2025-07-30 | Johannes Ullrich | Securing Firebase: Lessons Re-Learned from the Tea Breach |
2025-05-06 | Xavier Mertens | Python InfoStealer with Embedded Phishing Webserver |
2025-04-15 | Xavier Mertens | Online Services Again Abused to Exfiltrate Data |
2025-01-29 | Xavier Mertens | From PowerShell to a Python Obfuscation Race! |
2025-01-28 | Xavier Mertens | Fileless Python InfoStealer Targeting Exodus |
2024-12-18 | Jesse La Grew | [Guest Diary] A Deep Dive into TeamTNT and Spinning YARN |
2024-11-30 | Xavier Mertens | From a Regular Infostealer to its Obfuscated Version |
2024-11-22 | Xavier Mertens | An Infostealer Searching for « BIP-0039 » Data |
2024-11-07 | Xavier Mertens | Steam Account Checker Poisoned with Infostealer |
2024-10-09 | Xavier Mertens | From Perfctl to InfoStealer |
2024-09-18 | Xavier Mertens | Python Infostealer Patching Windows Exodus App |
2024-08-27 | Xavier Mertens | Why Is Python so Popular to Infect Windows Hosts? |
2024-07-26 | Xavier Mertens | ExelaStealer Delivered "From Russia With Love" |
2024-05-31 | Xavier Mertens | "K1w1" InfoStealer Uses gofile.io for Exfiltration |
2024-02-20 | Xavier Mertens | Python InfoStealer With Dynamic Sandbox Detection |
2024-01-25 | Xavier Mertens | Facebook AdsManager Targeted by a Python Infostealer |
2023-12-22 | Xavier Mertens | Shall We Play a Game? |
2023-09-29 | Xavier Mertens | Are You Still Storing Passwords In Plain Text Files? |
2023-07-01 | Russ McRee | Sandfly Security |
2023-05-09 | Russ McRee | Exploratory Data Analysis with CISSM Cyber Attacks Database - Part 2 |
2023-05-04 | Xavier Mertens | Infostealer Embedded in a Word Document |
2023-03-01 | Xavier Mertens | Python Infostealer Targeting Gamers |
2022-12-18 | Guy Bruneau | Infostealer Malware with Double Extension |
2022-09-23 | Xavier Mertens | Kids Like Cookies, Malware Too! |
2022-09-19 | Russ McRee | Chainsaw: Hunt, search, and extract event log records |
2022-08-11 | Xavier Mertens | InfoStealer Script Based on Curl and NSudo |
2022-06-10 | Russ McRee | EPSScall: An Exploit Prediction Scoring System App |
2022-04-06 | Brad Duncan | Windows MetaStealer Malware |
2022-03-23 | Brad Duncan | Arkei Variants: From Vidar to Mars Stealer |
2022-03-09 | Xavier Mertens | Infostealer in a Batch File |
2021-12-28 | Russ McRee | LotL Classifier tests for shells, exfil, and miners |
2021-12-21 | Xavier Mertens | More Undetected PowerShell Dropper |
2021-12-01 | Xavier Mertens | Info-Stealer Using webhook.site to Exfiltrate Data |
2021-07-09 | Brad Duncan | Hancitor tries XLL as initial malware file |
2021-06-30 | Brad Duncan | June 2021 Forensic Contest: Answers and Analysis |
2021-04-06 | Jan Kopriva | Malspam with Lokibot vs. Outlook and RFCs |
2021-03-31 | Xavier Mertens | Quick Analysis of a Modular InfoStealer |
2021-03-06 | Xavier Mertens | Spotting the Red Team on VirusTotal! |
2021-03-02 | Russ McRee | Adversary Simulation with Sim |
2021-01-19 | Russ McRee | Gordon for fast cyber reputation checks |
2020-10-23 | Russ McRee | Sooty: SOC Analyst's All-in-One Tool |
2020-08-12 | Russ McRee | To the Brim at the Gates of Mordor Pt. 1 |
2020-06-30 | Russ McRee | ISC Snapshot: SpectX IP Hitcount Query |
2020-04-21 | Russ McRee | SpectX: Log Parser for DFIR |
2020-02-27 | Xavier Mertens | Offensive Tools Are For Blue Teams Too |
2020-01-21 | Russ McRee | DeepBlueCLI: Powershell Threat Hunting |
2019-11-29 | Russ McRee | ISC Snapshot: Search with SauronEye |
2019-11-27 | Brad Duncan | Finding an Agent Tesla malware sample |
2019-11-08 | Xavier Mertens | Microsoft Apps Diverted from Their Main Use |
2019-10-09 | Brad Duncan | What data does Vidar malware steal from an infected host? |
2019-10-06 | Russ McRee | visNetwork for Network Data |
2019-08-21 | Russ McRee | KAPE: Kroll Artifact Parser and Extractor |
2019-07-16 | Russ McRee | Commando VM: The Complete Mandiant Offensive VM |
2019-04-05 | Russ McRee | Beagle: Graph transforms for DFIR data & logs |
2019-02-05 | Rob VandenBrink | Mitigations against Mimikatz Style Attacks |
2019-01-24 | Brad Duncan | Malspam with Word docs uses macro to run Powershell script and steal system data |
2018-10-17 | Russ McRee | RedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence |
2018-06-16 | Russ McRee | Anomaly Detection & Threat Hunting with Anomalize |
2017-03-08 | Xavier Mertens | Not All Malware Samples Are Complex |
2012-04-23 | Russ McRee | Emergency Operations Centers & Security Incident Management: A Correlation |
2011-03-25 | Kevin Liston | APT Tabletop Exercise |
2010-01-22 | Mari Nichols | Pass-down for a Successful Incident Response |
2010-01-14 | Bojan Zdrnja | DRG (Dragon Research Group) Distro available for general release |
2009-03-22 | Mari Nichols | Dealing with Security Challenges |