Update (CVE-2024-3400)
2024-04-13Johannes UllrichCritical Palo Alto GlobalProtect Vulnerability Exploited (CVE-2024-3400)
2024-04-11Yee Ching TokEvolution of Artificial Intelligence Systems and Ensuring Trustworthiness
2024-04-07Guy BruneauA Use Case for Adding Threat Hunting to Your Security Operations Team. Detecting Adversaries Abusing Legitimate Tools in A Customer Environment. [Guest Diary]
2024-04-01Bojan ZdrnjaThe amazingly scary xz sshd backdoor
2024-03-31Didier StevensWireshark 4.2.4 Released
2024-03-29Xavier MertensQuick Forensics Analysis of Apache logs
2024-03-28Xavier MertensFrom JavaScript to AsyncRAT
2024-03-19Johannes UllrichAttacker Hunting Firewalls
2024-03-17Guy BruneauGamified Learning: Using Capture the Flag Challenges to Supplement Cybersecurity Training [Guest Diary]
2024-03-14Jan KoprivaIncrease in the number of phishing messages pointing to IPFS and to R2 buckets
2024-03-13Xavier MertensUsing ChatGPT to Deobfuscate Malicious Scripts
2024-03-12Johannes UllrichMicrosoft Patch Tuesday - March 2024
2024-03-10Guy BruneauWhat happens when you accidentally leak your AWS API keys? [Guest Diary]
2024-03-07Jesse La Grew[Guest Diary] AWS Deployment Risks - Configuration and Credential File Targeting
2024-03-03Guy BruneauCapturing DShield Packets with a LAN Tap [Guest Diary]
2024-02-29Jesse La Grew[Guest Diary] Dissecting DarkGate: Modular Malware Delivery and Persistence as a Service.
2024-02-28Johannes UllrichExploit Attempts for Unknown Password Reset Vulnerability
2024-02-25Guy BruneauUtilizing the VirusTotal API to Query Files Uploaded to DShield Honeypot [Guest Diary]
2024-02-22Johannes UllrichLarge AT&T Wireless Network Outage #att #outage
2024-02-21Jan KoprivaPhishing pages hosted on archive.org
2024-02-20Xavier MertensPython InfoStealer With Dynamic Sandbox Detection
2024-02-18Guy BruneauMirai-Mirai On The Wall... [Guest Diary]
2024-02-15Jesse La Grew[Guest Diary] Learning by doing: Iterative adventures in troubleshooting
2024-02-12Johannes UllrichExploit against Unnamed "Bytevalue" router vulnerability included in Mirai Bot
2024-02-09Xavier MertensMSIX With Heavily Obfuscated PowerShell Script
2024-02-08Xavier MertensA Python MP3 Player with Builtin Keylogger Capability
2024-02-06Jan KoprivaComputer viruses are celebrating their 40th birthday (well, 54th, really)
2024-02-05Jesse La GrewPublic Information and Email Spam
2024-02-03Guy BruneauDShield Sensor Log Collection with Elasticsearch
2024-01-31Johannes UllrichThe Fun and Dangers of Top Level Domains (TLDs)
2024-01-30Johannes UllrichWhat did I say to make you stop talking to me?
2024-01-26Xavier MertensA Batch File With Multiple Payloads
2024-01-25Xavier MertensFacebook AdsManager Targeted by a Python Infostealer
2024-01-24Johannes UllrichHow Bad User Interfaces Make Security Tools Harmful
2024-01-19Xavier MertensmacOS Python Script Replacing Wallet Applications with Rogue Apps
2024-01-17Jesse La GrewNumber Usage in Passwords
2024-01-16Johannes UllrichScans for Ivanti Connect "Secure" VPN Vulnerability (CVE-2023-46805, CVE-2024-21887)
2024-01-12Xavier MertensOne File, Two Payloads
2024-01-08Jesse La GrewWhat is that User Agent?
2024-01-07Guy BruneauSuspicious Prometei Botnet Activity
2024-01-06Xavier MertensAre you sure of your password?
2024-01-05Rob VandenBrinkNetstat, but Better and in PowerShell
2024-01-04Jim ClausingWireshark updates
2024-01-03Jan KoprivaInteresting large and small malspam attachments from 2023
2024-01-02Johannes UllrichFingerprinting SSH Identification Strings
2023-12-31Tom WebbPi-Hole Pi4 Docker Deployment
2023-12-27Guy BruneauUnveiling the Mirai: Insights into Recent DShield Honeypot Activity [Guest Diary]
2023-12-23Xavier MertensPython Keylogger Using Mailtrap.io
2023-12-22Xavier MertensShall We Play a Game?
2023-12-20Guy BruneauHow to Protect your Webserver from Directory Enumeration Attack ? Apache2 [Guest Diary]
2023-12-16Xavier MertensAn Example of RocketMQ Exploit Scanner
2023-12-15Xavier MertensCSharp Payload Phoning to a CobaltStrike Server
2023-12-13Guy BruneauT-shooting Terraform for DShield Honeypot in Azure [Guest Diary]
2023-12-12Johannes UllrichMicrosoft Patch Tuesday December 2023
2023-12-06Jan KoprivaWhose packet is it anyway: a new RFC for attribution of internet probes
2023-12-06Guy BruneauRevealing the Hidden Risks of QR Codes [Guest Diary]
2023-12-05Didier StevensCobalt Strike's "Runtime Configuration"
2023-11-30John BambenekProphetic Post by Intern on CVE-2023-1389 Foreshadows Mirai Botnet Expansion Today
2023-11-25Didier StevensWireshark 4.2.0 Released
2023-11-25Didier StevensOVA Files
2023-11-22Guy BruneauCVE-2023-1389: A New Means to Expand Botnets
2023-11-18Xavier MertensQuasar RAT Delivered Through Updated SharpLoader
2023-11-17Jan KoprivaPhishing page with trivial anti-analysis features
2023-11-15Xavier MertensRedline Dropped Through MSIX Package
2023-11-09Xavier MertensVisual Examples of Code Injection
2023-11-09Guy BruneauRouters Targeted for Gafgyt Botnet [Guest Diary]
2023-11-08Xavier MertensExample of Phishing Campaign Project File
2023-11-07Johannes UllrichWhat's Normal: New uses of DNS, Discovery of Designated Resolvers (DDR)
2023-11-01Xavier MertensMalware Dropped Through a ZPAQ Archive
2023-10-31Xavier MertensMultiple Layers of Anti-Sandboxing Techniques
2023-10-29Guy BruneauSpam or Phishing? Looking for Credentials & Passwords
2023-10-28Xavier MertensSize Matters for Many Security Controls
2023-10-20Yee Ching TokVMware Releases Security Patches for Fusion, Workstation and Aria Operations for Logs
2023-10-18Jesse La GrewHiding in Hex
2023-10-15Guy BruneauDomain Name Used as Password Captured by DShield Sensor
2023-10-11Johannes UllrichCVE-2023-38545: curl SOCKS5 oversized hostname vulnerability. How bad is it?
2023-10-10Johannes UllrichOctober 2023 Microsoft Patch Tuesday Summary
2023-10-08Didier StevensWireshark 4.2.0 First Release Candidate
2023-10-07Jim ClausingWireshark releases 2 updates in one day. Mac users especially will want the latest.
2023-10-03Tom WebbAre Local LLMs Useful in Incident Response?
2023-09-30Xavier MertensSimple Netcat Backdoor in Python Script
2023-09-29Xavier MertensAre You Still Storing Passwords In Plain Text Files?
2023-09-28Didier StevensIPv4 Addresses in Little Endian Decimal Format
2023-09-26Johannes UllrichApple Releases MacOS Sonoma Including Numerous Security Patches
2023-09-24Didier StevensYARA Support for .LNK Files
2023-09-23Guy BruneauScanning for Laravel - a PHP Framework for Web Artisants
2023-09-18Johannes UllrichInternet Wide Multi VPN Search From Single /24 Network
2023-09-09Guy Bruneau?Anyone get the ASN of the Truck that Hit Me?!?: Creating a PowerShell Function to Make 3rd Party API Calls for Extending Honeypot Information [Guest Diary]
2023-09-07Johannes UllrichFleezeware/Scareware Advertised via Facebook Tags; Available in Apple App Store
2023-09-06Johannes UllrichSecurity Relevant DNS Records
2023-09-05Jesse La GrewCommon usernames submitted to honeypots
2023-09-02Jesse La GrewWhat is the origin of passwords submitted to honeypots?
2023-08-31Guy BruneauPotential Weaponizing of Honeypot Logs [Guest Diary]
2023-08-28Johannes UllrichHome Office / Small Business Hurricane Prep
2023-08-26Xavier MertensmacOS: Who?s Behind This Network Connection?
2023-08-25Xavier MertensPython Malware Using Postgresql for C2 Communications
2023-08-23Xavier MertensMore Exotic Excel Files Dropping AgentTesla
2023-08-22Xavier MertensHave You Ever Heard of the Fernet Encryption Algorithm?
2023-08-21Xavier MertensQuick Malware Triage With Inotify Tools
2023-08-20Guy BruneauSystemBC Malware Activity
2023-08-18Xavier MertensFrom a Zalando Phishing to a RAT
2023-08-17Jesse La GrewCommand Line Parsing - Are These Really Unique Strings?
2023-08-12Guy BruneauDShield Sensor Monitoring with a Docker ELK Stack [Guest Diary]
2023-08-11Xavier MertensShow me All Your Windows!
2023-08-10Bojan ZdrnjaSome things never change ? such as SQL Authentication ?encryption?
2023-08-04Xavier MertensAre Leaked Credentials Dumps Used by Attackers?
2023-08-03Jan KoprivaFrom small LNK to large malicious BAT file with zero VT score
2023-07-29Xavier MertensDo Attackers Pay More Attention to IPv6?
2023-07-28Xavier MertensShellCode Hidden with Steganography
2023-07-26Xavier MertensSuspicious IP Addresses Avoided by Malware Samples
2023-07-23Guy BruneauInstall & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-07-18Johannes UllrichExploit Attempts for "Stagil navigation for Jira Menus & Themes" CVE-2023-26255 and CVE-2023-26256
2023-07-12Brad DuncanLoader activity for Formbook "QM18"
2023-07-07Xavier MertensDSSuite (Didier's Toolbox) Docker Image Update
2023-07-06Jesse La GrewIDS Comparisons with DShield Honeypot Data
2023-06-29Brad DuncanGuLoader- or DBatLoader/ModiLoader-style infection for Remcos RAT
2023-06-28Jan KoprivaKazakhstan - the world's last SSLv2 superpower... and a country with potentially vulnerable last-mile internet infrastructure
2023-06-27Xavier MertensThe Importance of Malware Triage
2023-06-24Guy BruneauEmail Spam with Attachment Modiloader
2023-06-23Xavier MertensWord Document with an Online Attached Template
2023-06-21Yee Ching TokAnalyzing a YouTube Sponsorship Phishing Mail and Malware Targeting Content Creators
2023-06-20Xavier MertensMalicious Code Can Be Anywhere
2023-06-19Xavier MertensMalware Delivered Through .inf File
2023-06-17Brad DuncanFormbook from Possible ModiLoader (DBatLoader)
2023-06-16Xavier MertensAnother RAT Delivered Through VBS
2023-06-15Yee Ching TokSupervision and Verification in Vulnerability Management
2023-06-09Xavier MertensUndetected PowerShell Backdoor Disguised as a Profile File
2023-06-05Johannes UllrichBrute Forcing Simple Archive Passwords
2023-05-30Brad DuncanMalspam pushes ModiLoader (DBatLoader) infection for Remcos RAT
2023-05-30Johannes UllrichYour Business Data and Machine Learning at Risk: Attacks Against Apache NiFi
2023-05-28Guy BruneauWe Can no Longer Ignore the Cost of Cybersecurity
2023-05-26Xavier MertensUsing DFIR Techniques To Recover From Infrastructure Outages
2023-05-24Tom WebbIR Case/Alert Management
2023-05-24Jesse La GrewMore Data Enrichment for Cowrie Logs
2023-05-22Johannes UllrichProbes for recent ABUS Security Camera Vulnerability: Attackers keep an eye on everything.
2023-05-20Xavier MertensPhishing Kit Collecting Victim's IP Address
2023-05-19Xavier MertensWhen the Phisher Messes Up With Encoding
2023-05-17Xavier MertensIncrease in Malicious RAR SFX files
2023-05-16Jesse La GrewSignals Defense With Faraday Bags & Flipper Zero
2023-05-14Guy BruneauVMware Aria Operations addresses multiple Local Privilege Escalations and a Deserialization issue
2023-05-14Guy BruneauDShield Sensor Update
2023-05-09Russ McReeExploratory Data Analysis with CISSM Cyber Attacks Database - Part 2
2023-05-07Didier StevensQuickly Finding Encoded Payloads in Office Documents
2023-05-04Xavier MertensInfostealer Embedded in a Word Document
2023-05-03Xavier MertensIncreased Number of Configuration File Scans
2023-04-29Didier StevensWireshark 4.0.5 Released
2023-04-28Xavier MertensQuick IOC Scan With Docker
2023-04-27Johannes UllrichSANS.edu Research Journal: Volume 3
2023-04-22Didier StevensYARA v4.3.1 Release
2023-04-19Rob VandenBrinkTaking a Bite Out of Password Expiry Helpdesk Calls
2023-04-13Johannes UllrichHTTP: What's Left of it and the OCSP Problem
2023-04-09Didier StevensChrome's Download Tab: Dangerous Files
2023-04-08Xavier MertensMicrosoft Netlogon: Potential Upcoming Impacts of CVE-2022-38023
2023-04-07Xavier MertensDetecting Suspicious API Usage with YARA Rules
2023-04-04Johannes UllrichAnalyzing the efile.com Malware "efail"
2023-04-03Johannes UllrichTax Season Risks
2023-04-02Didier StevensYARA v4.3.0 Release
2023-03-31Guy BruneauUsing Linux grep and Windows findstr to Manipulate Files
2023-03-31Jan KoprivaUse of X-Frame-Options and CSP frame-ancestors security headers on 1 million most popular domains
2023-03-30Xavier MertensBypassing PowerShell Strong Obfuscation
2023-03-26Didier StevensExtra: "String Obfuscation: Character Pair Reversal"
2023-03-26Didier StevensCyberChef Version 10 Released
2023-03-25Guy BruneauMicrosoft Released an Update for Windows Snipping Tool Vulnerability
2023-03-22Didier StevensWindows 11 Snipping Tool Privacy Bug: Inspecting PNG Files
2023-03-21Didier StevensString Obfuscation: Character Pair Reversal
2023-03-20Xavier MertensFrom Phishing Kit To Telegram... or Not!
2023-03-18Xavier MertensOld Backdoor, New Obfuscation
2023-03-16Xavier MertensSimple Shellcode Dissection
2023-03-12Guy BruneauAsynRAT Trojan - Bill Payment (Pago de la factura)
2023-03-11Xavier MertensOverview of a Mirai Payload Generator
2023-03-09Rob VandenBrinkToday I Learned .. a new thing about GREP
2023-03-02Didier StevensYARA: Detect The Unexpected ...
2023-03-01Xavier MertensPython Infostealer Targeting Gamers
2023-02-24Brad DuncanURL files and WebDAV used for IcedID (Bokbot) infection
2023-02-21Xavier MertensPhishing Page Branded with Your Corporate Website
2023-02-18Guy BruneauSpear Phishing Handlers for Username/Password
2023-02-16Jan KoprivaHTML phishing attachment with browser-in-the-browser technique
2023-02-15Rob VandenBrinkDNS Recon Redux - Zone Transfers (plus a time machine) for When You Can't do a Zone Transfer
2023-02-14Johannes UllrichMicrosoft February 2023 Patch Tuesday
2023-02-10Xavier MertensObfuscated Deactivation of Script Block Logging
2023-02-09Xavier MertensA Backdoor with Smart Screenshot Capability
2023-02-06Johannes UllrichAPIs Used by Bots to Detect Public IP address
2023-02-04Guy BruneauAssemblyline as a Malware Analysis Sandbox
2023-02-03Jim ClausingVMware workstation 17.0.1 fixes arbitrary file deletion issue - https://www.vmware.com/security/advisories/VMSA-2023-0003.html
2023-02-01Didier StevensDetecting (Malicious) OneNote Files
2023-01-28Didier StevensSysinternals Updates: RDCMan v2.92, Sysmon v14.14, and ZoomIt v6.12
2023-01-26Tom WebbLive Linux IR with UAC
2023-01-25Xavier MertensA First Malicious OneNote Document
2023-01-22Didier StevensWireshark 4.0.3 Released
2023-01-21Guy BruneauDShield Sensor JSON Log to Elasticsearch
2023-01-19Jan KoprivaSPF and DMARC use on 100k most popular domains
2023-01-17Rob VandenBrinkFinding that one GPO Setting in a Pool of Hundreds of GPOs
2023-01-17Johannes UllrichPacket Tuesday: IPv6 Router Advertisements https://www.youtube.com/watch?v=uRWpB_lYIZ8
2023-01-16Johannes UllrichPSA: Why you must run an ad blocker when using Google
2023-01-15Johannes UllrichElon Musk Themed Crypto Scams Flooding YouTube Today
2023-01-12Russ McReeProwler v3: AWS & Azure security assessments
2023-01-08Guy BruneauDShield Sensor JSON Log Analysis
2023-01-07Didier StevensYARA v4.3.0-rc1 --skip-larger
2023-01-06Xavier MertensAutoIT Remains Popular in the Malware Landscape
2023-01-05Brad DuncanMore Brazil malspam pushing Astaroth (Guildma) in January 2023
2023-01-04Rob VandenBrinkUpdate to RTRBK - Diff and File Dates in PowerShell
2023-01-02Xavier MertensNetworkMiner 2.8 Released
2022-12-31Didier StevensYARA v4.3.0-rc1 --print-xor-key
2022-12-30Jan KoprivaSPF and DMARC use on GOV domains in different ccTLDs
2022-12-28Rob VandenBrinkPlaying with Powershell and JSON (and Amazon and Firewalls)
2022-12-22Guy BruneauExchange OWASSRF Exploited for Remote Code Execution
2022-12-21Guy BruneauDShield Sensor Setup in Azure
2022-12-20Xavier MertensLinux File System Monitoring & Actions
2022-12-19Xavier MertensHunting for Mastodon Servers
2022-12-18Guy BruneauInfostealer Malware with Double Extension
2022-12-17Didier StevensCyberChef & Entropy
2022-12-11Didier StevensQuickie: CyberChef Sorting By String Length
2022-12-07Jim ClausingWireshark 4.0.2 and 3.6.10 released
2022-12-04Didier StevensFinger.exe LOLBin
2022-12-03Guy BruneauLinux LOLBins Applications Available in Windows
2022-11-28Johannes UllrichUkraine Themed Twitter Spam Pushing iOS Scareware
2022-11-24Xavier MertensAttackers Keep Phishing Victims Under Stress
2022-11-19Guy BruneauMcAfee Fake Antivirus Phishing Campaign is Back!
2022-11-11Didier StevensUpdate: IPv4 Address Representations
2022-11-10Xavier MertensDo you collect "Observables" or "IOCs"?
2022-11-09Xavier MertensAnother Script-Based Ransomware
2022-11-05Guy BruneauWindows Malware with VHD Extension
2022-11-04Xavier MertensRemcos Downloader with Unicode Obfuscation
2022-11-02Brad DuncanWho put the "Dark" in DarkVNC?
2022-11-02Rob VandenBrinkBreakpoints in Burp
2022-10-31Rob VandenBrinkNMAP without NMAP - Port Testing and Scanning with PowerShell
2022-10-30Didier StevensSysinternals Updates: Process Explorer v17.0, Handle v5.0, Process Monitor v3.92 and Sysmon v14.11
2022-10-24Xavier MertensC2 Communications Through outlook.com
2022-10-22Didier Stevensrtfdump's Find Option
2022-10-21Brad Duncansczriptzzbn inject pushes malware for NetSupport RAT
2022-10-19Xavier MertensAre Internet Scanning Services Good or Bad for You?
2022-10-18Xavier MertensPython Obfuscation for Dummies
2022-10-17Xavier MertensFileless Powershell Dropper
2022-10-15Guy BruneauMalware - Covid Vaccination Supplier Declaration
2022-10-11Johannes UllrichOctober 2022 Microsoft Patch Tuesday
2022-10-10Didier StevensWireshark: Specifying a Protocol Stack Layer in Display Filters
2022-10-09Didier StevensCurl's resolve Option
2022-10-08Didier StevensWireshark 4.0.0 Released
2022-10-07Xavier MertensPowershell Backdoor with DGA Capability
2022-10-07Xavier MertensCritical Fortinet Vulnerability Ahead
2022-10-04Johannes UllrichCredential Harvesting with Telegram API
2022-09-26Xavier MertensEasy Python Sandbox Detection
2022-09-25Didier StevensDownloading Samples From Takendown Domains
2022-09-24Didier StevensMaldoc Analysis Info On MalwareBazaar
2022-09-23Xavier MertensKids Like Cookies, Malware Too!
2022-09-22Xavier MertensRAT Delivered Through FODHelper
2022-09-21Xavier MertensPhishing Campaigns Use Free Online Resources
2022-09-19Russ McReeChainsaw: Hunt, search, and extract event log records
2022-09-18Didier StevensVideo: Grep & Tail -f With Notepad++
2022-09-18Tom WebbPreventing ISO Malware
2022-09-17Didier StevensVideo: Analyzing Obfuscated VBS with CyberChef
2022-09-16Didier StevensWord Maldoc With CustomXML and Renamed VBAProject.bin
2022-09-15Xavier MertensMalicious Word Document with a Frameset
2022-09-14Xavier MertensEasy Process Injection within Python
2022-09-12Johannes UllrichVirusTotal Result Comparisons for Honeypot Malware
2022-09-11Didier StevensWireshark 3.6.8 and 4.0.0rc1 Released
2022-09-10Guy BruneauPhishing Word Documents with Suspicious URL
2022-09-07Johannes UllrichPHP Deserialization Exploit attempt
2022-09-06Didier StevensAnalysis of an Encoded Cobalt Strike Beacon
2022-09-05Didier StevensQuickie: Grep & Tail -f With Notepad++
2022-09-03Didier StevensVideo: James Webb JPEG With Malware
2022-09-02Didier StevensJames Webb JPEG With Malware
2022-08-31Johannes UllrichUnderscores and DNS: The Privacy Story
2022-08-30Johannes UllrichTwo things that will never die: bash scripts and IRC!
2022-08-28Didier StevensSysinternals Updates: Sysmon v14.0 and ZoomIt v6.01
2022-08-28Didier StevensDealing With False Positives when Scanning Memory Dumps for Cobalt Strike Beacons
2022-08-26Guy BruneauHTTP/2 Packet Analysis with Wireshark
2022-08-25Rob VandenBrinkTaking Apart URL Shorteners
2022-08-24Brad DuncanMonster Libra (TA551/Shathak) --> IcedID (Bokbot) --> Cobalt Strike & DarkVNC
2022-08-23Xavier MertensWho's Looking at Your security.txt File?
2022-08-22Xavier Mertens32 or 64 bits Malware?
2022-08-20Didier StevensYARA 4.2.3 Released
2022-08-19Johannes UllrichWindows Security Blocks UPX Compressed (packed) Binaries
2022-08-19Brad DuncanBrazil malspam pushes Astaroth (Guildma) malware
2022-08-17Johannes UllrichA Quick VoIP Experiment
2022-08-14Johannes UllrichRealtek SDK SIP ALG Vulnerability: A Big Deal, but not much you can do about it. CVE 2022-27255
2022-08-13Guy BruneauPhishing HTML Attachment as Voicemail Audio Transcription
2022-08-12Brad DuncanMonster Libra (TA551/Shathak) pushes IcedID (Bokbot) with Dark VNC and Cobalt Strike
2022-08-11Xavier MertensInfoStealer Script Based on Curl and NSudo
2022-08-10Johannes UllrichAnd Here They Come Again: DNS Reflection Attacks
2022-08-04Jan KoprivaTLP 2.0 is here
2022-08-03Johannes Ullrichl9explore and LeakIX Internet wide recon scans.
2022-07-30Didier StevensWireshark 3.6.7 Released
2022-07-29Johannes UllrichPDF Analysis Intro and OpenActions Entries
2022-07-28Johannes UllrichExfiltrating Data With Bookmarks
2022-07-27Brad DuncanIcedID (Bokbot) with Dark VNC and Cobalt Strike
2022-07-26Xavier MertensHow is Your macOS Security Posture?
2022-07-25Xavier MertensPowerShell Script with Fileless Capability
2022-07-23Guy BruneauAnalysis of SSH Honeypot Data with PowerBI
2022-07-22Yee Ching TokAn Analysis of a Discerning Phishing Website
2022-07-20Xavier MertensMalicious Python Script Behaving Like a Rubber Ducky
2022-07-20Johannes UllrichApple Patches Everything Day
2022-07-13Xavier MertensUsing Referers to Detect Phishing Attacks
2022-07-08Johannes UllrichISC Website Redesign
2022-07-07Brad DuncanEmotet infection with Cobalt Strike
2022-07-06Johannes UllrichHow Many SANs are Insane?
2022-07-05Jan KoprivaEternalBlue 5 years after WannaCry and NotPetya
2022-07-02Didier StevensYARA 4.2.2 Released
2022-06-30Brad DuncanCase Study: Cobalt Strike Server Lives on After Its Domain Is Suspended
2022-06-28Johannes UllrichPossible Scans for HiByMusic Devices
2022-06-25Xavier MertensMalicious Code Passed to PowerShell via the Clipboard
2022-06-23Xavier MertensFLOSS 2.0 Has Been Released
2022-06-22Xavier MertensMalicious PowerShell Targeting Cryptocurrency Browser Extensions
2022-06-19Didier StevensWireshark 3.6.6 Released
2022-06-17Brad DuncanMalspam pushes Matanbuchus malware, leads to Cobalt Strike
2022-06-17Bojan ZdrnjaCritical vulnerability in Splunk Enterprise?s deployment server functionality
2022-06-16Xavier MertensHoudini is Back Delivered Through a JavaScript Dropper
2022-06-15Johannes UllrichTerraforming Honeypots. Installing DShield Sensors in the Cloud
2022-06-12Didier StevensQuickie: Follina, RTF & Explorer Preview Pane
2022-06-10Russ McReeEPSScall: An Exploit Prediction Scoring System App
2022-06-06Didier Stevens"ms-msdt" RTF Maldoc Analysis: oledump Plugins
2022-06-05Didier StevensAnalysis Of An "ms-msdt" RTF Maldoc
2022-06-04Guy BruneauSpam Email Contains a Very Large ISO file
2022-06-03Xavier MertensSandbox Evasion... With Just a Filename!
2022-06-02Johannes UllrichQuick Answers in Incident Response: RECmd.exe
2022-06-01Jan KoprivaHTML phishing attachments - now with anti-analysis features
2022-05-31Xavier MertensFirst Exploitation of Follina Seen in the Wild
2022-05-30Xavier MertensNew Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme (CVE-2022-30190)
2022-05-29Didier StevensExtracting The Overlay Of A PE File
2022-05-28Didier StevensHuge Signed PE File: Keeping The Signature
2022-05-26Didier StevensHuge Signed PE File
2022-05-25Rob VandenBrinkUsing NMAP to Assess Hosts in Load Balanced Clusters
2022-05-23Johannes UllrichAttacker Scanning for jQuery-File-Upload
2022-05-20Xavier MertensA 'Zip Bomb' to Bypass Security Controls & Sandboxes
2022-05-19Brad DuncanBumblebee Malware from TransferXL URLs
2022-05-17Xavier MertensUse Your Browser Internal Password Vault... or Not?
2022-05-15Didier StevensWireshark 3.6.5 Released
2022-05-13Johannes UllrichFrom 0-Day to Mirai: 7 days of BIG-IP Exploits
2022-05-12Rob VandenBrinkWhen Get-WebRequest Fails You
2022-05-11Brad DuncanTA578 using thread-hijacked emails to push ISO files for Bumblebee malware
2022-05-10Renato MarinhoMicrosoft May 2022 Patch Tuesday
2022-05-09Xavier MertensOctopus Backdoor is Back with a New Embedded Obfuscated Bat File
2022-05-07Guy BruneauPhishing PDF Received in my ISC Mailbox
2022-05-06Jan KoprivaWhat is the simplest malware in the world?
2022-05-05Brad DuncanPassword-protected Excel spreadsheet pushes Remcos RAT
2022-05-03Johannes UllrichSome Honeypot Updates
2022-05-03Rob VandenBrinkFinding the Real "Last Patched" Day (Interim Version)
2022-04-30Didier StevensYARA 4.2.1 Released
2022-04-29Rob VandenBrinkUsing Passive DNS sources for Reconnaissance and Enumeration
2022-04-28Johannes UllrichA Day of SMB: What does our SMB/RPC Honeypot see? CVE-2022-26809
2022-04-27Jan KoprivaMITRE ATT&CK v11 - a small update that can help (not just) with detection engineering
2022-04-25Xavier MertensSimple PDF Linking to Malicious Content
2022-04-24Didier StevensAnalyzing a Phishing Word Document
2022-04-23Guy BruneauAre Roku Streaming Devices Safe from Exploitation?
2022-04-21Xavier MertensMulti-Cryptocurrency Clipboard Swapper
2022-04-20Brad Duncan"aa" distribution Qakbot (Qbot) infection with DarkVNC traffic
2022-04-14Johannes UllrichAn Update on CVE-2022-26809 - MSRPC Vulnerabliity - PATCH NOW
2022-04-13Jan KoprivaHow is Ukrainian internet holding up during the Russian invasion?
2022-04-11Johannes UllrichSpring: It isn't just about Spring4Shell. Spring Cloud Function Vulnerabilities are being probed too.
2022-04-10Didier StevensVideo: Method For String Extraction Filtering
2022-04-09Didier StevensMethod For String Extraction Filtering
2022-04-06Brad DuncanWindows MetaStealer Malware
2022-04-05Johannes UllrichWebLogic Crypto Miner Malware Disabling Alibaba Cloud Monitoring Tools
2022-04-04Johannes UllrichEmptying the Phishtank: Are WordPress sites the Mosquitoes of the Internet?
2022-04-03Didier Stevensjo
2022-04-02Didier Stevenscurl 7.82.0 Adds --json Option
2022-03-31Johannes UllrichSpring Vulnerability Update - Exploitation Attempts CVE-2022-22965
2022-03-30Johannes UllrichPossible new Java Spring Framework Vulnerability (Updated: not a Spring problem)
2022-03-30Johannes UllrichJava Springtime Confusion: What Vulnerability are We Talking About
2022-03-29Johannes UllrichMore Fake/Typosquatting Twitter Accounts Asking for Ukraine Crytocurrency Donations
2022-03-28Johannes UllrichBGP Hijacking of Twitter Prefix by RTComm.ru
2022-03-27Didier StevensWireshark 3.6.3 Released
2022-03-27Didier StevensVideo: Maldoc Cleaned by Anti-Virus
2022-03-26Guy BruneauIs buying Cyber Insurance a Must Now?
2022-03-25Xavier MertensXLSB Files: Because Binary is Stealthier Than XML
2022-03-24Xavier MertensMalware Delivered Through Free Sharing Tool
2022-03-23Brad DuncanArkei Variants: From Vidar to Mars Stealer
2022-03-22Johannes UllrichStatement by President Biden: What you need to do (or not do)
2022-03-18Johannes UllrichScans for Movable Type Vulnerability (CVE-2021-20837)
2022-03-16Brad DuncanQakbot infection with Cobalt Strike and VNC activity
2022-03-15Xavier MertensClean Binaries with Suspicious Behaviour
2022-03-13Didier StevensYARA 4.2.0 Released
2022-03-12Didier StevensICMP Messages: Original Datagram Field
2022-03-11Xavier MertensKeep an Eye on WebSockets
2022-03-10Xavier MertensCredentials Leaks on VirusTotal
2022-03-09Xavier MertensInfostealer in a Batch File
2022-03-07Johannes UllrichNo Bitcoin - No Problem: Follow Up to Last Weeks Donation Scam
2022-03-06Didier StevensVideo: TShark & Multiple IP Addresses
2022-03-05Didier Stevensoledump's Extra Option
2022-03-04Johannes UllrichScam E-Mail Impersonating Red Cross
2022-03-03Johannes UllrichAttackers Search For Exposed "LuCI" Folders: Help me understand this attack
2022-03-02Johannes UllrichThe More Often Something is Repeated, the More True It Becomes: Dealing with Social Media
2022-02-28Didier StevensTShark & Multiple IP Addresses
2022-02-26Guy BruneauUsing Snort IDS Rules with NetWitness PacketDecoder
2022-02-24Xavier MertensUkraine & Russia Situation From a Domain Names Perspective
2022-02-22Xavier MertensA Good Old Equation Editor Vulnerability Delivering Malware
2022-02-20Didier StevensVideo: YARA's Console Module
2022-02-19Didier StevensWireshark 3.6.2 Released
2022-02-18Xavier MertensRemcos RAT Delivered Through Double Compressed Archive
2022-02-16Brad DuncanAstaroth (Guildma) infection
2022-02-13Guy BruneauDHL Spear Phishing to Capture Username/Password
2022-02-11Xavier MertensCinaRAT Delivered Through HTML ID Attributes
2022-02-10Johannes UllrichZyxel Network Storage Devices Hunted By Mirai Variant
2022-02-09Brad DuncanExample of Cobalt Strike from Emotet infection
2022-02-05Didier StevensPower over Ethernet and Thermal Imaging
2022-02-03Johannes UllrichKeeping Track of Your Attack Surface for Cheap
2022-02-02Johannes UllrichFinding elFinder: Who is looking for your files?
2022-02-01Xavier MertensAutomation is Nice But Don't Replace Your Knowledge
2022-01-31Xavier MertensBe careful with RPMSG files
2022-01-30Didier StevensYARA's Console Module
2022-01-29Guy BruneauSIEM In this Decade, Are They Better than the Last?
2022-01-26Jan KoprivaOver 20 thousand servers have their iLO interfaces exposed to the internet, many with outdated and vulnerable versions of FW
2022-01-25Brad DuncanEmotet Stops Using 0.0.0.0 in Spambot Traffic
2022-01-22Xavier MertensMixed VBA & Excel4 Macro In a Targeted Excel Sheet
2022-01-21Xavier MertensObscure Wininet.dll Feature?
2022-01-20Xavier MertensRedLine Stealer Delivered Through FTP
2022-01-18Jan KoprivaPhishing e-mail with...an advertisement?
2022-01-16Guy Bruneau10 Most Popular Targeted Ports in the Past 3 Weeks
2022-01-11Johannes UllrichMicrosoft Patch Tuesday - January 2022
2022-01-09Didier StevensExtracting Cobalt Strike Beacons from MSBuild Scripts
2022-01-08Didier StevensTShark & jq
2022-01-07Xavier MertensCustom Python RAT Builder
2022-01-06Xavier MertensMalicious Python Script Targeting Chinese People
2022-01-05Xavier MertensCode Reuse In the Malware Landscape
2022-01-04Xavier MertensA Simple Batch File That Blocks People
2022-01-02Guy BruneauExchange Server - Email Trapped in Transport Queues
2022-01-01Didier StevensExpect Regressions
2021-12-28Russ McReeLotL Classifier tests for shells, exfil, and miners
2021-12-26Didier StevensQuicktip: TShark's Options -e and -T
2021-12-25Didier StevensTShark Tip: Extracting Field Values From Capture Files
2021-12-22Brad DuncanDecember 2021 Forensic Contest: Answers and Analysis
2021-12-21Xavier MertensMore Undetected PowerShell Dropper
2021-12-20Jan KoprivaPowerPoint attachments, Agent Tesla and code reuse in malware
2021-12-18Guy BruneauVMware Security Update - https://www.vmware.com/security/advisories/VMSA-2021-0030.html
2021-12-17Rob VandenBrinkDR Automation - Using Public DNS APIs
2021-12-16Brad DuncanHow the "Contact Forms" campaign tricks people
2021-12-15Xavier MertensSimple but Undetected PowerShell Backdoor
2021-12-09Yee Ching TokPhishing Direct Messages via Discord
2021-12-08Brad DuncanDecember 2021 Forensic Challenge
2021-12-06Xavier MertensThe Importance of Out-of-Band Networks
2021-12-04Guy BruneauA Review of Year 2021
2021-12-03Xavier MertensThe UPX Packer Will Never Die!
2021-12-02Brad DuncanTA551 (Shathak) pushes IcedID (Bokbot)
2021-12-01Xavier MertensInfo-Stealer Using webhook.site to Exfiltrate Data
2021-11-30Johannes UllrichHunting for PHPUnit Installed via Composer
2021-11-29Didier StevensWireshark 3.6.0 Released
2021-11-28Didier StevensVideo: YARA Rules for Office Maldocs
2021-11-26Guy BruneauSearching for Exposed ASUS Routers Vulnerable to CVE-2021-20090
2021-11-25Didier StevensYARA's Private Strings
2021-11-23Didier StevensYARA Rule for OOXML Maldocs: Less False Positives
2021-11-21Didier StevensBackdooring PAM
2021-11-20Guy BruneauHikvision Security Cameras Potentially Exposed to Remote Code Execution
2021-11-19Xavier MertensDownloader Disguised as Excel Add-In (XLL)
2021-11-18Xavier MertensJavaScript Downloader Delivers Agent Tesla Trojan
2021-11-15Rob VandenBrinkChanging your AD Password Using the Clipboard - Not as Easy as You'd Think!
2021-11-14Didier StevensExternal Email System FBI Compromised: Sending Out Fake Warnings
2021-11-11Johannes UllrichIn Memory of Alan Paller
2021-11-10Xavier MertensShadow IT Makes People More Vulnerable to Phishing
2021-11-08Xavier Mertens(Ab)Using Security Tools & Controls for the Bad
2021-11-07Didier StevensVideo: Decrypting Cobalt Strike Traffic With Keys Extracted From Process Memory
2021-11-06Didier StevensDecrypting Cobalt Strike Traffic With Keys Extracted From Process Memory
2021-11-04Tom WebbXmount for Disk Images
2021-11-04Brad DuncanOctober 2021 Forensic Contest: Answers and Analysis
2021-11-01Yee Ching TokRevisiting BrakTooth: Two Months Later
2021-10-31Didier StevensSysinternals: Autoruns and Sysmon updates
2021-10-31Didier StevensVideo: Phishing ZIP With Malformed Filename
2021-10-30Guy BruneauRemote Desktop Protocol (RDP) Discovery
2021-10-28Yee Ching TokMultiple Apple Patches for October 2021
2021-10-25Didier StevensDecrypting Cobalt Strike Traffic With a "Leaked" Private Key
2021-10-24Didier StevensPhishing ZIP With Malformed Filename
2021-10-22Brad DuncanOctober 2021 Contest: Forensic Challenge
2021-10-21Brad Duncan"Stolen Images Evidence" campaign pushes Sliver-based malware
2021-10-20Xavier MertensThanks to COVID-19, New Types of Documents are Lost in The Wild
2021-10-18Xavier MertensMalicious PowerShell Using Client Certificate Authentication
2021-10-16Guy BruneauApache is Actively Scan for CVE-2021-41773 & CVE-2021-42013
2021-10-14Xavier MertensPort-Forwarding with Windows for the Win
2021-10-13Johannes UllrichPlease fix your E-Mail Brute forcing tool!
2021-10-10Didier StevensWireshark 3.4.9 Released
2021-10-09Guy BruneauScanning for Previous Oracle WebLogic Vulnerabilities
2021-10-07Johannes UllrichWho Is Hunting For Your IPTV Set-Top Box?
2021-10-04Johannes UllrichBoutique "Dark" Botnet Hunting for Crumbs
2021-10-01Xavier MertensNew Tool to Add to Your LOLBAS List: cvtres.exe
2021-09-25Didier StevensStrings Analysis: VBA & Excel4 Maldoc
2021-09-25Didier StevensVideo: Strings Analysis: VBA & Excel4 Maldoc
2021-09-24Xavier MertensKeep an Eye on Your Users Mobile Devices (Simple Inventory)
2021-09-23Xavier MertensExcel Recipe: Some VBA Code with a Touch of Excel4 Macro
2021-09-21Johannes UllrichA First Look at Apple's iOS 15 "Private Relay" feature.
2021-09-20Johannes Ullrich#OMIGOD Exploits Captured in the Wild. Researchers responsible for half of scans for related ports.
2021-09-17Xavier MertensMalicious Calendar Subscriptions Are Back?
2021-09-16Jan KoprivaPhishing 101: why depend on one suspicious message subject when you can use many?
2021-09-15Brad DuncanHancitor campaign abusing Microsoft's OneDrive
2021-09-14Renato MarinhoMicrosoft September 2021 Patch Tuesday
2021-09-11Guy BruneauShipping to Elasticsearch Microsoft DNS Logs
2021-09-09Johannes UllrichUpdates to Our Datafeeds/API
2021-09-08Brad Duncan"Stolen Images Evidence" Campaign Continues Pushing BazarLoader Malware
2021-09-08Johannes UllrichMicrosoft Offers Workaround for 0-Day Office Vulnerability (CVE-2021-40444)
2021-09-02Xavier MertensAttackers Will Always Abuse Major Events in our Lifes
2021-09-01Brad DuncanSTRRAT: a Java-based RAT that doesn't care if you have Java
2021-08-31Yee Ching TokBrakTooth: Impacts, Implications and Next Steps
2021-08-30Xavier MertensCryptocurrency Clipboard Swapper Delivered With Love
2021-08-29Guy BruneauFilter JSON Data by Value with Linux jq
2021-08-21Didier StevensNew Versions Of Sysinternals Tools
2021-08-20Xavier MertensWaiting for the C2 to Show Up
2021-08-19Johannes UllrichWhen Lightning Strikes. What works and doesn't work.
2021-08-17Johannes UllrichLaravel (<=v8.4.2) exploit attempts for CVE-2021-3129 (debug mode: Remote code execution)
2021-08-15Didier StevensSimple Tips For Triage Of MALWARE Bazaar's Daily Malware Batches
2021-08-13Guy BruneauScanning for Microsoft Exchange eDiscovery
2021-08-11Brad DuncanTA551 (Shathak) continues pushing BazarLoader, infections lead to Cobalt Strike
2021-08-09Jan KoprivaProxyShell - how many Exchange servers are affected and where are they?
2021-08-07Didier StevensMALWARE Bazaar "Download daily malware batches"
2021-08-06Xavier MertensMalicious Microsoft Word Remains A Key Infection Vector
2021-08-03Johannes UllrichIs this the Weirdest Phishing (SMishing?) Attempt Ever?
2021-08-01Didier Stevensprocdump Version 10.1
2021-07-31Guy BruneauUnsolicited DNS Queries
2021-07-30Xavier MertensInfected With a .reg File
2021-07-29Xavier MertensMalicious Content Delivered Through archive.org
2021-07-28Jan KoprivaA sextortion e-mail from...IT support?!
2021-07-26Didier StevensFailed Malspam: Recovering The Password
2021-07-25Didier StevensWireshark 3.4.7 Released
2021-07-24Xavier MertensAgent.Tesla Dropped via a .daa Image and Talking to Telegram
2021-07-21Johannes Ullrich"Summer of SAM": Microsoft Releases Guidance for CVE-2021-36934
2021-07-20Bojan ZdrnjaSummer of SAM - incorrect permissions on Windows 10/11 hives
2021-07-18Didier StevensVideo: CyberChef BASE85 Decoding
2021-07-16Xavier MertensMultiple BaseXX Obfuscations
2021-07-14Jan KoprivaOne way to fail at malspam - give recipients the wrong password for an encrypted attachment
2021-07-09Brad DuncanHancitor tries XLL as initial malware file
2021-07-08Xavier MertensUsing Sudo with Python For More Security Controls
2021-07-06Xavier MertensPython DLL Injection Check
2021-07-04Didier StevensDIY CD/DVD Destruction - Follow Up
2021-07-03Didier StevensFinding Strings With oledump.py
2021-07-02Xavier Mertens"inception.py"... Multiple Base64 Encodings
2021-07-02Xavier MertensKaseya VSA Users Hit by Ransomware
2021-06-30Johannes UllrichCVE-2021-1675: Incomplete Patch and Leaked RCE Exploit
2021-06-30Brad DuncanJune 2021 Forensic Contest: Answers and Analysis
2021-06-28Didier StevensCFBF Files Strings Analysis
2021-06-27Didier StevensDIY CD/DVD Destruction
2021-06-26Guy BruneauCVE-2019-9670: Zimbra Collaboration Suite XXE vulnerability
2021-06-25Jim ClausingIs this traffic bAD?
2021-06-21Rick WannerMitre CWE - Common Weakness Enumeration
2021-06-19Xavier MertensEasy Access to the NIST RDS Database
2021-06-18Daniel WesemannNetwork Forensics on Azure VMs (Part #2)
2021-06-18Daniel WesemannOpen redirects ... and why Phishers love them
2021-06-17Daniel Wesemann Network Forensics on Azure VMs (Part #1)
2021-06-15Johannes UllrichMulti Perimeter Device Exploit Mirai Version Hunting For Sonicwall, DLink, Cisco and more
2021-06-12Guy BruneauFortinet Targeted for Unpatched SSL VPN Discovery Activity
2021-06-11Xavier MertensKeeping an Eye on Dangerous Python Modules
2021-06-11Xavier MertensSonicwall SRA 4600 Targeted By an Old Vulnerability
2021-06-09Jan KoprivaArchitecture, compilers and black magic, or "what else affects the ability of AVs to detect malicious files"
2021-06-04Xavier MertensRussian Dolls VBS Obfuscation
2021-06-03Jim ClausingStrange goings on with port 37
2021-06-02Jim ClausingWireshark 3.4.6 (and 3.2.14) released
2021-05-30Didier StevensYARA Release v4.1.1
2021-05-30Didier StevensSysinternals: Procmon, Sysmon, TcpView and Process Explorer update
2021-05-30Didier StevensVideo: Cobalt Strike & DNS - Part 1
2021-05-29Guy BruneauSpear-phishing Email Targeting Outlook Mail Clients
2021-05-28Xavier MertensMalicious PowerShell Hosted on script.google.com
2021-05-27Jan KoprivaAll your Base are...nearly equal when it comes to AV evasion, but 64-bit executables are not
2021-05-22Xavier Mertens"Serverless" Phishing Campaign
2021-05-21Xavier MertensLocking Kernel32.dll As Anti-Debugging Technique
2021-05-20Johannes UllrichAre Cookie Banners a Waste of Time or a Complete Waste of Time?
2021-05-19Brad DuncanMay 2021 Forensic Contest: Answers and Analysis
2021-05-18Xavier MertensFrom RunDLL32 to JavaScript then PowerShell
2021-05-17Daniel WesemannRansomware Defenses
2021-05-14Xavier Mertens"Open" Access to Industrial Systems Interface is Also Far From Zero
2021-05-12Jan KoprivaNumber of industrial control systems on the internet is lower then in 2020...but still far from zero
2021-05-10Johannes UllrichCorrectly Validating IP Addresses: Why encoding matters for input validation.
2021-05-08Guy BruneauWho is Probing the Internet for Research Purposes?
2021-05-07Daniel WesemannExposed Azure Storage Containers
2021-05-06Xavier MertensAlternative Ways To Perform Basic Tasks
2021-05-05Brad DuncanMay 2021 Forensic Contest
2021-05-02Didier StevensPuTTY And FileZilla Use The Same Fingerprint Registry Keys
2021-04-30Remco VerhoefQiling: A true instrumentable binary emulation framework
2021-04-29Xavier MertensFrom Python to .Net
2021-04-28Xavier MertensDeeper Analyzis of my Last Malicious PowerPoint Add-On
2021-04-25Didier StevensWireshark 3.4.5 Released
2021-04-25Didier StevensSysinternals: Procmon and Sysmon update
2021-04-24Guy BruneauBase64 Hashes Used in Web Scanning
2021-04-23Xavier MertensMalicious PowerPoint Add-On: "Small Is Beautiful"
2021-04-22Xavier MertensHow Safe Are Your Docker Images?
2021-04-16Xavier MertensHTTPS Support for All Internal Services
2021-04-15Johannes UllrichWhy and How You Should be Using an Internal Certificate Authority
2021-04-13Richard PorterMicrosoft April 2021 Patch Tuesday
2021-04-10Guy BruneauBuilding an IDS Sensor with Suricata & Zeek with Logs to ELK
2021-04-09Xavier MertensNo Python Interpreter? This Simple RAT Installs Its Own Copy
2021-04-08Xavier MertensSimple Powershell Ransomware Creating a 7Z Archive of your Files
2021-04-06Jan KoprivaMalspam with Lokibot vs. Outlook and RFCs
2021-04-03Didier StevensVideo: YARA and CyberChef
2021-04-02Xavier MertensC2 Activity: Sandboxes or Real Victims?
2021-04-01Brad DuncanApril 2021 Forensic Quiz
2021-03-31Xavier MertensQuick Analysis of a Modular InfoStealer
2021-03-19Xavier MertensPastebin.com Used As a Simple C2 Channel
2021-03-18Xavier MertensSimple Python Keylogger
2021-03-17Xavier MertensDefenders, Know Your Operating System Like Attackers Do!
2021-03-16Jan Kopriva50 years of malware? Not really. 50 years of computer worms? That's a different story...
2021-03-15Didier StevensFinding Metasploit & Cobalt Strike URLs
2021-03-14Didier StevensWireshark 3.4.4 Released
2021-03-12Guy BruneauMicrosoft DHCP Logs Shipped to ELK
2021-03-11Johannes UllrichPiktochart - Phishing with Infographics
2021-03-10Rob VandenBrinkSharpRDP - PSExec without PSExec, PSRemoting without PowerShell
2021-03-06Xavier MertensSpotting the Red Team on VirusTotal!
2021-03-05Xavier MertensSpam Farm Spotted in the Wild
2021-03-04Xavier MertensFrom VBS, PowerShell, C Sharp, Process Hollowing to RAT
2021-03-03Brad DuncanQakbot infection with Cobalt Strike
2021-03-03Johannes UllrichMicrosoft Releases Exchange Emergency Patch to Fix Actively Exploited Vulnerability
2021-03-02Russ McReeAdversary Simulation with Sim
2021-02-28Didier StevensMaldocs: Protection Passwords
2021-02-26Guy BruneauPretending to be an Outlook Version Update
2021-02-25Daniel WesemannForensicating Azure VMs
2021-02-25Jim ClausingSo where did those Satori attacks come from?
2021-02-24Brad DuncanMalspam pushes GuLoader for Remcos RAT
2021-02-23Jan KoprivaQakbot in a response to Full Disclosure post
2021-02-22Didier StevensUnprotecting Malicious Documents For Inspection
2021-02-21Didier StevensDDE and oledump
2021-02-20Didier StevensQuickie: Extracting HTTP URLs With tshark
2021-02-19Xavier MertensDynamic Data Exchange (DDE) is Back in the Wild?
2021-02-17Brad DuncanMalspam pushing Trickbot gtag rob13
2021-02-16Jim ClausingMore weirdness on TCP port 26
2021-02-15Johannes UllrichSecuring and Optimizing Networks: Using pfSense Traffic Shaper Limiters to Combat Bufferbloat
2021-02-14Didier StevensVideo: tshark & Malware Analysis
2021-02-13Guy BruneauvSphere Replication updates address a command injection vulnerability (CVE-2021-21976) - https://www.vmware.com/security/advisories/VMSA-2021-0001.html
2021-02-13Guy BruneauUsing Logstash to Parse IPtables Firewall Logs
2021-02-12Xavier MertensAgentTesla Dropped Through Automatic Click in Microsoft Help File
2021-02-11Jan KoprivaAgent Tesla hidden in a historical anti-malware tool
2021-02-08Didier StevensQuickie: tshark & Malware Analysis
2021-02-06Didier StevensYARA v4.0.5
2021-02-05Xavier MertensVBA Macro Trying to Alter the Application Menus
2021-02-04Bojan ZdrnjaAbusing Google Chrome extension syncing for data exfiltration and C&C
2021-02-03Brad DuncanExcel spreadsheets push SystemBC malware
2021-02-02Xavier MertensNew Example of XSL Script Processing aka "Mitre T1220"
2021-02-01Rob VandenBrinkTaking a Shot at Reverse Shell Attacks, CNC Phone Home and Data Exfil from Servers
2021-01-31Didier StevensYARA v4.0.4
2021-01-30Guy BruneauPacketSifter as Network Parsing and Telemetry Tool
2021-01-30Guy BruneauWireshark 3.2.11 is now available which contains Bug Fixes - https://www.wireshark.org
2021-01-28Daniel WesemannEmotet vs. Windows Attack Surface Reduction
2021-01-27Jan KoprivaTriOp - tool for gathering (not just) security-related data from Shodan.io (tool drop)
2021-01-26Brad DuncanTA551 (Shathak) Word docs push Qakbot (Qbot)
2021-01-25Rob VandenBrinkFun with NMAP NSE Scripts and DOH (DNS over HTTPS)
2021-01-24Didier StevensVideo: Doc & RTF Malicious Document
2021-01-23Didier StevensCyberChef: Analyzing OOXML Files for URLs
2021-01-22Xavier MertensAnother File Extension to Block in your MTA: .jnlp
2021-01-21Xavier MertensPowershell Dropping a REvil Ransomware
2021-01-20Brad DuncanQakbot activity resumes after holiday break
2021-01-19Russ McReeGordon for fast cyber reputation checks
2021-01-18Didier StevensDoc & RTF Malicious Document
2021-01-18Rob VandenBrinkThe CIS Benchmark for Cisco Nexus (NX-OS) 1.0 went live last week, find it here: https://www.cisecurity.org/cis-benchmarks/
2021-01-17Didier StevensNew Release of Sysmon Adding Detection for Process Tampering
2021-01-15Brad DuncanThrowback Friday: An Example of Rig Exploit Kit
2021-01-15Guy BruneauObfuscated DNS Queries
2021-01-14Bojan ZdrnjaDynamically analyzing a heavily obfuscated Excel 4 macro malicious file
2021-01-13Brad DuncanHancitor activity resumes after a hoilday break
2021-01-10Didier StevensMaldoc Analysis With CyberChef
2021-01-09Didier StevensMaldoc Strings Analysis
2021-01-07Rob VandenBrinkDirectly related to today's main story on CPE/CVEs - Code Exec in Cisco Jabber, all platforms https://nvd.nist.gov/vuln/detail/CVE-2020-26085
2021-01-06Johannes UllrichScans for Zyxel Backdoors are Commencing.
2021-01-05Johannes UllrichNetfox Detective: An Alternative Open-Source Packet Analysis Tool
2021-01-04Jan KoprivaFrom a small BAT file to Mass Logger infostealer
2021-01-02Guy BruneauProtecting Home Office and Enterprise in 2021
2021-01-01Didier StevensStrings 2021
2020-12-29Jan KoprivaWant to know what's in a folder you don't have a permission to access? Try asking your AV solution...
2020-12-24Xavier MertensMalicious Word Document Delivering an Octopus Backdoor
2020-12-23Jim ClausingAnalysis Dridex Dropper, IoC extraction (guest diary)
2020-12-22Xavier MertensMalware Victim Selection Through WiFi Identification
2020-12-20Didier StevensWireshark 3.4.2 Released
2020-12-19Guy BruneauSecure Communication using TLS in Elasticsearch
2020-12-18Jan KoprivaA slightly optimistic tale of how patching went for CVE-2019-19781
2020-12-16Daniel WesemannDNS Logs in Public Clouds
2020-12-15Didier StevensAnalyzing FireEye Maldocs
2020-12-14Johannes UllrichSolarWinds Breach Used to Infiltrate Customer Networks (Solarigate)
2020-12-13Didier StevensWireshark 3.4.1 Released
2020-12-13Didier StevensKringleCon 2020
2020-12-10Xavier MertensPython Backdoor Talking to a C2 Through Ngrok
2020-12-10John BambenekWriting Yara Rules for Fun and Profit: Notes from the FireEye Breach Countermeasures
2020-12-09Brad DuncanRecent Qakbot (Qbot) activity
2020-12-08Johannes UllrichDecember 2020 Microsoft Patch Tuesday: Exchange, Sharepoint, Dynamics and DNS Spoofing
2020-12-07Didier StevensCorrupt BASE64 Strings: Detection and Decoding
2020-12-06Didier Stevensoledump's Indicators (video)
2020-12-05Guy BruneauIs IP 91.199.118.137 testing Access to aahwwx.52host.xyz?
2020-12-04Guy BruneauDetecting Actors Activity with Threat Intel
2020-12-03Brad DuncanTraffic Analysis Quiz: Mr Natural
2020-11-30Didier StevensDecrypting PowerShell Payloads (video)
2020-11-29Didier StevensQuick Tip: Using JARM With a SOCKS Proxy
2020-11-25Xavier MertensLive Patching Windows API Calls Using PowerShell
2020-11-24Johannes UllrichThe special case of TCP RST
2020-11-23Didier StevensQuick Tip: Cobalt Strike Beacon Analysis
2020-11-21Guy BruneauVMware privilege escalation vulnerabilities (CVE-2020-4004, CVE-2020-4005) - https://www.vmware.com/security/advisories/VMSA-2020-0026.html
2020-11-19Xavier MertensPowerShell Dropper Delivering Formbook
2020-11-18Xavier MertensWhen Security Controls Lead to Security Issues
2020-11-16Jan KoprivaHeartbleed, BlueKeep and other vulnerabilities that didn't disappear just because we don't talk about them anymore
2020-11-13Xavier MertensOld Worm But New Obfuscation Technique
2020-11-12Daniel WesemannExposed Blob Storage in Azure
2020-11-12Daniel WesemannPreventing Exposed Azure Blob Storage
2020-11-11Brad DuncanTraffic Analysis Quiz: DESKTOP-FX23IK5
2020-11-09Xavier MertensHow Attackers Brush Up Their Malicious Scripts
2020-11-07Guy BruneauCryptojacking Targeting WebLogic TCP/7001
2020-11-06Johannes UllrichRediscovering Limitations of Stateful Firewalls: "NAT Slipstreaming" ? Implications, Detections and Mitigations
2020-11-05Xavier MertensDid You Spot "Invoke-Expression"?
2020-10-31Didier StevensMore File Selection Gaffes
2020-10-30Xavier MertensQuick Status of the CAA DNS Record Adoption
2020-10-26Didier StevensExcel 4 Macros: "Abnormal Sheet Visibility"
2020-10-25Didier StevensVideo: Pascal Strings
2020-10-24Guy BruneauAn Alternative to Shodan, Censys with User-Agent CensysInspect/1.1
2020-10-23Russ McReeSooty: SOC Analyst's All-in-One Tool
2020-10-22Jan KoprivaBazarLoader phishing lures: plan a Halloween party, get a bonus and be fired in the same afternoon
2020-10-21Daniel WesemannShipping dangerous goods
2020-10-20Xavier MertensMirai-alike Python Scanner
2020-10-14Brad DuncanMore TA551 (Shathak) Word docs push IcedID (Bokbot)
2020-10-14Xavier MertensNicely Obfuscated Python RAT
2020-10-07Johannes UllrichToday, Nobody is Going to Attack You.
2020-10-03Guy BruneauScanning for SOHO Routers
2020-10-01Daniel WesemannMaking sense of Azure AD (AAD) activity logs
2020-09-30Johannes UllrichScans for FPURL.xml: Reconnaissance or Not?
2020-09-29Xavier MertensManaging Remote Access for Partners & Contractors
2020-09-28Xavier MertensSome Tyler Technologies Customers Targeted with The Installation of a Bomgar Client
2020-09-27Didier StevensWireshark 3.2.7 Released
2020-09-27Didier StevensDecoding Corrupt BASE64 Strings
2020-09-24Xavier MertensParty in Ibiza with PowerShell
2020-09-23Xavier MertensMalicious Word Document with Dynamic Content
2020-09-20Guy BruneauAnalysis of a Salesforce Phishing Emails
2020-09-18Xavier MertensA Mix of Python & VBA in a Malicious Word Document
2020-09-17Xavier MertensSuspicious Endpoint Containment with OSSEC
2020-09-16Johannes UllrichDo Vulnerabilities Ever Get Old? Recent "Mirai" Variant Scanning for 20 Year Old Amanda Version?
2020-09-15Brad DuncanTraffic Analysis Quiz: Oh No... Another Infection!
2020-09-11Rob VandenBrinkWhat's in Your Clipboard? Pillaging and Protecting the Clipboard
2020-09-10Brad DuncanRecent Dridex activity
2020-09-09Johannes UllrichA First Look at macOS 11 Big Sur Network Traffic (New! Now with more GREASE!)
2020-09-04Jan KoprivaA blast from the past - XXEncoded VB6.0 Trojan
2020-09-03Xavier MertensSandbox Evasion Using NTP
2020-08-31Didier StevensFinding The Original Maldoc
2020-08-30Johannes UllrichCenturyLink Outage Causing Internet Wide Problems
2020-08-29Didier StevensMalicious Excel Sheet with a NULL VT Score: More Info
2020-08-28Xavier MertensExample of Malicious DLL Injected in PowerShell
2020-08-26Xavier MertensMalicious Excel Sheet with a NULL VT Score
2020-08-25Xavier MertensKeep An Eye on LOLBins
2020-08-24Xavier MertensTracking A Malware Campaign Through VT
2020-08-22Guy BruneauVMware App Volumes patches address Stored Cross-Site Scripting (XSS) vulnerability - https://www.vmware.com/security/advisories/VMSA-2020-0019.html
2020-08-22Guy BruneauRemote Desktop (TCP/3389) and Telnet (TCP/23), What might they have in Common?
2020-08-20Rob VandenBrinkOffice 365 Mail Forwarding Rules (and other Mail Rules too)
2020-08-19Xavier MertensExample of Word Document Delivering Qakbot
2020-08-18Xavier MertensUsing API's to Track Attackers
2020-08-15Didier StevensWireshark 3.2.6 Released
2020-08-14Jan KoprivaDefinition of 'overkill' - using 130 MB executable to hide 24 kB malware
2020-08-12Russ McReeTo the Brim at the Gates of Mordor Pt. 1
2020-08-10Bojan ZdrnjaScoping web application and web service penetration tests
2020-08-07Brad DuncanTA551 (Shathak) Word docs push IcedID (Bokbot)
2020-08-06Xavier MertensA Fork of the FTCode Powershell Ransomware
2020-08-05Brad DuncanTraffic Analysis Quiz: What's the Malware From This Infection?
2020-08-04Johannes UllrichReminder: Patch Cisco ASA / FTD Devices (CVE-2020-3452). Exploitation Continues
2020-08-04Johannes UllrichInternet Choke Points: Concentration of Authoritative Name Servers
2020-08-03Xavier MertensPowershell Bot with Multiple C2 Protocols
2020-08-03Johannes UllrichA Word of Caution: Helping Out People Being Stalked Online
2020-07-31Richard PorterBuilding a .freq file with Public Domain Data Sources
2020-07-27Johannes UllrichIn Memory of Donald Smith
2020-07-26Didier StevensCracking Maldoc VBA Project Passwords
2020-07-24Xavier MertensCompromized Desktop Applications by Web Technologies
2020-07-23Xavier MertensSimple Blocklisting with MISP & pfSense
2020-07-21Jan KoprivaCouple of interesting Covid-19 related stats
2020-07-20Rick WannerSextortion Update: The Final Final Chapter
2020-07-19Guy BruneauScanning Activity for ZeroShell Unauthenticated Access
2020-07-16John BambenekHunting for SigRed Exploitation
2020-07-15Brad DuncanWord docs with macros for IcedID (Bokbot)
2020-07-15Johannes UllrichPATCH NOW - SIGRed - CVE-2020-1350 - Microsoft DNS Server Vulnerability
2020-07-13Didier StevensVBA Project Passwords
2020-07-12Didier StevensMaldoc: VBA Purging Example
2020-07-11Guy BruneauVMware XPC Client validation privilege escalation vulnerability - https://www.vmware.com/security/advisories/VMSA-2020-0017.html
2020-07-11Guy BruneauScanning Home Internet Facing Devices to Exploit
2020-07-10Brad DuncanExcel spreasheet macro kicks off Formbook infection
2020-07-08Xavier MertensIf You Want Something Done Right, You Have To Do It Yourself... Malware Too!
2020-07-05Didier StevensCVE-2020-5902 F5 BIG-IP Exploitation Attempt
2020-07-04Russ McReeHappy FouRth of July from the Internet Storm Center
2020-06-30Russ McReeISC Snapshot: SpectX IP Hitcount Query
2020-06-29Didier StevensSysmon and Alternate Data Streams
2020-06-27Didier StevensVideo: YARA's BASE64 Strings
2020-06-25Johannes UllrichTech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release.
2020-06-24Jan KoprivaUsing Shell Links as zero-touch downloaders and to initiate network connections
2020-06-19Remco VerhoefSigma rules! The generic signature format for SIEM systems.
2020-06-16Xavier MertensSextortion to The Next Level
2020-06-15Rick WannerVMWare Security Advisory - VMSA-2020-0013 - https://www.vmware.com/security/advisories/VMSA-2020-0013.html
2020-06-14Didier StevensYARA's BASE64 Strings
2020-06-13Guy BruneauMirai Botnet Activity
2020-06-12Xavier MertensMalicious Excel Delivering Fileless Payload
2020-06-11Xavier MertensAnti-Debugging JavaScript Techniques
2020-06-10Brad DuncanJob application-themed malspam pushes ZLoader
2020-06-08Didier StevensTranslating BASE64 Obfuscated Scripts
2020-06-05Johannes UllrichCyber Security for Protests
2020-06-04Xavier MertensAnti-Debugging Technique based on Memory Protection
2020-06-01Jim ClausingStackstrings, type 2
2020-06-01Didier StevensXLMMacroDeobfuscator: An Update
2020-05-31Guy BruneauWindows 10 Built-in Packet Sniffer - PktMon
2020-05-30Didier StevensYARA v4.0.1
2020-05-29Johannes UllrichThe Impact of Researchers on Our Data
2020-05-28Xavier MertensFlashback on CVE-2019-19781
2020-05-24Didier StevensWireshark 3.2.4 Released
2020-05-24Didier StevensZloader Maldoc Analysis With xlm-deobfuscator
2020-05-23Xavier MertensAgentTesla Delivered via a Malicious PowerPoint Add-In
2020-05-22Didier StevensSome Strings to Remember
2020-05-21Xavier MertensMalware Triage with FLOSS: API Calls Based Behavior
2020-05-20Brad DuncanMicrosoft Word document with malicious macro pushes IcedID (Bokbot)
2020-05-19Rick WannerVMWare Security Advisory - VMSA-2020-0010 - https://www.vmware.com/security/advisories/VMSA-2020-0010.html
2020-05-19Rick WannerWireshark Release - 2.6.17, 3.0.11 and 3.2.4 - https://www.wireshark.org/news/20200519.html
2020-05-15Rob VandenBrinkHashes in PowerShell
2020-05-15Rob VandenBrinkSHA3 Hashes (on Windows) - Where Art Thou?
2020-05-14Rob VandenBrinkPatch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe
2020-05-13Brad DuncanMalspam with links to zip archives pushes Dridex malware
2020-05-10Didier StevensYARA v4.0.0: BASE64 Strings
2020-05-09Rick WannerVMWare vRealize Critical vulnerabilities due to SaltStack - VMSA-2020-0009
2020-05-08Xavier MertensUsing Nmap As a Lightweight Vulnerability Scanner
2020-05-06Xavier MertensKeeping an Eye on Malicious Files Life Time
2020-05-05Russ McReeCloud Security Features Don't Replace the Need for Personnel Security Capabilities
2020-05-04Didier StevensSysmon and File Deletion
2020-05-02Guy BruneauPhishing PDF with Unusual Hostname
2020-04-30Xavier MertensCollecting IOCs from IMAP Folder
2020-04-29Johannes UllrichPrivacy Preserving Protocols to Trace Covid19 Exposure
2020-04-27Xavier MertensPowershell Payload Stored in a PSCredential Object
2020-04-26Didier StevensVideo: Malformed .docm File
2020-04-25Didier StevensMALWARE Bazaar
2020-04-24Xavier MertensMalicious Excel With a Strong Obfuscation and Sandbox Evasion
2020-04-21Russ McReeSpectX: Log Parser for DFIR
2020-04-20Didier StevensKPOT AutoIt Script: Analysis
2020-04-18Guy BruneauMaldoc Falsely Represented as DOCX Invoice Redirecting to Fake Apple Store
2020-04-17Xavier MertensWeaponized RTF Document Generator & Mailer in PowerShell
2020-04-16Johannes UllrichUsing AppLocker to Prevent Living off the Land Attacks
2020-04-12Didier StevensReader Analysis: "Dynamic analysis technique to get decrypted KPOT Malware."
2020-04-11Didier StevensWireshark 3.2.3 Released: Mac Users Pay Attention Please
2020-04-10Xavier MertensPowerShell Sample Extracting Payload From SSL
2020-04-10Scott FendleyCritical Vuln in vCenter vmdir (CVE-2020-3952)
2020-04-08Brad DuncanGerman malspam pushes ZLoader malware
2020-04-07Johannes UllrichIncrease in RDP Scanning
2020-04-06Didier StevensPassword Protected Malicious Excel Files
2020-04-05Guy BruneauMaldoc XLS Invoice with Excel 4 Macros
2020-04-04Didier StevensNew Bypass Technique or Corrupt Word Document?
2020-04-03Xavier MertensObfuscated with a Simple 0x0A
2020-04-02Tom WebbTPOT's Cowrie to ISC Logs
2020-03-31Johannes UllrichKwampirs Targeted Attacks Involving Healthcare Sector
2020-03-30Jan KoprivaCrashing explorer.exe with(out) a click
2020-03-29Didier StevensObfuscated Excel 4 Macros
2020-03-27Xavier MertensMalicious JavaScript Dropping Payload in the Registry
2020-03-26Xavier MertensVery Large Sample as Evasion Technique?
2020-03-25Brad DuncanRecent Dridex activity
2020-03-24Russ McReeAnother Critical COVID-19 Shortage: Digital Security
2020-03-23Didier StevensKPOT Deployed via AutoIt Script
2020-03-23Didier StevensWindows Zeroday Actively Exploited: Type 1 Font Parsing Remote Code Execution Vulnerability
2020-03-22Didier StevensMore COVID-19 Themed Malware
2020-03-21Guy BruneauHoneypot - Scanning and Targeting Devices & Services
2020-03-19Xavier MertensCOVID-19 Themed Multistage Malware
2020-03-18Brad DuncanTrickbot gtag red5 distributed as a DLL file
2020-03-16Jan KoprivaDesktop.ini as a post-exploitation tool
2020-03-15Guy BruneauVPN Access and Activity Monitoring
2020-03-14Didier StevensPhishing PDF With Incremental Updates.
2020-03-13Rob VandenBrinkNot all Ethernet NICs are Created Equal - Trying to Capture Invalid Ethernet Frames
2020-03-12Xavier MertensCritical SMBv3 Vulnerability: Remote Code Execution
2020-03-12Brad DuncanHancitor distributed through coronavirus-themed malspam
2020-03-11Xavier MertensAgent Tesla Delivered via Fake Canon EOS Notification on Free OwnCloud Account
2020-03-10Johannes UllrichMicrosoft Patch Tuesday March 2020
2020-03-09Didier StevensMalicious Spreadsheet With Data Connection and Excel 4 Macros
2020-03-07Didier StevensWireshark 3.2.2 Released: Windows' Users Pay Attention Please
2020-03-06Xavier MertensA Safe Excel Sheet Not So Safe
2020-03-05Xavier MertensWill You Put Your Password in a Survey?
2020-03-04Johannes UllrichLet's Encrypt Revoking 3 Million Certificates
2020-03-03Johannes UllrichIntroduction to EvtxEcmd (Evtx Explorer)
2020-02-28Xavier MertensShow me Your Clipboard Data!
2020-02-27Xavier MertensOffensive Tools Are For Blue Teams Too
2020-02-25Jan KoprivaQuick look at a couple of current online scam campaigns
2020-02-24Didier StevensMaldoc: Excel 4 Macros and VBA, Devil and Angel?
2020-02-23Didier StevensMaldoc: Excel 4 Macros in OOXML Format
2020-02-22Xavier MertensSimple but Efficient VBScript Obfuscation
2020-02-21Xavier MertensQuick Analysis of an Encrypted Compound Document Format
2020-02-18Jan KoprivaDiscovering contents of folders in Windows without permissions
2020-02-17Didier Stevenscurl and SSPI
2020-02-16Guy BruneauSOAR or not to SOAR?
2020-02-15Didier Stevensbsdtar on Windows 10
2020-02-14Xavier MertensKeep an Eye on Command-Line Browsers
2020-02-12Brad DuncanMalpsam pushes Ursnif through Italian language Word docs
2020-02-08Russell EubanksAfter Action Review
2020-02-07Xavier MertensSandbox Detection Tricks & Nice Obfuscation in a Single VBScript
2020-02-05Brad DuncanFake browser update pages are "still a thing"
2020-02-03Jan KoprivaAnalysis of a triple-encrypted AZORult downloader
2020-02-02Didier StevensVideo: Stego & Cryptominers
2020-02-01Didier StevensWireshark 3.2.1 Released
2020-01-28Brad DuncanEmotet epoch 1 infection with Trickbot gtag mor84
2020-01-27Johannes UllrichNetwork Security Perspective on Coronavirus Preparedness
2020-01-25Russell EubanksVisibility Gap of Your Security Tools
2020-01-25Guy BruneauIs Threat Hunting the new Fad?
2020-01-23Xavier MertensComplex Obfuscation VS Simple Trick
2020-01-22Brad DuncanGerman language malspam pushes Ursnif
2020-01-21Russ McReeDeepBlueCLI: Powershell Threat Hunting
2020-01-16Bojan ZdrnjaSumming up CVE-2020-0601, or the Let?s Decrypt vulnerability
2020-01-16Jan KoprivaPicks of 2019 malware - the large, the small and the one full of null bytes
2020-01-15Johannes UllrichCVE-2020-0601 Followup
2020-01-13Didier StevensCitrix ADC Exploits: Overview of Observed Payloads
2020-01-12Guy BruneauELK Dashboard and Logstash parser for tcp-honeypot Logs
2020-01-11Johannes UllrichCitrix ADC Exploits are Public and Heavily Used. Attempts to Install Backdoor
2020-01-10Xavier MertensMore Data Exfiltration
2020-01-09Xavier MertensQuick Analyzis of a(nother) Maldoc
2020-01-07Johannes UllrichA Quick Update on Scanning for CVE-2019-19781 (Citrix ADC / Gateway Vulnerability)
2020-01-06Johannes UllrichIncrease in Number of Sources January 3rd and 4th: spoofed
2020-01-04Didier StevensKringleCon 2019
2020-01-03Kevin ShorttCCPA - Quick Overview
2020-01-02Xavier MertensRansomware in Node.js
2019-12-31Johannes UllrichSome Thoughts About the Critical Citrix ADC/Gateway Vulnerability (CVE-2019-19781)
2019-12-29Guy BruneauELK Dashboard for Pihole Logs
2019-12-28Didier StevensCorrupt Office Documents
2019-12-26Xavier MertensBypassing UAC to Install a Cryptominer
2019-12-24Brad DuncanMalspam with links to Word docs pushes IcedID (Bokbot)
2019-12-23Didier StevensNew oledump.py plugin: plugin_version_vba
2019-12-22Didier StevensExtracting VBA Macros From .DWG Files
2019-12-21Didier StevensWireshark 3.2.0 Released
2019-12-16Didier StevensMalicious .DWG Files?
2019-12-15Didier StevensVirusTotal Email Submissions
2019-12-12Xavier MertensCode & Data Reuse in the Malware Ecosystem
2019-12-11Brad DuncanGerman language malspam pushes yet another wave of Trickbot
2019-12-09Didier Stevens(Lazy) Sunday Maldoc Analysis
2019-12-08Didier StevensWireshark 3.0.7 Released
2019-12-05Jan KoprivaE-mail from Agent Tesla
2019-12-04Jan KoprivaAnalysis of a strangely poetic malware
2019-12-03Brad DuncanUrsnif infection with Dridex
2019-11-29Russ McReeISC Snapshot: Search with SauronEye
2019-11-27Brad DuncanFinding an Agent Tesla malware sample
2019-11-23Guy BruneauLocal Malware Analysis with Malice
2019-11-22Xavier MertensAbusing Web Filters Misconfiguration for Reconnaissance
2019-11-20Brad DuncanHancitor infection with Pony, Evil Pony, Ursnif, and Cobalt Strike
2019-11-19Johannes UllrichCheap Chinese JAWS of DVR Exploitability on Port 60001
2019-11-18Johannes UllrichSMS and 2FA: Another Reason to Move away from It.
2019-11-09Guy BruneauFake Netflix Update Request by Text
2019-11-08Xavier MertensMicrosoft Apps Diverted from Their Main Use
2019-11-06Brad DuncanMore malspam pushing Formbook
2019-11-05Rick WannerBluekeep exploitation causing Bluekeep vulnerability scan to fail
2019-11-01Didier StevensTip: Password Managers and 2FA
2019-10-29Xavier MertensGenerating PCAP Files from YAML
2019-10-27Didier StevensWireshark 3.0.6 Released
2019-10-27Guy BruneauUnusual Activity with Double Base64 Encoding
2019-10-25Rob VandenBrinkMore on DNS Archeology (with PowerShell)
2019-10-21Jim ClausingWhat's up with TCP 853 (DNS over TLS)?
2019-10-20Guy BruneauScanning Activity for NVMS-9000 Digital Video Recorder
2019-10-19Russell EubanksWhat Assumptions Are You Making?
2019-10-18Xavier MertensQuick Malicious VBS Analysis
2019-10-16Xavier MertensSecurity Monitoring: At Network or Host Level?
2019-10-14Didier StevensYARA's XOR Modifier
2019-10-12Didier StevensYARA v3.11.0 released
2019-10-10Rob VandenBrinkMining Live Networks for OUI Data Oddness
2019-10-09Brad DuncanWhat data does Vidar malware steal from an infected host?
2019-10-06Russ McReevisNetwork for Network Data
2019-10-03Xavier Mertens"Lost_Files" Ransomware
2019-10-02Brad DuncanA recent example of Emotet malspam
2019-09-27Xavier MertensNew Scans for Polycom Autoconfiguration Files
2019-09-26Rob VandenBrinkMining MAC Address and OUI Information
2019-09-25Brad DuncanMalspam pushing Quasar RAT
2019-09-24Xavier MertensHuge Amount of remotewebaccess.com Sites Found in Certificate Transparency Logs
2019-09-22Didier StevensVideo: Encrypted Sextortion PDFs
2019-09-21Didier StevensWireshark 3.0.5 Release: Potential Windows Crash when Updating
2019-09-19Xavier MertensAgent Tesla Trojan Abusing Corporate Email Accounts
2019-09-19Xavier MertensBlocklisting or Whitelisting in the Right Way
2019-09-18Brad DuncanEmotet malspam is back
2019-09-17Rob VandenBrinkInvestigating Gaps in your Windows Event Logs
2019-09-16Didier StevensEncrypted Sextortion PDFs
2019-09-07Guy BruneauUnidentified Scanning Activity
2019-09-03Johannes Ullrich[Guest Diary] Tricky LNK points to TrickBot
2019-08-30Xavier MertensMalware Dropping a Local Node.js Instance
2019-08-28Johannes Ullrich[Guest Diary] Open Redirect: A Small But Very Common Vulnerability
2019-08-28Xavier MertensMalware Samples Compiling Their Next Stage on Premise
2019-08-25Guy BruneauAre there any Advantages of Buying Cyber Security Insurance?
2019-08-22Xavier MertensSimple Mimikatz & RDPWrapper Dropper
2019-08-21Russ McReeKAPE: Kroll Artifact Parser and Extractor
2019-08-18Didier StevensVideo: Analyzing DAA Files
2019-08-16Didier StevensThe DAA File Format
2019-08-15Didier StevensAnalysis of a Spearphishing Maldoc
2019-08-14Brad DuncanRecent example of MedusaHTTP malware
2019-08-12Didier StevensMalicious .DAA Attachments
2019-08-09Xavier Mertens100% JavaScript Phishing Page
2019-08-08Johannes Ullrich[Guest Diary] The good, the bad and the non-functional, or "how not to do an attack campaign"
2019-08-05Rick WannerSextortion: Follow the Money - The Final Chapter
2019-08-05Rick WannerScanning for Bluekeep vulnerable RDP instances
2019-08-01Johannes UllrichWhat is Listening On Port 9527/TCP?
2019-07-28Didier StevensVideo: Analyzing Compressed PowerShell Scripts
2019-07-26Kevin ShorttDVRIP Port 34567 - Uptick
2019-07-25Rob VandenBrinkWhen Users Attack! Users (and Admins) Thwarting Security Controls
2019-07-24Xavier MertensMay People Be Considered as IOC?
2019-07-20Guy BruneauRe-evaluating Network Security - It is Increasingly More Complex
2019-07-18Rob VandenBrinkThe Other Side of Critical Control 1: 802.1x Wired Network Access Controls
2019-07-18Xavier MertensMalicious PHP Script Back on Stage?
2019-07-16Russ McReeCommando VM: The Complete Mandiant Offensive VM
2019-07-13Guy BruneauGuidance to Protect DNS Against Hijacking & Scanning for Version.BIND Still a Thing
2019-07-11Johannes UllrichRemembering Mike Assante
2019-07-11Xavier MertensRussian Dolls Malicious Script Delivering Ursnif
2019-07-10Rob VandenBrinkDumping File Contents in Hex (in PowerShell)
2019-07-09John BambenekSolving the WHOIS and Privacy Problem: A Draft of Implementing WHOIS in DNS
2019-07-09John BambenekMSFT July 2019 Patch Tuesday
2019-07-05Didier StevensA "Stream O" Maldoc
2019-07-02Xavier MertensMalicious Script With Multiple Payloads
2019-07-01Didier StevensMaldoc: Payloads in User Forms
2019-06-28Rob VandenBrinkVerifying Running Processes against VirusTotal - Domain-Wide
2019-06-27Rob VandenBrinkFinding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell
2019-06-25Brad DuncanRig Exploit Kit sends Pitou.B Trojan
2019-06-24Johannes UllrichExtensive BGP Issues Affecting Cloudflare and possibly others
2019-06-21Rob VandenBrinkNetstat Local and Remote -new and improved, now with more PowerShell!
2019-06-20Xavier MertensUsing a Travel Packing App for Infosec Purpose
2019-06-19Johannes UllrichCritical Actively Exploited WebLogic Flaw Patched CVE-2019-2729
2019-06-18Brad DuncanMalspam with password-protected Word docs pushing Dridex
2019-06-18Johannes UllrichWhat You Need To Know About TCP "SACK Panic"
2019-06-17Brad DuncanAn infection from Rig exploit kit
2019-06-14Jim ClausingA few Ghidra tips for IDA users, part 4 - function call graphs
2019-06-10Xavier MertensInteresting JavaScript Obfuscation Example
2019-06-06Xavier MertensKeep an Eye on Your WMI Logs
2019-06-04Russ McReeISC snapshot: r-cyber with rud.is
2019-06-03Didier StevensTip: BASE64 Encoded PowerShell Scripts are Recognizable by the Amount of Letter As
2019-05-29Xavier MertensBehavioural Malware Analysis with Microsoft ASA
2019-05-28Didier StevensOffice Document & BASE64? PowerShell!
2019-05-26Didier StevensVideo: nmap Service Detection Customization
2019-05-22Johannes UllrichAn Update on the Microsoft Windows RDP "Bluekeep" Vulnerability (CVE-2019-0708) [now with pcaps]
2019-05-20Tom WebbCVE-2019-0604 Attack
2019-05-19Guy BruneauIs Metadata Only Approach, Good Enough for Network Traffic Analysis?
2019-05-16Xavier MertensThe Risk of Authenticated Vulnerability Scans
2019-05-13Xavier MertensFrom Phishing To Ransomware?
2019-05-10Xavier MertensDSSuite - A Docker Container with Didier's Tools
2019-05-03Jim ClausingA few Ghidra tips for IDA users, part 3 - conversion, labels, and comments
2019-05-01Xavier MertensAnother Day, Another Suspicious UDF File
2019-04-26Rob VandenBrinkPillaging Passwords from Service Accounts
2019-04-25Rob VandenBrinkUnpatched Vulnerability Alert - WebLogic Zero Day
2019-04-25Rob VandenBrinkService Accounts Redux - Collecting Service Accounts with PowerShell
2019-04-24Rob VandenBrinkWhere have all the Domain Admins gone? Rooting out Unwanted Domain Administrators
2019-04-22Didier Stevens.rar Files and ACE Exploit CVE-2018-20250
2019-04-19Didier StevensAnalyzing UDF Files with Python
2019-04-17Jim ClausingA few Ghidra tips for IDA users, part 2 - strings and parameters
2019-04-17Xavier MertensMalware Sample Delivered Through UDF Image
2019-04-13Johannes UllrichConfiguring MTA-STS and TLS Reporting For Your Domain
2019-04-11Johannes UllrichHow to Find Hidden Cameras in your AirBNB
2019-04-08Jim ClausingA few Ghidra tips for IDA users, part 1 - the decompiler/unreachable code
2019-04-05Russ McReeBeagle: Graph transforms for DFIR data & logs
2019-04-04Xavier MertensNew Waves of Scans Detected by an Old Rule
2019-04-03Jim ClausingA few Ghidra tips for IDA users, part 0 - automatic comments for API call parameters
2019-04-02Johannes UllrichFake AV is Back: LaCie Network Drives Used to Spread Malware
2019-04-01Didier StevensAnalysis of PDFs Created with OpenOffice/LibreOffice
2019-03-31Didier StevensMaldoc Analysis of the Weekend by a Reader
2019-03-30Didier Stevens"404" is not Malware
2019-03-29Remco VerhoefAnnotating Golang binaries with Cutter and Jupyter
2019-03-27Xavier MertensRunning your Own Passive DNS Service
2019-03-25Didier Stevens"VelvetSweatshop" Maldocs: Shellcode Analysis
2019-03-24Didier StevensDecoding QR Codes with Python
2019-03-23Didier Stevens"VelvetSweatshop" Maldocs
2019-03-21Xavier MertensNew Wave of Extortion Emails: Central Intelligence Agency Case
2019-03-20Rob VandenBrinkUsing AD to find hosts that aren't in AD - fun with the [IPAddress] construct!
2019-03-18Didier StevensWireshark 3.0.0 and Npcap: Some Remarks
2019-03-17Didier StevensVideo: Maldoc Analysis: Excel 4.0 Macro
2019-03-16Didier StevensMaldoc: Excel 4.0 Macros
2019-03-15Remco VerhoefBinary Analysis with Jupyter and Radare2
2019-03-14Didier StevensTip: Ghidra & ZIP Files
2019-03-13Brad DuncanMalspam pushes Emotet with Qakbot as the follow-up malware
2019-03-11Didier StevensWireshark 3.0.0 and Npcap
2019-03-10Didier StevensMalicious HTA Analysis by a Reader
2019-03-10Didier StevensQuick and Dirty Malicious HTA Analysis
2019-03-09Guy BruneauA Comparison Study of SSH Port Activity - TCP 22 & 2222
2019-03-08Remco VerhoefAnalysing meterpreter payload with Ghidra
2019-03-06Johannes UllrichMarch Edition of Ouch! Newsletter: Securely Disposing Mobile Devices https://www.sans.org/security-awareness-training/resources/disposing-your-mobile-device
2019-03-06Xavier MertensKeep an Eye on Disposable Email Addresses
2019-03-06Brad DuncanMalspam with password-protected word docs still pushing IcedID (Bokbot) with Trickbot
2019-03-05Rob VandenBrinkPowershell, Active Directory and the Windows Host Firewall
2019-02-27Didier StevensMaldoc Analysis by a Reader
2019-02-25Didier StevensSextortion Email Variant: With QR Code
2019-02-24Guy BruneauPacket Editor and Builder by Colasoft
2019-02-21Xavier MertensSimple Powershell Keyloggers are Back
2019-02-20Brad DuncanMore Russian language malspam pushing Shade (Troldesh) ransomware
2019-02-17Didier StevensVideo: Finding Property Values in Office Documents
2019-02-16Didier StevensFinding Property Values in Office Documents
2019-02-14Xavier MertensSuspicious PDF Connecting to a Remote SMB Share
2019-02-14Xavier MertensOld H-Worm Delivered Through GitHub
2019-02-11Didier StevensHave You Seen an Email Virus Recently?
2019-02-10Didier StevensVideo: Maldoc Analysis of the Weekend
2019-02-09Didier StevensMaldoc Analysis of the Weekend
2019-02-07Bojan ZdrnjaUAC is not all that bad really
2019-02-07Xavier Mertens Phishing Kit with JavaScript Keylogger
2019-02-06Brad DuncanHancitor malspam and infection traffic from Tuesday 2019-02-05
2019-02-01Rick WannerSextortion: Follow the Money Part 3 - The cashout begins!
2019-01-31Xavier MertensTracking Unexpected DNS Changes
2019-01-30Russ McReeCR19-010: The United States vs. Huawei
2019-01-29Johannes UllrichA Not So Well Done Phish (Why Attackers need to Implement IPv6 Now! ;-) )
2019-01-28Bojan ZdrnjaRelaying Exchange?s NTLM authentication to domain admin (and more)
2019-01-26Didier StevensVideo: Analyzing Encrypted Malicious Office Documents
2019-01-24Brad DuncanMalspam with Word docs uses macro to run Powershell script and steal system data
2019-01-22Xavier MertensDNS Firewalling with MISP
2019-01-18John BambenekSextortion Bitcoin on the Move
2019-01-16Brad DuncanEmotet infections and follow-up malware
2019-01-14Rob VandenBrinkMicrosoft LAPS - Blue Team / Red Team
2019-01-12Guy BruneauSnorpy a Web Base Tool to Build Snort/Suricata Rules
2019-01-10Brad DuncanHeartbreaking Emails: "Love You" Malspam
2019-01-09Russ McReegganimate: Animate YouR Security Analysis
2019-01-07Didier StevensAnalyzing Encrypted Malicious Office Documents
2019-01-06Didier StevensMalicious .tar Attachments
2019-01-05Didier StevensA Malicious JPEG? Second Example
2019-01-04Didier StevensA Malicious JPEG?
2019-01-02Didier StevensMaldoc with Nonfunctional Shellcode
2019-01-02Lorna HutchesonGift Card Scams on the rise
2019-01-02Xavier MertensMalicious Script Leaking Data via FTP
2018-12-31Didier StevensSoftware Crashes: A New Year's Resolution
2018-12-23Guy BruneauScanning Activity, end Goal is to add Hosts to Mirai Botnet
2018-12-22Didier StevensKringleCon 2018
2018-12-19Xavier MertensRestricting PowerShell Capabilities with NetSh
2018-12-19Xavier MertensMicrosoft OOB Patch for Internet Explorer: Scripting Engine Memory Corruption Vulnerability
2018-12-19Xavier MertensUsing OSSEC Active-Response as a DFIR Framework
2018-12-18Brad DuncanMalspam links to password-protected Word docs that push IcedID (Bokbot)
2018-12-17Didier StevensPassword Protected ZIP with Maldoc
2018-12-16Guy BruneauRandom Port Scan for Open RDP Backdoor
2018-12-15Didier StevensDe-DOSfuscation Example
2018-12-14Rick WannerBombstortion?? Boomstortion??
2018-12-13Xavier MertensPhishing Attack Through Non-Delivery Notification
2018-12-12Didier StevensYet Another DOSfuscation Sample
2018-12-11Richard PorterMicrosoft December 2018 Patch Tuesday
2018-12-09Didier StevensQuickie: String Analysis is Still Useful
2018-12-08Didier StevensReader Malware Submission: MHT File Inside a ZIP File
2018-12-07Remco VerhoefA Dive into malicious Docker Containers
2018-12-05Brad DuncanCampaign evolution: Hancitor changes its Word macros
2018-12-03Didier StevensWord maldoc: yet another place to hide a command
2018-12-01Didier StevensWireshark update 2.6.5 available
2018-11-30Remco VerhoefCoinMiners searching for hosts
2018-11-29Brad DuncanRussian language malspam pushing Shade (Troldesh) ransomware
2018-11-27Xavier MertensMore obfuscated shell scripts: Fake MacOS Flash update
2018-11-27Rob VandenBrinkData Exfiltration in Penetration Tests
2018-11-26Russ McReeViperMonkey: VBA maldoc deobfuscation
2018-11-26Xavier MertensObfuscated bash script targeting QNap boxes
2018-11-22Xavier MertensDivided Payload in Multiple Pasties
2018-11-20Xavier MertensQuerying DShield from Cortex
2018-11-20Xavier MertensVMware Affected by Dell EMC Avamar Vulnerability
2018-11-19Xavier MertensThe Challenge of Managing Your Digital Library
2018-11-18Guy BruneauMultipurpose PCAP Analysis Tool
2018-11-17Xavier MertensQuickly Investigating Websites with Lookyloo
2018-11-16Xavier MertensBasic Obfuscation With Permissive Languages
2018-11-15Brad DuncanEmotet infection with IcedID banking Trojan
2018-11-14Brad DuncanDay in the life of a researcher: Finding a wave of Trickbot malspam
2018-11-13Johannes UllrichNovember 2018 Microsoft Patch Tuesday
2018-11-12Rick WannerUsing the Neutrino ip-blocklist API to test general badness of an IP
2018-11-11Pasquale StirparoCommunity contribution: joining forces or multiply solutions?
2018-11-10Didier StevensVideo: CyberChef: BASE64/XOR Recipe
2018-11-06Xavier MertensMalicious Powershell Script Dissection
2018-11-05Johannes UllrichStruts 2.3 Vulnerable to Two Year old File Upload Flaw
2018-11-04Pasquale StirparoBeyond good ol' LaunchAgent - part 1
2018-10-30Brad DuncanCampaign evolution: Hancitor malspam starts pushing Ursnif this week
2018-10-26Xavier MertensDissecting Malicious Office Documents with Linux
2018-10-23Xavier MertensDiving into Malicious AutoIT Code
2018-10-22Xavier MertensMalicious Powershell using a Decoy Picture
2018-10-21Didier StevensMSG Files: Compressed RTF
2018-10-21Pasquale StirparoBeyond good ol’ LaunchAgent - part 0
2018-10-18Russ McReeCisco Security Advisories 17 OCT 2018
2018-10-17Russ McReeVMSA-2018-0026 VMware ESXi, Workstation & Fusion updates address out-of-bounds read vulnerability https://www.vmware.com/security/advisories/VMSA-2018-0026.html
2018-10-17Russ McReeRedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence
2018-10-16Didier StevensCyberChef: BASE64/XOR Recipe
2018-10-13Didier StevensMaldoc: Once More It's XOR
2018-10-12Xavier MertensMore Equation Editor Exploit Waves
2018-10-10Xavier MertensNew Campaign Using Old Equation Editor Vulnerability
2018-10-09Johannes UllrichOctober 2018 Microsoft Patch Tuesday
2018-10-08Guy BruneauApple Security Updates
2018-10-08Guy BruneauLatest Release of rockNSM 2.1
2018-10-07Didier StevensYARA XOR Strings: Some Remarks
2018-10-06Didier StevensYARA: XOR Strings
2018-10-05Jim ClausingA strange spam
2018-10-01Didier StevensDecoding Custom Substitution Encodings with translate.py
2018-10-01Didier StevensDeveloping YARA Rules: a Practical Example
2018-09-30Didier StevensWhen DOSfuscation Helps...
2018-09-28Xavier MertensMore Excel DDE Code Injection
2018-09-26Brad DuncanOne Emotet infection leads to three follow-up malware infections
2018-09-24Didier StevensAnalyzing Encoded Shellcode with scdbg
2018-09-22Didier StevensSuspicious DNS Requests ... Issued by a Firewall
2018-09-20Xavier MertensHunting for Suspicious Processes with OSSEC
2018-09-19Rob VandenBrinkCertificates Revisited - SSL VPN Certificates 2 Ways
2018-09-18Rob VandenBrinkUsing Certificate Transparency as an Attack / Defense Tool
2018-09-16Didier Stevens20/20 malware vision
2018-09-13Xavier MertensMalware Delivered Through MHT Files
2018-09-11Johannes UllrichMicrosoft September Patch Tuesday Summary
2018-09-07Xavier MertensCrypto Mining in a Windows Headless Browser
2018-09-05Rob VandenBrinkWhere have all my Certificates gone? (And when do they expire?)
2018-09-05Xavier MertensMalicious PowerShell Compiling C# Code on the Fly
2018-09-04Rob VandenBrinkLet's Trade: You Read My Email, I'll Read Your Password!
2018-08-31Jim ClausingQuickie: Using radare2 to disassemble shellcode
2018-08-30Xavier MertensCrypto Mining Is More Popular Than Ever!
2018-08-29Xavier Mertens3D Printers in The Wild, What Can Go Wrong?
2018-08-26Didier StevensIdentifying numeric obfuscation
2018-08-26Didier Stevens"When was this machine infected?"
2018-08-25Didier StevensMicrosoft Publisher malware: static analysis
2018-08-24Xavier MertensMicrosoft Publisher Files Delivering Malware
2018-08-23Xavier MertensSimple Phishing Through formcrafts.com
2018-08-22Deborah HaleEmail/password Frustration
2018-08-21Xavier MertensMalicious DLL Loaded Through AutoIT
2018-08-20Didier StevensOpenSSH user enumeration (CVE-2018-15473)
2018-08-15Brad DuncanMore malspam pushing password-protected Word docs for AZORult and Hermes Ransomware
2018-08-15Xavier MertensTruncating Payloads and Anonymizing PCAP files
2018-08-13Didier StevensNew Extortion Tricks: Now Including Your (Partial) Phone Number!
2018-08-12Didier StevensA URL shortener handy for phishers
2018-08-06Didier StevensNumeric obfuscation: another example
2018-08-04Didier StevensDealing with numeric obfuscation in malicious scripts
2018-08-02Brad DuncanDHL-themed malspam reveals embedded malware in animated gif
2018-08-01Johannes UllrichWhen Cameras and Routers attack Phones. Spike in CVE-2014-8361 Exploits Against Port 52869
2018-07-30Didier StevensMalicious Word documents using DOSfuscation
2018-07-30Xavier MertensExploiting the Power of Curl
2018-07-29Guy BruneauUsing RITA for Threat Analysis
2018-07-27Brad DuncanMalspam with password-protected Word docs pushes Hermes ransomware
2018-07-26Xavier MertensWindows Batch File Deobfuscation
2018-07-24Brad DuncanRecent Emotet activity
2018-07-24Tom WebbCell Phone Monitoring. Who is Watching the Watchers?
2018-07-17Xavier MertensSearching for Geographically Improbable Login Attempts
2018-07-17Scott FendleyOracle Critical Patch Update Release
2018-07-13Xavier MertensCryptominer Delivered Though Compromized JavaScript File
2018-07-12Johannes UllrichNew Extortion Tricks: Now Including Your Password!
2018-07-09Renato MarinhoCriminals Don't Read Instructions or Use Strong Passwords
2018-07-03Didier StevensProgress indication for scripts on Windows
2018-07-02Guy BruneauVMware ESXi, Workstation, and Fusion address multiple out-of-bounds read vulnerabilities https://www.vmware.com/security/advisories/VMSA-2018-0016.html
2018-06-29Remco VerhoefCrypto community target of MacOS malware
2018-06-27Renato MarinhoSilently Profiling Unknown Malware Samples
2018-06-25Didier StevensGuilty by association
2018-06-23Russell EubanksCreative Hiring From Non-Traditional Places
2018-06-22Lorna HutchesonXPS Attachment Used for Phishing
2018-06-21Xavier MertensAre Your Hunting Rules Still Working?
2018-06-19Xavier MertensPowerShell: ScriptBlock Logging... Or Not?
2018-06-18Xavier MertensMalicious JavaScript Targeting Mobile Browsers
2018-06-17Didier StevensEncrypted Office Documents
2018-06-16Russ McReeAnomaly Detection & Threat Hunting with Anomalize
2018-06-15Lorna HutchesonSMTP Strangeness - Possible C2
2018-06-13Remco VerhoefFrom Microtik with Love
2018-06-13Xavier MertensA Bunch of Compromized Wordpress Sites
2018-06-12Johannes UllrichMicrosoft June 2018 Patch Tuesday
2018-06-07Remco VerhoefAutomated twitter loot collection
2018-06-06Xavier MertensConverting PCAP Web Traffic to Apache Log
2018-06-05Xavier MertensMalicious Post-Exploitation Batch File
2018-06-04Rob VandenBrinkDigging into Authenticode Certificates
2018-06-01Remco VerhoefBinary analysis with Radare2
2018-05-30Bojan ZdrnjaThe end of the lock icon
2018-05-28Kevin ListonDo you hear Laurel or Yanny or is it On-Off Keying?
2018-05-27Guy BruneauCapture and Analysis of User Agents
2018-05-25Xavier MertensAntivirus Evasion? Easy as 1,2,3
2018-05-24Xavier Mertens"Blocked" Does Not Mean "Forget It"
2018-05-22Guy BruneauVMware updates enable Hypervisor-Assisted Guest Mitigations for Speculative Store Bypass issue - https://www.vmware.com/security/advisories/VMSA-2018-0012.html
2018-05-22Xavier MertensMalware Distributed via .slk Files
2018-05-22Xavier MertensVMware Workstation and Fusion updates address signature bypass and multiple denial-of-service vulnerabilities https://www.vmware.com/security/advisories/VMSA-2018-0013.html
2018-05-20Didier StevensDASAN GPON home routers exploits in-the-wild
2018-05-19Xavier MertensMalicious Powershell Targeting UK Bank Customers
2018-05-16Mark HofmanEFAIL, a weakness in openPGP and S\MIME
2018-05-10Bojan ZdrnjaExfiltrating data from (very) isolated environments
2018-05-09Xavier MertensNice Phishing Sample Delivering Trickbot
2018-05-07Xavier MertensAdding Persistence Via Scheduled Tasks
2018-05-06Guy BruneauScans Attempting to use PowerShell to Download PHP Script
2018-05-03Renato MarinhoWebLogic Exploited in the Wild (Again)
2018-05-01Xavier MertensDiving into a Simple Maldoc Generator
2018-04-30Remco VerhoefAnother approach to webapplication fingerprinting
2018-04-28Rick WannerMicrosoft Security Update for Spectre V2
2018-04-27Tom WebbMore Threat Hunting with User Agent and Drupal Exploits
2018-04-25Johannes UllrichYet Another Drupal RCE Vulnerability
2018-03-11Guy BruneaurockNSM Configuration & Installation Steps http://handlers.sans.org/gbruneau/rockNSM%20as%20an%20Incident%20Response%20Package.htm
2018-03-08Xavier MertensCRIMEB4NK IRC Bot
2018-03-06Mark HofmanThe joys of changing Privacy Laws
2018-03-05Xavier MertensMalicious Bash Script with Multiple Features
2018-03-04Xavier MertensThe Crypto Miners Fight For CPU Cycles
2018-03-03Xavier MertensReminder: Beware of the "Cloud"
2018-03-01Johannes UllrichWhy Does Emperor Xi Dislike Winnie the Pooh and Scrambled Eggs?
2018-02-25Guy BruneauBlackhole Advertising Sites with Pi-hole
2018-02-25Didier StevensRetrieving malware over Tor on Windows
2018-02-02Xavier MertensSimple but Effective Malicious XLS Sheet
2018-01-30Kevin ListonUsing FLIR in Incident Response?
2018-01-29Didier StevensComment your Packet Captures - Extra!
2018-01-28Didier StevensIs this a pentest?
2018-01-26Xavier MertensInvestigating Microsoft BITS Activity
2018-01-25Xavier MertensRansomware as a Service
2018-01-23John BambenekLife after GDPR: Implications for Cybersecurity
2018-01-22Didier StevensHTTPS on every port?
2018-01-20Didier StevensAn RTF phish
2018-01-18Xavier MertensComment your Packet Captures!
2018-01-13Rick WannerFlaw in Intel's Active Management Technology (AMT)
2018-01-12Bojan ZdrnjaThose pesky registry keys required by critical security patches
2018-01-11Xavier MertensMining or Nothing!
2018-01-10Russ McReeGitHub InfoSec Threepeat: HELK, ptf, and VulnWhisperer
2018-01-09Jim ClausingWhat is going on with port 3333?
2018-01-09Jim ClausingAre you watching for brute force attacks on IPv6?
2018-01-08Bojan ZdrnjaMeltdown and Spectre: clearing up the confusion
2018-01-03John BambenekPhishing to Rural America Leads to Six-figure Wire Fraud Losses
2018-01-01Didier StevensWhat is new?
2017-12-30Xavier Mertens2017, The Flood of CVEs
2017-12-27Guy BruneauWhat are your Security Challenges for 2018?
2017-12-25Didier StevensDealing with obfuscated RTF files
2017-12-24Didier StevensPDF documents & URLs: update
2017-12-23Didier StevensEncrypted PDFs
2017-12-20Richard PorterVMWare Security Advisory: VMSA-2017-0021: https://www.vmware.com/security/advisories/VMSA-2017-0021.html
2017-12-19Xavier MertensExample of 'MouseOver' Link in a Powerpoint File
2017-12-16Xavier MertensMicrosoft Office VBA Macro Obfuscation via Metadata
2017-12-14Russ McReeSecurity Planner: Improve your online safety
2017-12-14Russ McReeDetection Lab: Visibility & Introspection for Defenders
2017-12-13Xavier MertensTracking Newly Registered Domains
2017-12-12Johannes UllrichDecember Microsoft Patch Tuesday Summary
2017-12-09Didier StevensSometimes it's a dud
2017-12-05Tom WebbIR using the Hive Project.
2017-12-03Xavier MertensStartSSL: Termination of Services is Now Scheduled
2017-12-02Xavier MertensUsing Bad Material for the Good
2017-11-29Xavier MertensFileless Malicious PowerShell Sample
2017-11-28Xavier MertensApple High Sierra Uses a Passwordless Root Account
2017-11-25Guy BruneauBenefits associated with the use of Open Source Software
2017-11-25Guy BruneauExim Remote Code Exploit
2017-11-23Xavier MertensProactive Malicious Domain Search
2017-11-17Xavier MertensTop-100 Malicious IP STIX Feed
2017-11-16Xavier MertensSuspicious Domains Tracking Dashboard
2017-11-15Xavier MertensIf you want something done right, do it yourself!
2017-11-13Guy Bruneaujsonrpc Scanning for root account
2017-11-13Guy BruneauVBE Embeded Script (info.zip)
2017-11-11Xavier MertensKeep An Eye on your Root Certificates
2017-11-07Xavier MertensInteresting VBA Dropper
2017-11-03Xavier MertensSimple Analysis of an Obfuscated JAR File
2017-11-01Rob VandenBrinkSecuring SSH Services - Go Blue Team!!
2017-10-31Xavier MertensSome Powershell Malicious Code
2017-10-30Johannes UllrichCritical Patch For Oracle's Identity Manager
2017-10-29Didier StevensRemember ACE files?
2017-10-27Renato Marinho"Catch-All" Google Chrome Malicious Extension Steals All Posted Data
2017-10-25Mark HofmanDUHK attack, continuing a week of named issues
2017-10-24Xavier MertensStop relying on file extensions
2017-10-24Xavier MertensBadRabbit: New ransomware wave hitting RU & UA
2017-10-20Rick WannerCisco fixes for KRACKs not complete
2017-10-17Brad DuncanHancitor malspam uses DDE attack
2017-10-16Johannes UllrichWPA2 "KRACK" Attack
2017-10-15Didier StevensPeeking into .msg files
2017-10-12Xavier MertensVersion control tools aren't only for Developers
2017-10-06Johannes UllrichWhat's in a cable? The dangers of unauthorized cables
2017-10-05Johannes Ullrichpcap2curl: Turning a pcap file into a set of cURL commands for "replay"
2017-10-03Brad DuncanMalspam pushing Formbook info stealer
2017-10-02Xavier MertensInvestigating Security Incidents with Passive DNS
2017-09-30Lorna HutchesonWho's Borrowing your Resources?
2017-09-28Xavier MertensThe easy way to analyze huge amounts of PCAP data
2017-09-25Renato MarinhoXPCTRA Malware Steals Banking and Digital Wallet User's Credentials
2017-09-24Jim ClausingForensic use of mount --bind
2017-09-22Russell EubanksWhat is the State of Your Union?
2017-09-20Renato MarinhoOngoing Ykcol (Locky) campaign
2017-09-19Jim ClausingNew tool: mac-robber.py
2017-09-18Xavier MertensCCleaner 5.33 compromised - http://www.piriform.com/news/release-announcements/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users
2017-09-18Johannes UllrichSANS Securingthehuman posted a follow up to their Equifax breach webcast: https://securingthehuman.sans.org/blog/2017/09/15/equifax-webcast-follow-up
2017-09-18Xavier MertensGetting some intelligence from malspam
2017-09-17Guy BruneaurockNSM as a Incident Response Package
2017-09-16Guy BruneauVMware ESXi, vCenter Server, Fusion and Workstation updates resolve multiple security vulnerabilities - https://www.vmware.com/security/advisories/VMSA-2017-0015.html
2017-09-14Xavier MertensAnother webshell, another backdoor!
2017-09-13Rob VandenBrinkSysinternals Update: Sysmon v6.10, Process Monitor v3.40, Autoruns v13.80, AccessChk v6.11 - https://blogs.technet.microsoft.com/sysinternals/2017/09/12/sysinternals-update-sysmon-v6-1-process-monitor-v3-4-autoruns-v13-8-accesschk-v6-11/
2017-09-11Russ McReeWindows Auditing with WINspect
2017-09-09Didier StevensMalware analysis output sanitization
2017-09-08Adrien de BeaupreYASRV (Yet Another Struts RCE Vulnerability) yes a different one from yesterday
2017-09-05Johannes UllrichThe Mirai Botnet: A Look Back and Ahead At What's Next
2017-09-05Adrien de BeaupreStruts vulnerability patch released by apache, patch now
2017-09-02Xavier MertensAutoIT based malware back in the wild
2017-09-01Brad DuncanMalspam pushing Locky ransomware tries HoeflerText notifications for Chrome and FireFox
2017-08-29Renato MarinhoSecond Google Chrome Extension Banker Malware in Two Weeks
2017-08-28Johannes UllrichAn Update On DVR Malware: A DVR Torture Chamber
2017-08-26Didier StevensMalware analysis: searching for dots
2017-08-25Xavier MertensMalicious AutoIT script delivered in a self-extracting RAR file
2017-08-23Xavier MertensMalicious script dropping an executable signed by Avast?
2017-08-22Xavier MertensDefang all the things!
2017-08-20Didier StevensIt's Not An Invoice ...
2017-08-18Guy Bruneautshark 2.4 New Feature - Command Line Export Objects
2017-08-18Renato MarinhoEngineBox Malware Supports 10+ Brazilian Banks
2017-08-17Xavier MertensMaldoc with auto-updated link
2017-08-15Brad DuncanMalspam pushing Trickbot banking Trojan
2017-08-15Renato Marinho(Banker(GoogleChromeExtension)).targeting("Brazil")
2017-08-13Didier StevensThe Good Phishing Email
2017-08-10Didier StevensMaldoc Analysis with ViperMonkey
2017-08-07Xavier MertensIncrease of phpMyAdmin scans
2017-08-03Johannes UllrichUsing a Raspberry Pi honeypot to contribute data to DShield/ISC
2017-08-01Rob VandenBrinkRooting Out Hosts that Support Older Samba Versions
2017-07-30Renato MarinhoSMBLoris - the new SMB flaw
2017-07-30Guy BruneauText Banking Scams
2017-07-24Russell EubanksTrends Over Time
2017-07-24Renato MarinhoUber drivers new threat: the "passenger"
2017-07-21Didier StevensMalicious .iso Attachments
2017-07-19Xavier MertensBots Searching for Keys & Config Files
2017-07-18Bojan ZdrnjaInvestigation of BitTorrent Sync (v.2.0) as a P2P Cloud Service (Part 4 ? Windows Thumbnail Cache, Registry, Prefetch Files, and Link Files artefacts)
2017-07-16Renato MarinhoSMS Phishing induces victims to photograph its own token card
2017-07-14Brad DuncanNemucodAES and the malspam that distributes it
2017-07-13Bojan ZdrnjaInvestigation of BitTorrent Sync (v.2.0) as a P2P Cloud Service (Part 3 ? Physical Memory artefacts)
2017-07-12Xavier MertensBackup Scripts, the FIM of the Poor
2017-07-11Renato MarinhoJuly's Microsoft Patch Tuesday
2017-07-09Russ McReeAdversary hunting with SOF-ELK
2017-07-08Xavier MertensA VBScript with Obfuscated Base64 Data
2017-07-07Renato MarinhoDDoS Extortion E-mail: Yet Another Bluff?
2017-07-05Didier StevensSelecting domains with random names
2017-07-01Rick WannerUsing nmap to scan for MS17-010 (CVE-2017-0143 EternalBlue)
2017-06-28Brad DuncanPetya? I hardly know ya! - an ISC update on the 2017-06-27 ransomware outbreak
2017-06-28Brad DuncanCatching up with Blank Slate: a malspam campaign still going strong
2017-06-22Xavier MertensObfuscating without XOR
2017-06-17Guy BruneauMapping Use Cases to Logs. Which Logs are the Most Important to Collect?
2017-06-16Lorna HutchesonWhat is going on with Port 83?
2017-06-15Bojan ZdrnjaUberscammers
2017-06-10Russell EubanksAn Occasional Look in the Rear View Mirror
2017-06-08Tom WebbSummer STEM for Kids
2017-06-07Johannes UllrichDeceptive Advertisements: What they do and where they come from
2017-06-06Didier StevensMalware and XOR - Part 2
2017-06-05Didier StevensMalware and XOR - Part 1
2017-06-01Xavier MertensSharing Private Data with Webcast Invitations
2017-05-31Pasquale StirparoAnalysis of Competing Hypotheses, WCry and Lazarus (ACH part 2)
2017-05-30Johannes UllrichFreeRadius Authentication Bypass
2017-05-28Pasquale StirparoAnalysis of Competing Hypotheses (ACH part 1)
2017-05-28Guy BruneauCyberChef a Must Have Tool in your Tool bag!
2017-05-25Xavier MertensCritical Vulnerability in Samba from 3.5.0 onwards
2017-05-24Brad DuncanJaff ransomware gets a makeover
2017-05-23Rob VandenBrinkWhat did we Learn from WannaCry? - Oh Wait, We Already Knew That!
2017-05-18Xavier MertensMy Little CVE Bot
2017-05-17Richard PorterWait What? We don?t have to change passwords every 90 days?
2017-05-16Russ McReeWannaCry? Do your own data analysis.
2017-05-13Guy BruneauMicrosoft Released Guidance for WannaCrypt
2017-05-13Guy BruneauHas anyone Tested WannaCry Killswitch? - https://blog.didierstevens.com/2017/05/13/quickpost-wcry-killswitch-check-is-not-proxy-aware/
2017-05-12Xavier MertensWhen Bad Guys are Pwning Bad Guys...
2017-05-12Xavier MertensMassive wave of ransomware ongoing
2017-05-10Johannes UllrichRead This If You Are Using a Script to Pull Data From This Site
2017-05-08Renato MarinhoExploring a P2P Transient Botnet - From Discovery to Enumeration
2017-05-06Xavier MertensThe story of the CFO and CEO...
2017-05-06Russell EubanksWhat Can You Learn On Your Own?
2017-05-05Xavier MertensHTTP Headers... the Achilles' heel of many applications
2017-05-03Bojan ZdrnjaPowershelling with exploits
2017-05-02Richard PorterDo you have Intel AMT? Then you have a problem today! Intel Active Management Technology INTEL-SA-00075
2017-04-28Russell EubanksKNOW before NO
2017-04-28Xavier MertensAnother Day, Another Obfuscation Technique
2017-04-27Johannes UllrichBGP Hijacking: The Internet is Still/Again Broken
2017-04-26Johannes UllrichIf there are some unexploited MSSQL Servers With Weak Passwords Left: They got you now (again)
2017-04-23Didier StevensMalicious Documents: A Bit Of News
2017-04-22Jim ClausingWTF tcp port 81
2017-04-20Xavier MertensDNS Query Length... Because Size Does Matter
2017-04-19Xavier MertensHunting for Malicious Excel Sheets
2017-04-14Rick WannerWireshark 2.2.6 available -> https://www.wireshark.org/docs/relnotes/wireshark-2.2.6.html
2017-04-13Rob VandenBrinkPacket Captures Filtered by Process
2017-04-12Brad DuncanMalspam on 2017-04-11 pushes yet another ransomware variant
2017-04-11Brad DuncanDridex malspam seen on Monday 2017-04-10
2017-04-10Didier StevensPassword History: Insights Shared by a Reader
2017-04-07Xavier MertensTracking Website Defacers with HTTP Referers
2017-04-05Xavier MertensWhitelists: The Holy Grail of Attackers
2017-04-02Guy BruneauIPFire - A Household Multipurpose Security Gateway
2017-03-30Xavier MertensDiverting built-in features for the bad
2017-03-29Xavier MertensCritical VMware vulnerabilities disclosed
2017-03-25Russell EubanksDistraction as a Service
2017-03-24Xavier MertensNicely Obfuscated JavaScript Sample
2017-03-19Xavier MertensSearching for Base64-encoded PE Files
2017-03-18Xavier MertensExample of Multiple Stages Dropper
2017-03-15Xavier MertensRetro Hunting!
2017-03-14Johannes UllrichFebruary and March Microsoft Patch Tuesday
2017-03-12Guy BruneauHoneypot Logs and Tracking a VBE Script
2017-03-11Russell EubanksWhat's On Your Not To Do List?
2017-03-10Xavier MertensThe Side Effect of GeoIP Filters
2017-03-08Xavier MertensNot All Malware Samples Are Complex
2017-03-08Richard PorterWhat is really being proxied?
2017-03-04Xavier MertensHow your pictures may affect your website reputation
2017-03-03Lorna HutchesonBitTorrent or Something Else?
2017-03-01Bojan ZdrnjaSSL/TLS on port 389. Say what?
2017-02-28Xavier MertensAnalysis of a Simple PHP Backdoor
2017-02-26Guy BruneauIt is Tax Season - Watch out for Suspicious Attachment
2017-02-24Rick WannerCloudflare data leak...what does it mean to me?
2017-02-17Rob VandenBrinkRTRBK - Router / Switch / Firewall Backups in PowerShell (tool drop)
2017-02-15Xavier MertensHow was your stay at the Hotel La Playa?
2017-02-14Johannes UllrichMicrosoft Patch Tuesday Delayed
2017-02-13Rob VandenBrinkStuff I Learned Decrypting
2017-02-12Xavier MertensAnalysis of a Suspicious Piece of JavaScript
2017-02-10Brad DuncanHancitor/Pony malspam
2017-02-09Brad DuncanCryptoShield Ransomware from Rig EK
2017-02-07Johannes UllrichMy Password is [taco] Using Emojis for Stronger Passwords
2017-02-05Xavier MertensMany Malware Samples Found on Pastebin
2017-02-04Xavier MertensDetecting Undisclosed Vulnerabilities with Security Tools & Features
2017-02-03Lorna HutchesonCisco - Issue with Clock Signal Component
2017-02-02Rick WannerMultiple vulnerabilities discovered in popular printer models
2017-01-31Johannes UllrichVMWare Security Advisory for AirWatch http://www.vmware.com/security/advisories/VMSA-2017-0001.html
2017-01-31Johannes UllrichMalicious Office files using fileless UAC bypass to drop KEYBASE malware
2017-01-30Didier Stevenspy2exe Decompiling - Part 2
2017-01-28Guy BruneauRequest for Packets and Logs - TCP 5358
2017-01-26Xavier MertensIOC's: Risks of False Positive Alerts Flood Ahead
2017-01-24Johannes UllrichCritical Vulnerability in Cisco WebEx Chrome Plugin
2017-01-24Xavier MertensMalicious SVG Files in the Wild
2017-01-18Rob VandenBrinkMaking Windows 10 a bit less "Creepy" - Common Privacy Settings
2017-01-13Xavier MertensWho's Attacking Me?
2017-01-12Mark BaggettSome tools updates
2017-01-12Mark BaggettSystem Resource Utilization Monitor
2017-01-11Johannes UllrichJanuary 2017 Edition of Ouch! Security Awareness Newsletter Released: https://securingthehuman.sans.org/ouch
2017-01-10Johannes UllrichRealtors Be Aware: You Are a Target
2017-01-10Johannes UllrichPort 37777 "MapTable" Requests
2017-01-06John BambenekGreat Misadventures of Security Vendors: Absurd Sandboxing Edition
2017-01-06John BambenekRansomware Operators Cold Calling UK Schools to Get Malware Through
2017-01-05John BambenekNew Year's Resolution: Build Your Own Malware Lab?
2017-01-01Didier Stevenspy2exe Decompiling - Part 1
2016-12-29Rick WannerMore on Protocol 47 denys
2016-12-29Rick WannerIncrease in Protocol 47 denys
2016-12-27Guy BruneauUsing daemonlogger as a Software Tap
2016-12-26Russ McReeCritical security update: PHPMailer 5.2.20 (CVE-2016-10045)
2016-12-19John BambenekUPDATED x1: Mirai Scanning for Port 6789 Looking for New Victims / Now hitting tcp/23231
2016-12-13Xavier MertensUAC Bypass in JScript Dropper
2016-12-11Russ McReeSteganography in Action: Image Steganography & StegExpose
2016-12-09Rick WannerMirai - now with DGA
2016-12-07Xavier MertensThe Passwords You Should Never Use
2016-12-05Didier StevensHancitor Maldoc Videos
2016-12-02Rob VandenBrinkProtecting Powershell Credentials (NOT)
2016-11-27Russ McReeScapy vs. CozyDuke
2016-11-25Xavier MertensFree Software Quick Security Checklist
2016-11-23Tom WebbVmware Patches VMSA-2016-0005.5, VMSA-2016-0018.3 and VMSA-2016-0021
2016-11-23Tom WebbMapping Attack Methodology to Controls
2016-11-22Didier StevensUpdate:ZIP With Comment
2016-11-20Pasquale StirparoHow many “Epoch” times? Epocalypse.py timestamp converter
2016-11-18Brad DuncanWireshark update: version 2.2.2 (stable release) and 2.0.8 (old stable release) - https://www.wireshark.org/download.html
2016-11-13Guy BruneauBitcoin Miner File Upload via FTP
2016-11-11Rick WannerBenevolent malware? reincarna/Linux.Wifatch
2016-11-05Xavier MertensFull Packet Capture for Dummies
2016-11-02Rob VandenBrinkWhat Does a Pentest Look Like?
2016-10-31Russ McReeSEC505 DFIR capture script: snapshot.ps1
2016-10-30Pasquale StirparoVolatility Bot: Automated Memory Analysis
2016-10-26Johannes UllrichNew VMWare Security Advisory: VMSA-2016-0017 Information Disclosure in VMWare Fusion and VMWare Tools https://www.vmware.com/security/advisories/VMSA-2016-0017.html
2016-10-26Johannes UllrichCritical Flash Player Update APSB16-36
2016-10-25Xavier MertensAnother Day, Another Spam...
2016-10-23Johannes UllrichISC Briefing: Large DDoS Attack Against Dyn
2016-10-19Xavier MertensSpam Delivered via .ICS Files
2016-10-13Jim ClausingNew tool: docker-mount.py
2016-10-11Xavier MertensWiFi Still Remains a Good Attack Vector
2016-10-10Didier StevensRadare2: rahash2
2016-10-08Russell EubanksUnauthorized Change Detected!
2016-10-07Rick WannerFirst Hurricane Matthew related Phish
2016-10-02Guy BruneauIs there an Infosec Cybersecurity Talent Shortage?
2016-09-30Xavier MertensAnother Day, Another Malicious Behaviour
2016-09-28Xavier MertensSNMP Pwn3ge
2016-09-25Pasquale StirparoDefining Threat Intelligence Requirements
2016-09-22Rick WannerYAHDD! (Yet another HUGE data Breach!)
2016-09-17Guy BruneauMultiple Cisco Products affected by IKEv1 Vulnerability
2016-09-15Xavier MertensIn Need of a OTP Manager Soon?
2016-09-13Rob VandenBrinkIf it's Free, YOU are the Product
2016-09-13Rob VandenBrinkMicrosoft Patch Tuesday Analysis
2016-09-09Xavier MertensCollecting Users Credentials from Locked Devices
2016-09-05Xavier MertensMalware Delivered via '.pub' Files
2016-09-04Russ McReeKali Linux 2016.2 Release: https://www.kali.org/news/kali-linux-20162-release/
2016-09-02Johannes UllrichApple Patches "Trident" Vulnerabilities in OS X / Safari
2016-09-01Xavier MertensMaxmind.com (Ab)used As Anti-Analysis Technique
2016-08-31Deborah HaleDropbox Breach
2016-08-31Deborah HaleCisco Security Advisories Issued
2016-08-31Deborah HaleAngler Exploit Kits Reported
2016-08-29Russ McReeRecommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
2016-08-28Guy BruneauSpam with Obfuscated Javascript
2016-08-25Xavier MertensOut-of-Band iOS Patch Fixes 0-Day Vulnerabilities
2016-08-24Tom WebbStay on Track During IR
2016-08-24Xavier MertensExample of Targeted Attack Through a Proxy PAC File
2016-08-23Xavier MertensVoice Message Notifications Deliver Ransomware
2016-08-22Russ McReeRed Team Tools Updates: hashcat and SpiderFoot
2016-08-21Rick WannerCisco ASA SNMP Remote Code Execution Vulnerability
2016-08-20Russell EubanksWhat are YOU doing to give back to the security community?
2016-08-19Xavier MertensData Classification For the Masses
2016-08-14Guy BruneauvRealize Log Insight directory traversal vulnerability - http://www.vmware.com/security/advisories/VMSA-2016-0011.html
2016-08-11Pasquale StirparoLooking for the insider: Forensic Artifacts on iOS Messaging App
2016-08-06Didier Stevensrtfdump
2016-08-01Daniel WesemannAre you getting I-CANNED ?
2016-07-31Pasquale StirparoSharing (intel) is caring... or not?
2016-07-30Didier Stevensrtfobj
2016-07-29Didier StevensMalicious RTF Files
2016-07-28Bojan ZdrnjaVerifying SSL/TLS certificates manually
2016-07-27Xavier MertensAnalyze of a Linux botnet client source code
2016-07-27Xavier MertensCritical Xen PV guests vulnerabilities
2016-07-26Johannes UllrichCommand and Control Channels Using "AAAA" DNS Records
2016-07-25Didier StevensPython Malware - Part 4
2016-07-21Didier StevensPractice ntds.dit File
2016-07-16Didier StevensPython Malware - Part 3
2016-07-15Xavier MertensName All the Things!
2016-07-13Xavier MertensDrupal: Patch released today to fix a highly critical RCE in contributed modules
2016-07-12Johannes UllrichMicrosoft Patch Tuesday Summary for July 2016
2016-07-12Xavier MertensHunting for Malicious Files with MISP + OSSEC
2016-07-08Mark HofmanMalware being distributed pretending to be from AU Fedcourts
2016-07-03Guy BruneauIs Data Privacy part of your Company's Culture?
2016-06-29Xavier MertensPhishing Campaign with Blurred Images
2016-06-26Rick WannerBart - a new Ransomware
2016-06-23Russell EubanksAn Approach to Vulnerability Management
2016-06-22Bojan ZdrnjaSecurity through obscurity never works
2016-06-20Xavier MertensUsing Your Password Manager to Monitor Data Leaks
2016-06-20Xavier MertensOngoing Spam Campaign Related to Swift
2016-06-18Rob VandenBrinkControlling JavaScript Malware Before it Runs
2016-06-15Richard PorterWarp Speed Ahead, L7 Open Source Packet Generator: Warp17
2016-06-12Guy BruneauDNS Sinkhole ISO Version 2.0
2016-06-09Xavier MertensOffensive or Defensive Security? Both!
2016-06-03Tom ListonMySQL is YourSQL
2016-06-01Xavier MertensDocker Containers Logging
2016-05-28Russell EubanksApplied Lessons Learned
2016-05-26Xavier MertensKeeping an Eye on Tor Traffic
2016-05-25Rick WannerVMWare Security Advisories
2016-05-22Pasquale StirparoThe strange case of WinZip MRU Registry key
2016-05-21Didier StevensPython Malware - Part 2
2016-05-19Rick WannerTeslaCrypt closes down...Releases master decryption key
2016-05-18Russ McReeResources: Windows Auditing & Monitoring, Linux 2FA
2016-05-16Rick WannerAn oldie but a goodie - 419 Death Scam
2016-05-15Didier StevensPython Malware - Part 1
2016-05-14Guy BruneauINetSim as a Basic Honeypot
2016-05-13Xavier MertensMISP - Malware Information Sharing Platform
2016-05-12Xavier MertensAdobe Released Updates to Fix Critical Vulnerability
2016-05-05Xavier MertensMicrosoft BITS Used to Download Payloads
2016-05-02Rick WannerFake Chrome update for Android
2016-05-02Rick WannerLean Threat Intelligence
2016-04-29Rob VandenBrinkSysinternals Updated today - Updates to Sysmon, Procdump and Sigcheck. https://blogs.technet.microsoft.com/sysinternals/2016/04/28/update-sysmon-v4-procdump-v8-sigcheck-v2-51/
2016-04-28Rob VandenBrinkDNS and DHCP Recon using Powershell
2016-04-27Tom WebbKippos Cousin Cowrie
2016-04-25Guy BruneauHighlights from the 2016 HPE Annual Cyber Threat Report
2016-04-21Daniel WesemannDecoding Pseudo-Darkleech (#1)
2016-04-21Daniel WesemannDecoding Pseudo-Darkleech (Part #2)
2016-04-15Xavier MertensWindows Command Line Persistence?
2016-04-11John BambenekTool Released to Decrypt Petya Ransomware Infected Disks
2016-04-10Didier StevensHandling Malware Samples
2016-04-02Russell EubanksWhy Can't We Be Friends?
2016-04-01John BambenekTips for Stopping Ransomware
2016-03-30Xavier MertensWhat to watch with your FIM?
2016-03-28Xavier MertensImproving Bash Forensics Capabilities
2016-03-23Bojan ZdrnjaAbusing Oracles
2016-03-15Xavier MertensDockerized DShield SSH Honeypot
2016-03-13Xavier MertensSSH Honeypots (Ab)used as Proxy
2016-03-13Guy BruneauA Look at the Mandiant M-Trends 2016 Report
2016-03-11Jim ClausingForensicating Docker, Part 1
2016-03-09Rob VandenBrinkA Wall Against Cryptowall? Some Tips for Preventing Ransomware
2016-03-08Rick WannerCritical Adobe Updates - March 2016
2016-03-07Xavier MertensAnother Malicious Document, Another Way to Deliver Malicious Code
2016-03-07Xavier MertensOSX Ransomware Spread via a Rogue BitTorrent Client Installer
2016-03-06Jim ClausingNovel method for slowing down Locky on Samba server using fail2ban
2016-02-28Guy BruneauRFC 6598 - Carrier Grade NAT
2016-02-27Guy BruneauWireshark Fixes Several Bugs and Vulnerabilities
2016-02-27Guy BruneauOpenSSL Security Update Planned for 1 March Release
2016-02-26Xavier MertensQuick Audit of *NIX Systems
2016-02-24Xavier MertensAnalyzis of a Malicious .lnk File with an Embedded Payload
2016-02-23Xavier MertensVMware VMSA-2016-0002
2016-02-22Xavier MertensReducing False Positives with Open Data Sources
2016-02-20Didier StevensLocky: JavaScript Deobfuscation
2016-02-18Xavier MertensHunting for Executable Code in Windows Environments
2016-02-13Guy BruneauVMware VMSA-2015-0007.3 has been Re-released
2016-02-11Tom WebbTomcat IR with XOR.DDoS
2016-02-09Johannes UllrichMicrosoft February 2016 Patch Tuesday
2016-02-07Xavier MertensMore Malicious JavaScript Obfuscation
2016-02-03Xavier MertensAutomating Vulnerability Scans
2016-02-03Xavier MertensEMET 5.5 Released
2016-02-02Johannes UllrichTargeted IPv6 Scans Using pool.ntp.org .
2016-01-31Guy BruneauWindows 10 and System Protection for DATA Default is OFF
2016-01-30Xavier MertensAll CVE Details at Your Fingertips
2016-01-29Xavier MertensScripting Web Categorization
2016-01-26Rob VandenBrinkPentest Time Machine: NMAP + Powershell + whatever tool is next
2016-01-25Rob VandenBrinkAssessing Remote Certificates with Powershell
2016-01-24Didier StevensObfuscated MIME Files
2016-01-23Didier StevensSigcheck and VirusTotal for Offline Machine
2016-01-21Jim ClausingScanning for Fortinet ssh backdoor
2016-01-20Xavier Mertens/tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters!
2016-01-19Rob VandenBrinkPowershell and HTTPS ? It Ain?t All Rainbows And Lollipops! (or is it?)
2016-01-15Xavier MertensJavaScript Deobfuscation Tool
2016-01-13Alex StanfordYou Have Got a New Audio Message - Guest Diary by Pasquale Stirparo
2016-01-11Didier StevensBlackEnergy .XLS Dropper
2016-01-10Jim ClausingVMware security update
2016-01-09Xavier MertensVirtual Bitlocker Containers
2016-01-06Russ McReetoolsmith #112: Red vs Blue - PowerSploit vs PowerForensics
2016-01-05Guy BruneauWhat are you Concerned the Most in 2016?
2016-01-01Didier StevensFailure Is An Option
2015-12-29Daniel WesemannNew Years Resolutions
2015-12-28Rick WannerAdobe Flash and Adobe AIR Updates - https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
2015-12-26Didier StevensMalfunctioning Malware
2015-12-24Xavier MertensUnity Makes Strength
2015-12-23Rob VandenBrinkLibraries and Dependencies - It Really is Turtles All The Way Down!
2015-12-22Rick WannerThe other Juniper vulnerability - CVE-2015-7756
2015-12-21Daniel WesemannCritical Security Controls: Getting to know the unknown
2015-12-19Russell EubanksVMWare Security Advisory
2015-12-17Alex StanfordWhen Hunting BeEF, Yara rules (Part 2)
2015-12-16Xavier MertensPlaying With Sandboxes Like a Boss
2015-12-15Russ McReeSecurity Management vs Chaos: Understanding the Butterfly Effect to Manage Outcomes & Reduce Chaos
2015-12-14Russ McReeAD Security's Unofficial Guide to Mimikatz & Command Reference
2015-12-13Didier StevensUse The Privilege
2015-12-12Russell EubanksWhat Signs Are You Missing?
2015-12-10Rob VandenBrinkUninstalling Problem Applications using Powershell
2015-12-10Rob VandenBrinkNew Burp Feature - ClickBandit
2015-12-09Xavier MertensEnforcing USB Storage Policy with PowerShell
2015-12-06Mark HofmanMalware SPAM a new run has started.
2015-12-05Guy BruneauAre you looking to setup your own Malware Sandbox?
2015-12-05Guy BruneauCyber Threat Information Sharing Survey Looking for your Feedback - https://www.harrishealth.org/cybergrantsurvey
2015-12-04Tom WebbAutomating Phishing Analysis using BRO
2015-12-02Rob VandenBrinkNessus and Powershell is like Chocolate and Peanut Butter!
2015-11-22Guy BruneauOpenDNS Research Used to Predict Threat
2015-11-21Didier StevensMaldoc Social Engineering Trick
2015-11-09John BambenekICYMI: Widespread Unserialize Vulnerability in Java
2015-11-09John BambenekProtecting Users and Enterprises from the Mobile Malware Threat
2015-11-07Didier StevensRansomware & Entropy: Your Turn -> Solution
2015-11-04Richard PorterApplication Aware and Critical Control 2
2015-11-04Johannes UllrichInternet Wide Scanners Wanted
2015-10-30Didier StevensRansomware & Entropy: Your Turn
2015-10-27Xavier MertensThe "Yes, but..." syndrome
2015-10-18Russell EubanksSecurity Awareness for Security Professionals
2015-10-18Didier StevensRansomware & Entropy
2015-10-17Russell EubanksCIS Critical Security Controls - Version 6.0
2015-10-12Guy BruneauData Visualization,What is your Tool of Choice?
2015-10-12Guy BruneauCritical Vulnerability in Multiple Cisco Products - Apache Struts 2 Command Execution http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2
2015-10-09Guy BruneauAdobe Acrobat and Reader Pre-Announcement
2015-09-29Pedro BuenoTricks for DLL analysis
2015-09-28Johannes Ullrich"Transport of London" Malicious E-Mail
2015-09-23Daniel WesemannMaking our users unlearn what we taught them
2015-09-21Xavier MertensDetecting XCodeGhost Activity
2015-09-19Didier StevensDon't launch that file Adobe Reader!
2015-09-08Lenny ZeltserA Close Look at PayPal Overpayment Scams That Target Craigslist Sellers
2015-09-03Xavier MertensQuerying the DShield API from RTIR
2015-09-01Daniel WesemannEncryption of "data at rest" in servers
2015-08-31Xavier MertensDetecting file changes on Microsoft systems with FCIV
2015-08-29Tom WebbAutomating Metrics using RTIR REST API
2015-08-28Didier StevensTest File: PDF With Embedded DOC Dropping EICAR
2015-08-19Bojan ZdrnjaOutsourcing critical infrastructure (such as DNS)
2015-08-18Russ McReeMicrosoft Security Bulletin MS15-093 - Critical OOB - Internet Explorer RCE
2015-08-17Russ McReeTool Tip: Kansa Stafford released, PowerShell for DFIR
2015-08-16Guy BruneauAre you a "Hunter"?
2015-08-12Rob VandenBrinkWindows Service Accounts - Why They're Evil and Why Pentesters Love them!
2015-08-12Rob VandenBrinkWireshark 1.12.7 is released, multiple fixes. Find the release notes at: https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html and the binaries at: https://www.wireshark.org/download.html
2015-08-07Tony CarothersCritical Firefox Update Today
2015-08-06Didier StevensSigcheck and virustotal-search
2015-07-31Russ McReefroxlor Server Management Portal severe security issue
2015-07-31Russ McReeTech tip follow-up: Using the data Invoked with R's system command
2015-07-31Russ McReeTech tip: Invoke a system command in R
2015-07-28Rick WannerAndroid Stagefright multimedia viewer prone to remote exploitation
2015-07-27Daniel WesemannAngler's best friends
2015-07-21Didier StevensSearching Through the VirusTotal Database
2015-07-18Russell EubanksThe Value a "Fresh Set Of Eyes" (FSOE)
2015-07-17Didier StevensProcess Explorer and VirusTotal
2015-07-17Didier StevensAutoruns and VirusTotal
2015-07-17Didier StevensSigcheck and VirusTotal
2015-07-15Richard PorterAlways Check Your References (Cheat Sheets to the Rescue)
2015-07-14Johannes UllrichJuly 2015 Microsoft Patch Tuesday
2015-07-03Didier StevensAnalyzing Quarantine Files
2015-06-29Rob VandenBrinkThe Powershell Diaries 2 - Software Inventory
2015-06-28Didier StevensThe EICAR Test File
2015-06-27Guy BruneauIs Windows XP still around in your Network a year after Support Ended?
2015-06-26Daniel WesemannCisco default credentials - again!
2015-06-24Rob VandenBrinkThe Powershell Diaries - Finding Problem User Accounts in AD
2015-06-23Kevin ShorttXOR DDOS Mitigation and Analysis
2015-06-22Johannes UllrichSMTP Brute Forcing
2015-06-18Johannes UllrichOS X and iOS Unauthorized Cross Application Resource Access (XARA)
2015-06-02Alex StanfordGuest Diary: Xavier Mertens - Playing with IP Reputation with Dshield & OSSEC
2015-05-30Russell EubanksWeekend Learning - Spoofer Project
2015-05-29Russell EubanksTrust But Verify
2015-05-27Tom WebbSYSINTERNALS Update(AccessChk v6.0, Autoruns v13.4, Process Monitor v3.2, VMMap v3.2)
2015-05-23Guy BruneauBusiness Value in "Big Data"
2015-05-20Brad DuncanLogjam - vulnerabilities in Diffie-Hellman key exchange affect browsers and servers using TLS
2015-05-14Daniel WesemannOh Bloat!
2015-05-10Didier StevensWireshark TCP Flags: How To Install On Windows Video
2015-05-09Didier StevensMalicious Word Document: This Time The Maldoc Is A MIME File
2015-05-07Chris MohanSecurity Awareness? How do you keep your staff safe?
2015-05-03Russ McReeVolDiff, for memory image differential analysis
2015-04-30Brad DuncanDalexis/CTB-Locker malspam campaign
2015-04-28Daniel WesemannScammy Nepal earthquake donation requests
2015-04-24Basil Alawi S.TaherFileless Malware
2015-04-23Bojan ZdrnjaWhen automation does not help
2015-04-19Didier StevensHandling Special PDF Compression Methods
2015-04-17Didier StevensMemory Forensics Of Network Devices
2015-04-15Johannes UllrichMS15-034: HTTP.sys (IIS) DoS And Possible Remote Code Execution. PATCH NOW
2015-04-09Brad DuncanAn example of the malicious emails sometimes sent to the ISC handler addresses
2015-04-08Tom WebbIs it a breach or not?
2015-04-06Guy Bruneau'Dead Drops' Hidden USB Sticks Around the World
2015-04-05Didier StevensWireshark TCP Flags
2015-04-04Didier StevensVMware Product Updates Address Critical Information Disclosure Issue In JRE
2015-04-03Didier StevensSSH Fingerprints Are Important
2015-04-02Brad DuncanAngler Exploit Kit - Recent Traffic Patterns
2015-04-01Brad DuncanRig Exploit Kit Changes Traffic Patterns
2015-03-30Didier StevensYARA Rules For Shellcode
2015-03-26Daniel WesemannPin-up on your Smartphone!
2015-03-21Russell EubanksHave you seen my personal information? It has been lost. Again.
2015-03-18Daniel WesemannNew SANS memory forensics poster
2015-03-18Daniel WesemannPass the hash!
2015-03-17Didier StevensFrom PEiD To YARA
2015-03-17Didier StevensImproperly issued SSL certificate for domain "live.fi" could be used in attempts to spoof content. https://technet.microsoft.com/library/security/3046310
2015-03-16Johannes UllrichAutomatically Documenting Network Connections From New Devices Connected to Home Networks
2015-03-14Didier StevensMaldoc VBA Sandbox/Virtualization Detection
2015-03-13Guy BruneauBlind SQL Injection against WordPress SEO by Yoast
2015-03-12Johannes UllrichWho got the bad SSL Certificate? Using tshark to analyze the SSL handshake.
2015-03-08Brad DuncanWhat Happened to You, Asprox Botnet?
2015-03-07Guy BruneauShould it be Mandatory to have an Independent Security Audit after a Breach?
2015-02-27Rick WannerTor Browser Version 4.0.4 released - https://blog.torproject.org/blog/tor-browser-404-released
2015-02-27Rick WannerLet's Encrypt!
2015-02-26Johannes UllrichNew Feature: Subnet Report
2015-02-23Richard PorterSubscribing to the DShield Top 20 on a Palo Alto Networks Firewall
2015-02-22Russell EubanksLeave Things Better Than When You Found Them
2015-02-20Tom WebbFast analysis of a Tax Scam
2015-02-19Daniel WesemannMacros? Really?!
2015-02-19Daniel WesemannDNS-based DDoS
2015-02-17Rob VandenBrinkoclHashcat 1.33 Released
2015-02-17Rob VandenBrinkA Different Kind of Equation
2015-02-13Johannes UllrichMicrosoft February Patch Failures Continue: KB3023607 vs. Cisco AnyConnect Client
2015-02-11Johannes UllrichMicrosoft Hardens GPO by Fixing Two Serious Vulnerabilities.
2015-02-11Johannes UllrichDid PCI Just Kill E-Commerce By Saying SSL is Not Sufficient For Payment Info ? (spoiler: TLS!=SSL)
2015-02-10Mark BaggettDetecting Mimikatz Use On Your Network
2015-02-09Chris MohanBackups are part of the overall business continuity and disaster recovery plan
2015-02-08Rob VandenBrinkRaising the "Creep Factor" in License Agreements
2015-02-08Rob VandenBrinkBURP 1.6.10 Released
2015-02-06Johannes UllrichAnthem, TurboTax and How Things "Fit Together" Sometimes
2015-02-04Alex StanfordExploit Kit Evolution - Neutrino
2015-02-03Johannes UllrichWhat is using this library?
2015-02-03Johannes UllrichAnother Network Forensic Tool for the Toolbox - Dshell
2015-02-01Rick WannerImproving SSL Warnings
2015-01-31Guy BruneauBeware of Phishing and Spam Super Bowl Fans!
2015-01-23Adrien de BeaupreInfocon change to yellow for Adobe Flash issues
2014-12-24Rick WannerIncident Response at Sony
2014-12-23John BambenekHow I learned to stop worrying and love malware DGAs....
2014-12-05Basil Alawi S.TaherVMware new and updated security advisories
2014-12-01Guy BruneauDo you have a Data Breach Response Plan?
2014-11-27Russ McReeSyrian Electronic Army attack leads to malvertising
2014-11-25Adrien de BeaupreLess is, umm, less?
2014-11-24Richard PorterSomeone is using this? PoS: Compressor
2014-11-20Johannes UllrichCritical WordPress XSS Update
2014-11-05Russ McReeTool Tip: vFeed
2014-11-04Daniel WesemannWhois someone else?
2014-11-04Daniel Wesemann20$ is 999999 Euro
2014-10-23Russ McReeDigest: 23 OCT 2014
2014-10-14Johannes UllrichUpdates for Firefox and Thunderbird. http://www.mozilla.org/firefox/new/
2014-10-13Lorna HutchesonFor or Against: Port Security for Network Access Control
2014-10-09Johannes UllrichCSAM: My servers started speaking IRC, and that is when I started to listen!
2014-10-03Johannes UllrichCSAM: The Power of Virustotal to Turn Harmless Binaries Malicious
2014-10-02Johannes UllrichWhy is your Mac all for sudden using Bing as a search engine?
2014-10-01Russ McReeVMware security advisory: VMSA-2014-0010 http://www.vmware.com/security/advisories/VMSA-2014-0010.html
2014-10-01Russ McReeSecurity Onion news: Updated ShellShock detection scripts for Bro
2014-09-27Guy BruneauWhat has Bash and Heartbleed Taught Us?
2014-09-22Johannes UllrichFake LogMeIn Certificate Update with Bad AV Detection Rate
2014-09-19Guy BruneauAdded today in oclhashcat 131 Django [Default Auth] (PBKDF2 SHA256 Rounds Salt) Support - http://hashcat.net/hashcat/
2014-09-19Guy BruneauCipherShed Fork from TrueCrypt Project, Support Windows, Mac OS and Linux - https://ciphershed.org
2014-09-16Mark HofmanFreeBSD Denial of Service advisory (CVE-2004-0230)
2014-09-15Johannes UllrichGoogle DNS Server IP Address Spoofed for SNMP reflective Attacks
2014-09-12Chris MohanVMware NSX and vCNS product updates address a critical information disclosure vulnerability http://www.vmware.com/security/advisories/VMSA-2014-0009.html
2014-09-12Chris MohanAre credential dumps worth reviewing?
2014-09-10Johannes UllrichContent Security Policy (CSP) is Growing Up.
2014-09-07Johannes UllrichOdd Persistent Password Bruteforcing
2014-09-03Johannes UllrichF5 BigIP Unauthenticated rsync Vulnerability
2014-08-29Johannes UllrichFalse Positive or Not? Difficult to Analyze Javascript
2014-08-27Rob VandenBrinkOne More Day of Trolling in POS Memory
2014-08-25Jim ClausingUnusual CRL traffic?
2014-08-25Jim ClausingUDP port 1900 DDoS traffic
2014-08-23Guy BruneauNSS Labs Cyber Resilience Report
2014-08-22Richard PorterOCLHashCat 1.30 Released
2014-08-22Richard PorterPHP 5.4.32 Released http://www.php.net/ChangeLog-5.php#5.4.32
2014-08-22Richard PorterPHP 5.5.16 is available http://www.php.net/ChangeLog-5.php#5.5.16
2014-08-20Kevin ShorttSocial Engineering Alive and Well
2014-08-17Rick WannerPart 2: Is your home network unwittingly contributing to NTP DDOS attacks?
2014-08-16Lenny ZeltserWeb Server Attack Investigation - Installing a Bot and Reverse Shell via a PHP Vulnerability
2014-08-15Tom WebbAppLocker Event Logs with OSSEC 2.8
2014-08-14Basil Alawi S.TaherThreats to virtual environments
2014-08-13Johannes UllrichUpdates for Apple Safari
2014-08-12Adrien de BeaupreHost discovery with nmap
2014-08-12Adrien de BeaupreAdobe updates for 2014/08
2014-08-12Adrien de BeaupreSysinternals updates Sysmon v1.0; Updates: Autoruns v12.01, Coreinfo v3.3, Procexp v16.03 http://blogs.technet.com/b/sysinternals/
2014-08-10Basil Alawi S.TaherIncident Response with Triage-ir
2014-08-09Adrien de BeaupreComplete application ownage via Multi-POST XSRF
2014-08-06Johannes UllrichAll Passwords have been lost: What's next?
2014-08-06Chris MohanFree Service to Help CryptoLocker Victims by FireEye and Fox-IT
2014-08-05Johannes UllrichLegal Threat Spam: Sometimes it Gets Personal
2014-08-05Johannes UllrichSynolocker: Why OFFLINE Backups are important
2014-08-05Johannes UllrichCenter for Internet Security Releases Benchmark for VMWare ESXi 5.5 https://benchmarks.cisecurity.org/downloads/form/index.cfm?download=esxi55.100
2014-08-04Russ McReeThreats & Indicators: A Security Intelligence Lifecycle
2014-08-01Chris MohanWireShark 1.10.9 and 1.12.0 has been released
2014-07-30Rick WannerSymantec Endpoint Protection Privilege Escalation Zero Day
2014-07-28Guy BruneauManagement and Control of Mobile Device Security
2014-07-28Johannes UllrichInteresting HTTP User Agent "chroot-apach0day"
2014-07-26Chris Mohan"Internet scanning project" scans
2014-07-24Bojan ZdrnjaWindows Previous Versions against ransomware
2014-07-23Johannes UllrichNew Feature: "Live" SSH Brute Force Logs and New Kippo Client
2014-07-22Daniel WesemannIvan's Order of Magnitude
2014-07-22Daniel Wesemann WordPress brute force attack via wp.getUsersBlogs
2014-07-19Russ McReeKeeping the RATs out: the trap is sprung - Part 3
2014-07-18Russ McReeKeeping the RATs out: **it happens - Part 2
2014-07-18Russ McReeGameover Zeus reported as "returned from the dead"
2014-07-16Russ McReeKeeping the RATs out: an exercise in building IOCs - Part 1
2014-07-15Daniel WesemannAOC Cloud
2014-07-15Daniel WesemannOracle July 2014 CPU (patch bundle)
2014-07-14Johannes UllrichThe Internet of Things: How do you "on-board" devices?
2014-07-13Tony CarothersOracle July 2014 Update Pre-Notification
2014-07-11Rob VandenBrinkEgress Filtering? What - do we have a bird problem?
2014-07-09Daniel WesemannWho inherits your IP address?
2014-07-08Johannes UllrichHardcoded Netgear Prosafe Switch Password
2014-07-07Johannes UllrichMulti Platform *Coin Miner Attacking Routers on Port 32764
2014-07-06Richard PorterPhysical Access, Point of Sale, Vegas
2014-07-05Guy BruneauMalware Analysis with pedump
2014-07-05Guy BruneauJava Support ends for Windows XP
2014-07-03Johannes UllrichCredit Card Processing in 700 Words or Less
2014-07-02Johannes UllrichJuly Ouch! Security Awareness Newsletter Released. E-mail Do's and Don'ts http://www.securingthehuman.org/resources/newsletters/ouch/2014#july2014
2014-07-02Johannes UllrichCisco Unified Communications Domain Manager Update
2014-07-02Johannes UllrichSimple Javascript Extortion Scheme Advertised via Bing
2014-07-01Johannes UllrichMicrosoft No-IP Takedown
2014-06-30Johannes UllrichShould I setup a Honeypot? [SANSFIRE]
2014-06-28Mark HofmanNo more Microsoft advisory email notifications?
2014-06-24Kevin ShorttNTP DDoS Counts Have Dropped
2014-06-23Russ McReeMicrosoft Interflow announced today at 26th FIRST conference
2014-06-22Russ McReeOfficeMalScanner helps identify the source of a compromise
2014-06-19Tony CarothersWordPress and Security
2014-06-17Rob VandenBrinkNew Security Advisories / Updates from Microsoft - Heads up for Next Patch Tuesday!
2014-06-17Rob VandenBrinkBro 2.3 released - new here: http://blog.bro.org/2014/06/bro-23-release.html, release notes here: http://www.bro.org/sphinx-git/install/release-notes.html
2014-06-13Richard PorterA welcomed response, PF Chang's
2014-06-12Daniel WesemannMade any new friends lately?
2014-06-12Guy BruneauBIND Security Update for CVE-2014-3859
2014-06-11Daniel WesemannHelp your pilot fly!
2014-06-11Daniel WesemannPay attention to Cryptowall!
2014-06-10Daniel WesemannSampling Bias
2014-06-08Guy Bruneauefax Spam Containing Malware
2014-06-06Johannes UllrichMicrosoft June Patch Tuesday Advance Notification
2014-06-03Basil Alawi S.TaherAn Introduction to RSA Netwitness Investigator
2014-06-02Rick WannerUsing nmap to scan for DDOS reflectors
2014-06-02John BambenekGameover Zeus and Cryptolocker Takedowns
2014-05-30Johannes UllrichFake Australian Electric Bill Leads to Cryptolocker
2014-05-28Rob VandenBrinkAssessing SOAP APIs with Burp
2014-05-27Kevin ShorttAvast forums hacked
2014-05-23Richard PorterHighlights from Cisco Live 2014 - The Internet of Everything
2014-05-22Rob VandenBrinkAnother Site Breached - Time to Change your Passwords! (If you can that is)
2014-05-22Johannes UllrichDiscontinuing Support for ISC Alert Task Bar Icon
2014-05-18Russ McReesed and awk will always rock
2014-05-07Johannes UllrichDe-Clouding your Life: Things that should not go into the cloud.
2014-05-01Johannes UllrichBusybox Honeypot Fingerprinting and a new DVR scanner
2014-05-01Johannes UllrichMicrosoft Announces Special Patch for IE 0-day (Win XP included!)
2014-04-30Russ McReeUltraDNS DDOS
2014-04-29Russ McReeFirefox 29.0 & Thunderbird 24.5 released: http://www.mozilla.org/security/known-vulnerabilities/
2014-04-28Russ McReeAdobe Security Bulletin: Security updates available for Adobe Flash Player http://adobe.ly/QVjO72
2014-04-27Tony CarothersThe Dreaded "D" Word of IT
2014-04-26Guy BruneauAndroid Users - Beware of Bitcoin Mining Malware
2014-04-26Guy BruneauNew Project by Linux Foundation - Core Infrastructure Initiative
2014-04-24Rob VandenBrinkApache Struts Zero Day and Mitigation
2014-04-21Pedro BuenoHeartbleed hunting
2014-04-21Daniel WesemannOpenSSL Rampage
2014-04-21Daniel WesemannFinding the bleeders
2014-04-21Daniel WesemannAllow us to leave!
2014-04-16Johannes UllrichNew Feature: Monitoring Certification Revocation Lists https://isc.sans.edu/crls.html
2014-04-16Johannes UllrichOracle Critical Patch Update for April 2014
2014-04-15Richard PorterVMWare Advisory VMSA-2014-0004 - Updates on OpenSSL HeartBleed http://www.vmware.com/security/advisories/VMSA-2014-0004.html
2014-04-14Kevin ShorttINFOCon Green: Heartbleed - on the mend
2014-04-13Kevin ShorttReverse Heartbleed Testing
2014-04-12Guy BruneauCritical Security Update for JetPack WordPress Plugin. Bug has existed since Jetpack 1.9, released in October 2012. - http://jetpack.me/2014/04/10/jetpack-security-update/
2014-04-12Guy BruneauInterested in a Heartbleed Challenge?
2014-04-11Rob VandenBrinkThe Other Side of Heartbleed - Client Vulnerabilities
2014-04-11Rob VandenBrinkVMware Security Advisories / Patches released for 2 issues (NOT Heartbleed) - http://www.vmware.com/security/advisories/VMSA-2014-0003.html and http://www.vmware.com/security/advisories/VMSA-2014-0002.html
2014-04-11Johannes UllrichTonight OpenSSL Webcast #4: Client Side Issues / What to tell your kids & managers about it https://www.sans.org/webcasts/side-heartbleed-client-vulnerabilities-98135
2014-04-11Guy BruneauHeartbleed Fix Available for Download for Cisco Products
2014-04-08Guy BruneauOpenSSL CVE-2014-0160 Fixed
2014-04-08Johannes Ullrich* Patch Now: OpenSSL "Heartbleed" Vulnerability
2014-04-06Basil Alawi S.Taher"Power Worm" PowerShell based Malware
2014-04-05Jim ClausingThose strange e-mails with URLs in them can lead to Android malware
2014-04-04Rob VandenBrinkDealing with Disaster - A Short Malware Incident Response
2014-04-02Kevin ShorttApple Security Update for Safari 6.1.3/7.0.3: http://support.apple.com/kb/HT6181
2014-04-01Basil Alawi S.TaherUpgrading Your Android, Elevating My Malware
2014-04-01Johannes Ullrichcmd.so Synology Scanner Also Found on Routers
2014-03-31Johannes UllrichMore Device Malware: This is why your DVR attacked my Synology Disk Station (and now with Bitcoin Miner!)
2014-03-28Johannes UllrichWar of the Bots: When DVRs attack NASs
2014-03-26Johannes UllrichLet's Finally "Nail" This Port 5000 Traffic - Synology owners needed.
2014-03-26Johannes UllrichFull Disclosure Mailing List is back: http://insecure.org/news/fulldisclosure/
2014-03-24Johannes UllrichIntegrating Physical Security Sensors
2014-03-24Johannes UllrichNew Microsoft Advisory: Unpatched Word Flaw used in Targeted Attacks
2014-03-22Guy BruneauHow the Compromise of a User Account Lead to a Spam Incident
2014-03-19Mark HofmanMozilla released updates for Firefox ( v 28.0), Thunderbird (v 24.4) and Firefox Extended Support Release (ESR) updates to 24.4.0 (Fixes include the issues highlighted at the pwn2own contest.)
2014-03-17Johannes UllrichScans for FCKEditor File Manager
2014-03-14Richard PorterWord Press Shenanigans? Anyone seeing strange activity today?
2014-03-13Daniel WesemannIdentification and authentication are hard ... finding out intention is even harder
2014-03-12Johannes UllrichWordpress "Pingback" DDoS Attacks
2014-03-11Johannes UllrichMicrosoft Patch Tuesday March 2014
2014-03-11Basil Alawi S.TaherIntroduction to Memory Analysis with Mandiant Redline
2014-03-10Basil Alawi S.TaherSysinternals Process Explorer v16.02, Process Monitor v3.1, PSExec v2.1 and Sigcheck v2.03 update
2014-03-08Guy BruneauMicrosoft March Patch Pre-Announcement
2014-03-07Tom WebbLinux Memory Dump with Rekall
2014-03-06Mark BaggettPort 5000 traffic and snort signature
2014-03-04Daniel WesemannXPired!
2014-03-04Daniel WesemannTriple Handshake Cookie Cutter
2014-03-02Stephen HallSymantec goes yellow
2014-03-02Stephen HallSunday Reading
2014-02-28Daniel WesemannOversharing
2014-02-28Daniel WesemannFiesta!
2014-02-27Richard PorterCisco Prime Infrastructure Command Execution Vulnerability http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140226-pi
2014-02-27Richard PorterDDoS and BCP 38
2014-02-24Russ McReeExplicit Trusted Proxy in HTTP/2.0 or...not so much
2014-02-22Tony CarothersCisco UCS Director Vulnerability and Update
2014-02-21Johannes UllrichUPS Malware Spam Using Fake SPF Headers
2014-02-19Russ McReeThreat modeling in the name of security
2014-02-18Johannes UllrichMore Details About "TheMoon" Linksys Worm
2014-02-17Chris MohanNTP reflection attacks continue
2014-02-14Chris MohanSYM14-004 Symantec Endpoint Protection Management Vulnerabilities - http://www.symantec.com/business/support/index?page=content&id=TECH214866
2014-02-11Johannes UllrichFebruary 2014 Microsoft Patch Tuesday
2014-02-10Rob VandenBrinkA Tale of Two Admins (and no Change Control)
2014-02-09Basil Alawi S.TaherMandiant Highlighter 2
2014-02-07Johannes UllrichMicrosoft Advance Notification for February 2014
2014-02-07Rob VandenBrinkHello Virustotal? It's Microsoft Calling.
2014-02-07Rob VandenBrinkNew ISO Standards on Vulnerability Handling and Disclosure
2014-02-05Johannes UllrichTo Merrillville or Sochi: How Dangerous is it to travel?
2014-02-05Johannes UllrichSANS Ouch Security Awareness Newsletter What is Malware http://www.securingthehuman.org/ouch
2014-02-04Johannes UllrichFirefox 27 Available http://www.mozilla.org/en-US/firefox/27.0/releasenotes/
2014-01-30Johannes UllrichOracle Reports Vulnerability
2014-01-25Guy BruneauFinding in Cisco's Annual Security Report
2014-01-24Chris MohanPhishing via Social Media
2014-01-24Chris MohanSecurity Update for OS X for CVE-2014-1252 http://support.apple.com/kb/HT6117
2014-01-23Chris MohanLearning from the breaches that happens to others Part 2
2014-01-22Chris MohanLearning from the breaches that happens to others
2014-01-19Rick WannerAnatomy of a Malware distribution campaign
2014-01-17Russ McReeMassive RFI scans likely a free web app vuln scanner rather than bots
2014-01-17Russ McReeNew and updated VMWare security advisories - http://www.vmware.com/security/advisories
2014-01-16Kevin ShorttPort 4028 - Interesting Activity
2014-01-14Johannes UllrichMicrosoft Patch Tuesday January 2014
2014-01-14Johannes UllrichOracle Critical Patch Update January 2014
2014-01-11Guy Bruneautcpflow 1.4.4 and some of its most Interesting Features
2014-01-10Basil Alawi S.TaherWindows Autorun-3
2014-01-10Basil Alawi S.TaherCisco Small Business Devices backdoor fix
2014-01-09Johannes UllrichMicrosoft Security Bulletin Advance Notification for January 2014 http://technet.microsoft.com/en-us/security/bulletin/ms14-jan
2014-01-09Bojan ZdrnjaMassive PHP RFI scans
2014-01-08Kevin ShorttIntercepted Email Attempts to Steal Payments
2014-01-04Tom WebbMonitoring Windows Networks Using Syslog (Part One)
2014-01-02Johannes UllrichScans Increase for New Linksys Backdoor (32764/TCP)
2014-01-01Russ McReeHappy New Year from the Syrian Electronic Army - Skype’s Social Media Accounts Hacked
2014-01-01Russ McReeSix degrees of celebration: Juniper, ANT, Shodan, Maltego, Cisco, and Tails
2013-12-28Russ McReeWeekend Reading List 27 DEC
2013-12-28Bojan ZdrnjaDRG online challenge(s)
2013-12-24Daniel WesemannMr Jones wants you to appear in court!
2013-12-24Daniel WesemannUnfriendly crontab additions
2013-12-23Rob VandenBrinkHow-To's for the Holidays - Java Whitelisting using AD Group Policy
2013-12-23Scott FendleyVMWare ESX/ESXi Security Advisory
2013-12-23Daniel WesemannCostco, BestBuy, Walmart really want to send you a package!
2013-12-21Daniel WesemannAdobe phishing underway
2013-12-21Guy BruneauStrange DNS Queries - Request for Packets
2013-12-19Rob VandenBrinkTarget US - Credit Card Data Breach
2013-12-18Adrien de BeaupreWireshark 1.10.4 and 1.8.12 are available
2013-12-17Adrien de BeaupreApple security updates Mac OS X and Safari
2013-12-16Tom WebbThe case of Minerd
2013-12-12Basil Alawi S.TaherAcquiring Memory Images with Dumpit
2013-12-11Johannes UllrichBrowser Fingerprinting via SSL Client Hello Messages
2013-12-11Johannes UllrichFacebook Phishing and Malware via Tumblr Redirects
2013-12-10Rob VandenBrinkThose Look Just Like Hashes!
2013-12-07Guy BruneauSuspected Active Rovnix Botnet Controller
2013-12-07Guy BruneauMicrosoft December Patch Pre-Announcement
2013-12-06Guy BruneauVMware ESX 4.x Security Advisory
2013-12-05Mark HofmanUpdated Standards Part 1 - ISO 27001
2013-12-05Alex StanfordDec OUCH! is out - "Securing Your New Tablet". Download & share with family/friends. www.securingthehuman.org/ouch
2013-12-04Adrien de BeaupreVMware Security Advisory VMSA-2013-0014
2013-12-02Richard PorterReports of higher than normal SSH Attacks
2013-12-01Richard PorterBPF, PCAP, Binary, hex, why they matter?
2013-11-30Russ McReeA review of Tubes, A Journey to the Center of the Internet
2013-11-29Russ McReeMS Exchange update, includes failed backup fix: http://support.microsoft.com/kb/2892464
2013-11-28Rob VandenBrinkMicrosoft Security Advisory (2914486): Vulnerability in Microsoft Windows Kernel 0 day exploit in wild
2013-11-25Johannes UllrichMore Bad Port 0 Traffic
2013-11-22Rick WannerPort 0 DDOS
2013-11-22Rick WannerTales of Password Reuse
2013-11-21Mark Baggett"In the end it is all PEEKS and POKES."
2013-11-20Mark BaggettSearching live memory on a running machine with winpmem
2013-11-19Mark BaggettWinpmem - Mild mannered memory aquisition tool??
2013-11-16Guy BruneauSagan as a Log Normalizer
2013-11-15Johannes UllrichVMWare Security Advisory: http://www.vmware.com/security/advisories/VMSA-2013-0013.html
2013-11-13Johannes UllrichPacket Challenge for the Hivemind: What's happening with this Ethernet header?
2013-11-12Johannes UllrichNovember 2013 Microsoft Patch Tuesday
2013-11-10Rick WannerMicrosoft and Facebook announce bug bounty
2013-11-09Guy BruneauIE Zero-Day Vulnerability Exploiting msvcrt.dll
2013-11-08Johannes UllrichMicrosoft Patch Tuesday Preview
2013-11-05Daniel WesemannIs your vacuum cleaner sending spam?
2013-11-05Daniel WesemannTIFF images in MS-Office documents used in targeted attacks
2013-11-04Manuel Humberto Santander PelaezWhen attackers use your DNS to check for the sites you are visiting
2013-11-03Jim ClausingWhat were you doing 25 years ago (yesterday)?
2013-11-02Rick WannerProtecting Your Family's Computers
2013-10-31Russ McReeHappy Halloween: The Ghost Really May Be In The Machine
2013-10-30Russ McReeSIR v15: Five good reasons to leave Windows XP behind
2013-10-28Daniel WesemannExploit cocktail (Struts, Java, Windows) going after 3-month old vulnerabilities
2013-10-26Guy BruneauActive Perl/Shellbot Trojan
2013-10-25Rob VandenBrinkKaspersky flags TCPIP.SYS as Malware
2013-10-24Johannes UllrichFalse Positive: php.net Malware Alert
2013-10-22Richard PorterGreenbone and OpenVAS Scanner
2013-10-22John BambenekCryptolocker Update, Request for Info
2013-10-21Johannes UllrichNew tricks that may bring DNS spoofing back or: "Why you should enable DNSSEC even if it is a pain to do"
2013-10-18Guy BruneauVMware Release Multiple Security Updates
2013-10-18Rob VandenBrinkCSAM - Why am I seeing DNS Requests to IANA.ORG in my Firewall Logs?
2013-10-17Adrien de BeaupreChrome updated http://googlechromereleases.blogspot.ca/2013/10/stable-channel-update_15.html
2013-10-17Adrien de BeaupreMicrosoft phish
2013-10-15Rob VandenBrinkWireshark 1.11.0 Development Version Released ==> http://www.wireshark.org/download.html (1.10.2 remains the Stable version)
2013-10-08Johannes UllrichAnti-Virus Company Avira Homepage Defaced
2013-10-05Richard PorterAdobe Breach Notification, Notifications?
2013-10-04Johannes UllrichThe Adobe Breach FAQ
2013-10-02John BambenekObamacare related domain registration spike, Government shutdown domain registration beginning
2013-10-01Johannes UllrichiOS 7 Adds Multipath TCP
2013-10-01Adrien de BeaupreCSAM! Send us your logs!
2013-10-01John Bambenek*Metaspoit Releases Module to Exploit Unpatched IE Vuln CVE-2013-3893
2013-09-30Adrien de BeaupreTwitter DM spam/malware
2013-09-24Tom WebbIDS, NSM, and Log Management with Security Onion 12.04.3
2013-09-23Rob VandenBrinkHow do you spell "PSK"?
2013-09-20Russ McReeThreat Level Yellow: Protection recommendations regarding Internet Explorer exploits in the wild
2013-09-18Rob VandenBrinkCisco DCNM Update Released
2013-09-17John BambenekMicrosoft Releases Out-of-Band Advisory for all Versions of Internet Explorer
2013-09-13Rob VandenBrinkUpdate for Safari to version 5.1.10 is out - http://support.apple.com/kb/HT5921
2013-09-12Daniel Wesemann37.58.73.42 / 95.156.228.69 / 195.210.43.42, anyone?
2013-09-11Alex StanfordGetting Started with Rsyslog Filters
2013-09-11Johannes UllrichReboot Wednesday: Yesterday's Patch Tuesday Aftermath
2013-09-10Swa FrantzenMore Black Tuesday workload
2013-09-10Swa FrantzenMacs need to patch too!
2013-09-10Swa FrantzenAdobe September 2013 Black Tuesday Overview
2013-09-10Swa FrantzenMicrosoft September 2013 Black Tuesday Overview
2013-09-09Johannes UllrichSSL is broken. So what?
2013-09-07Guy BruneauMicrosoft September Patch Pre-Announcement
2013-09-05Rob VandenBrinkBuilding Your Own GPU Enabled Private Cloud
2013-09-05Rob VandenBrinkWhat's Next for IPS?
2013-09-03Rob VandenBrinkIs "Reputation Backscatter" a Thing?
2013-09-02Guy BruneauSnort IDS Sensor with Sguil New ISO Released
2013-09-02Guy BruneauMultiple Cisco Security Notice
2013-08-30Kevin ListonVMware ESXi and ESX address an NFC Protocol Unhandled Exception
2013-08-30Kevin ListonTor Use Uptick
2013-08-29Russ McReeSuspect Sendori software
2013-08-26Alex StanfordStop, Drop and File Carve
2013-08-25Johannes UllrichWhen does your browser send a "Referer" header (or not)?
2013-08-21Alex StanfordPsst. Your Browser Knows All Your Secrets.
2013-08-21Rob VandenBrinkFibre Channel Reconnaissance - Reloaded
2013-08-19Johannes UllrichRunning Snort on ESXi using the Distributed Switch
2013-08-19Guy Bruneau Business Risks and Cyber Attacks
2013-08-19Rob VandenBrinkZMAP 1.02 released
2013-08-19Johannes UllrichMicrosoft re-releases MS13-066: https://technet.microsoft.com/security/bulletin/MS13-066
2013-08-19Rob VandenBrinkNMAP 6.40 Released (www.nmap.org), Release Notes at www.nmap.org/changelog.html
2013-08-16Kevin ListonCVE-2013-2251 Apache Struts 2.X OGNL Vulnerability
2013-08-15Johannes UllrichMicrosoft Pulls MS013-061 due to problems with Exchange Server 2013 http://blogs.technet.com/b/exchange/archive/2013/08/14/exchange-2013-security-update-ms13-061-status-update.aspx
2013-08-14Johannes UllrichImaging LUKS Encrypted Drives
2013-08-13Swa FrantzenMicrosoft August 2013 Black Tuesday Overview
2013-08-13Swa FrantzenMicrosoft security advisories: RDP and MD5 deprecation in Microsoft root certificates
2013-08-09Kevin ShorttCopy Machines - Changing Scanned Content
2013-08-07Johannes UllrichNew edition of the Ouch! Security Awareness Newsletter is out: http://www.securingthehuman.org/resources/newsletters/ouch/2013
2013-08-07Johannes UllrichFirefox 23 and Mixed Active Content
2013-08-05Chris MohanDMARC: another step forward in the fight against phishing?
2013-08-03Deborah HaleWhat Anti-virus Program Is Right For You?
2013-08-02Johannes UllrichFake American Express Alerts
2013-08-02Chris MohanVMware Security Advisory VMSA-2013-0009 - http://www.vmware.com/security/advisories/VMSA-2013-0009.html
2013-08-02Chris MohanCisco Security Advisory: OSPF LSA Manipulation Vulnerability in Multiple Cisco Products http://tools.cisco.com/security/center/viewAlert.x?alertId=30210
2013-08-02Johannes UllrichScans for Open File Uploads into CKEditor
2013-07-31Johannes UllrichPOP3 Server Brute Forcing Attempts Using Polycom Credentials
2013-07-28Guy BruneauWireshark 1.8.9 and 1.10.1 Security Update
2013-07-27Scott FendleyDefending Against Web Server Denial of Service Attacks
2013-07-22Johannes UllrichApple Developer Site Breach
2013-07-21Guy BruneauUbuntu Forums Security Breach
2013-07-21Guy BruneauWhy use Regular Expressions?
2013-07-20Manuel Humberto Santander PelaezDo you have rogue Internet gateways in your network? Check it with nmap
2013-07-17Johannes UllrichNetwork Solutions Outage
2013-07-15Johannes UllrichProblems with MS13-057
2013-07-13Lenny ZeltserDecoy Personas for Safeguarding Online Identity Using Deception
2013-07-12Johannes UllrichDNS resolution is failing for Microsofts Teredo server (teredo.ipv6.microsoft.com)
2013-07-12Johannes UllrichMicrosoft Teredo Server "Sunset"
2013-07-12Rob VandenBrinkHmm - where did I save those files?
2013-07-10Johannes Ullrich.NL Registrar Compromisse
2013-07-09Swa FrantzenMicrosoft July 2013 Black Tuesday Overview
2013-07-08Richard PorterWhy do we Click?
2013-07-06Guy BruneauMicrosoft July Patch Pre-Announcement
2013-07-06Guy BruneauIs Metadata the Magic in Modern Network Security?
2013-07-04Russ McReeCelebrating 4th of July With a Malware PCAP Visualization
2013-07-03Kevin ShorttApple Security Update 2013-003
2013-07-01Manuel Humberto Santander PelaezUsing nmap scripts to enhance vulnerability asessment results
2013-06-29Johannes UllrichInstagram "Fruit" Spam
2013-06-27Tony CarothersPhysical Security in the Cyber World
2013-06-27Tony CarothersRuby Update for SSL Vulnerability
2013-06-25Bojan ZdrnjaMozilla Firefox 22 released, fixes 14 security vulnerabilities, more info at http://www.mozilla.org/en-US/firefox/22.0/releasenotes/
2013-06-23Kevin ListonIs SSH no more secure than telnet?
2013-06-21Guy BruneauSysinternals Updates for Autoruns, Strings & ZoomIt http://blogs.technet.com/b/sysinternals/archive/2013/06/20/updates-autoruns-v11-61-strings-v2-52-zoomit-v4-5.aspx
2013-06-20Guy BruneauHP iLO3/iLO4 Remote Unauthorized Access with Single-Sign-On
2013-06-18Russ McReeVolatility rules...any questions?
2013-06-17Daniel WesemannSANSFIRE 2013
2013-06-11Swa FrantzenStore passwords the right way in your application
2013-06-11Swa FrantzenMicrosoft June 2013 Black Tuesday Overview
2013-06-11Swa FrantzenOther Microsoft Black Tuesday News
2013-06-11Swa Frantzenvmware security advisory VMSA-2013-0008
2013-06-07Daniel Wesemann100% Compliant (for 65% of the systems)
2013-06-05Richard PorterWindows Sysinternals Updated http://technet.microsoft.com/en-us/sysinternals/default.aspx
2013-06-05Johannes UllrichNew version of "Ouch", the SANS Securing the Human Newsletter http://www.securingthehuman.org/resources/newsletters/ouch/2013
2013-06-05Richard PorterWireshark 1.10.0 Stable Released http://www.wireshark.org/download.html
2013-05-31Chris MohanVMware releases new and updated security advisories
2013-05-23Adrien de BeaupreWireshark 1.10.0rc2 is now available http://www.wireshark.org/download.html
2013-05-23Adrien de BeaupreMoVP II
2013-05-22Adrien de BeauprePrivilege escalation, why should I care?
2013-05-22Adrien de BeaupreWireshark 1.8.7 and 1.6.15 Released http://www.wireshark.org/news/20130517.html
2013-05-22Adrien de BeaupreChrome 24.0.1312.52 has been updated for Windows, Mac, Linux, and Chrome Frame
2013-05-21Adrien de BeaupreMoore, Oklahoma tornado charitable organization scams, malware, and phishing
2013-05-20Guy BruneauSysinternals Updates for Accesschk, Procdump, RAMMap and Strings http://blogs.technet.com/b/sysinternals/archive/2013/05/17/updates-accesschk-v5-11-procdump-v6-0-rammap-v1-22-strings-v2-51.aspx
2013-05-19Kevin ShorttPort 51616 - Got Packets?
2013-05-17Daniel Wesemanne-netprotections.su ?
2013-05-17Johannes UllrichSSL: Another reason not to ignore IPv6
2013-05-16Daniel WesemannExtracting signatures from Apple .apps
2013-05-14Swa FrantzenMicrosoft Security Advisory 2846338
2013-05-14Swa FrantzenCVE-2013-2094: Linux privilege escalation
2013-05-14Jim ClausingSo what passwords are those ssh scanners trying?
2013-05-14Swa FrantzenMicrosoft May 2013 Black Tuesday Overview
2013-05-14Swa FrantzenFirefox & Thunderbird released
2013-05-14Swa FrantzenAdobe May 2013 Black Tuesday Overview
2013-05-11Lenny ZeltserExtracting Digital Signatures from Signed Malware
2013-05-10Johannes UllrichMicrosoft and Adobe Patch Tuesday Pre-Release
2013-05-09Johannes UllrichMicrosoft released a Fix-it for the Internet Explorer 8 Vulnerability http://support.microsoft.com/kb/2847140
2013-05-08Chris MohanSyria drops from Internet 7th May 2013
2013-05-07Adam SwangerMay 2013 OUCH! - Strong Passwords: Passphrases, Using Passwords Securely http://www.securingthehuman.org/resources/newsletters/ouch/2013#May2013
2013-05-07Jim ClausingNGINX updates address buffer overflow (CVE-2013-2028) see http://nginx.org/en/CHANGES-1.4
2013-05-04Kevin ShorttThe Zero-Day Pendulum Swings
2013-05-01Daniel WesemannThe cost of cleaning up
2013-04-28Russ McReeSANS's Alan Paller discusses the threat of cyberterrorism on CNN
2013-04-26Russ McReeWhat is "up to date anti-virus software"?
2013-04-25Adam SwangerSANS 2013 Forensics Survey - https://www.surveymonkey.com/s/2013SANSForensicsSurvey
2013-04-25Adam SwangerGuest Diary: Dylan Johnson - A week in the life of some Perimeter Firewalls
2013-04-23Russ McReeMicrosoft's Security Intelligence Report (SIRv14) released
2013-04-21John BambenekA Chargen-based DDoS? Chargen is still a thing?
2013-04-19Russ McReeJava 8 release schedule delayed for renewed focus on security
2013-04-18John BambenekISC Handler Lenny Zeltser's REMnux v4 Reviewed on Hak5
2013-04-17John BambenekUPDATEDx1: Boston-Related Malware Campaigns Have Begun - Now with Waco Plant Explosion Fun
2013-04-16John BambenekFake Boston Marathon Scams Update
2013-04-15Rob VandenBrinkOops - You Mean That Deleted Server was a Certificate Authority?
2013-04-15John BambenekPlease send any spam (full headers), URLs or other suspicious content scamming off Boston Marathon explosions to handlers@sans.org
2013-04-14Johannes UllrichProtocol 61 Packets Follow Up
2013-04-10Manuel Humberto Santander PelaezMassive Google scam sent by email to Colombian domains
2013-04-09Swa FrantzenMicrosoft April 2013 Black Tuesday Overview
2013-04-04Adam SwangerApril 2013 OUCH! - Protecting Your Kids Online http://www.securingthehuman.org/resources/newsletters/ouch/2013#april2013
2013-04-04Johannes UllrichPostgresql Patches Critical Vulnerability
2013-04-04Johannes UllrichMicrosoft April Patch Tuesday Advance Notification
2013-04-03Mark HofmanFirefox 20 and Thunderbird 17.0.5 updates
2013-04-03Mark HofmanNew release of snort is available Snort 2.9.4.5, details on www.snort.org (thanks Bill)
2013-03-28John BambenekWhere Were You During the Great DDoS Cybergeddon of 2013?
2013-03-27Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - IPv6 moving target defense
2013-03-27Rob VandenBrinkSourcefire VRT Community ruleset is live
2013-03-26Daniel WesemannHow your Webhosting Account is Getting Abused
2013-03-25Johannes UllrichIPv6 Focus Month: IPv6 over IPv4 Preference
2013-03-23Guy BruneauApple ID Two-step Verification Now Available in some Countries
2013-03-22Mark BaggettWipe the drive! Stealthy Malware Persistence - Part 4
2013-03-20Mark BaggettWipe the drive! Stealthy Malware Persistence - Part 3
2013-03-19Johannes UllrichWindows 7 SP1 and Windows Server 2008 R2 SP1 Being "pushed" today
2013-03-19Johannes UllrichScam of the day: More fake CNN e-mails
2013-03-18Kevin ShorttCisco IOS Type 4 Password Issue: http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20130318-type4
2013-03-18Kevin ShorttSpamhaus DDOS
2013-03-15Mark BaggettAVG detect legit file as virus
2013-03-14Mark BaggettWipe the drive! Stealthy Malware Persistence - Part 2
2013-03-13Mark BaggettWipe the drive! Stealthy Malware Persistence Mechanism - Part 1
2013-03-13Johannes UllrichIPv6 Focus Month: Kaspersky Firewall IPv6 Vulnerability
2013-03-12Swa FrantzenMicrosoft March 2013 Black Tuesday Overview
2013-03-09Guy BruneauIPv6 Focus Month: IPv6 Encapsulation - Protocol 41
2013-03-08Johannes UllrichIPv6 Focus Month: Filtering ICMPv6 at the Border
2013-03-07Guy BruneauWireshark Security Updates
2013-03-07Guy BruneauApple Blocking Java Web plug-in
2013-03-06Adam SwangerMarch 2013 OUCH! - Social Networking Safely http://www.securingthehuman.org/resources/newsletters/ouch/2013#march2013
2013-03-06Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - Geolocation Using IPv6 Addresses
2013-03-05Mark HofmanIPv6 Focus Month: Device Defaults
2013-03-04Johannes UllrichIPv6 Focus Month: Addresses
2013-03-03Richard PorterUptick in MSSQL Activity
2013-03-02Scott FendleyEvernote Security Issue
2013-03-02Scott FendleyApple Blocks Older Insecure Versions of Flash Player
2013-02-28Daniel WesemannParsing Windows Eventlogs in Powershell
2013-02-27Adam SwangerGuest Diary: Dylan Johnson - There's value in them there logs!
2013-02-25Johannes UllrichTrustwave Trustkeeper Phish
2013-02-25Johannes UllrichPunkspider enumerates web application vulnerabilities
2013-02-25Kevin ListonWhy I think you should try Bro
2013-02-25Johannes UllrichMass-Customized Malware Lures: Don't trust your cat!
2013-02-22Chris MohanPHP 5.4.12 and PHP 5.3.22 released http://www.php.net/ChangeLog-5.php
2013-02-22Chris MohanVMware releases new and updated security advisories
2013-02-22Johannes UllrichZendesk breach affects Tumblr/Pinterest/Twitter
2013-02-22Johannes UllrichWhen web sites go bad: bible . org compromise
2013-02-22Johannes UllrichWhat has Iran been up to lately?
2013-02-21Pedro BuenoNBC site redirecting to Exploit kit
2013-02-21Bojan ZdrnjaSSHD rootkit in the wild
2013-02-20Manuel Humberto Santander PelaezSANS SCADA Summit at Orlando - Bigger problems and so far from getting them solved
2013-02-20Johannes UllrichUpdate Palooza
2013-02-19Johannes UllrichOracle Updates Java (Java 7 Update 15, Java 6 update 41)
2013-02-19Johannes UllrichFirefox 19 Release with various security fixes.
2013-02-17Guy BruneauHP ArcSight Connector Appliance and Logger Vulnerabilities
2013-02-17Guy BruneauAdobe Acrobat and Reader Security Update Planned this Week
2013-02-16Lorna HutchesonFedora RedHat Vulnerabilty Released
2013-02-14Adam SwangerISC Monthly Threat Update - February 2013 http://isc.sans.edu/podcastdetail.html?id=3121
2013-02-13Swa FrantzenMore adobe reader and acrobat (PDF) trouble
2013-02-12Adam SwangerMicrosoft February 2013 Black Tuesday Update - Overview
2013-02-11John BambenekIs This Chinese Registrar Really Trying to XSS Me?
2013-02-08Kevin ShorttIs it Spam or Is it Malware?
2013-02-08Johannes UllrichVMWare Advisories (ESX, Workstation, Fusion...) http://www.vmware.com/security/advisories/VMSA-2013-0002.html
2013-02-08Johannes UllrichMicrosoft February Patch Tuesday Advance Notification
2013-02-06Adam SwangerFebruary 2013 OUCH! - Email Phishing Attacks http://www.securingthehuman.org/resources/newsletters/ouch/2013#february2013
2013-02-06Adam SwangerSysinternals in particular Process Explorer update https://blogs.technet.com/b/sysinternals/?Redirected=true
2013-02-06Johannes UllrichHTTP Range Header and Partial Downloads
2013-02-06Kevin ShorttFirefox updated to 18.02 -> https://www.mozilla.org/en-US/firefox/18.0.2/releasenotes/
2013-02-06Johannes UllrichAre you losing system logging information (and don't know it)?
2013-02-06Johannes UllrichIntel Network Card (82574L) Packet of Death
2013-02-04Russ McReeAn expose of a recent SANS GIAC XSS vulnerability
2013-02-04Adam SwangerSAN Securing The Human Monthly Awareness Video - Advanced Persistent Threat (APT) http://www.securingthehuman.org/resources/ncsam
2013-02-03Lorna HutchesonIs it Really an Attack?
2013-02-02Kevin ListonTwitter Confirms Compromise of Approximately 250,000 Users
2013-02-01Jim ClausingVMware vSphere security updates for the authentication service and third party libraries (see http://www.vmware.com/security/advisories/VMSA-2013-0001.html)
2013-02-01Jim ClausingOracle quitely releases Java 7u13 early
2013-01-30Richard PorterGetting Involved with the Local Community
2013-01-27Tony CarothersHP JetDirect Vulnerabilities Discussed
2013-01-25Johannes UllrichVulnerability Scans via Search Engines (Request for Logs)
2013-01-19Guy BruneauJava 7 Update 11 Still has a Flaw
2013-01-18Russ McReeInteresting reads for Friday 18 JAN 2013
2013-01-18Russ McReeSourcefire VRT rules update addresses remote stack buffer overflow in rule 3:20275
2013-01-15Rob VandenBrinkWhen Disabling IE6 (or Java, or whatever) is not an Option...
2013-01-15Russ McReeCisco introducing Cisco Security Notices 16 JAN 2013
2013-01-14Richard PorterJanuary 2013 Microsoft Out of Cycle Patch
2013-01-13Stephen HallSysinternals Updates
2013-01-12Stephen HallOracle Patch Tuesday Pre-Release
2013-01-10Rob VandenBrinkWhat Else runs Telnets? Or, Pentesters Love Video Conferencing Units Too!
2013-01-10Adam SwangerISC Monthly Threat Update New Format
2013-01-10Adam SwangerJanuary 2013 OUCH! - Dangers of Java http://www.securingthehuman.org/resources/newsletters/ouch/2013#january2013
2013-01-09Rob VandenBrinkSQL Injection Flaw in Ruby on Rails
2013-01-09Richard PorterThe 80's called - They Want Their Mainframe Back!
2013-01-09Rob VandenBrinkHotmail seeing some temporary access issues
2013-01-09Rob VandenBrinkFirefox and Thunderbird Updates
2013-01-09Rob VandenBrinkSecurity Updates for Adobe Reader / Acrobat - http://www.adobe.com/support/security/bulletins/apsb13-02.html
2013-01-09Johannes UllrichNew Format for Monthly Threat Update
2013-01-09Rob VandenBrinkSecurity Update - Cisco Prime LMS (cisco-sa-20130109-lms - remote execution as root vulnerability) - advisory at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-lms
2013-01-09Rob VandenBrinkSecurity Update - Cisco 7900 Phones - cisco-sa-20130109-uipphone privilege escallation issue - advisory at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone
2013-01-08Jim ClausingCuckoo 0.5 is out and the world didn't end
2013-01-08Richard PorterYahoo Web Interface Report: Compose and Send
2013-01-08Richard PorterA picture worth a 1000 barcodes?
2013-01-08Richard PorterMicrosoft January 2013 Black Tuesday Update - Overview
2013-01-08Richard PorterFirefox 18 Released, Security Fixes http://www.mozilla.org/security/known-vulnerabilities/firefox.html
2013-01-07Adam SwangerPlease consider participating in our 2013 ISC StormCast survey at http://www.surveymonkey.com/s/stormcast
2013-01-05Guy BruneauD-link Wireless-G Router Year Issue (Y2K-plus-13)
2013-01-05Guy BruneauAdobe ColdFusion Security Advisory
2013-01-04Daniel WesemannBlue for Reset?
2013-01-04Daniel WesemannPatch pre-notification from Adobe and Microsoft
2013-01-03Bojan ZdrnjaMemory acquisition traps
2013-01-03Manuel Humberto Santander PelaezNew year and new CA compromised
2013-01-02Russ McReeEMET 3.5: The Value of Looking Through an Attacker's Eyes
2013-01-01Johannes UllrichFixIt Available for Internet Explorer Vulnerability
2012-12-31Manuel Humberto Santander PelaezHow to determine which NAC solutions fits best to your needs
2012-12-27John BambenekIt's 3pm 2 days after Christmas, do you know where your unmanaged SSH keys are?
2012-12-22Guy BruneauNew Poll - Which of the following issues impacted the most your business in 2012? - https://isc.sans.edu/poll.html
2012-12-20Daniel WesemannWhite House strategy on security information sharing and safeguarding
2012-12-18Dan GoldbergMitigating the impact of organizational change: a risk assessment
2012-12-18Rob VandenBrinkAll I Want for Christmas is to Not Get Hacked !
2012-12-16Tony CarothersSSH Brute Force on Non-Standard Ports
2012-12-14Adam SwangerISC Feature of the Week: Webhoneypot: Web Server Log Project
2012-12-13Adam SwangerDecember 2012 OUCH! - Seven Steps to a Secure Computer http://www.securingthehuman.org/resources/newsletters/ouch/2012#december2012
2012-12-11John BambenekMicrosoft December 2012 Black Tuesday Update - Overview
2012-12-07Adam SwangerISC Feature of the Week: Glossary Additions
2012-12-06Johannes UllrichHow to identify if you are behind a "Transparent Proxy"
2012-12-06Daniel WesemannFake tech support calls - revisited
2012-12-06Daniel WesemannRich Quick Make Money!
2012-12-04Johannes UllrichWhere do your backup tapes go to die?
2012-12-03Kevin ListonMobile Malware: Request for Field Reports
2012-12-03John BambenekJohn McAfee Exposes His Location in Photo About His Being on Run
2012-12-03Kevin ListonRecent SSH vulnerabilities
2012-12-02Guy BruneauZero Day MySQL Buffer Overflow
2012-12-01Guy BruneauFirefox 17.0.1 Bug Fixes - http://www.mozilla.org/en-US/firefox/17.0.1/releasenotes/
2012-11-29Adam SwangerISC Feature of the Week: SSH Scan Reports
2012-11-29Kevin ShorttNew Apple Security Update: APPLE-SA-2012-11-29-1 Apple TV 5.1.1
2012-11-28Mark HofmanMcAfee releases extraDAT for W32/Autorun.worm.aaeb-h
2012-11-28Mark HofmanNew version of wireshark is available (1.8.4), some security fixes included.
2012-11-27Chris MohanCan users' phish emails be a security admin's catch of the day?
2012-11-26John BambenekOnline Shopping for the Holidays? Tips, News and a Fair Warning
2012-11-23Rob VandenBrinkRisk Assessment Reloaded (thanks PCI ! )
2012-11-23Rob VandenBrinkWhat's in Your Change Control Form?
2012-11-22Kevin ListonGreek National Arrested on Suspicion of Theft of 9M Records on Fellow Greeks
2012-11-20John BambenekBehind the Random NTP Bizarreness of Incorrect Year Being Set
2012-11-20John BambenekFirefox v 17.0 just released, more here: http://www.mozilla.org/en-US/firefox/17.0/releasenotes/
2012-11-19John BambenekMoneyGram fined $100 million for aiding wire fraud - http://krebsonsecurity.com/2012/11/moneygram-fined-100-million-for-wire-fraud/
2012-11-19John BambenekNew Poll: Top 5 Unresolved Security Problems of 2012
2012-11-18Guy BruneauFreeBSD Project Servers Compromised - http://www.freebsd.org/news/2012-compromise.html
2012-11-17Manuel Humberto Santander PelaezNew Sysinternal Updates: AdExplorer v1.44, Contig v1.7, Coreinfo v3.2, Procdump v5.1. See http://blogs.technet.com/b/sysinternals/archive/2012/11/16/updates-adexplorer-v1-44-contig-v1-7-coreinfo-v3-2-procdump-v5-1.aspx?Redirected=true
2012-11-16Guy BruneauVMware security updates for vSphere API and ESX Service Console - http://www.vmware.com/security/advisories/VMSA-2012-0016.html
2012-11-16Manuel Humberto Santander PelaezInformation Security Incidents are now a concern for colombian government
2012-11-15Jim ClausingAnother month another password disclosure breach
2012-11-14Adam SwangerNovember 2012 OUCH! - Two-Factor Authentication http://www.securingthehuman.org/resources/newsletters/ouch#2012
2012-11-13Jim ClausingMicrosoft November 2012 Black Tuesday Update - Overview
2012-11-12John BambenekRequest for info: Robocall Phishing Against Local/Regional Banks
2012-11-09Mark BaggettRemote Diagnostics with PSR
2012-11-09Mark BaggettFresh batch of Microsoft patches next week
2012-11-08Daniel WesemannAdobe Patches
2012-11-07Mark BaggettHelp eliminate unquoted path vulnerabilities
2012-11-07Mark BaggettMultiple 0-Days Reported!
2012-11-07Mark BaggettCisco TACACS+ Authentication Bypass
2012-11-05Johannes UllrichReminder: Ongoing SMTP Brute Forcing Attacks
2012-11-05Johannes UllrichPossible Fake-AV Ads from Doubleclick Servers
2012-11-04Lorna HutchesonWhat's important on your network?
2012-11-02Daniel WesemannThe shortcomings of anti-virus software
2012-11-02Daniel WesemannLamiabiocasa
2012-11-01Daniel WesemannPatched your Java yet?
2012-10-31Johannes UllrichCyber Security Awareness Month - Day 31 - Business Continuity and Disaster Recovery
2012-10-30Johannes UllrichHurricane Sandy Update
2012-10-30Richard PorterSplunk 5.0 SP-CAAAHB4 http://www.splunk.com/view/SP-CAAAHB4
2012-10-30Mark HofmanCyber Security Awareness Month - Day 30 - DSD 35 mitigating controls
2012-10-29Kevin ShorttCyber Security Awareness Month - Day 29 - Clear Desk: The Unacquainted Standard
2012-10-28Tony CarothersFirefox 16.02 Released
2012-10-26Adam SwangerSecuring the Human Special Webcast - October 30, 2012
2012-10-26Russ McReeCyber Security Awareness Month - Day 26 - Attackers use trusted domain to propagate Citadel Zeus variant
2012-10-25Richard PorterCyber Security Awareness Month - Day 25 - Pro Audio & Video Packets on the Wire
2012-10-24Rob VandenBrinkTime to run Windows Update - - Microsoft Updates KB2755801 for Windows RT / IE10 / Flash Player - http://technet.microsoft.com/en-us/security/advisory/2755801
2012-10-24Russ McReeCyber Security Awareness Month - Day 24 - A Standard for Information Security Incident Management - ISO 27035
2012-10-24Russ McReeOngoing Windstream outage in the midwest - https://twitter.com/search?q=windstream
2012-10-23Rob VandenBrinkCyber Security Awareness Month - Day 23: Character Encoding Standards - ASCII and Successors
2012-10-21Johannes UllrichCyber Security Awareness Month - Day 22: Connectors
2012-10-21Lorna HutchesonPotential Phish for Regular Webmail Accounts
2012-10-19Johannes UllrichCyber Security Awareness Month - Day 19: Standard log formats and CEE.
2012-10-18Rob VandenBrinkCyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide
2012-10-17Mark HofmanOracle Critical Patch Update October
2012-10-17Mark HofmanNew Acrobat release (including reader) available. Version 11. Some security improvements more here -->http://blogs.adobe.com/adobereader/
2012-10-17Rob VandenBrinkCyber Security Awareness Month - Day 17 - A Standard for Risk Management - ISO 27005
2012-10-16Richard PorterCyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook.
2012-10-16Johannes UllrichCyber Security Awareness Month - Day 16: W3C and HTML
2012-10-14Pedro BuenoCyber Security Awareness Month - Day 14 - Poor Man's File Analysis System - Part 1
2012-10-13Guy BruneauNew Poll - Cyber Security Awareness Month Activities 2012 - https://isc.sans.edu/poll.html
2012-10-12Mark HofmanCyber Security Awareness Month - Day 12 PCI DSS
2012-10-11Rob VandenBrinkFirefox 16 / Thunderbird 16 updates
2012-10-11Rob VandenBrinkCyber Security Awareness Month - Day 11 - Vendor Agnostic Standards (Center for Internet Security)
2012-10-10Kevin ShorttCyber Security Awareness Month - Day 10 - Standard Sudo - Part Two
2012-10-09Johannes UllrichAdobe Flash Player update http://www.adobe.com/support/security/bulletins/apsb12-22.html
2012-10-09Johannes UllrichCyber Security Awreness Month - Day 9 - Request for Comment (RFC)
2012-10-09Johannes UllrichMicrosoft October 2012 Black Tuesday Update - Overview
2012-10-08Mark HofmanCyber Security Awareness Month - Day 8 ISO 27001
2012-10-07Tony CarothersCyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1
2012-10-06Manuel Humberto Santander PelaezCyber Security Awareness Month - Day 6 - NERC: The standard that enforces security on power SCADA
2012-10-05Johannes UllrichCyber Security Awareness Month - Day 5: Standards Body Soup, So many Flavors in the bowl.
2012-10-05Richard PorterReports of a Distributed Injection Scan
2012-10-05Richard PorterVMWare Security Advisory: VMSA-2012-0014 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html
2012-10-05Adam SwangerISC Feature of the Week: Report Fake Tech Support Call Statistics
2012-10-04Mark HofmanAnd the SHA-3 title goes to .....Keccak
2012-10-04Johannes UllrichCyber Security Awareness Month - Day 4: Crypto Standards
2012-10-04Johannes UllrichMicrosoft October Patch Pre-Announcement
2012-10-03Adam SwangerOctober 2012 OUCH! - Losing Your Mobile Device http://www.securingthehuman.org/resources/newsletters/ouch#2012
2012-10-03Kevin ShorttFake Support Calls Reported
2012-10-03Kevin ShorttCyber Security Awareness Month - Day 3 - Standard Sudo - Part One
2012-10-02Russ McReeCyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines
2012-10-01Johannes UllrichCyber Security Awareness Month
2012-09-28Joel EslerAdobe certification revocation for October 4th
2012-09-27Kevin ShorttCisco IOS Security Advisory Bundle - http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep12.html
2012-09-27Adam SwangerISC Feature of the Week: Glossary
2012-09-26Johannes UllrichSome Android phones can be reset to factory default by clicking on links
2012-09-26Johannes UllrichMore Java Woes
2012-09-23Tony CarothersUpdate for CVE-2012-3132
2012-09-21Johannes UllrichiOS 6 Security Roundup
2012-09-21Guy BruneauStoring your Collection of Malware Samples with Malwarehouse
2012-09-20Russ McReeFlash Player update but no announcement, check your version http://www.adobe.com/software/flash/about/
2012-09-20Russ McReeApple and Cisco Security Advisories 19 SEP 2012
2012-09-20Russ McReeFinancial sector advisory: attacks and threats against financial institutions
2012-09-19Russ McReeScript kiddie scavenging with Shellbot.S
2012-09-19Kevin ListonVolatility: 2.2 is Coming Soon
2012-09-17Rob VandenBrinkIE Zero Day is "For Real"
2012-09-17Rob VandenBrinkWhat's on your iPad?
2012-09-14Lenny ZeltserAnalyzing Malicious RTF Files Using OfficeMalScanner's RTFScan
2012-09-14Lenny ZeltserScam Report - Fake Voice Mail Email Notification Redirects to Malicious Site
2012-09-14Adam SwangerISC Feature of the Week: Privacy Policy
2012-09-13Mark BaggettTCP Fuzzing with Scapy
2012-09-13Mark BaggettMicrosoft disrupts traffic associated with the Nitol botnet
2012-09-13Mark BaggettMore SSL trouble
2012-09-12Adam SwangerSeptember 2012 OUCH! - Hacked: Now What? http://www.securingthehuman.org/resources/newsletters/ouch#2012
2012-09-11Adam SwangerMicrosoft September 2012 Black Tuesday Update - Overview
2012-09-10Johannes UllrichMicrosoft Patch Tuesday Pre-Release
2012-09-10Johannes UllrichGodaddy DDoS Attack
2012-09-10donald smithBlue Toad publishing co compromise lead to UDID release. http://redtape.nbcnews.com/_news/2012/09/10/13781440-exclusive-the-real-source-of-apple-device-ids-leaked-by-anonymous-last-week?lite
2012-09-09Guy BruneauPhishing/Spam Pretending to be from BBB
2012-09-07Chris MohanKeeping an eye on those BYODs with DHCP
2012-09-06Johannes UllrichSSL Requests sent to port 80 (request for help/input)
2012-09-04Johannes UllrichAnother round of "Spot the Exploit E-Mail"
2012-09-02Lorna HutchesonDemonstrating the value of your Intrusion Detection Program and Analysts
2012-09-01Russ McReeBlackhole targeting Java vulnerability via fake Microsoft Services Agreement email phish
2012-08-31Johannes UllrichVMware Updates
2012-08-31Russ McReeNot so fast: Java 7 Update 7 critical vulnerability discovered in less than 24 hours
2012-08-30Bojan ZdrnjaAnalyzing outgoing network traffic (part 2)
2012-08-30Johannes UllrichEditorial: The Slumlord Approach to Network Security http://isc.sans.edu/j/editorial
2012-08-29Johannes Ullrich"Data" URLs used for in-URL phishing
2012-08-28Johannes UllrichFirefox 15 Released (includes silent future updates) http://www.mozilla.org/en-US/firefox/15.0/releasenotes/buglist.html
2012-08-27Johannes UllrichThe Good, Bad and Ugly about Assigning IPv6 Addresses
2012-08-27Johannes UllrichMalware Spam harvesting Facebook Information
2012-08-26Lorna HutchesonWho ya gonna contact?
2012-08-23Bojan ZdrnjaAnalyzing outgoing network traffic
2012-08-23Adam SwangerISC Feature of the Week: Contact Us
2012-08-22Adrien de BeaupreApple Remote Desktop update fixes no encryption issue
2012-08-22Adrien de BeauprePhishing/spam via SMS
2012-08-21Adrien de BeaupreYYABCAFU - Yes Yet Another Bleeping Critical Adobe Flash Update
2012-08-21Adrien de BeaupreRuggedCom fails key management 101 on Rugged Operating System (ROS)
2012-08-20Manuel Humberto Santander PelaezDo we need test procedures in our companies before implementing Antivirus signatures?
2012-08-19Manuel Humberto Santander PelaezAuthentication Issues between entities during protocol message exchange in SCADA Systems
2012-08-17Guy BruneauSuspicious eFax Spear Phishing Messages
2012-08-16Johannes UllrichA Poor Man's DNS Anomaly Detection Script
2012-08-15Guy BruneauWireshark Security Update
2012-08-15Guy BruneauCisco IOS XR Software Route Processor DoS Vulnerability - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120530-iosxr
2012-08-14Rick WannerMicrosoft August 2012 Black Tuesday Update - Overview
2012-08-14Rick WannerBacktrack 5 r3 released - http://www.backtrack-linux.org/downloads/
2012-08-12Tony CarothersLayers of the Defense-in-Depth Onion
2012-08-12Tony CarothersOracle Security Alert for CVE-2012-3132
2012-08-10Adam SwangerISC Feature of the Week: Report Fake Tech Support Calls
2012-08-09Mark HofmanZeus/Citadel variant causing issues in the Netherlands
2012-08-09Adam SwangerAugust 2012 OUCH! - Counterfeit Websites http://www.securingthehuman.org/resources/newsletters/ouch#2012
2012-08-09Mark HofmanSQL Injection Lilupophilupop style, Part 2
2012-08-08Adrien de Beaupresnort updated to 2.9.3.1 Changelog: http://www.snort.org/downloads/1837
2012-08-07Adrien de BeaupreWho protects small business?
2012-08-05Daniel WesemannPhishing for Payroll with unpatched Java
2012-08-04Adam SwangerISC Feature of the Week: Handler Select News Feed
2012-08-04Kevin ListonVendors: More Patch-Release Options Please
2012-08-03Guy BruneauFlash Player 11.3.300.270 for Windows released to address a crash - http://forums.adobe.com/message/4594596#4594596
2012-08-02Guy BruneauOpera Security Update
2012-08-01Johannes UllrichGoogle Chrome 21 and getUserMedia API
2012-07-30Guy BruneauEnd of Days for MS-CHAPv2
2012-07-27Daniel WesemannCuckoo 0.4 is out - cool new features for malware analysis http://www.cuckoosandbox.org/
2012-07-26Adam SwangerISC Feature of the Week: The 404Project - now with IP Mask
2012-07-25Johannes UllrichApple Releases Safari 6
2012-07-25Johannes UllrichMicrosoft Exchange/Sharepoint and others: Oracle Outside In Vulnerability
2012-07-24Richard PorterWireshark 1.8.1 Released http://www.wireshark.org/
2012-07-24Richard PorterReport of spike in DNS Queries gd21.net
2012-07-23Johannes UllrichMost Anti-Privacy Web Browsing Tool Ever?
2012-07-21Rick WannerOpenDNS is looking for a few good malware people!
2012-07-20Mark BaggettSyria Internet connection cut?
2012-07-19Mark BaggettDiagnosing Malware with Resource Monitor
2012-07-19Mark BaggettA Heap of Overflows?
2012-07-18Rob VandenBrinkSnort Updated today
2012-07-18Rob VandenBrinkVote NO to Weak Keys!
2012-07-18Rob VandenBrinkVote NO to Weak Encryption!
2012-07-17Jim ClausingFirefox 14.0.1, Thunderbird 14.0 out - both claim security fixes, but release notes not updated yet with security details
2012-07-16Jim ClausingAn analysis of the Yahoo! passwords
2012-07-16Richard PorterSysinternals Update @ http://blogs.technet.com/b/sysinternals/archive/2012/07/16/updates-handle-v3-5-process-explorer-v15-22-process-monitor-v3-03-rammap-v1-21-zoomit-v4-3.aspx
2012-07-15Guy BruneauOracle July 2012 Critical Patch Pre-Release Announcement
2012-07-14Tony CarothersUser Awareness and Education
2012-07-13Richard PorterYesterday (not as on the ball as Rob) at SANSFire
2012-07-13Russ McRee2 for 1: SANSFIRE & MSRA presentations
2012-07-13Russ McReeVMWare Security Advisory 12 JUL 2012
2012-07-13Russ McReeYahoo service SQL injection vuln leads to account exposure
2012-07-12Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms
2012-07-12Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Recording Server - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs
2012-07-12Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts
2012-07-12Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Manager - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman
2012-07-12Rob VandenBrinkToday at SANSFIRE - Dude Your Car is PWND !
2012-07-12Adam SwangerISC Feature of the Week: Internet Storm Center Events
2012-07-11Adam SwangerJuly 2012 OUCH! - The Tech-Support Phone Call Scam http://www.securingthehuman.org/resources/newsletters/ouch#2012
2012-07-11Rick WannerExcellent Security Education Resources
2012-07-10Swa FrantzenMicrosoft fix-it to disable gadgets - SA 2719662
2012-07-10Swa FrantzenMicrosoft July 2012 Black Tuesday Update - Overview
2012-07-10Rob VandenBrinkToday at SANSFIRE (09 July 2012) - ISC Panel Discussion on the State of the Internet
2012-07-10Swa FrantzenMicrosoft revoking trust in Microsoft certificates - SA 2728973
2012-07-09Johannes UllrichThe FBI will turn off the Internet on Monday (or not)
2012-07-09Manuel Humberto Santander PelaezInternet Storm Center panel tonight at SANSFIRE 2012!
2012-07-05Adrien de BeaupreNew OS X trojan backdoor MaControl variant reported
2012-07-05Adrien de BeaupreMicrosoft advanced notification for July 2012 patch Tuesday
2012-07-02Joel EslerA rough guide to keeping your website up
2012-07-02Dan GoldbergStorms of June 29th 2012 in Mid Atlantic region of the USA
2012-07-02Joel EslerLinux & Java leap second bug
2012-06-29Jim ClausingUpdated SysInternals tools - Autoruns, Process Explorer, Process Monitor, PSKill -- http://blogs.technet.com/b/sysinternals/archive/2012/06/28/updates-autoruns-v11-32-process-explorer-v15-21-process-monitor-v3-02-pskill-v1-15-rammap-v1-2.aspx
2012-06-28Chris MohanMassive spike in BGP traffic - Possible BGP poisoning?
2012-06-28Adam SwangerISC Feature of the Week: About the Internet Storm Center
2012-06-27Daniel WesemannWhat's up with port 79 ?
2012-06-27Swa FrantzenOnline Banking Heists
2012-06-26Daniel WesemannRun, Forest! (Update)
2012-06-25Rick WannerTargeted Malware for Industrial Espionage?
2012-06-25Swa FrantzenBelgian online banking customers hacked.
2012-06-25Guy BruneauUsing JSDetox to Analyze and Deobfuscate Javascript
2012-06-22Kevin ListonUpdated Poll: Which Patch Delivery Schedule Works the Best for You?
2012-06-22Adam SwangerISC Feature of the Week: Tools->ISC At-A-Glance
2012-06-22Daniel WesemannRun, Forest!
2012-06-21Russ McReeCisco Security Advisories 20 JUN 2012
2012-06-21Raul SilesPrint Bomb? (Take 2)
2012-06-21Russ McReeAnalysis of drive-by attack sample set
2012-06-21Russ McReeWireshark 1.8.0 released 21 JUN 2012 http://www.wireshark.org/download.html
2012-06-20Raul SilesFirefox 13.0.1 Update
2012-06-20Raul SilesCVE-2012-0217 (from MS12-042) applies to other environments too
2012-06-19Daniel Wesemann Vulnerabilityqueerprocessbrittleness
2012-06-14Johannes UllrichVMWare Security Advisories
2012-06-14Johannes UllrichSpot the Phish: Verizon Wireless
2012-06-13Johannes UllrichMicrosoft Certificate Updater
2012-06-12Swa FrantzenMicrosoft June 2012 Black Tuesday Update - Overview
2012-06-12Swa FrantzenMicrosoft Security Advisory 2719615 - MSXML - CVE-2012-1889
2012-06-11Johannes UllrichMicrosoft Update Security
2012-06-07Adam SwangerJune 2012 OUCH! - Using The Cloud Safely http://www.securingthehuman.org/resources/newsletters/ouch#2012
2012-06-07Johannes UllrichMicrosoft June Security Bulletin Advance Notification
2012-06-06Jim ClausingFirefox, Thunderbird, and Seamonkey Security Updates
2012-06-06Jim ClausingPotential leak of 6.5+ million LinkedIn password hashes
2012-06-05Adam SwangerISC Feature of the Week: IPv6 Preparedness and Tools
2012-06-04Lenny ZeltserDecoding Common XOR Obfuscation in Malicious Code
2012-06-04Rob VandenBrinkvSphere 5.0 Hardening Guide Officially Released
2012-06-04Johannes UllrichMicrosoft Emergency Bulletin: Unauthorized Certificate used in "Flame"
2012-06-04Rob VandenBrinkBrowsers and SSL Security - a Race to the Bottom !
2012-06-01Adam SwangerISC Feature of the Week: Country and Region Report
2012-05-31Johannes UllrichSCADA@Home: Your health is no secret no more!
2012-05-30Rob VandenBrinkToo Big to Fail / Too Big to Learn?
2012-05-30Rob VandenBrinkIt's Phishing Season! In fact, it's ALWAYS Phishing Season!
2012-05-25Guy BruneauGoogle Publish Transparency Report
2012-05-25Guy BruneauVMware vMA Security Advisory VMSA-2012-0010 - http://www.vmware.com/security/advisories/VMSA-2012-0010.html
2012-05-24Adam SwangerISC Feature of the Week: Country Report
2012-05-23Mark BaggettProblems with MS12-035 affecting XP, SBS and Windows 2003?
2012-05-22Johannes Ullrichnmap 6 released
2012-05-22Johannes UllrichThe "Do Not Track" header
2012-05-22Johannes UllrichWhen factors collapse and two factor authentication becomes one.
2012-05-21Kevin ShorttDNS ANY Request Cannon - Need More Packets
2012-05-18Johannes UllrichZTE Score M Android Phone backdoor
2012-05-17Johannes UllrichDo Firewalls make sense?
2012-05-17Johannes UllrichNew IPv6 Video: IPv6 Router Advertisements https://isc.sans.edu/ipv6videos
2012-05-17Adam SwangerISC Feature of the Week: Tools->Information Gathering
2012-05-16Johannes UllrichMicrosoft released an update for its Enhanced Mitigation Experience Tool (EMET) http://blogs.technet.com/b/srd/archive/2012/05/15/introducing-emet-v3.aspx
2012-05-16Johannes UllrichReserved IP Address Space Reminder
2012-05-16Johannes UllrichNew Version of Google Chrome released (19.0.1084.46)
2012-05-16Johannes UllrichAvira Antivirus false positives http://forum.avira.com/wbb/index.php?page=Thread&threadID=144875
2012-05-16Johannes UllrichGot Packets? Odd duplicate DNS replies from 10.x IP Addresses
2012-05-14Chris MohanLaptops at Security Conferences
2012-05-11Adam SwangerISC Feature of the Week: Link List
2012-05-10Kevin ShorttSafari 5.1.7 - an interesting feature
2012-05-08Bojan ZdrnjaWindows Firewall Bypass Vulnerability and NetBIOS NS
2012-05-07Guy BruneauiOS 5.1.1 Software Update for iPod, iPhone, iPad
2012-05-06Jim ClausingTool updates and Win 8
2012-05-05Tony CarothersVulnerability Assessment Program - Discussions
2012-05-05Tony CarothersVulnerability Exploit for Snow Leopard
2012-05-04Adam SwangerISC Feature of the Week: Data/Reports
2012-05-04Guy BruneauAdobe Security Flash Update
2012-05-03Adam SwangerMay 2012 OUCH! - Safely Disposing of Your Mobile Device - http://bit.ly/ja6TMH
2012-05-03Guy BruneauVMware Critical Security Issues Advisory - http://www.vmware.com/security/advisories/VMSA-2012-0009.html
2012-05-02Bojan ZdrnjaMonitoring VMWare logs
2012-04-30Rob VandenBrinkFCC posts Enquiry Documents on Google Wardriving
2012-04-30Rob VandenBrinkPatch for Oracle TNS Listener issue released !
2012-04-27Johannes UllrichCritical Unpatched Oracle Vulnerability
2012-04-27Adam SwangerISC Feature of the Week: Handler Created Tools
2012-04-26Richard PorterPacketstorm Security and Metasploit have Exploit code for MS12-027
2012-04-26Richard PorterDefine Irony: A medical device with a Virus?
2012-04-25Daniel WesemannBlacole's obfuscated JavaScript
2012-04-25Daniel WesemannBlacole's shell code
2012-04-23Russ McReeEmergency Operations Centers & Security Incident Management: A Correlation
2012-04-21Guy BruneauWordPress Release Security Update
2012-04-18Kevin ShorttSysinternals Updates - 2012 Apr 17
2012-04-18Kevin ShorttOracle Critical Patch Update Advisory - April 2012: http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html
2012-04-18Adam SwangerISC Feature of the Week: Suspicious Domains
2012-04-15Rick Wanner.Net update affects printing from some applications
2012-04-14Rick WannerFlashback Trojan Removal Tool Released
2012-04-13Daniel WesemannOracle CPU Patches announced for Apr 17
2012-04-13Adam SwangerISC Feature of the Week: Get to know the Handlers
2012-04-13Daniel WesemannAnti-virus scanning exclusions
2012-04-13Daniel WesemannVMware ESX/ESXi privilege escalation vuln. advisory: http://www.vmware.com/security/advisories/VMSA-2012-0007.html
2012-04-12Guy BruneauHP ProCurve 5400 zl Switch, Flash Cards Infected with Malware
2012-04-12Guy Bruneauwicd Privilege Escalation 0day exploit for Backtrack 5 R2
2012-04-12Guy BruneauApple Java Updates for Mac OS X
2012-04-10Swa FrantzenAdobe April 2012 Black Tuesday Update
2012-04-09Johannes UllrichNot your Parent's Wireless Threat
2012-04-06Johannes UllrichSocial Share Privacy
2012-04-06Johannes UllrichMicrosoft April Patch Tuesday Pre-Announcement (6 Patches): http://technet.microsoft.com/en-us/security/bulletin/ms12-apr
2012-04-05Adam SwangerApril 2012 OUCH! - Metadata http://www.securingthehuman.org/resources/newsletters/ouch#2012
2012-04-05Johannes UllrichEvil hides everywhere: Web Application Exploits in Headers
2012-04-04Adam SwangerISC Feature of the Week: Diary/Infocon/Event Notifications
2012-04-02Johannes UllrichSHA 1-2-3
2012-03-28Kevin ShorttAdobe Flash Player APSB12-07 - 28 March 2012
2012-03-27Adam SwangerISC Feature of the Week: ISC Poll
2012-03-27Guy BruneauWireshark 1.6.6 and 1.4.2 Released
2012-03-27Guy BruneauOpera 11.62 for Windows patch several bugs and vulnerabilities - http://www.opera.com/docs/changelogs/windows/1162/
2012-03-27Johannes UllrichFirefox 3.6 EOL
2012-03-25Daniel Wesemannevilcode.class
2012-03-21Adam SwangerISC Feature of the Week: Presentations and Papers
2012-03-20Johannes UllrichA Reminder: Private Key Security
2012-03-16Guy BruneauVMware New and Updated Security Advisories
2012-03-16Russ McReeMS12-020 RDP vulnerabilities: Patch, Mitigate, Detect
2012-03-15Adam SwangerISC Feature of the Week: Infocon
2012-03-12Johannes UllrichApple Released Safari 5.1.4
2012-03-12Guy BruneauOpenSSL Security Update
2012-03-11Johannes UllrichAn Analysis of Jester's QR Code Attack. (Guest Diary)
2012-03-09Guy BruneauVMware New and Updated Advisories
2012-03-08Adam SwangerMarch 2012 OUCH! - The Dos and Don'ts of Email http://bit.ly/ja6TMH
2012-03-08Johannes UllrichMicrosoft March Patch Tuesday Pre-Anouncement out. 6 patches, 1 critical: http://technet.microsoft.com/en-us/security/bulletin/ms12-mar
2012-03-07Johannes UllrichWhat happened to RFI attacks?
2012-03-06Adam SwangerISC Feature of the Week: Follow us on Twitter
2012-03-05Johannes UllrichAdobe Flash Player Security Update
2012-03-05Johannes UllrichFlashback Malware now with Twitter C&C
2012-03-03Jim ClausingNew automated sandbox for Android malware
2012-03-01Bojan ZdrnjaMonitoring Remote Desktop Services logs ... or not?
2012-02-29Adam SwangerISC Feature of the Week: 404Project Reports
2012-02-29Russ McReeCisco Security Advisories - 29FEB2011
2012-02-27Johannes UllrichOdd Vanishing Signatures in OS X XProtect
2012-02-24Guy BruneauBlackBerry PlayBook tablet Samba file sharing Vulnerability - http://www.blackberry.com/btsc/KB29565
2012-02-24Guy BruneauCisco Small Business SRP 500 Series Multiple Vulnerabilities - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120223-srp500
2012-02-24Guy BruneauFlashback Trojan in the Wild
2012-02-23donald smithDNS-Changer "clean DNS" extension requested
2012-02-22Adam SwangerISC Feature of the Week: Handler Diaries
2012-02-20Johannes UllrichThe Ultimate OS X Hardening Guide Collection
2012-02-20Pedro BuenoSimple Malware Research Tools
2012-02-20Rick WannerDNSChanger resolver shutdown deadline is March 8th
2012-02-16Johannes UllrichAdobe Flash Player Update
2012-02-16Tony CarothersJava Update for February
2012-02-15Adam SwangerISC Feature of the Week: XML Feeds
2012-02-14Johannes UllrichAdobe Shockwave Player and RoboHelp for Word Patches
2012-02-11Mark HofmanYet another version of Firefox has been released. One security fix. More info can be found here: https://www.mozilla.org/en-US/firefox/10.0.1/releasenotes/
2012-02-09Adam SwangerFebruary 2012 OUCH! - Securing Your Mobile Device Apps http://www.securingthehuman.org/resources/newsletters/ouch#2012
2012-02-08Jim ClausingChrome to stop checking Certificate Revocation List (CRL)?
2012-02-07Jim ClausingBook Review: Practical Packet Analysis, 2nd ed
2012-02-07Adam SwangerISC Feature of the Week: Security Dashboard
2012-02-04Scott FendleyApple Security Advisory 2012-001 v1.1
2012-02-01Adam SwangerISC Feature of the Week: ISC Search
2012-02-01Russ McReeOracle Security Alert: http://www.oracle.com/technetwork/topics/security/alert-cve-2011-5035-1506603.html
2012-01-31Russ McReeFirefox 10 and VMWare advisories and updates
2012-01-27Mark HofmanCISCO Ironport C & M Series telnet vulnerability
2012-01-25Adam SwangerISC Feature of the Week: ISC Link Back
2012-01-25Bojan ZdrnjapcAnywhere users – patch now!
2012-01-22Johannes UllrichJavascript DDoS Tool Analysis
2012-01-18Richard PorterOracle Quarterly Released, http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html
2012-01-18Adam SwangerISC Feature of the Week: The 404Project
2012-01-16Kevin ShorttZappos Breached
2012-01-14Daniel WesemannHello, Antony!
2012-01-13Adam SwangerJanuary 2012 OUCH! released - This month we focus on how to secure home Wi-Fi networks, now in German also! http://bit.ly/ja6TMH
2012-01-13Guy BruneauSysinternals Updates - http://blogs.technet.com/b/sysinternals/archive/2012/01/13/updates-autoruns-v11-21-coreinfo-v3-03-portmon-v-3-03-process-explorer-v15-12-mark-s-blog-and-mark-at-rsa-2012.aspx
2012-01-12Rob VandenBrinkStuff I Learned Scripting - Fun with STDERR
2012-01-11Adrien de BeaupreNew wireshark released - 1.6.5 and 1.4.11 - www.wireshark.org/download.html
2012-01-11Adam SwangerISC Feature of the Week: Internet Storm Center / DShield API
2012-01-10Adrien de BeaupreJanuary 2012 Microsoft Black Tuesday Summary
2012-01-07Scott FendleyGoogle Chrome Updated
2012-01-06Guy BruneauJanuary 2012 Patch Tuesday Pre-release
2012-01-05Russ McReeOpenSSL vulnerability fixes
2012-01-05Russ McReeWordPress 3.3.1 fixes 15 issues with WordPress 3.3 including XSS. Download 3.3.1 or visit Dashboard --> Updates in your site admin panel.
2012-01-03Rick WannerAnalysis of the Stratfor Password List
2012-01-03Bojan ZdrnjaThe tale of obfuscated JavaScript continues
2012-01-03Adam SwangerISC Feature of the Week: How to Submit Firewall Logs
2011-12-29Richard PorterASP.Net Vulnerability
2011-12-28Daniel Wesemann.nl.ai ?
2011-12-28Daniel WesemannHash collisions vulnerability in web servers
2011-12-26Deborah HaleBadware 2011
2011-12-25Deborah HaleMerry Christmas, Happy Holidays
2011-12-25Deborah HaleAnother Company Falls Victim
2011-12-23Daniel WesemannPrinter Pranks
2011-12-22Johannes UllrichFirefox 9 Security Fixes
2011-12-21Chris MohanFirefox 9 has been released patching known vulnerabilities http://www.mozilla.org/security/known-vulnerabilities/firefox.html#firefox9
2011-12-19Guy BruneauProcess Explorer Update 15.11 with bugfixes - http://technet.microsoft.com/en-us/sysinternals/bb896653
2011-12-13Johannes UllrichDecember 2011 Microsoft Black Tuesday Summary
2011-12-12Daniel WesemannYou won 100$ or a free iPad!
2011-12-10Daniel WesemannUnwanted Presents
2011-12-08Adrien de BeaupreNewest Adobe Flash 11.1.102.55 and Previous 0 Day Exploit
2011-12-08Adrien de BeaupreMicrosoft Security Bulletin Advance Notification for December 2011
2011-12-07Lenny ZeltserAdobe Acrobat Latest Zero-Day Vulnerability Fix Coming to All Platforms by January 10
2011-12-07Lenny ZeltserV8 as an Alternative to SpiderMonkey for JavaScript Deobfuscation
2011-12-06Pedro BuenoThe RedRet connection...
2011-12-04Guy BruneauSSH Password Brute Forcing may be on the Rise
2011-11-29John BambenekHacking HP Printers for Fun and Profit
2011-11-28Tom ListonA Puzzlement...
2011-11-22Pedro BuenoUpdates on ZeroAccess and BlackHole front...
2011-11-19Pedro BuenoDragon Research Group (DRG) announced the white paper entitled "VNC: Threats and Countermeasures" : https://dragonresearchgroup.org/insight/vnc-tac.html
2011-11-18Kevin ListonRecent VMWare security advisories
2011-11-18Kevin ListonFujacks Variant Using ACH Lure
2011-11-16Adrien de BeaupreGET BACK TO ME ASAP
2011-11-11Rick WannerAPPLE-SA-2011-11-10-2 Time Capsule and AirPort Base Station (802.11n) Firmware 7.6 update
2011-11-11Rick WannerAdobe Air updated to 3.1.0.4880
2011-11-11Rick WannerYay! More Sysinternals updates! http://technet.microsoft.com/en-us/sysinternals
2011-11-10Rob VandenBrinkStuff I Learned Scripting - - Parsing XML in a One-Liner
2011-11-09Russ McReeOperation Ghost Click: FBI bags crime ring responsible for $14 million in losses
2011-11-08Swa FrantzenFirefox 8.0 released
2011-11-07Rob VandenBrinkStuff I Learned Scripting - Evaluating a Remote SSL Certificate
2011-11-07Rob VandenBrinkJuniper BGP issues causing locallized Internet Problems
2011-11-06Tom ListonNew, odd SSH brute force behavior
2011-11-04Guy BruneauDuqu Mitigation
2011-11-03Richard PorterAn Apple, Inc. Sandbox to play in.
2011-11-03Guy BruneauNovember 2011 Patch Tuesday Pre-release
2011-11-02Russ McReeWireshark updates: 1.6.3 and 1.4.10 released
2011-11-01Russ McReeHoneynet Project: Android Reverse Engineering (A.R.E.) Virtual Machine released
2011-11-01Russ McReeSecure languages & frameworks
2011-10-29Richard PorterThe Sub Critical Control? Evidence Collection
2011-10-28Russ McReeCritical Control 19: Data Recovery Capability
2011-10-28Daniel WesemannCritical Control 20: Security Skills Assessment and Training to fill Gaps
2011-10-27Mark BaggettCritical Control 18: Incident Response Capabilities
2011-10-26Rick WannerCritical Control 17:Penetration Tests and Red Team Exercises
2011-10-26Rob VandenBrinkThe Theoretical "SSL Renegotiation" Issue gets a Whole Lot More Real !
2011-10-25Chris MohanRecurring reporting made easy?
2011-10-22Guy BruneauOracle Java SE Critical Patch Update
2011-10-20Johannes UllrichEvil Printers Sending Mail
2011-10-19Mark HofmanOracle Critical Patch Update
2011-10-18Rob VandenBrinkJava SE 6 Update 29 - http://www.oracle.com/technetwork/java/javase/6u29-relnotes-507960.html . Of particular interest is the Blocklist feature (introduced in 6u14) - http://www.oracle.com/technetwork/java/javase/6u14-137039.html#blocklist-jar-6u14
2011-10-17Rob VandenBrinkCritical Control 11: Account Monitoring and Control
2011-10-13Johannes UllrichCritical OS X Vulnerability Patched
2011-10-13Kevin ShorttVMware ESXi and ESX updates to third party libraries and ESX Service Console - http://www.vmware.com/security/advisories/VMSA-2011-0012.html
2011-10-13Kevin ShorttDennis M. Ritchie (1941 - 2011)
2011-10-13Guy BruneauCritical Control 10: Continuous Vulnerability Assessment and Remediation
2011-10-12Kevin ShorttCritical Control 8 - Controlled Use of Administrative Privileges
2011-10-11Swa FrantzenCritical Control 7 - Application Software Security
2011-10-11Swa FrantzenMicrosoft Security Intelligence Report (SIR) - Volume 11
2011-10-10Jim ClausingCritical Control 6 - Maintenance, Monitoring, and Analysis of Security Audit Logs
2011-10-10Tom ListonWhat's In A Name?
2011-10-07Mark HofmanCritical Control 5 - Boundary Defence
2011-10-05Jim ClausingVMware Advisory - UDF file system handling
2011-10-04Rob VandenBrinkCritical Control 2 - Inventory of Authorized and Unauthorized Software
2011-10-04Johannes UllrichCritical Control 3 - Secure Configurations for Hardware and Software on Laptops, Workstations and Servers
2011-10-03Mark HofmanCritical Control 1 - Inventory of Authorized and Unauthorized Devices
2011-10-03Mark BaggettWhat are the 20 Critical Controls?
2011-10-03Tom ListonSecurity 101 : Security Basics in 140 Characters Or Less
2011-10-02Mark HofmanCyber Security Awareness Month Day 1/2 - Schedule
2011-10-02Mark HofmanCyber Security Awareness Month Day 1/2 - Introduction to the controls
2011-10-01Mark HofmanHot on the heels fo FF, Thunderbird v 7.0.1 and SeaMonkey v 2.4.1 have been updated.
2011-09-30Tony CarothersFirefox v. 7.0.1 Is Live
2011-09-30Tony CarothersMicrosoft Security Essentials Mis-identifes Chrome
2011-09-29Daniel WesemannThe SSD dilemma
2011-09-28Richard PorterAll Along the ARP Tower!
2011-09-27Jason LamFirefox 3.6.23 security update is out and so is version 7 (time to break some add-on)
2011-09-26Jason LamMySQL.com compromised spreading malware
2011-09-21Mark HofmanOctober 2011 Cyber Security Awareness Month
2011-09-20Swa FrantzenDiginotar declared bankrupt
2011-09-19Guy BruneauMS Security Advisory Update - Fraudulent DigiNotar Certificates
2011-09-18Guy BruneauGoogle Chrome Security Updates
2011-09-15Swa FrantzenDigiNotar looses their accreditation for qualified certificates
2011-09-15Johannes UllrichSeptember OUCH! awareness newsletter released - How to use social networking sites safely. http://bit.ly/ja6TMH
2011-09-13Swa FrantzenMore DigiNotar intermediate certificates blocklisted at Microsoft
2011-09-12Johannes UllrichMore RDP Worm Variants?
2011-09-09Rob VandenBrinkWireshark 1.62 (Newest Stable Release) is out !! ==> http://www.wireshark.org/download.html
2011-09-09Guy BruneauAdobe plan to release critical security updates next Tuesday for Acrobat and Reader http://www.adobe.com/support/security/bulletins/apsb11-24.html
2011-09-09Johannes UllrichLarge power outage in Southern California may last until Friday. http://www.sdge.com
2011-09-09Johannes UllrichEarly Patch Tuesday Today: Microsoft September 2011 Patches
2011-09-09Guy BruneauApple Certificate Trust Policy Update
2011-09-09Guy BruneauAdobe Publish its List of Trusted Root Certificate - http://www.adobe.com/security/approved-trust-list.html
2011-09-08Rob VandenBrinkWhen Good CA's go Bad: Other Things to Check in Your Datacenter
2011-09-08Mark HofmanMicrosoft has released their advanced notification for patch Tuesday. 15 Vulnerabilities to be addressed. more here --> http://blogs.technet.com/b/msrc/archive/2011/09/08/advanced-notification-for-the-september-2011-bulletin-release.aspx
2011-09-07Lenny ZeltserAnalyzing Mobile Device Malware - Honeynet Forensic Challenge 9 and Some Tools
2011-09-07Lenny ZeltserGlobalSign Temporarily Stops Issuing Certificates to Investigate a Potential Breach
2011-09-06Swa FrantzenDigiNotar audit - intermediate report available
2011-09-06Johannes UllrichMicrosoft Releases Diginotar Related Patch and Advisory
2011-09-06Guy BruneauFirefox 6.0.2 released to removed trust to DigiNotar certificate authority http://www.mozilla.org/en-US/firefox/6.0.2/releasenotes/
2011-09-05Bojan ZdrnjaBitcoin – crypto currency of future or heaven for criminals?
2011-09-04Lorna HutchesonSeveral Sites Defaced
2011-09-01Swa FrantzenDigiNotar breach - the story so far
2011-08-31Johannes UllrichFirefox/Thunderbird 6.0.1 released to blocklist bad DigiNotar SSL certificates
2011-08-31Johannes UllrichKernel.org Compromise
2011-08-30Scott FendleyCisco Security Advisory - Apache HTTPd DoS
2011-08-29Kevin ShorttInternet Worm in the Wild
2011-08-26Daniel WesemannUser Agent 007
2011-08-26Johannes UllrichSANS Virginia Beach Conference Canceled. Details: http://www.sans.org/virginia-beach-2011/
2011-08-26Johannes UllrichSome Hurricane Technology Tips
2011-08-25Kevin ShorttIncreased Traffic on Port 3389
2011-08-24Rob VandenBrinkDisaster Preparedness - Are We Shaken or Stirred?
2011-08-24Rob VandenBrinkCitrix Access Gateway Cross Site Scripting vulnerability and fix ==> http://support.citrix.com/article/CTX129971
2011-08-24Rob VandenBrinkGoogle Chrome 13.0.782.215 Released, several security updates ==> http://googlechromereleases.blogspot.com/2011/08/stable-channel-update_22.html
2011-08-17Johannes UllrichAugust edition of security awareness newsletter OUCH! released. Focus: Updating your Software http://t.co/ftRVetZ
2011-08-17Rob VandenBrinkPutting all of Your Eggs in One Basket - or How NOT to do Layoffs
2011-08-17Rob VandenBrinkSysinternal updates for ProcDump v4.0, Process Monitor v2.96, Process Explorer v15.02 ==> http://blogs.technet.com/b/sysinternals/
2011-08-16Scott FendleyPhishing Scam Victim Response
2011-08-16Scott FendleyFirefox 3.6.20 Corrects Several Critical Vulnerabilities
2011-08-15Rob VandenBrink8 Years since the Eastern Seaboard Blackout - Has it Been that Long?
2011-08-14Guy BruneauFireCAT 2.0 Released
2011-08-14Guy BruneauTelex - A Radical New Approach to Bypass Security
2011-08-11Johannes UllrichAs part of this weeks patch tuesday, microsoft also re-release MS11-043 to address stability issues.
2011-08-11Guy BruneauBlackBerry Enterprise Server Critical Update
2011-08-10Johannes UllrichTheoretical and Practical Password Entropy
2011-08-09Swa FrantzenMicrosoft August 2011 Black Tuesday Overview
2011-08-05Johannes UllrichCommon Web Attacks. A quick 404 project update
2011-08-05Johannes UllrichMicrosoft Patch Tuesday Advance Notification: 13 Bulletins coming http://www.microsoft.com/technet/security/Bulletin/MS11-aug.mspx
2011-08-05donald smithNew Mac Trojan: BASH/QHost.WB
2011-08-05Johannes UllrichForensics: SIFT Kit 2.1 now available for download http://computer-forensics.sans.org/community/downloads
2011-08-04Johannes UllrichIRC traffic on non standard ports
2011-08-03Johannes UllrichPort 3389 / terminal services scans
2011-08-03Johannes UllrichMalicious Images: What's a QR Code
2011-08-02Mark HofmanSSH Brute Force attacks
2011-07-31Daniel WesemannAnatomy of a Unix breach
2011-07-30Deborah HaleData Encryption Ban? Really?
2011-07-29Richard PorterApple Lion talking on TCP 5223
2011-07-28Guy BruneauXenApp and XenDesktop could result in Arbitrary Code Execution
2011-07-28Johannes UllrichAnnouncing: The "404 Project"
2011-07-25Chris MohanMonday morning incident handler practice
2011-07-25Johannes UllrichApple released patch for iWork security issue http://support.apple.com/kb/HT1222
2011-07-23Johannes UllrichApple Battery Firmware Default Password
2011-07-21Mark HofmanLion Released
2011-07-19Richard PorterSMS Phishing at the SANSFire 2011 Handler Dinner
2011-07-17Mark HofmanSSH Brute Force
2011-07-15Deborah HaleWhat's in a Firewall?
2011-07-14Guy BruneauBlackberry Server Security Update - http://btsc.webapps.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB27258
2011-07-13Kevin ShorttFirefox Update 5.0.1 Available - http://www.mozilla.com/en-US/firefox/new/
2011-07-13Guy BruneauNew Sguil HTTPRY Agent
2011-07-10Raul SilesSecurity Testing SSL/TLS (HTTPS) Implementations
2011-07-10Raul SilesJailbreakme Takes Advantage of 0-day PDF Vuln in Apple iOS Devices
2011-07-09Tony CarothersCopyright Alert System - What say you?
2011-07-09Chris MohanSafer Windows Incident Response
2011-07-05Raul SilesHelping Developers Understand Security - Spot the Vuln
2011-07-04Deborah HaleVSFTP Backdoor in Source Code
2011-07-02Pedro BuenoBootkits, they are back at full speed...
2011-06-30Guy BruneauSymantec Report - Spam Surge against Social Networks
2011-06-30Guy BruneauWordPress 3.1.4 Security Update - http://wordpress.org/news/2011/06/wordpress-3-1-4/
2011-06-30Rob VandenBrinkUpdate for RSA Authentication Manager
2011-06-29Johannes UllrichRandom SSL Tips and Tricks
2011-06-28Johannes UllrichHashing Passwords
2011-06-28Johannes UllrichUpdate: Opera 11.50 is now available http://www.opera.com/
2011-06-28Johannes UllrichUpdate: Google Chrome 12.0.742.112 released http://googlechromereleases.blogspot.com/2011/06/stable-channel-update_28.html
2011-06-28Johannes UllrichUpdate: Thunderbird 5.0 released. https://www.mozilla.org/en-US/thunderbird/
2011-06-23Jim ClausingApple Security Updates 2011-004
2011-06-22Guy BruneauWordPress Forces Password Reset
2011-06-22Guy BruneauHow Good is your Employee Termination Policy?
2011-06-21Guy BruneauFirefox 5.0 is out with support Do Not Track on Multiple Platform - http://www.mozilla.com/en-US/firefox/new/
2011-06-21Chris MohanStartSSL, a web authentication authority, suspend services after a security breach
2011-06-21Chris MohanAustralian government security audit report shows tough love to agencies
2011-06-19Guy BruneauSega Pass Compromised - 1.29 Million Customers Data Leaked
2011-06-17Richard PorterWhen do you stop owning Technology?
2011-06-15Pedro BuenoHit by MacDefender, Apple Web Security (name your Mac FakeAV here)...
2011-06-15Johannes UllrichLatest issue of "Ouch!" is out http://www.securingthehuman.org/resources/newsletters/ouch
2011-06-14Swa FrantzenMicrosoft June 2011 Black Tuesday Overview
2011-06-13Bojan ZdrnjaHarry Potter and the Rogue anti-virus: Part 1
2011-06-12Mark HofmanCloud thoughts
2011-06-09Richard PorterChrome Version 12.0.742.91 Released
2011-06-09Richard PorterOne Browser to Rule them All?
2011-06-07Johannes UllrichRSA Offers to Replace Tokens
2011-06-06Manuel Humberto Santander PelaezPhishing: Same goal, same techniques and people still falling for such scams
2011-06-04Rick WannerDo you have a personal disaster recovery plan?
2011-06-03Guy BruneauRelease of Wireshark 1.6.0rc2
2011-06-02Johannes UllrichSome Insight into Apple's Anti-Virus Signatures
2011-06-01Adrien de BeaupreWireshark 1.4.7 and 1.2.17 Released - http://www.wireshark.org/news/20110531.html
2011-06-01Adrien de BeaupreCisco Security Advisory: Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series - http://www.cisco.com/warp/public/707/cisco-sa-20110601-phone.shtml
2011-06-01Adrien de BeaupreCisco Security Advisory: Default Credentials Vulnerability in Cisco Network Registrar - http://www.cisco.com/warp/public/707/cisco-sa-20110601-cnr.shtml
2011-06-01Adrien de BeaupreCisco Security Advisory: Default Credentials for root Account on the Cisco Media Experience Engine 5600 - http://www.cisco.com/warp/public/707/cisco-sa-20110601-mxe.shtml
2011-06-01Johannes UllrichEnabling Privacy Enhanced Addresses for IPv6
2011-06-01Adrien de BeaupreCisco Security Advisory: Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client - http://www.cisco.com/warp/public/707/cisco-sa-20110601-ac.shtml
2011-05-31Chris MohanGetting the IT security word out there to the rest of the world
2011-05-31Johannes UllrichApple Improving OS X Anti-Malware Feature
2011-05-30Johannes UllrichAllied Telesis Passwords Leaked
2011-05-30Johannes UllrichLockheed Martin and RSA Tokens
2011-05-26Swa FrantzenMacDefender ups the ante with removing the password need for installation
2011-05-25Daniel WesemannApple advisory on "MacDefender" malware
2011-05-25Lenny ZeltserMonitoring Social Media for Security References to Your Organization
2011-05-25Daniel WesemannFive new Cisco security advisories released. See http://www.cisco.com/go/psirt
2011-05-23Mark HofmanMicrosoft Support Scam (again)
2011-05-22Kevin ShorttFacebook goes two-factor
2011-05-21Daniel WesemannWeekend reading
2011-05-20Guy BruneauDistributed Denial of Service Cheat Sheet
2011-05-20Guy BruneauCommon Vulnerability Reporting Framework (CVRF)
2011-05-20Guy BruneauSysinternals Updates, Analyzing Stuxnet Infection with Sysinternals Tools Part 3
2011-05-19Daniel WesemannFake AV Bingo
2011-05-18Bojan ZdrnjaAndroid, HTTP and authentication tokens
2011-05-17Johannes UllrichA Couple Days of Logs: Looking for the Russian Business Network
2011-05-16Jason LamFirefox 3.5 forced upgrade coming soon
2011-05-14Guy BruneauWebsense Study Claims Canada Next Hotbed for Cybercrime Web Hosting Activity
2011-05-13Jason LamMicrosoft Security Intelligence Report volume 10
2011-05-10Swa FrantzenMay 2011 Microsoft Black Tuesday Overview
2011-05-10Swa FrantzenBacktrack 5 released
2011-05-10Swa FrantzenChanging MO in scamming our users ?
2011-05-10Swa FrantzenTime to change your facebook password?
2011-05-09Rick WannerSerious flaw in OpenID
2011-05-09Rick WannerVUPEN Security pwns Google Chrome
2011-05-09Johannes UllrichPatch for BIND 9.8.0 DoS Vulnerability
2011-05-08Lorna HutchesonMonitoring Virtual Machines
2011-05-06Richard PorterUpdated Exploit Index for Microsoft
2011-05-06Richard PorterUnpatched Exploit: Skype for MAC
2011-05-04Richard PorterMicrosoft Sysinterals Update
2011-05-03Johannes UllrichAnalyzing Teredo with tshark and Wireshark
2011-05-03Johannes UllrichUpdate on Osama Bin Laden themed Malware
2011-05-02Johannes UllrichBin Laden Death Related Malware
2011-05-01Deborah HaleDroid MarketPlace Has a New App
2011-04-29Guy BruneauFirefox, Thunderbird and SeaMonkey Security Updates
2011-04-29Guy BruneauIncident Response Methodologies Worm Infection Cheat Sheet
2011-04-28Chris MohanCisco Security Advisories
2011-04-28Chris MohanGathering and use of location information fears - or is it all a bit too late
2011-04-28Guy BruneauVMware ESXi 4.1 Security and Firmware Updates
2011-04-28Chris MohanDSL Reports advise 9,000 accounts were compromised
2011-04-26John BambenekIs the Insider Threat Really Over?
2011-04-25Rob VandenBrinkWhat's Your (IP) Address Worth?
2011-04-25Rob VandenBrinkSony PlayStation Network Outage - Day 5
2011-04-23Manuel Humberto Santander PelaezImage search can lead to malware download
2011-04-22Manuel Humberto Santander PelaezIn-house developed applications: The constant headache for the information security officer
2011-04-21Guy BruneauSilverlight Update Available
2011-04-21Guy BruneauAdobe Reader and Acrobat Security Updates
2011-04-20Daniel WesemannData Breach Investigations Report published by Verizon
2011-04-20Daniel WesemannVirustotal.com hiccup
2011-04-18John BambenekWordpress.com Security Breach
2011-04-16Scott FendleyNew Versions of Wireshark released
2011-04-16Scott FendleyOracle Patch Update Pre-Release Announcement
2011-04-14Adrien de BeaupreSysinternals updates, a new blog post, and webcast
2011-04-13Johannes UllrichApril issue of SANS Security Awareness Newsletter is out http://www.securingthehuman.org/resources/ouch
2011-04-11Johannes UllrichLayer 2 DoS and other IPv6 Tricks
2011-04-11Jim ClausingApril 2011 Microsoft Black Tuesday Summary
2011-04-10Raul SilesRecent security enhancements in web browsers (e.g. Google Chrome)
2011-04-10Raul SilesPros and Cons of "Secure" Wi-Fi Access
2011-04-08Johannes UllrichDark Black Tuesday Coming Up: 17 Microsoft Bulletins
2011-04-07Chris MohanBeing a good internet neighbour
2011-04-04Mark HofmanWhen your service provider has a breach
2011-04-03Richard PorterExtreme Disclosure? Not yet but a great trend!
2011-04-02Rick WannerRSA/EMC: Anatomy of a compromise
2011-03-30Adrien de BeaupreTwo Cisco advisories: cisco-sa-20110330-nac and cisco-sa-20110330-acs
2011-03-29Daniel WesemannMaking sense of RSA ACE server audit logs
2011-03-29Daniel WesemannRequesting deletion of "free" email and chat accounts
2011-03-29Daniel WesemannMalware emails with fake cellphone invoice
2011-03-27Guy BruneauStrange Shockwave File with Surprising Attachments
2011-03-25Kevin ListonAPT Tabletop Exercise
2011-03-25Rob VandenBrinkThe Recent RSA Breach - Imagining the Worst Case, And Why it Isn't Time to Panic (Yet)
2011-03-23Johannes UllrichFirefox 4 Security Features
2011-03-23Johannes UllrichFirefox 3 Updates and SSL Blocklist extension
2011-03-22Kevin ShorttAdobe Reader/Acrobat Security Update - http://www.adobe.com/support/security/bulletins/apsb11-06.html
2011-03-21Kevin ShorttAPPLE-SA-2011-03-21-1 Mac OS X v10.6.7 and Security Update 2011-001
2011-03-21Kevin ShorttPort 1434: Sudden Slammer Decline?
2011-03-18Chris MohanRSA Breach Notification
2011-03-17Kevin ListonSo You Got an AV Alert. Now What?
2011-03-16Johannes UllrichAnalyzing HTTP Packet Captures
2011-03-14Bojan ZdrnjaTsunami in Japan and self modifying RogueAV code
2011-03-11Guy BruneauSnort IDS Sensor with Sguil Framework ISO
2011-03-11Guy BruneauJapan Earthquake: Possible scams / malware
2011-03-09Kevin ShorttAVG Anti-Virus 2011 False Positives - Luhe.Exploit.PDF.B
2011-03-09Kevin ShorttGoogle Chrome Updates Available - just in time for Pwn2Own
2011-03-09Chris MohanPossible Issue with Forefront Update KB2508823
2011-03-08Jim ClausingVMware ESX/ESXi security updates released, see http://www.vmware.com/security/advisories/VMSA-2011-0004.html
2011-03-08Jim ClausingMarch 2011 Microsoft Black Tuesday Summary
2011-03-07Bojan ZdrnjaOracle padding attacks (Codegate crypto 400 writeup)
2011-03-05Mark HofmanNot surprisingly Thunderbird was also updated. Details here --> http://www.mozillamessaging.com/en-US/thunderbird/3.1.9/releasenotes/
2011-03-04Mark HofmanAnd a new version of Firefox (thx all) hits the road, Version 3.6.15 more details here http://www.mozilla.com/en-US/firefox/3.6.15/releasenotes/ (and I agree it was a bit quick after 3.6.14)
2011-03-03Manuel Humberto Santander PelaezRogue apps inside Android Marketplace
2011-03-02Chris MohanMicrosoft’s Autorun update v2.1 now automatically deployed from Windows Update
2011-03-02Chris MohanUpdates: Firefox 3.6.14/3.5.17, Thunderbird 3.1.8, Adobe Flash v10.2.152.32 & WireShark 1.4.4
2011-03-01Daniel WesemannAV software and "sharing samples"
2011-02-26Rick WannerFirefox 4 Beta 12 released
2011-02-25Johannes UllrichThunderbolt Security Speculations
2011-02-24Johannes UllrichWindows 7 / 2008 R2 Service Pack 1 Problems
2011-02-23Johannes UllrichWindows 7 Service Pack 1 out
2011-02-22Bojan ZdrnjaHBGary hack: lessons learned
2011-02-21Adrien de BeaupreWinamp forums compromised
2011-02-21Adrien de BeaupreKaspersky update servers unreachable
2011-02-19Guy BruneauSnort Data Acquisition Library
2011-02-15Jason LamOracle Java 6 Update 24
2011-02-15Jason LamHTTP headers fun
2011-02-14Lorna HutchesonNetwork Visualization
2011-02-14Richard PorterAnonymous Damage Control Anybody?
2011-02-11Kevin Johnson Two-Factor Auth: Can we just Google the response?
2011-02-10Chris MohanLinksys WAP610N has Unauthenticated Root Console issue
2011-02-10Chris MohanBefriending Windows Security Log Events
2011-02-09Mark HofmanAdobe Patches (shockwave, Flash, Reader & Coldfusion)
2011-02-09Mark HofmanJava Floating point issue (CVE-2010-4476)
2011-02-08Chris MohanVMWare Security Advisory
2011-02-08Mark HofmanWordPress 3.0.5 (and 3.1 RC4) are out
2011-02-07Pedro BuenoThe Good , the Bad and the Unknown Online Scanners
2011-02-07Richard PorterCrime is still Crime! Pt 2
2011-02-05Guy BruneauOpenSSH Legacy Certificate Information Disclosure Vulnerability
2011-02-04Daniel WesemannOh, just click "yes"
2011-02-02Johannes UllrichHaving Phish on Friday
2011-02-02Chris MohanDefault Credentials for Root Account on Cisco Personal Video units
2011-02-01Lenny ZeltserThe Importance of HTTP Headers When Investigating Malicious Sites
2011-01-30Richard PorterThe Modern Dark Ages?
2011-01-29Mark HofmanSourceforge attack
2011-01-27Chris CarboniOpera Updates
2011-01-27Robert DanfordMicrosoft Security Advisory for MHTML via Internet Explorer (MS2501696/CVE-2011-0096)
2011-01-26Bojan ZdrnjaGoogle Chrome and (weird) DNS requests
2011-01-25Johannes UllrichPacket Tricks with xxd
2011-01-25Chris MohanReviewing our preconceptions
2011-01-24Rob VandenBrinkWhere have all the COM Ports Gone? - How enumerating COM ports led to me finding a “misplaced” Microsoft tool
2011-01-23Richard PorterCrime is still Crime!
2011-01-20Manuel Humberto Santander PelaezPossible new Twitter worm
2011-01-19Johannes UllrichMicrosoft's Secure Developer Tools
2011-01-18Daniel WesemannYet another rogue anti-virus
2011-01-18Daniel WesemannOracle Patches (Jan2011 CPU)
2011-01-15Jim ClausingWhat's up with port 8881?
2011-01-13Rob VandenBrinkIs Infosec seeing "Death by a Thousand Budget Cuts"?
2011-01-13Rob VandenBrinkBlackberry BES Server Updates for PDF Vulnerabilities
2011-01-13Rob VandenBrinkGoogle Chrome 8.0.552.237 and Chrome OS 8.0.552.334 released ==> http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html and http://www.kb.cert.org/vuls/id/258423
2011-01-12Richard PorterYet Another Data Broker? AOL Lifestream.
2011-01-12Richard PorterHow Many Loyalty Cards do you Carry?
2011-01-12Richard PorterHas Big Brother gone Global?
2011-01-10Manuel Humberto Santander PelaezFacebook virus spreads via photo album chat messages
2011-01-10Manuel Humberto Santander PelaezVirusTotal VTzilla firefox/chrome plugin
2011-01-08Guy BruneauPandaLabs 2010 Annual Report
2011-01-08Guy BruneauJanuary 2011 Patch Tuesday Pre-release
2011-01-05Johannes UllrichVMWare Security Advisory VMSA-2011-0001
2011-01-05Johannes UllrichSurvey: Software Security Awareness Training
2011-01-05Johannes UllrichCurrently Unpatched Windows / Internet Explorer Vulnerabilities
2011-01-04Johannes UllrichMicrosoft Advisory: Vulnerability in Graphics Rendering Engine
2011-01-03Johannes UllrichWhat Will Matter in 2011
2010-12-31Bojan ZdrnjaAndroid malware enters 2011
2010-12-30Johannes UllrichCritcal Wordpress Security Update http://wordpress.org/news/2010/12/3-0-4-update/
2010-12-30Rick WannerSamuraiWTF Review over at ISSA Toolsmith
2010-12-29Daniel WesemannMalware Domains 2234.in, 0000002.in & co
2010-12-29Daniel WesemannBeware of strange web sites bearing gifts ...
2010-12-28Johannes UllrichNew annual survey: Please help us improve. http://isc.sans.edu/survey (redirect to surveymonkey)
2010-12-28John BambenekMozilla Notifies of Relatively Minor Security Breach
2010-12-27Johannes UllrichVarious sites "Owned and Exposed"
2010-12-25Manuel Humberto Santander PelaezAn interesting vulnerability playground to learn application vulnerabilities
2010-12-24Daniel WesemannA question of class
2010-12-23Mark HofmanWhite house greeting cards
2010-12-22John BambenekIIS 7.5 0-Day DoS (processing FTP requests)
2010-12-21Rob VandenBrinkNetwork Reliability, Part 2 - HSRP Attacks and Defenses
2010-12-20Guy BruneauHighlight of Survey Related to Issues Affecting Businesses in 2010
2010-12-20Guy BruneauPatch Issues with Outlook 2007
2010-12-19Raul SilesIntel's new processors have a remote kill switch (Anti-Theft 3.0)
2010-12-18Raul SilesWhere are the Wi-Fi Driver Vulnerabilities?
2010-12-18Raul SilesGoogle Chrome (Stable and Beta) have been updated to 8.0.552.224 for all platforms (Chrome OS too). http://bit.ly/fW04cr
2010-12-15Manuel Humberto Santander PelaezVulnerability in the PDF distiller of the BlackBerry Attachment Service
2010-12-15Johannes UllrichOpenBSD IPSec "Backdoor"
2010-12-15Manuel Humberto Santander PelaezHP StorageWorks P2000 G3 MSA hardcoded user
2010-12-14Manuel Humberto Santander PelaezDecember 2010 Microsoft Black Tuesday Summary
2010-12-13Deborah HaleGawker Media Breach of Security
2010-12-13Deborah HaleThe Week to Top All Weeks
2010-12-12Raul SilesNew trend regarding web application vulnerabilities?
2010-12-10Mark HofmanEXIM MTA vulnerability
2010-12-10Mark HofmanMicrosoft patches
2010-12-09Mark HofmanFirefox version 3.6.13 is being pushed out, time to update (thanks Vincent). Thunderbird 3.1.7 and 3.0.11 can also be added to the list as well as SeaMonkey 2.0.11. - M
2010-12-08Rob VandenBrinkHow a Tablet Changed My Life
2010-12-08Rob VandenBrinkInteresting DDOS activity around Wikileaks
2010-12-05Jim ClausingUpdates to a couple of Sysinternals tools
2010-12-02Kevin JohnsonRobert Hansen and our happiness
2010-12-02Kevin JohnsonSQL Injection: Wordpress 3.0.2 released
2010-12-02Kevin JohnsonProFTPD distribution servers compromised
2010-11-29Stephen HallSun security updates
2010-11-26Mark HofmanUsing password cracking as metric/indicator for the organisation's security posture
2010-11-24Jim ClausingHelp with odd port scans
2010-11-24Bojan ZdrnjaPrivilege escalation 0-day in almost all Windows versions
2010-11-22Lenny ZeltserBrand Impersonations On-Line: Brandjacking and Social Networks
2010-11-19Jason LamExchanging and sharing of assessment results
2010-11-19Jason LamAdobe Reader X - Sandbox
2010-11-18Chris CarboniStopping the ZeroAccess Rootkit
2010-11-18Chris CarboniAll of your pages are belonging to us
2010-11-17Guy BruneauReference on Open Source Digital Forensics
2010-11-17Guy BruneauConficker B++ Activated on Nov 15
2010-11-17Guy BruneauCisco Unified Videoconferencing Affected by Multiple Vulnerabilities
2010-11-16Guy BruneauMac OS X Server v10.6.5 (10H575) Security Update: http://support.apple.com/kb/HT4452
2010-11-16Guy BruneauAcrobat and Adobe Reader Security Update
2010-11-15Stephen HallMozilla Firefox 3.6.12 Remote Denial Of Service
2010-11-12Guy BruneauHoneynet Forensic Challenge - Analyzing Malicious Portable Destructive Files
2010-11-11Daniel WesemannFake AV scams via Skype Chat
2010-11-08Manuel Humberto Santander PelaezNetwork Security Perimeter: How to choose the correct firewall and IPS for your environment?
2010-11-08Manuel Humberto Santander PelaezDST to EST error summary
2010-11-07Adrien de BeaupreChange your clocks?
2010-11-04Johannes UllrichMicrosoft Patches Pre-Announcement
2010-11-04Johannes UllrichMicrosoft Smart Screen False Positivies
2010-11-03Kevin ListonSQL Slammer Clean-up: Roundup and Review
2010-11-01Manuel Humberto Santander PelaezCVE-2010-3654 exploit in the wild
2010-11-01Manuel Humberto Santander PelaezCheckpoint UTM-1 edge VPN boxes worldwide did an unscheduled reboot
2010-10-31Marcus SachsCyber Security Awareness Month - Day 31 - Tying it all together
2010-10-30Guy BruneauSecurity Update for Shockwave Player
2010-10-30Guy BruneauCyber Security Awareness Month - Day 30 - Role of the network team
2010-10-29Kevin ListonSQL Slammer Clean-up: Contacting CERTs
2010-10-29Manuel Humberto Santander PelaezCyber Security Awareness Month - Day 29- Role of the office geek
2010-10-28Rick WannerCyber Security Awareness Month - Day 27 - Social Media use in the office
2010-10-28Rick WannerFirefox 3.6.12 available - http://www.mozilla.com/en-US/firefox/personal.html
2010-10-28Tony CarothersCyber Security Awareness Month - Day 28 - Role of the employee
2010-10-26Pedro BuenoFirefox news
2010-10-26Pedro BuenoCyber Security Awareness Month - Day 26 - Sharing Office Files
2010-10-26Pedro BuenoBe (even more) careful with public hotspots. Firesheep released yesterday. Brilliant and scary.
2010-10-25Kevin ShorttCyber Security Awareness Month - Day 25 - Using Home Computers for Work
2010-10-25Kevin ListonSQL Slammer Clean-up: Switching Viewpoints
2010-10-24Swa FrantzenCyber Security Awarenes Month - Day 24 - Using work computers at home
2010-10-23Mark HofmanCyber Security Awareness Month - Day 23 - The Importance of compliance
2010-10-22Daniel WesemannCyber Security Awareness Month - Day 22 - Security of removable media
2010-10-22Manuel Humberto Santander PelaezIntypedia project
2010-10-21Chris CarboniCyber Security Awareness Month - Day 21 - Impossible Requests from the Boss
2010-10-20Jim ClausingFirefox 3.6.11 and 3.5.14 released, includes security updates ( http://www.mozilla.com/firefox/3.6.11/releasenotes/ )
2010-10-20Jim ClausingThunderbird 3.1.4 and 3.0.9 released, includes security patches ( http://www.mozillamessaging.com/thunderbird/3.1.5/releasenotes/ )
2010-10-20Jim ClausingCyber Security Awareness Month - Day 20 - Securing Mobile Devices
2010-10-20Jim ClausingTools updates - Oct 2010
2010-10-19Rob VandenBrinkCyber Security Awareness Month - Day 19 - VPN Architectures – SSL or IPSec?
2010-10-19Rob VandenBrinkCyber Security Awareness Month - Day 19 - Remote User VPN Access – Are things getting too easy, or too hard?
2010-10-19Rob VandenBrinkCyber Security Awareness Month - Day 19 - VPN and Remote Access Tools
2010-10-19Kevin ListonSQL Slammer Clean-up: Picking up the Phone
2010-10-19Rob VandenBrinkCyber Security Awareness Month - Day 19 - Remote Access Tools
2010-10-19Rob VandenBrinkCyber Security Awareness Month - Day 19 - Remote User VPN Tunnels - to Split or not to Split?
2010-10-18Manuel Humberto Santander PelaezCyber Security Awareness Month - Day 18 - What you should tell your boss when there's a crisis
2010-10-17Stephen HallCyber Security Awareness Month - Day 17 - What a boss should and should not have access to
2010-10-15Marcus SachsCyber Security Awareness Month - Day 15 - What Teachers Need to Know About Their Students
2010-10-15Guy BruneauCyber Security Awareness Month - Day 16 - Securing a donated computer
2010-10-14Johannes UllrichCyber Security Awareness Month - Day 14 - Securing a public computer
2010-10-13Deborah HaleCyber Security Awareness Month - Day 13 - Online Bullying
2010-10-12Adrien de BeaupreNew version of Opera- Opera 10.63 is a recommended upgrade offering security and stability enhancements: http://www.opera.com/browser/download/
2010-10-12Scott FendleyCyber Security Awareness Month - Day 12 - Protecting and Managing Your Digital Identity On Social Media Sites
2010-10-12Adrien de BeaupreOctober 2010 Microsoft Black Tuesday Summary
2010-10-12Scott FendleyOracle Critical Updates Released
2010-10-11Kevin ListonSQL Slammer Clean-up: Reporting Upstream
2010-10-11Rick WannerCyber Security Awareness Month - Day 11 - Safe Browsing for Teens
2010-10-11Rick WannerNew version of Wireshark available for download - 1.4.1 - http://www.wireshark.org/download.html
2010-10-10Kevin ListonCyber Security Awareness Month - Day 10 - Safe browsing for pre-teens
2010-10-09Kevin ShorttCyber Security Awareness Month - Day 9 - Disposal of an Old Computer
2010-10-08Rick WannerCyber Security Awareness Month - Day 8 - Patch Management and System Updates
2010-10-08Rick WannerPatch Tuesday Pre-release -- 16 updates
2010-10-07Rob VandenBrinkSORBS.NET - email RBL issues
2010-10-06Rob VandenBrinkCyber Security Awareness Month - Day 7 - Remote Access and Monitoring Tools
2010-10-06Marcus SachsCyber Security Awareness Month - Day 6 - Computer Monitoring Tools
2010-10-05Rick WannerCyber Security Awareness Month - Day 5 - Sites you should stay away from
2010-10-04Daniel WesemannCyber Security Awareness Month - Day 4 - Managing EMail
2010-10-04Kevin ListonSQL Slammer Clean-up: How to Report
2010-10-03Adrien de Beaupre Cyber Security Awareness Month - Day 3 - Recognizing phishing and online scams
2010-10-03Adrien de BeaupreH went down.
2010-10-03Adrien de BeaupreCanada's Cyber Security Strategy released today
2010-10-02Mark HofmanCyber Security Awareness Month - Day 2 - Securing the Family Network
2010-10-01Kevin ListonCyber Security Awareness Month Activity: SQL Slammer Clean-up
2010-10-01Marcus SachsCyber Security Awareness Month - 2010
2010-10-01Marcus SachsCyber Security Awareness Month - Day 1 - Securing the Family PC
2010-09-28Daniel WesemannSupporting the economy (in Russia and Ukraine)
2010-09-28Daniel WesemannMS10-070 OOB Patch for ASP.NET vulnerability
2010-09-27Adrien de BeaupreMS OOB patch tomorrow for Security Advisory 2416728
2010-09-26Daniel WesemannEgosurfing, the corporate way
2010-09-26Daniel WesemannThe wireless wiretap
2010-09-25Rick WannerGuest Diary: Andrew Hunt - Visualizing the Hosting Patterns of Modern Cybercriminals
2010-09-21Johannes UllrichImplementing two Factor Authentication on the Cheap
2010-09-18Rick WannerMicrosoft Security Advisory for ASP.NET
2010-09-17Robert DanfordCirca 2007 Linux Kernel Vulnerability Resurfaces (Was CVE-2007-4573, Now CVE-2010-3301)
2010-09-16Johannes UllrichFacebook "Like Pages"
2010-09-16Johannes UllrichOpenX Ad-Server Vulnerability
2010-09-14Adrien de BeaupreAdobe Flash v10.1.82.76 and earlier vulnerability in-the-wild
2010-09-14Adrien de BeaupreSeptember 2010 Microsoft Black Tuesday Summary
2010-09-14Adrien de BeaupreBlackEnergy DDoS
2010-09-12Manuel Humberto Santander PelaezAdobe Acrobat pushstring Memory Corruption paper
2010-09-09Marcus Sachs'Here You Have' Email
2010-09-09Jim ClausingOpera 10.62 - security (the DLL path issue) and stability upate see http://www.opera.com/docs/changelogs/windows/1062/
2010-09-08John BambenekAdobe Acrobat/Reader 0-day in Wild, Adobe Issues Advisory
2010-09-07Bojan ZdrnjaSSH password authentication insight and analysis by DRG
2010-09-04Kevin ListonInvestigating Malicious Website Reports
2010-09-02Daniel WesemannMicrosoft EMETv2 released
2010-08-30Adrien de BeaupreApple QuickTime potential vulnerability/backdoor
2010-08-27Mark HofmanFTP Brute Password guessing attacks
2010-08-25Pedro BuenoAdobe released security update for Shockwave player that fix several CVEs: APSB1020
2010-08-23Manuel Humberto Santander PelaezFirefox plugins to perform penetration testing activities
2010-08-22Rick WannerFailure of controls...Spanair crash caused by a Trojan
2010-08-22Manuel Humberto Santander PelaezSCADA: A big challenge for information security professionals
2010-08-19Rob VandenBrinkChange is Good. Change is Bad. Change is Life.
2010-08-19Daniel WesemannCasper the unfriendly ghost
2010-08-18Guy BruneauAdobe out-of-cycle Updates
2010-08-17Bojan ZdrnjaDo you like Bing? So do the RogueAV guys!
2010-08-16Raul SilesBlind Elephant: A New Web Application Fingerprinting Tool
2010-08-16Raul SilesThe Seven Deadly Sins of Security Vulnerability Reporting
2010-08-16Raul SilesDDOS: State of the Art
2010-08-15Manuel Humberto Santander PelaezOpensolaris project cancelled, replaced by Solaris 11 express
2010-08-15Manuel Humberto Santander PelaezPython to test web application security
2010-08-14Tony CarothersFreedom of Information
2010-08-13Tom ListonThe Strange Case of Doctor Jekyll and Mr. ED
2010-08-10Jim ClausingAugust 2010 Micrsoft Black Tuesday Summary
2010-08-09Jim ClausingVirtualbox update available - looks like a few stability fixes http://www.virtualbox.org/wiki/Changelog
2010-08-08Marcus SachsThinking about Cyber Security Awareness Month in October
2010-08-06Rob VandenBrinkFOXIT PDF Reader update to resolve iPhone/iPad Jailbreak issue ==> http://www.foxitsoftware.com/announcements/2010861227.html
2010-08-05Manuel Humberto Santander PelaezAdobe Acrobat Font Parsing Integer Overflow Vulnerability
2010-08-05Rob VandenBrinkAccess Controls for Network Infrastructure
2010-08-04Adrien de BeaupreMultiple Cisco Advisories
2010-08-03Johannes UllrichWhen Lightning Strikes
2010-08-03Johannes UllrichSolar activity may cause problems this week
2010-08-02Manuel Humberto Santander PelaezSecuring Windows Internet Kiosk
2010-08-02Johannes UllrichMicrosoft Out-of-Band bulletin addresses LNK/Shortcut vulnerability
2010-07-30Guy BruneauWeb Traffic Analysis with httpry
2010-07-30Guy BruneauWireshark 1.2.10 released
2010-07-30Guy BruneauCisco Internet Streamer: Web Server Directory Traversal Vulnerability http://www.cisco.com/warp/public/707/cisco-sa-20100721-spcdn.shtml
2010-07-30Johannes UllrichMicrosoft LNK vulnerability fix coming on Monday
2010-07-29Rob VandenBrinkThe 2010 Verizon Data Breach Report is Out
2010-07-29Rob VandenBrinkNoScript 2.0 released
2010-07-29Rob VandenBrinkSnort 2.8.6.1 and Snort 2.9 Beta Released
2010-07-29Rob VandenBrinkFBI, Slovenian and Spanish Police announce more arrests of Mariposa Botnet Creator, Operators
2010-07-25Rick WannerNew Firefox Version, 3.6.8
2010-07-25Rick WannerMozilla advisory for Firefox...Upgrade to 3.6.8. http://www.mozilla.org/security/announce/2010/mfsa2010-48.html
2010-07-25Rick WannerUpdated version of Mandiant's Web Historian
2010-07-24Manuel Humberto Santander PelaezTypes of diary: One liners vs full diary
2010-07-24Manuel Humberto Santander PelaezTransmiting logon information unsecured in the network
2010-07-23Mark HofmanFirefox 3.6.8 is out. Yes it only seems like yesterday when you installed FF 3.6.7 (it was for me). The release notes say a stability issue has been fixed in this release.
2010-07-23Mark HofmanSome of our favourite sysinternals tools have been updated. TCPview, Autoruns, ProcDump and Disk2vhd have changed. More here http://blogs.technet.com/b/sysinternals/archive/2010/07/22/updates-tcpview-v3-0-autoruns-v10-02-procdump-v1-81-disk2vhd-v1-61.aspx
2010-07-21Adrien de BeaupreUpdate on .LNK vulnerability
2010-07-21Adrien de BeaupreAdobe Reader Protected Mode
2010-07-21Adrien de BeaupreDell PowerEdge R410 replacement motherboard firmware contains malware
2010-07-21Adrien de Beaupreautorun.inf and .lnk Malware (NOT 'Vulnerability in Windows Shell Could Allow Remote Code Execution' 2286198)
2010-07-20Manuel Humberto Santander PelaezLNK vulnerability now with Metasploit module implementing the WebDAV method
2010-07-20Manuel Humberto Santander PelaeziTunes buffer overflow vulnerability
2010-07-20Manuel Humberto Santander PelaezTruecrypt 7.0 released
2010-07-20Manuel Humberto Santander PelaezLowering infocon back to green
2010-07-18Manuel Humberto Santander PelaezSAGAN: An open-source event correlation system - Part 1: Installation
2010-07-14Deborah HaleSecunia Half Year Report for 2010 shows interesting trends
2010-07-13Jim ClausingForensic challenge results
2010-07-13Jim ClausingJuly 2010 Microsoft Black Tuesday Summary
2010-07-13Jim ClausingVMware Studio Security Update
2010-07-10Tony CarothersOracle July 2010 Pre-Release Announcement
2010-07-08Kyle HaugsnessNew poll on MSRC
2010-07-08Kyle HaugsnessPirate Bay account database compromised
2010-07-07Kevin ShorttFacebook, Facebook, What Do YOU See?
2010-07-06Rob VandenBrinkBogus Support Organizations use Live Operators to Install Malware
2010-07-04Manuel Humberto Santander PelaezMalware inside PDF Files
2010-07-04Manuel Humberto Santander PelaezInteresting analysis of the PHP SplObjectStorage Vulnerability
2010-07-03Deborah HaleDelivery Status Failure Notice That Packed A Wallop
2010-07-02Johannes UllrichOISF released version 1.0.0 of Suricata, the open source IDS/IPS engine http://www.openinfosecfoundation.org
2010-07-01Bojan ZdrnjaDown the RogueAV and Blackhat SEO rabbit hole (part 2)
2010-06-29Johannes UllrichHow to be a better spy: Cyber security lessons from the recent russian spy arrests
2010-06-29donald smithInteresting idea to help prevent RogueAV from using SEO without being noticed:)
2010-06-28Bojan ZdrnjaDown the RogueAV and Blackhat SEO rabbit hole
2010-06-27Jim ClausingFirefox 3.6.6 out - fixes issues with "crash protection"
2010-06-27Manuel Humberto Santander PelaezStudy of clickjacking vulerabilities on popular sites
2010-06-24Jason LamHelp your competitor - Advise them of vulnerability
2010-06-23Scott FendleyMozilla Firefox Updates
2010-06-23Scott FendleyOpera Browser Update
2010-06-18Tom ListonIMPORTANT INFORMATION: Distributed SSH Brute Force Attacks
2010-06-18Johannes UllrichPlease take a second and rate the daily podcast (Stormcast): http://www.surveymonkey.com/s/stormcast
2010-06-18Adrien de BeaupreThunderbird 3.05 released
2010-06-18Adrien de BeaupreDistributed SSH Brute Force Attempts on the rise again
2010-06-17Deborah HaleDigital Copy Machines - Security Risk?
2010-06-17Deborah HaleInternet Fraud Alert Kicks Off Today
2010-06-17Deborah HaleFYI - Another bogus site
2010-06-16Kevin ShorttAdobe Flash Player 10.1 - Security Update Available
2010-06-15Manuel Humberto Santander PelaezMastercard delivering cards with OTP device included
2010-06-15Manuel Humberto Santander PelaezMicrosoft Windows Help and Support Center vulnerability (CVE 2010-1885) exploit in the wild
2010-06-15Manuel Humberto Santander PelaezApple releases advisory for Mac OS X - Multiple vulnerabilities discovered
2010-06-15Manuel Humberto Santander PelaeziPhone 4 Order Security Breach Exposes Private Information
2010-06-14Manuel Humberto Santander PelaezNew way of social engineering on IRC
2010-06-14Manuel Humberto Santander PelaezAnother way to get protection for application-level attacks
2010-06-14Manuel Humberto Santander PelaezPython on a microcontroller?
2010-06-14Manuel Humberto Santander PelaezSmall lot of Olympus Stylus Tough 6010 shipped with malware
2010-06-14Manuel Humberto Santander PelaezRogue facebook application acting like a worm
2010-06-13Rick WannerUnRealCD compromised by Trojan
2010-06-10Deborah HaleiPad Owners Exposed
2010-06-10Deborah HaleTop 5 Social Networking Media Risks
2010-06-10Deborah HaleWireshark 1.2.9 Now Available
2010-06-10Deborah HaleMicrosoft Help Centre Handling of Escape Sequences May Lead to Exploit
2010-06-10Deborah HaleMicrosoft Security Advisory 2219475
2010-06-08Mark HofmanSafari 5.0 is available for all platforms. Addresses some security issues, more here http://support.apple.com/kb/HT4196
2010-06-08Manuel Humberto Santander PelaezJune 2010 Microsoft Black Tuesday Summary
2010-06-07Manuel Humberto Santander PelaezSoftware Restriction Policy to keep malware away
2010-06-07Manuel Humberto Santander PelaezInternet Storm Center panel tonight at SANSFIRE
2010-06-06Manuel Humberto Santander PelaezNice OS X exploit tutorial
2010-06-05Guy BruneauSecurity Advisory for Flash Player, Adobe Reader and Acrobat
2010-06-04Johannes UllrichChanges to Internet Storm Center Host Name
2010-06-04Rick WannerNew Honeynet Project Forensic Challenge
2010-06-03Guy BruneauMicrosoft Patch Tuesday June 2010 Pre-Release
2010-06-02Rob VandenBrinkNew Mac malware - OSX/Onionspy
2010-06-02Mark HofmanOpenSSL version 1.0.0a released. This fixes a number of security issues. Don't forget a number of commercial appliances will be using this, so look for vendor updates soon.
2010-06-02Rob VandenBrinkSPAM pretending to be from Habitat for Humanity
2010-05-30Kevin ListonVMware ESX/ESXi Updates
2010-05-29G. N. WhiteRogue AV Indictment
2010-05-28Jim ClausingWireshark SMB file extraction plug-in
2010-05-26Bojan ZdrnjaMalware modularization and AV detection evasion
2010-05-25donald smithFace book “joke” leads to firing.
2010-05-23Manuel Humberto Santander Pelaeze-mail scam announcing Fidel Castro's funeral ... and nasty malware to your computer.
2010-05-23Manuel Humberto Santander PelaezOracle Java SE and Java for Business 'MixerSequencer' Remote Code Execution Vulnerability
2010-05-22Rick WannerSANS 2010 Digital Forensics Summit - APT Based Forensic Challenge
2010-05-21Rick WannerIBM distributes malware at AusCERT!
2010-05-21Rick Wanner2010 Digital Forensics and Incident Response Summit
2010-05-19Jason LamEFF paper about browser tracking
2010-05-19Kyle HaugsnessWordpress blog attacks... again
2010-05-18Johannes UllrichCanonical Display Driver Vulnerability
2010-05-16Rick WannerSymantec triggers on World of Warcraft update
2010-05-15Deborah HaleOnboard Computers Subject to Attack?
2010-05-12Rob VandenBrinkAdobe Shockwave Update
2010-05-12Rob VandenBrinkLayer 2 Security - Private VLANs (the Story Continues ...)
2010-05-11Scott FendleyMay 2010 Microsoft Patches
2010-05-10Toby KohlenbergAnother round of WordPress Attacks
2010-05-08Guy BruneauMicrosoft Patch Tuesday May 2010 Pre-Release
2010-05-08Guy BruneauWireshark DOCSIS Dissector DoS Vulnerability
2010-05-07Rob VandenBrinkSecurity Awareness – Many Audiences, Many Messages (Part 2)
2010-05-06Rick WannerLearn about web app hacking and defense
2010-05-04Rick WannerSIFT review in the ISSA Toolsmith
2010-05-03Daniel WesemannSocial engineering via paper mail
2010-05-02Mari NicholsZbot Social Engineering
2010-05-01Marcus SachsHappy May Day
2010-04-30Johannes UllrichSharepoint XSS Vulnerability
2010-04-30Kevin ListonCVE-2010-0817 SharePoint XSS Scorecard
2010-04-30Kevin ListonThe Importance of Small Files
2010-04-29Bojan ZdrnjaWho needs exploits when you have social engineering?
2010-04-27Rob VandenBrinkLayer 2 Security - L2TPv3 for Disaster Recovery Sites
2010-04-26Raul SilesVulnerable Sites Database
2010-04-23Adrien de BeaupreShadowserver botnet rules
2010-04-22Guy BruneauMS10-025 Security Update has been Pulled
2010-04-22Deborah HaleHow McAfee turned a Disaster Exercise Into a REAL Learning Experience for Our Community Disaster Team
2010-04-22Deborah HaleDon't Be Fooled by Twitter Spam in Your Inbox
2010-04-22John BambenekData Redaction: You're Doing it Wrong
2010-04-21Guy BruneauMcAfee DAT 5958 Update Issues
2010-04-21Guy BruneauGoogle Chrome Security Update v4.1.249.1059 Released: http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html
2010-04-20Raul SilesAre You Ready for a Transportation Collapse...?
2010-04-19Daniel WesemannLinked into scams?
2010-04-18Guy BruneauSome NetSol hosted sites breached
2010-04-14Mark HofmanOracle has released 47 critical patches (Includes SUN patches)
2010-04-13Johannes UllrichMicrosoft April 2010 Patch Tuesday
2010-04-13Adrien de BeaupreSecurity update available for Adobe Reader and Acrobat
2010-04-13Adrien de BeaupreWeb App Testing Tools
2010-04-13Johannes UllrichMore Legal Threat Malware E-Mail
2010-04-13Johannes UllrichApache.org Bugtracker Breach
2010-04-11Marcus SachsNetwork and process forensics toolset
2010-04-09Mark HofmanVMware has released the following patch "VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues". Make sure you test before applying to production.
2010-04-08Guy BruneauMicrosoft Patch Tuesday April 2010 Pre-Release
2010-04-07Rob VandenBrinkThe Many Paths to Security Awareness
2010-04-06Daniel WesemannApplication Logs
2010-04-04Mari NicholsFinancial Management of Cyber Risk
2010-04-02Guy BruneauFirefox 3.6.3 fix for CVE-2010-1121 http://www.mozilla.org/security/announce/2010/mfsa2010-25.html
2010-04-02Guy BruneauSecurity Advisory for ESX Service Console
2010-04-02Guy BruneauApple QuickTime and iTunes Security Update
2010-04-02Guy BruneauFoxit Reader Security Update
2010-04-02Guy BruneauOracle Java SE and Java for Business Critical Patch Update Advisory
2010-04-01Jim ClausingWireshark 1.2.7 released, bug fixes, doesn't look like any security issues (http://www.wireshark.org/)
2010-03-30Pedro BuenoSharing the Tools
2010-03-30Pedro BuenoVMWare Security Advisories Out
2010-03-29Adrien de BeaupreAPPLE-SA-2010-03-29-1 Security Update 2010-002 / Mac OS X v10.6.3
2010-03-28Rick WannerHoneynet Project: 2010 Forensic Challenge #3
2010-03-27Guy BruneauHP-UX Running NFS/ONCplus, Inadvertently Enabled NFS
2010-03-27Guy BruneauCreate a Summary of IP Addresses from PCAP Files using Unix Tools
2010-03-26Daniel WesemannGetting the EXE out of the RTF again
2010-03-26Daniel WesemannSIFT2.0 SANS Investigative Forensics Toolkit released
2010-03-25Kevin Liston"Copyright Lawsuit filed against you"
2010-03-25Kevin ListonResponding to "Copyright Lawsuit filed against you"
2010-03-24Johannes Ullrich".sys" Directories Delivering Driveby Downloads
2010-03-24Kyle HaugsnessWax nostalgic - commodore64 updated to present time
2010-03-23John BambenekThe Top 10 Riskiest US Cities for Cybercrime
2010-03-22Guy BruneauNew Opera 10.51 available with security fixes. More information available at: http://www.opera.com/docs/changelogs/windows/1051/
2010-03-21Scott FendleySkipfish - Web Application Security Tool
2010-03-21Chris CarboniResponding To The Unexpected
2010-03-20Scott FendleyBitDefender 2010 Update Problem
2010-03-20Scott FendleyFirefox 3.6.2 to be released March 30
2010-03-18Bojan ZdrnjaDangers of copy&paste
2010-03-17Deborah HaleTrojan outbreak on a College Campus
2010-03-17Deborah HaleSpam was killing us! Here is what we did to help!
2010-03-15Adrien de BeaupreSpamassassin Milter Plugin Remote Root Attack
2010-03-12Mark HofmanFirefox 3.6 is being pushed out to users. http://www.mozilla.com/en-US/firefox/3.6/releasenotes/
2010-03-11Mark HofmanA new version of Safari is out. Looks like for Mac and Windows. Plenty of security fixes (mostly for Windows Safari users http://support.apple.com/kb/HT4070 )
2010-03-10Rob VandenBrinkWhat's My Firewall Telling Me? (Part 4)
2010-03-10Rob VandenBrinkMicrosoft Security Advisory 981374 - Remote Code Execution Vulnerability for IE6 and IE7
2010-03-10Rob VandenBrinkMicrosoft re-release of KB973811 - attacks on Extended Protection for Authentication
2010-03-09Marcus SachsEnergizer Malware
2010-03-09John BambenekMarch 2010 - Microsoft Patch Tuesday Diary
2010-03-08Raul SilesSamurai WTF 0.8
2010-03-08Raul SilesMicrosoft announced two important bulletins (fixing multiple vulns. affecting Windows and Office) for tomorrow: http://www.microsoft.com/technet/security/Bulletin/MS10-mar.mspx
2010-03-07Mari NicholsDHS issues Cybersecurity challenge
2010-03-06Tony CarothersIntegration and the Security of New Technologies
2010-03-05Kyle HaugsnessUnpatched Opera 10.50 and below code execution vulnerability
2010-03-05Kyle HaugsnessJavascript obfuscators used in the wild
2010-03-05Kyle HaugsnessWhat is your firewall log telling you - responses
2010-03-05Kyle HaugsnessFalse scare email proclaiming North Korea nuclear launch against Japan
2010-03-04Daniel Wesemannsalefale-dot-com is bad
2010-03-03Mark HofmanMS10-015 re-released
2010-03-03Johannes UllrichReports about large number of fake Amazon order confirmations
2010-03-03Daniel WesemannWhat is your firewall log telling you - Part #2
2010-03-01Mark HofmanMicrosoft will drop support for Vista (without any Service Packs) on April 13 and support for XP SP2 ends July 13. (i.e. no more security updates). If you are still running these, it it time to update.
2010-03-01Mark HofmanIE 0-day using .hlp files
2010-02-28Mari NicholsDisasters take practice
2010-02-27Johannes UllrichSearch Engine Poisoning: Chile Earthquake
2010-02-26Rick WannerNew version of FireBug Firefox plug-in - http://getfirebug.com/
2010-02-25Chris CarboniPass The Hash
2010-02-25Andre LudwigMicrosoft, restraining orders, and how a big botnet (waledec) ate curb.
2010-02-23Mark HofmanWhat is your firewall telling you and what is TCP249?
2010-02-22Rob VandenBrinkNew Risks in Penetration Testing
2010-02-21Patrick Nolan Looking for "more useful" malware information? Help develop the format.
2010-02-20Mari NicholsIs "Green IT" Defeating Security?
2010-02-19Mark HofmanMS10-015 may cause Windows XP to blue screen (but only if you have malware on it)
2010-02-17Rob VandenBrinkDefining Clouds - " A Cloud by any Other Name Would be a Lot Less Confusing"
2010-02-17Rob VandenBrinkMultiple Security Updates for ESX 3.x and ESXi 3.x
2010-02-17Rob VandenBrinkCisco ASA5500 Security Updates - cisco-sa-20100217-asa
2010-02-17Rob VandenBrinkCisco Security Agent Security Updates: cisco-sa-20100217-csa
2010-02-16Jim ClausingTeredo request for packets
2010-02-16Johannes UllrichTeredo "stray packet" analysis
2010-02-16Robert DanfordAdobe Updates: http://www.adobe.com/support/security/bulletins/apsb10-07.html http://www.adobe.com/support/security/bulletins/apsb10-06.html
2010-02-15Johannes UllrichVarious Olympics Related Dangerous Google Searches
2010-02-13Lorna HutchesonNetwork Traffic Analysis in Reverse
2010-02-12G. N. WhiteAdobe Flash Player 10.0.45.2 and AIR 1.5.3.9130 released to correct vulnerability CVE-2010-0186 Details: http://www.adobe.com/support/security/bulletins/apsb10-06.html
2010-02-12G. N. WhiteTime to update those IP Bogon Filters (again)
2010-02-11Deborah HaleCritical Update for AD RMS
2010-02-11Johannes UllrichMS10-015 may cause Windows XP to blue screen
2010-02-11Deborah HaleThe Mysterious Blue Screen
2010-02-10Marcus SachsVulnerability in TLS/SSL Could Allow Spoofing
2010-02-10Johannes UllrichTwitpic, EXIF and GPS: I Know Where You Did it Last Summer
2010-02-10Marcus SachsDatacenters and Directory Traversals
2010-02-09Adrien de BeaupreWhen is a 0day not a 0day? Samba symlink bad default config
2010-02-09Mark HofmanOracle has an unscheduled security alert and patch for CVE-2010-0073. The issue affects WebLogic Server and is remotely exploitable. Details and patch are here http://www.oracle.com/technology/deploy/security/alerts/alert-cve-2010-0073.html
2010-02-09Johannes UllrichFebruary 2010 Black Tuesday Overview
2010-02-07Rick WannerMandiant Mtrends Report
2010-02-06Guy BruneauOracle WebLogic Server Security Alert
2010-02-05Jim ClausingWordPress iframe injection?
2010-02-04Johannes UllrichMicrosoft Patch Tuesday Pre-Release
2010-02-03Rob VandenBrinkSupport for Legacy Browsers
2010-02-03Johannes UllrichInformation Disclosure Vulnerability in Internet Explorer
2010-02-02Johannes UllrichTwitter Mass Password Reset due to Phishing
2010-02-02Guy BruneauCisco Secure Desktop Remote XSS Vulnerability
2010-02-02Johannes UllrichNew IPv6 Screencast Videos: http://isc.sans.org/ipv6videos (Today: blocking and detecting IPv6 in Linux)
2010-02-01Rob VandenBrinkNMAP 5.21 - Is UDP Protocol Specific Scanning Important? Why Should I Care?
2010-01-30Stephen HallNew and updated VMWare advisories
2010-01-29Johannes UllrichAnalyzing isc.sans.org weblogs, part 2, RFI attacks
2010-01-27Raul SilesEuropean Union Security Challenge (Campus Party 2010)
2010-01-27Raul SilesGoogle Chrome v4.0.249.78 Released: http://googlechromereleases.blogspot.com/2010/01/stable-channel-update_25.html
2010-01-26Rob VandenBrinkVMware vSphere Hardening Guide Draft posted for public review
2010-01-26Jason Lame107 CMS system website compromised
2010-01-25William Salusky"Bots and Spiders and Crawlers, be gone!" - or - "New Open Source WebAppSec tools, Huzzah!"
2010-01-24Pedro BuenoOutdated client applications
2010-01-23Lorna HutchesonThe necessary evils: Policies, Processes and Procedures
2010-01-22Mari NicholsPass-down for a Successful Incident Response
2010-01-21Johannes UllrichNew Microsoft Advisory: Vulnerability in Windows Kernel Privilege Escalation (CVE-2010-0232)
2010-01-21Chris Carboni* Microsoft Out Of Band Patch Release
2010-01-21Johannes UllrichMicrosoft January Out of Band Patch
2010-01-21Chris CarboniFirefox Upgrade Available
2010-01-19Jim ClausingForensic challenges
2010-01-19Johannes UllrichUnpatched Microsoft Windows (all versions) Privilege Escalation Vulnerability Released
2010-01-17Rick WannerBuffer overflow in Quicktime
2010-01-14Bojan ZdrnjaPDF Babushka
2010-01-14Bojan ZdrnjaRogue AV exploiting Haiti earthquake
2010-01-14Bojan ZdrnjaDRG (Dragon Research Group) Distro available for general release
2010-01-14Bojan Zdrnja0-day vulnerability in Internet Explorer 6, 7 and 8
2010-01-13Johannes UllrichSMS Donations Advertised via Twitter
2010-01-13Guy BruneauSun Java JRE 6 Update 18 Released
2010-01-12Johannes UllrichMicrosoft Patch Tuesday - Preannouncement
2010-01-12Johannes UllrichBaidu defaced - Domain Registrar Tampering
2010-01-12Johannes UllrichMicrosoft Security Bulletin: January 2010
2010-01-12Johannes UllrichMicrosoft Advices XP Users to Uninstall Flash Player 6
2010-01-12Johannes UllrichOracle Patches Relased
2010-01-12Johannes UllrichPre-Announced Adobe Reader and Acrobat Patch Found!
2010-01-12Johannes UllrichHaiti Earthquake: Possible scams / malware
2010-01-11Johannes UllrichFake Android Application
2010-01-11Adrien de BeaupreBackTrack 4 final released http://www.remote-exploit.org/news.html http://www.backtrack-linux.org/downloads/
2010-01-10Johannes Ullrich6.5 magnitude earthquake in California causing local poweroutage
2010-01-09G. N. WhiteWhat's Up With All The Port Scanning Using TCP/6000 As A Source Port?
2010-01-08Johannes UllrichPlease participate in our reader survey: http://www.surveymonkey.com/s/2MH25ZC
2010-01-08Rob VandenBrinkMicrosoft OfficeOnline, Searching for Trust and Malware
2010-01-07Daniel WesemannStatic analysis of malicious PDFs
2010-01-07Daniel WesemannStatic analysis of malicous PDFs (Part #2)
2010-01-07Daniel WesemannJuniper routers may crash on certain malformed packets
2010-01-06Guy BruneauFirefox security and stability update for version 3.5.7 and 3.0.17 available for download
2010-01-06Guy BruneauSecure USB Flaw Exposed
2010-01-01G. N. WhiteDealing With Unwanted SSH Bruteforcing
2009-12-30Guy BruneauKDC DoS in cross-realm referral processing
2009-12-29Rick WannerMicrosoft responds to possible IIS 6 0-day
2009-12-24Guy BruneauF5 BIG-IP ASM and PSM Remote Buffer Overflow
2009-12-24Guy BruneauMicrosoft IIS File Parsing Extension Vulnerability
2009-12-23Johannes UllrichTell us about your Christmas Family Emergency Kit
2009-12-23Marcus SachsBlackberry Outage
2009-12-18Stephen HallTwitter outage via DNS hijacking
2009-12-18Stephen HallWireshark 1.2.5 released - including three security fixes
2009-12-17Daniel Wesemannoverlay.xul is back
2009-12-17Daniel WesemannIn caches, danger lurks
2009-12-16Mark HofmanFirefox 3.5.6 is available, time to update.
2009-12-16Rob VandenBrinkBeware the Attack of the Christmas Greeting Cards !
2009-12-14Adrien de BeaupreAnti-forensics, COFEE vs. DECAF
2009-12-09Swa FrantzenOSSEC 2.3 released
2009-12-09Swa FrantzenFacebook announces privacy improvements
2009-12-08Deborah HaleDecember 2009 Black Tuesday Overview
2009-12-07Rick WannerCheat Sheet: Analyzing Malicious Documents
2009-12-07Rob VandenBrinkLayer 2 Network Protections – reloaded!
2009-12-05Guy BruneauJava JRE Buffer and Integer Overflow
2009-12-04Daniel WesemannMax Power's Malware Paradise
2009-12-04Daniel WesemannThe economics of security advice (MSFT research paper)
2009-12-03Mark HofmanAvast false positives
2009-12-02Rob VandenBrinkMicrosoft Black Screen of Death - Fact of Fiction?
2009-12-02Rob VandenBrinkSPAM and Malware taking advantage of H1N1 concerns
2009-12-01Chris CarboniVulnerabilities in the PDF distiller of the BlackBerry Attachment Service
2009-11-30Bojan ZdrnjaDistributed Wordpress admin account cracking
2009-11-29Patrick Nolan A Cloudy Weekend
2009-11-25Jim ClausingTool updates
2009-11-25Jim ClausingMicrosoft Updates requiring reboot
2009-11-25Jim ClausingUpdates to my GREM Gold scripts and a new script
2009-11-24Rick WannerMicrosoft Security Advisory 977981 - IE 6 and IE 7
2009-11-22Marcus SachsIE6 and IE7 0-Day Reported
2009-11-21Mark HofmanVMware vCenter and ESX updates available http://lists.vmware.com/pipermail/security-announce/2009/000070.html
2009-11-18Rob VandenBrinkUsing a Cisco Router as a “Remote Collector” for tcpdump or Wireshark
2009-11-16G. N. WhiteReports of a successful exploit of the SSL Renegotiation Vulnerability?
2009-11-14Adrien de BeaupreMicrosoft advisory for Windows 7 / Windows Server 2008 R2 Remote SMB DoS Exploit released
2009-11-13Deborah HaleIt's Never Too Early To Start Teaching Them
2009-11-13Adrien de BeaupreTLS & SSLv3 renegotiation vulnerability explained
2009-11-13Adrien de BeaupreFlash Origin Policy Attack
2009-11-13Adrien de BeaupreConficker patch via email?
2009-11-12Rob VandenBrinkWindows 7 / Windows Server 2008 Remote SMB Exploit
2009-11-11Rob VandenBrinkLayer 2 Network Protections against Man in the Middle Attacks
2009-11-11Rob VandenBrinkApple Safari 4.0.4 Released
2009-11-10Swa FrantzenMicrosoft November Black Tuesday Overview
2009-11-09Chris Carboni80's Flashback on Jailbroken iPhones
2009-11-09Guy BruneauApple Security Update 2009-006 for Mac OS X v10.6.2
2009-11-08Bojan ZdrnjaiPhone worm in the wild
2009-11-07Marcus SachsMore Thoughts on Legacy Systems
2009-11-06Mark HofmanA new version of Firefox (3.5.5) just became available. According to the release notes they are stability improvements.
2009-11-05Swa FrantzenTLS Man-in-the-middle on renegotiation vulnerability made public
2009-11-05Swa FrantzenRIM fixes random code execution vulnerability
2009-11-05Swa FrantzenLegacy systems
2009-11-05Swa FrantzenInsider threat: The snapnames case
2009-11-03Bojan ZdrnjaOpachki, from (and to) Russia with love
2009-11-02Daniel WesemannPassword rules: Change them every 25 years
2009-11-02Rob VandenBrinkMicrosoft releases v1.02 of Enhanced Mitigation Evaluation Toolkit (EMET)
2009-10-30Rob VandenBrinkNew version of NIST 800-41, Firewalls and Firewall Policy Guidelines
2009-10-29Kyle HaugsnessCyber Security Awareness Month - Day 29 - dns port 53
2009-10-28Johannes UllrichSniffing SSL: RFC 4366 and TLS Extensions
2009-10-28Johannes UllrichCyber Security Awareness Month - Day 28 - ntp (123/udp)
2009-10-28Johannes UllrichFirefox 3.5.4 released. Lots of security bug fixes. (thanks Gilbert!)
2009-10-27Rob VandenBrinkNew VMware Desktop Products Released (Workstation, Fusion, ACE)
2009-10-25Lorna HutchesonCyber Security Awareness Month - Day 25 - Port 80 and 443
2009-10-23Johannes UllrichLittle new tool: reversing md5/sha1 hashes http://isc.sans.org/tools/reversehash.html
2009-10-22Adrien de BeaupreTruecrypt 6.3 released
2009-10-22Adrien de BeaupreCyber Security Awareness Month - Day 22 port 502 TCP - Modbus
2009-10-22Adrien de BeaupreSysinternals updates: Disk2vhd v1.1, ZoomIt v4.1, Coreinfo v2.0, VMMap v2.4
2009-10-21Pedro BuenoWordPress Hardening
2009-10-21Pedro BuenoCyber Security Awareness Month - Day 21 - Port 135
2009-10-20Raul SilesOracle Critical Patch Update (CPU) - October 2009
2009-10-20Raul SilesWASC 2008 Statistics
2009-10-19Daniel WesemannCyber Security Awareness Month - Day 19 - ICMP
2009-10-19Daniel WesemannBacked up, lately ?
2009-10-18Mari NicholsComputer Security Awareness Month - Day 18 - Telnet an oldie but a goodie
2009-10-17Rick WannerCyber Security Awareness Month - Day 17 - Port 22/SSH
2009-10-17Rick WannerMozilla disables Microsoft plug-ins?
2009-10-16Stephen HallVMWare updates ESX
2009-10-16Adrien de BeaupreCyber Security Awareness Month - Day 16 - Port 1521 - Oracle TNS Listener
2009-10-16Adrien de BeaupreDisable MS09-054 patch, or Firefox Plugin?
2009-10-15Deborah HaleYet another round of Viral Spam
2009-10-15Deborah HaleCyber Security Awareness Month - Day 15 - Ports 995, 465, and 993 - Secure Email
2009-10-13Johannes UllrichMicrosoft October 2009 Black Tuesday Overview
2009-10-13Daniel WesemannAdobe Reader and Acrobat - Black Tuesday continues
2009-10-11Mark HofmanCyber Security Awareness Month - Day 12 Ports 161/162 Simple Network Management Protocol (SNMP)
2009-10-09Rob VandenBrinkCyber Security Awareness Month - Day 9 - Port 3389/tcp (RDP)
2009-10-09Rob VandenBrinkTHAWTE to discontinue free Email Certificate Services and Web of Trust Service
2009-10-08Johannes UllrichFirefox Plugin Collections
2009-10-08Johannes UllrichCyber Security Awareness Month - Day 8 - Port 25 - SMTP
2009-10-08Johannes UllrichNew Adobe Vulnerability Exploited in Targeted Attacks
2009-10-06Adrien de BeaupreCyber Security Awareness Month - Day 6 ports 67&68 udp - bootp and dhcp
2009-10-05Adrien de BeaupreCyber Security Awareness Month - Day 5 port 31337
2009-10-05Adrien de BeaupreTime to change your hotmail/gmail/yahoo password
2009-10-04Guy BruneauSamba Security Information Disclosure and DoS
2009-10-02Stephen HallCyber Security Awareness Month - Day 2 - Port 0
2009-10-02Stephen HallNew SysInternal fun for the weekend
2009-10-02Stephen HallVMware Fusion updates to fixes a couple of bugs
2009-10-02Stephen HallVerizon New York area issues
2009-09-27Stephen HallUse Emerging Threats signatures? READ THIS!
2009-09-26Kyle HaugsnessConficker detection hints
2009-09-25Lenny ZeltserCategories of Common Malware Traits
2009-09-25Deborah HaleConficker Continues to Impact Networks
2009-09-25Deborah HaleMalware delivered over Google and Yahoo Ad's?
2009-09-23Marcus SachsAddendum to SRI's Conficker C Analysis Published
2009-09-20Mari NicholsInsider Threat and Security Awareness
2009-09-19Rick WannerSysinternals Tools Updates
2009-09-17Bojan ZdrnjaWhy is Rogue/Fake AV so successful?
2009-09-17Bojan ZdrnjaSnort 2.8.5 is out
2009-09-16Raul SilesWireshark 1.2.2 (and 1.0.9) is out!
2009-09-16Raul SilesReview the security controls of your Web Applications... all them!
2009-09-16Bojan ZdrnjaSMB2 remote exploit released
2009-09-15Johannes UllrichSANS releases new Cyber Security Risk Report
2009-09-10Johannes UllrichHealthcare Spam
2009-09-10Guy BruneauFirefox 3.5.3 and 3.0.14 has been released
2009-09-08Adrien de BeaupreMicrosoft Security Advisory 975191 Revised
2009-09-07Jim ClausingRequest for packets
2009-09-07Lorna HutchesonEncrypting Data
2009-09-05Mark HofmanCritical Infrastructure and dependencies
2009-09-04Adrien de BeaupreVulnerabilities (plural) in MS IIS FTP Service 5.0, 5.1. 6.0, 7.0
2009-09-04Adrien de BeaupreFake anti-virus
2009-09-04Adrien de BeaupreSo, you updated your Flash did you?
2009-09-01Guy BruneauOpera 10 with Security Fixes
2009-08-31Pedro BuenoMicrosoft IIS 5/6 FTP 0Day released
2009-08-30Tony CarothersHow do I recover from.....?
2009-08-29Guy BruneauImmunet Protect - Cloud and Community Malware Protection
2009-08-28Adrien de BeaupreWPA with TKIP done
2009-08-28Adrien de Beaupreapache.org compromised
2009-08-26Johannes UllrichWSUS 3.0 SP2 released
2009-08-26Johannes UllrichMalicious CD ROMs mailed to banks
2009-08-25Bojan ZdrnjaFlash attack vectors (and worms)
2009-08-21Rick WannerUpdates to VMWare Products
2009-08-21Rick WannerInteresting malware...affecting the Delphi Compiler?
2009-08-21Rick WannerTime to update...New Thunderbird version!
2009-08-19Daniel WesemannChecking your protection
2009-08-18Deborah HaleSysinternals Procdump Updated
2009-08-18Daniel WesemannForensics: Mounting partitions from full-disk 'dd' images
2009-08-16Mari NicholsSurviving a third party onsite audit
2009-08-13Johannes UllrichCA eTrust update crashes systems
2009-08-13Jim ClausingNew and updated cheat sheets
2009-08-13Jim ClausingTools for extracting files from pcaps
2009-08-11Swa FrantzenWordpress unauthenticated administrator password reset
2009-08-11Swa FrantzenMicrosoft August 2009 Black Tuesday Overview
2009-08-11Swa FrantzenSafari 4.0.3
2009-08-04Mark HofmanFirefox Updates
2009-08-04donald smithJava Security Update
2009-08-03Mark HofmanSwitch hardening on your network
2009-07-31Deborah HaleDon't forget to tell your SysAdmin Thanks
2009-07-31Deborah HaleGoogle Safe Browsing
2009-07-29Bojan ZdrnjaIncreasing number of attacks on security sites
2009-07-28Adrien de BeaupreYYAMCCBA
2009-07-28Adrien de BeaupreMS released two OOB bulletins and an advisory
2009-07-28Adrien de BeaupreTwitter spam/phish
2009-07-27Raul SilesFilemon and Regmon are dead, long life to Procmon!
2009-07-27Raul SilesNew Hacker Challenge: Prison Break - Breaking, Entering & Decoding
2009-07-26Jim ClausingNew Volatility plugins
2009-07-24Rick WannerMicrosoft Out of Band Patch
2009-07-23John BambenekMissouri Passes Breach Notification Law: Gap Still Exists for Banking Account Information
2009-07-22Chris CarboniFirefox 3.0.12 is Available
2009-07-20Stephen HallWireshark Release 1.2.1
2009-07-19Marcus SachsMozilla Comments on Firefox 3.5.1 issue
2009-07-18Patrick NolanChrome update contains Security fixes
2009-07-17Stephen HallFirefox 3.5.1 has been released
2009-07-17Bojan ZdrnjaA new fascinating Linux kernel vulnerability
2009-07-17John BambenekCross-Platform, Cross-Browser DoS Vulnerability
2009-07-16Guy BruneauChanges in Windows Security Center
2009-07-14Swa FrantzenMicrosoft July Black Tuesday Overview
2009-07-14Swa FrantzenFirefox new exploit
2009-07-14Swa FrantzenOracle Black Tuesday
2009-07-13Adrien de BeaupreVulnerability in Microsoft Office Web Components Control Could Allow Remote Code Execution
2009-07-13Adrien de BeaupreSecurity Update available for Wyse Device Manager
2009-07-11Rick WannerVMWare Security Advisories
2009-07-10Guy BruneauWordPress Fixes Multiple vulnerabilities
2009-07-09John BambenekLatest Updates on Ongoing DDoS on Governmental/Commercial Websites in USA and S. Korea
2009-07-08Marcus SachsMilw0rm offline
2009-07-08Andre LudwigSafari 4.0.2 update published
2009-07-06Stephen Hall0-day in Microsoft DirectShow (msvidctl.dll) used in drive-by attacks
2009-07-03Adrien de BeaupreAuthorize.net down
2009-07-03Adrien de BeaupreBCP/DRP
2009-07-03Adrien de BeaupreFCKEditor advisory
2009-07-03Adrien de BeaupreHappy 4th of July!
2009-07-02Daniel WesemannGetting the EXE out of the RTF
2009-07-02Bojan ZdrnjaCold Fusion web sites getting compromised
2009-07-01Bojan ZdrnjaMobile phone trojans
2009-07-01Bojan ZdrnjaNew VMWare Security Advisory
2009-06-30Chris CarboniFirefox 3.5 is available
2009-06-27Tony CarothersNew NIAP Strategy on the Horizon
2009-06-23Bojan ZdrnjaSlowloris and Iranian DDoS attacks
2009-06-23Bojan ZdrnjaNew Thunderbird out, patches couple of vulnerabilities
2009-06-21Scott FendleyphpMyAdmin Scans
2009-06-20Mark HofmanG'day from Sansfire2009
2009-06-20Scott FendleySituational Awareness: Spam Crisis and China
2009-06-17Guy BruneauWireshark 1.2.0 released
2009-06-16Bojan ZdrnjaIranian hacktivism
2009-06-16John BambenekIran Internet Blackout: Using Twitter for Operational Intelligence
2009-06-16John BambenekURL Shortening Service Cligs Hacked
2009-06-15Daniel WesemannDrive-by Blackouting ?
2009-06-14Guy BruneauSANSFIRE 2009 Starts Tomorrow
2009-06-12Adrien de BeaupreGoogle updates for Chrome
2009-06-12Adrien de BeaupreGreen Dam
2009-06-11Rick WannerMIR-ROR Motile Incident Response - Respond Objectively Remediate
2009-06-11Rick WannerWHO Declares Flu A(H1N1) a Pandemic
2009-06-11Rick WannerFirefox 3.0.11 is available
2009-06-10Rick WannerSysInternals Survey
2009-06-09Swa FrantzenSafari 4.0 released - contains security fixes
2009-06-09Swa FrantzenMicrosoft June Black Tuesday Overview
2009-06-09Swa FrantzenAdobe June Black Tuesday upgrades
2009-06-06Patrick NolanARRA/HIPAA Breach Reporting Dates Approaching
2009-06-04Raul SilesMalware targetting banks ATM's
2009-06-04Raul SilesTargeted e-mail attacks asking to verify wire transfer details
2009-06-01G. N. WhiteYet another "Digital Certificate" malware campaign
2009-05-30John BambenekEmbedded Devices: An Avenue for Cyberterrorism?
2009-05-29Lorna HutchesonVMWare Patches Released
2009-05-29Lorna HutchesonBlackberry Server Vulnerability
2009-05-28Jim ClausingMore new volatility plugins
2009-05-28Jim ClausingStego in TCP retransmissions
2009-05-28Stephen HallMicrosoft DirectShow vulnerability
2009-05-27donald smithWebDAV write-up
2009-05-26Jason LamA new Web application security blog
2009-05-25Jim ClausingWireshark-1.0.8 released
2009-05-24Raul SilesAnalyzing malicious PDF documents
2009-05-21Adrien de BeaupreGumblar analysis and writeup
2009-05-20Pedro BuenoCyber Warfare and Kylin thoughts
2009-05-19Rick WannerNew Version of Mandiant Highlighter
2009-05-19Bojan ZdrnjaAdvanced blind SQL injection (with Oracle examples)
2009-05-18Rick WannerCisco SAFE Security Reference Guide Updated
2009-05-18Rick WannerJSRedir-R/Gumblar badness
2009-05-15Daniel WesemannIIS6.0 WebDav Remote Auth Bypass
2009-05-12Swa FrantzenMSFT's version of responsible disclosure
2009-05-12Swa FrantzenApple patches and updates
2009-05-12Swa FrantzenMay Black Tuesday Overview
2009-05-11Mari NicholsSysinternals Updates 3 Applications
2009-05-10Mari NicholsIs your Symantec Antivirus Alerting working correctly?
2009-05-09Patrick NolanUnusable, Unreadable, or Indecipherable? No Breach reporting required
2009-05-07Deborah HaleMalicious Content on the Web
2009-05-05Bojan ZdrnjaEvery dot matters
2009-05-05Bojan ZdrnjaHealth database breached
2009-05-04Tom ListonFacebook phishing malware
2009-05-04Tom ListonAdobe Reader/Acrobat Critical Vulnerability
2009-05-02Rick WannerSignificant increase in port 2967 traffic
2009-05-01Adrien de BeaupreIncident Management
2009-05-01Adrien de BeauprePassword != secure
2009-04-30Marcus SachsMicrosoft Revises 08-069, 08-076, and 09-012
2009-04-30Marcus SachsARIN Notification Concerning IPv6
2009-04-29Jason LamTwo Adobe 0-day vulnerabilities
2009-04-28Deborah HaleRSA Conference Social Security Awards
2009-04-27Johannes UllrichSwine Flu (Mexican Flu) related domains
2009-04-26Johannes UllrichPandemic Preparation - Swine Flu
2009-04-24John BambenekData Leak Prevention: Proactive Security Requirements of Breach Notification Laws
2009-04-24Pedro BuenoDid you check your conference goodies?
2009-04-21Bojan ZdrnjaWeb application vulnerabilities
2009-04-19Mari NicholsProviding Accurate Risk Assessments
2009-04-18Johannes UllrichTwitter Packet Challenge Solution
2009-04-17Daniel WesemannGuess what? SSH again!
2009-04-16Adrien de BeaupreIncident Response vs. Incident Handling
2009-04-16Adrien de BeaupreSome conficker lessons learned
2009-04-15Marcus Sachs2009 Data Breach Investigation Report
2009-04-14Swa FrantzenVMware exploits - just how bad is it ?
2009-04-14Swa FrantzenApril Black Tuesday Overview
2009-04-14Swa FrantzenOracle quarterly patches
2009-04-13Bojan ZdrnjaTwitter worm copycats
2009-04-12Patrick NolanTwitter Worm(s)
2009-04-10Stephen HallPatches for critical VMWare vulnerability
2009-04-10Stephen HallHosted javascript leading to .cn PDF malware
2009-04-09Johannes UllrichConficker update with payload
2009-04-09Jim ClausingWireshark 1.0.7 released
2009-04-09Jim ClausingConficker Working Group site down
2009-04-07Johannes UllrichCommon Apache Misconception
2009-04-07Bojan ZdrnjaAdvanced JavaScript obfuscation (or why signature scanning is a failure)
2009-04-07Johannes UllrichTax Season Scams
2009-04-07Johannes UllrichSSH scanning from compromised mail servers
2009-04-06Adrien de BeaupreAbuse addresses
2009-04-05Marcus SachsOpen Source Conficker-C Scanner/Detector Released
2009-04-04Tony CarothersRecent VMware Updates Available
2009-04-02Bojan ZdrnjaJavaScript insertion and log deletion attack tools
2009-04-02Handlers A view from the CWG Trenches
2009-03-30Daniel WesemannWatch your Internet routers!
2009-03-30Daniel WesemannLocate Conficker infected hosts with a network scan!
2009-03-29Chris CarboniApril 1st - What Will Really Happen?
2009-03-28Rick WannerNew Beta release of Nmap
2009-03-27David GoldsmithFirefox 3.0.8 Released
2009-03-25David GoldsmithJava Runtime Environment 6.0 Update 13 Released
2009-03-20Stephen HallMaking the most of your runbooks
2009-03-19Mark HofmanBrace yourselves - IE8 reported to be released
2009-03-19Mark HofmanBrowsers Tumble at CanSecWest
2009-03-16Johannes Ullrichnew rogue-DHCP server malware
2009-03-13Bojan ZdrnjaWhen web application security, Microsoft and the AV vendors all fail
2009-03-11Bojan ZdrnjaMassive ARP spoofing attacks on web sites
2009-03-10Swa FrantzenTinyURL and security
2009-03-10Swa FrantzenBrowser plug-ins, transparent proxies and same origin policies
2009-03-10Swa Frantzenconspiracy fodder: pifts.exe
2009-03-10Swa FrantzenMarch black Tuesday overview
2009-03-10Swa FrantzenAdobe Acrobat 9.1 released
2009-03-08Marcus SachsBehind the Estonia Cyber Attacks
2009-03-04Deborah HaleWireshark 1.0.6 Released
2009-03-04Deborah HaleFirefox Releases version 3.0.7
2009-03-03Kyle HaugsnessOpera browser security updates
2009-03-02Swa FrantzenObama's leaked chopper blueprints: anything we can learn?
2009-03-01Jim ClausingCool combination of tools
2009-02-25Andre LudwigAdobe Acrobat pdf 0-day exploit, No JavaScript needed!
2009-02-25Andre LudwigPreview/Iphone/Linux pdf issues
2009-02-25Swa FrantzenTargeted link diversion attempts
2009-02-25donald smithAutoRun disabling patch released
2009-02-23Daniel WesemannTurf War
2009-02-23Daniel WesemannAnd the Oscar goes to...
2009-02-22Mari NicholsThe Internet Safety Act of 2009
2009-02-17Jason LamDShield Web Honeypot - Alpha Preview Release
2009-02-14Deborah HaleMicrosoft Time Sync Appears to Down
2009-02-14Deborah HaleDebit Card Compromise Letter
2009-02-13Andre LudwigThird party information on conficker
2009-02-12Mark HofmanAustralian Bushfires
2009-02-11Robert DanfordProFTPd SQL Authentication Vulnerability exploit activity
2009-02-10Swa FrantzenFebruary Black Tuesday Overview
2009-02-10Bojan ZdrnjaMore tricks from Conficker and VM detection
2009-02-09Bojan ZdrnjaSome tricks from Conficker's bag
2009-02-08Mari NicholsAre we becoming desensitized to data breaches?
2009-02-06Adrien de BeaupreTime to patch your HP printers
2009-02-06Adrien de BeaupreFake stimulus payments
2009-02-05Rick WannerMandiant Memoryze review, Hilighter, other Mandiant tools!
2009-02-04Daniel WesemannFirefox 3.0.6
2009-02-04Daniel WesemannTitan Shields up!
2009-02-02Stephen HallHow do you audit your production code?
2009-01-31Swa FrantzenWindows 7 - not so secure ?
2009-01-31Swa FrantzenVMware updates
2009-01-31John BambenekGoogle Search Engine's Malware Detection Broken
2009-01-30Mark HofmanWe all "Love" USB drives
2009-01-30Mark HofmanRequest for info - Scan and webmail
2009-01-25Rick WannerTwam?? Twammers?
2009-01-24Pedro BuenoIdentifying and Removing the iWork09 Trojan
2009-01-21Raul SilesTraffic increase for port UDP/8247
2009-01-20Adrien de BeaupreObamamania
2009-01-18Maarten Van HorenbeeckTargeted social engineering
2009-01-18Daniel Wesemann3322. org
2009-01-16G. N. WhiteConficker.B/Downadup.B/Kido: F-Secure publishes details pertaining to their counting methodology of compromised machines
2009-01-15Bojan ZdrnjaConficker's autorun and social engineering
2009-01-13Johannes UllrichJanuary Black Tuesday Overview
2009-01-12William SaluskyDownadup / Conficker - MS08-067 exploit and Windows domain account lockout
2009-01-12William SaluskyWeb Application Firewalls (WAF) - Have you deployed WAF technology?
2009-01-09Johannes UllrichSANS Log Management Survey
2009-01-07Bojan ZdrnjaAn Israeli patriot program or a trojan
2009-01-04Rick WannerTwitter/Facebook Phishing Attempt
2009-01-03Rick WannerRAID != Backup
2009-01-02Rick WannerTools on my Christmas list.
2009-01-02Mark HofmanBlocking access to MD5 signed certs
2008-12-31David GoldsmithThunderbird 2.0.0.19 Released
2008-12-28Raul SilesLevel3 Outage?
2008-12-28Raul SilesAT&T Wireless Outage
2008-12-25Maarten Van HorenbeeckMerry Christmas, and beware of digital hitchhikers!
2008-12-25Maarten Van HorenbeeckChristmas Ecard Malware
2008-12-23Patrick NolanMS ACK's Vulnerability in SQL Server which Could Allow Remote Code Execution
2008-12-21Mari Nichols Proving Security ROI in Tough Economic Times
2008-12-17donald smithFirefox 3.0.5 fixes several security issues.
2008-12-17donald smithTeam CYMRU's Malware Hash Registry
2008-12-17donald smithOpera 9.6.3 released with security fixes
2008-12-17donald smithInternet Explorer 960714 is released
2008-12-16donald smithMicrosoft announces an out of band patch for IE zero day
2008-12-16donald smithCisco's Annual Security report has been released.
2008-12-15Toby KohlenbergNew MS SQL Server vulnerability
2008-12-13Jim ClausingFollowup from last shift and some research to do.
2008-12-12Johannes UllrichMSIE 0-day Spreading Via SQL Injection
2008-12-12Swa FrantzenBrowser Security Handbook
2008-12-10Bojan Zdrnja0-day exploit for Internet Explorer in the wild
2008-12-10Mark HofmanMicrosoft wordpad text converter issue
2008-12-09Swa FrantzenDecember Black Tuesday Overview
2008-12-05Daniel WesemannBeen updatin' your Flash player lately?
2008-12-05Daniel WesemannBaby, baby!
2008-12-04Bojan ZdrnjaRogue DHCP servers
2008-12-03Andre LudwigNew ISC Poll! Has your organization suffered a DDoS (Distributed Denial of Service) attack in the last year?
2008-12-01Jason LamCall for volunteers - Web Honeypot Project
2008-11-30Mari NicholsRejected Email Issues
2008-11-29Pedro BuenoUbuntu users: Time to update!
2008-11-25Andre LudwigTmobile G1 handsets having DNS problems?
2008-11-25Andre LudwigThe beginnings of a collaborative approach to IDS
2008-11-25Andre LudwigOS X Dns Changers part three
2008-11-22G. N. WhitePicture Printing Kiosks & Flash Memory Devices
2008-11-20Jason LamLarge quantity SQL Injection mitigation
2008-11-17Marcus SachsNew Tool: NetWitness Investigator
2008-11-17Jim ClausingFinding stealth injected DLLs
2008-11-17Jim ClausingCritical update to Adobe AIR
2008-11-16Maarten Van HorenbeeckDetection of Trojan control channels
2008-11-14Stephen HallMore updated tools
2008-11-13Jim ClausingNew Firefoxen out
2008-11-12John BambenekThoughts on Security Intelligence (McColo Corp alleged spam/malware host knocked offline)
2008-11-11Swa FrantzenAcrobat continued activity in the wild
2008-11-11Swa FrantzenPhishing for Google adwords
2008-11-11Swa FrantzenNovember Black Tuesday Overview
2008-11-10Stephen HallAdobe Reader Vulnerability - part 2
2008-11-08Raul SilesWPA Cracked - additional details
2008-11-06Joel EslerWireless Poll
2008-11-06Joel EslerWPA Wi-fi Cracked (but it's not as bad as you think... yet)
2008-11-05donald smithBot net hunters get an improved tool from SRI bothunters
2008-11-05donald smithhacking the election
2008-11-05donald smithIf you missed President Elect Obamas speech have some malware instead
2008-11-04Marcus SachsCyber Security Awareness Month 2008 - Summary and Links
2008-11-03Joel EslerDay 34 -- Feeding The Lessons Learned Back to the Preparation Phase
2008-11-02Mari NicholsDay 33 - Working with Management to Improve Processes
2008-11-01Koon Yaw TanDay 32 - What Should I Make Public?
2008-10-31Rick WannerSprint-Cogent Peering Issue
2008-10-31Rick WannerDay 31 - Legal Awareness
2008-10-30Kevin ListonDay 30 - Applying Patches and Updates
2008-10-30Kevin ListonOpera 9.62 available - security update
2008-10-29Deborah HaleDay 29 - Should I Switch Software Vendors?
2008-10-28Jason LamDay 28 - Avoiding Finger Pointing and the Blame Game
2008-10-27Johannes UllrichDay 27 - Validation via Vulnerability Scanning
2008-10-25Rick WannerDay 26 - Restoring Systems from Backup
2008-10-25Koon Yaw TanDay 25 - Finding and Removing Hidden Files and Directories
2008-10-24Stephen HallDay 24 - Cleaning Email Servers and Clients
2008-10-23Mark HofmanMicrosoft out-of-band patch - Severity Critical
2008-10-22Johannes UllrichDay 22 - Wiping Disks and Media
2008-10-22Mari NicholsF-Secure and Trend Micro Release Critical Patches
2008-10-22Mari NicholsOpera 9.6.1 Released
2008-10-22Chris CarboniDay 23 - Turning off Unused Services
2008-10-21Johannes UllrichWireshark 1.0.4 released
2008-10-21Johannes UllrichDay 21 - Removing Bots, Keyloggers, and Spyware
2008-10-20Raul SilesDay 20 - Eradicating a Rootkit
2008-10-20Johannes UllrichFraudulent ATM Reactivation Phone Calls.
2008-10-19Lorna HutchesonDay 19 - Eradication: Forensic Analysis Tools - What Happened?
2008-10-18Rick WannerUpdates to SysInternals tools!
2008-10-17Patrick NolanDay 17 - Containing a DNS Hijacking
2008-10-17Rick WannerDay 18 - Containing Other Incidents
2008-10-16Mark HofmanDay 16 - Containing a Malware Outbreak
2008-10-15Rick WannerDay 15 - Containing the Damage From a Lost or Stolen Laptop
2008-10-14Swa FrantzenDay 14 - Containment: a Personal IdentityTheft Incident
2008-10-14Swa FrantzenOctober Black Tuesday Overview
2008-10-14Swa FrantzenOracle quarterly patches on black tuesday
2008-10-13Adrien de BeaupreDay 13 - Containment: Containing on Production Systems Such as a Web Server
2008-10-12Mari NicholsDay 12 Containment: Gathering Evidence That Can be Used in Court
2008-10-11Stephen HallDay 11 - Identification: Other Methods of Identifying an Incident
2008-10-10Marcus SachsDay 10 - Identification: Using Your Help Desk to Identify Security Incidents
2008-10-10Marcus SachsFake Microsoft Update Email
2008-10-09Marcus SachsDay 9 - Identification: Log and Audit Analysis
2008-10-09Bojan ZdrnjaWatch that .htaccess file on your web site
2008-10-08Johannes UllrichDay 8 - Global Incident Awareness
2008-10-07Kyle HaugsnessCogent peering problems
2008-10-07Kyle HaugsnessDay 7 - Identification: Host-based Intrusion Detection Systems
2008-10-07Kyle HaugsnessGood reading and a malware challenge
2008-10-06Jim ClausingNovell eDirectory advisory
2008-10-06Jim ClausingDay 6 - Network-based Intrusion Detection Systems
2008-10-05Stephen HallDay 5 - Identification: Events versus Incidents
2008-10-04Marcus SachsDay 4 - Preparation: What Goes Into a Response Kit
2008-10-03Jason LamDay 3 - Preparation: Building Checklists
2008-10-02Marcus SachsDay 2 - Preparation: Building a Response Team
2008-10-02Kyle HaugsnessLow, slow, distributed SSH username brute forcing
2008-10-01Marcus SachsDay 1 - Preparation: Policies, Management Support, and User Awareness
2008-10-01Rick WannerHandler Mailbag
2008-09-30Marcus SachsCyber Security Awareness Month - Daily Topics
2008-09-29Daniel WesemannASPROX mutant
2008-09-29Daniel WesemannPatchbag: WinZip / MPlayer / RealWin SCADA vuln
2008-09-26Patrick NolanFirefox v2.0.0.17 and Thunderbird v2.0.0.17 release fixes vulnerabilities
2008-09-25Jim ClausingFirefox 3.0.3 will be out probably tomorrow
2008-09-24Deborah HaleFlurry of Security Advisories from CISCO
2008-09-22Maarten Van HorenbeeckData exfiltration and the use of anonymity providers
2008-09-22Jim ClausingLessons learned from the Palin (and other) account hijacks
2008-09-21Mari NicholsYou still have time!
2008-09-20Rick WannerNew (to me) nmap Features
2008-09-19Bojan ZdrnjaVMWare ESX(i) 3.5 security patches
2008-09-18Bojan ZdrnjaMonitoring HTTP User-Agent fields
2008-09-16donald smithDon't open that invoice.zip file its not from UPS
2008-09-15donald smithFake antivirus 2009 and search engine results
2008-09-11David GoldsmithCookieMonster is coming to Pown (err, Town)
2008-09-10Adrien de BeaupreApple updates iPod Touch + Bonjour for Windows
2008-09-09Swa FrantzenGoogle Chrome being polished
2008-09-09Swa FrantzenSeptember 2008 Black Tuesday Overview
2008-09-09Swa Frantzenwordpress upgrade
2008-09-08Raul SilesCitectSCADA ODBC service exploit published
2008-09-07Lorna HutchesonMalware Analysis: Tools are only so good
2008-09-04Chris CarboniWireshark 1.0.3 released
2008-09-03Daniel WesemannStatic analysis of Shellcode
2008-09-03Daniel WesemannStatic analysis of Shellcode - Part 2
2008-09-01John BambenekThe Number of Machines Controlled by Botnets Has Jumped 4x in Last 3 Months
2008-08-25John BambenekThoughts on the Best Western Compromise
2008-08-20Adrien de BeaupreFrom the mailbag, Opera 9.52...
2008-08-17Kevin ListonVolatility 1.3 Released
2008-08-16Marcus SachsAnother Infected Digital Photo Frame
2008-08-15Jim ClausingOMFW 2008 reflections
2008-08-13Adrien de BeaupreCNN switched to MSNBC
2008-08-12Johannes UllrichVMWare ESX 3.5u2 Errors
2008-08-12Stephen HallAugust 2008 Black Tuesday Overview
2008-08-09Deborah HaleA Few Tips to Help You Protect Your Home Computer
2008-08-05Daniel WesemannThe news update you never asked for
2008-08-03Deborah HaleSecuring A Network - Lessons Learned
2008-08-02Maarten Van HorenbeeckA little of that human touch
2008-08-02Maarten Van HorenbeeckIssues affecting sites using Sitemeter [resolved]
2008-08-01Robert DanfordMicrosoft Malicious Software Removal Tool users double check it's running
2008-07-30David GoldsmithSerious 0-Day Flaw in Oracle -- Patch Released
2008-07-24Bojan ZdrnjaMozilla releases Thunderbrid 2.0.0.16, fixes security vulnerabilities
2008-07-20Kevin ListonMalware Intelligence: Making it Actionable
2008-07-19William SaluskyA twist in fluxnet operations. Enter Hydraflux
2008-07-18Adrien de BeaupreExit process?
2008-07-17Mari NicholsFirefox Releases 3.0.1 and fixes 3 security vulnerabilities
2008-07-17Mari NicholsAdobe Reader 9 Released
2008-07-17Mari NicholsMicrosoft Updates 2 DirectX Bulletins
2008-07-16Maarten Van HorenbeeckFirefox 2.0.0.16 fixes two security vulnerabilities
2008-07-15Maarten Van HorenbeeckExtracting scripts and data from suspect PDF files
2008-07-15Maarten Van HorenbeeckOracle (and BEA, Hyperion and TimesTen) critical patch update July 15th, 2008
2008-07-15Maarten Van HorenbeeckBlackBerry PDF parsing vulnerability
2008-07-15Maarten Van HorenbeeckBot controller mimicry
2008-07-14Daniel WesemannObfuscated JavaScript Redux
2008-07-14Daniel WesemannDR/BCM lessons from the Vancouver fire
2008-07-09Johannes UllrichUnpatched Word Vulnerability
2008-07-08Johannes UllrichMulitple Vendors DNS Spoofing Vulnerability
2008-07-08Swa FrantzenSecurity implications in HVAC equipment
2008-07-08Swa FrantzenJuly 2008 black tuesday overview
2008-07-07Scott FendleyMicrosoft Snapshot Viewer Security Advisory
2008-07-07Jason LamWe need academic volunteers - Web security research
2008-07-07Pedro BuenoBad url classification
2008-07-04Kevin ListonStorm Botnet Celebrates Birthday With Fireworks
2008-07-03Bojan ZdrnjaNew Opera v9.51 fixes couple of security issues
2008-07-02Jim ClausingFirefox 2.0.0.15 is out
2008-07-02Jim ClausingThe scoop on the spike in UDP port 7 traffic
2008-07-02Jim ClausingAnother little script I threw together
2008-06-30Marcus SachsMore SQL Injection with Fast Flux hosting
2008-06-26Daniel WesemannAutomatic wireless connections
2008-06-25Deborah HaleReport of Coreflood.dr Infection
2008-06-24Jason LamAdobe Reader and Acrobat 8.1.2 Security Update
2008-06-24Jason LamMicrosoft SQL Injection Prevention Strategy
2008-06-23donald smithPreventing SQL injection
2008-06-19William StearnsFirefox vunerability
2008-06-18Marcus SachsOlympics Part II
2008-06-16Kevin ListonOpera 9.5 is Available
2008-06-16Marcus SachsFirefox 3.0 to be Released on Tuesday
2008-06-14Lorna HutchesonMalware Detection - Take the Blinders Off
2008-06-13Johannes UllrichFloods: More of the same (2)
2008-06-12Bojan ZdrnjaSafari on Windows - not looking good
2008-06-11John BambenekCitectSCADA Buffer Overflow Vulnerability
2008-06-10Swa FrantzenRansomware keybreaking
2008-06-10Swa FrantzenJune 2008 Black Tuesday Overview
2008-06-10Swa FrantzenSNMP v3 trouble
2008-06-10Swa FrantzenLinux ASN.1 BER kernel buffer overflow
2008-06-09Scott FendleySo Where Are Those OpenSSH Key-based Attacks?
2008-06-07Jim ClausingFollowup to 'How do you monitor your website?'
2008-06-06Kevin ListonMicrosoft Security Bulletin Advance Notification for June 2008
2008-06-02donald smithNew Stormworm download site
2008-06-02Jim ClausingEmergingthreats.net and ThePlanet
2008-06-01Mark HofmanFree Yahoo email account! Sign me up, Ok well maybe not.
2008-06-01Mari NicholsUpdates to VMware resolve critical security issues
2008-06-01Swa FrantzenThe Planet outage - what can we all learn from it?
2008-05-28Adrien de BeaupreAnother example of malicious SWF
2008-05-27Adrien de BeaupreAdobe flash player vuln
2008-05-27Adrien de BeaupreMalicious swf files?
2008-05-26Marcus SachsPredictable Response
2008-05-26Marcus SachsPort 1533 on the Rise
2008-05-25Stephen HallCisco's Response to Rootkit presentation
2008-05-23Mike PoorCisco IOS Rootkit thoughts
2008-05-20Raul SilesList of malicious domains inserted through SQL injection
2008-05-19Maarten Van HorenbeeckText message and telephone aid scams
2008-05-19Maarten Van HorenbeeckRoute filtering and its impact on the DNS fabric
2008-05-17Jim ClausingDisaster donation scams continue
2008-05-15Bojan ZdrnjaINFOCon yellow: update your Debian generated keys/certs ASAP
2008-05-15Bojan ZdrnjaDebian and Ubuntu users: fix your keys/certificates NOW
2008-05-14Bojan ZdrnjaWar of the worlds?
2008-05-13Swa FrantzenMay 2008 black tuesday overview
2008-05-13Swa FrantzenMicrosoft office file block & MOICE
2008-05-12Scott FendleyBrute-force SSH Attacks on the Rise
2008-05-09Joel EslerThunderbird 2.0.0.14 is out!
2008-05-08Joel EslerCOMPROMISED FILE IN VIETNAMESE LANGUAGE PACK FOR FIREFOX 2
2008-05-06John BambenekWindows XP Service Pack 3 Released
2008-05-06Marcus SachsIndustrial Control Systems Vulnerability
2008-05-05John BambenekDefenses Against Automated Patch-Based Exploit Generation
2008-05-02Adrien de BeaupreHi, remember me?...
2008-05-01Adrien de BeaupreWindows XP SteadyState
2008-05-01Adrien de BeaupreWindows Detours
2008-04-30Bojan Zdrnja(Minor) evolution in Mac DNS changer malware
2008-04-29Bojan ZdrnjaScripts in ASF files
2008-04-27Marcus SachsWhat's With Port 20329?
2008-04-24Maarten Van HorenbeeckTargeted attacks using malicious PDF files
2008-04-24donald smithHundreds of thousands of SQL injections
2008-04-23Mari NicholsWhat's New, Old and Morphing?
2008-04-22donald smithXP SP3 RC2 Available
2008-04-22donald smithSpam to your calendar via Google agenda?
2008-04-22donald smithSymantec decomposer rar bypass allowed malicious content.
2008-04-22donald smithMaximus root kit downloads via MySpace social engineering trick.
2008-04-18John BambenekIIS Vulnerability Documented by Microsoft - Includes Workarounds
2008-04-18John BambenekEV SSL Certificates - Just once, why can't one of our poorly considered quick fixes work?
2008-04-18John BambenekThe Patch Window is Gone: Automated Patch-Based Exploit Generation
2008-04-17Chris CarboniFirefox Update
2008-04-17Chris CarboniSafari 3.1.1 Released
2008-04-16Bojan ZdrnjaThe 10.000 web sites infection mystery solved
2008-04-16William StearnsWindows XP Service Pack 3 - unofficial schedule: Apr 21-28
2008-04-16William StearnsPasser, a aassive machine and service sniffer
2008-04-15Johannes UllrichIt's Tax Day
2008-04-15Johannes UllrichSRI Malware Threat Center
2008-04-14John BambenekA Federal Subpoena or Just Some More Spam & Malware?
2008-04-11John BambenekADSL Router / Cable Modem / Home Wireless AP Hardening in 5 Steps
2008-04-10Deborah HaleDSLReports Being Attacked Again
2008-04-09Joel EslerISC Podcast Episode Number 2
2008-04-08Swa FrantzenSymantec's Global Internet Security Threat Report
2008-04-08Swa FrantzenApril 2008 - Black Tuesday Overview
2008-04-07John BambenekHP USB Keys Shipped with Malware for your Proliant Server
2008-04-07John BambenekGot Kraken?
2008-04-07John BambenekNetwork Solutions Technical Difficulties? Enom too
2008-04-07John BambenekKraken Technical Details: UPDATED x3
2008-04-06Daniel WesemannAdvanced obfuscated JavaScript analysis
2008-04-04Daniel Wesemannnmidahena
2008-04-03Bojan ZdrnjaMixed (VBScript and JavaScript) obfuscation
2008-04-03Bojan ZdrnjaVB detection: is it so difficult?
2008-04-03Bojan ZdrnjaOpera fixes vulnerabilities and Microsoft announces April's fixes
2008-04-02Adrien de BeaupreWhen is a DMG file not a DMG file
2008-04-01Joel EslerSecurity in everyday life -- A true April Fools story
2008-03-31Stephen HallStorming into April on Fools Day
2008-03-30Mark HofmanMail Anyone?
2008-03-27Maarten Van HorenbeeckGuarding the guardians: a story of PGP key ring theft
2008-03-26Raul SilesFirefox 2.0.0.13 is out
2008-03-26Raul SilesORDB.org blocklisting all IP addresses
2008-03-25Raul SilesMicrosoft Jet Database Engine Advisory Update (950627)
2008-03-24Raul SilesNext-generation Web browsers?
2008-03-22Koon Yaw TanMicrosoft Security Advisory Released (950627)
2008-03-21donald smithD-Link router based worm?
2008-03-20Joel EslerAPPLE-SA-2008-03-19 AirPort Extreme Base Station Firmware 7.3.1
2008-03-20Joel EslerPotential Vulnerability in Flash CS3 Professional, Flash Professional 8 and Flash Basic 8?
2008-03-19Raul SilesVMware updates resolve critical security issues (VMSA-2008-0005)
2008-03-13Jason LamRemote File Include spoof!?
2008-03-12Joel EslerAdobe security updates
2007-01-03Toby KohlenbergVLC Media Player udp URL handler Format String Vulnerability
2006-12-28Jim ClausingArchiving the snort tips
2006-12-26Swa FrantzenVista: better security [Y/N] ?
2006-12-18Toby KohlenbergORDB Shutting down
2006-12-18Toby KohlenbergSkype worm
2006-12-12Swa FrantzenMicrosoft Black Tuesday - December 2006 overview
2006-12-12Jim ClausingMS06-075: csrss local privilege escalation (CVE-2006-5585)
2006-12-12Lorna HutchesonMS06-072: Cumulative Security Update for Internet Explorer (925454)
2006-12-12Robert DanfordMS06-078: 2 Windows Media Format Vulnerabilities (CVE-2006-4702, CVE-2006-6134)
2006-12-12Swa FrantzenMicrosoft Office 2004 - Mac OS X updated
2006-12-12Swa FrantzenOffline Microsoft Patching
2006-12-12Swa FrantzenThe missing Microsoft patches
2006-11-29Toby KohlenbergNew Vulnerability Announcement and patches from Apple
2006-11-29Toby KohlenbergWeek of Oracle bugs cancelled
2006-11-29Toby KohlenbergNew Adobe vulnerability
2006-11-20Joel EslerMS06-070 Remote Exploit
2006-11-14Jim ClausingMS06-069: Adobe Flash Player
2006-11-14Jim ClausingMS06-071: MSXML Core Services
2006-11-10Tony CarothersA busy Black Tuesday coming up.....
2006-10-30William SaluskyToD - Configuration Management - maintaining security awareness
2006-10-18Robert DanfordOracle Quarterly Critical Patch Update (Oct 2006)
2006-10-17Arrigo TriulziHacking Tor, the anonymity onion routing network
2006-10-09Swa FrantzenMicrosoft black tuesday - October 2006 STATUS
2006-10-05Swa FrantzenMS06-053 revisited ?
2006-10-05John BambenekThere are no more Passive Exploits
2006-10-03Swa FrantzenDetecting attacks against servers
2006-09-30Robert Danford*WebViewFolderIcon ActiveX control exploit(s) in the wild
2006-09-30Swa FrantzenYellow: WebViewFolderIcon setslice exploit spreading
2006-09-28Swa FrantzenPowerpoint, yet another new vulnerability
2006-09-28Swa FrantzenMSIE: One patched, one pops up again (setslice)
2006-09-26Jim ClausingMS06-049 re-release
2006-09-21Johannes UllrichApple updates Airport Drivers
2006-09-13Swa FrantzenPHP - shared hosters, take note.
2006-09-12Michael HaisleyMicrosoft Security Bulletin MS06-054
2006-09-12Swa FrantzenMicrosoft security patches for September 2006
2006-09-12Michael HaisleyMicrosoft Security Bulletin MS06-052
2006-09-12Swa FrantzenAdobe Flash player upgrade time
2006-09-10Lenny ZeltserEarly Discussions of Computer Security in the Media
2006-09-09Jim ClausingNew feature at isc.sans.org
2006-09-06Johannes UllrichUpdated Packet Attack flash animation
2006-09-01Joel EslerCA eTrust Antivirus [was] flagging lsass.e x e
2006-08-31Swa FrantzenNT botnet submitted
2006-08-17Swa FrantzenMicrosoft August 2006 Patches: STATUS
2000-01-02Deborah Hale2010 A Look Back - 2011 A Look Ahead
2000-01-01Manuel Humberto Santander PelaezHappy New Year 2011!!!