Date Author Title

FLASHBACK G

2012-02-24Guy BruneauFlashback Trojan in the Wild

FLASHBACK

2012-04-14/a>Rick WannerFlashback Trojan Removal Tool Released
2012-04-12/a>Guy BruneauApple Java Updates for Mac OS X
2012-03-05/a>Johannes UllrichFlashback Malware now with Twitter C&C
2012-02-24/a>Guy BruneauFlashback Trojan in the Wild

G

2024-10-03/a>Guy BruneauKickstart Your DShield Honeypot [Guest Diary]
2024-09-25/a>Guy BruneauOSINT - Image Analysis or More Where, When, and Metadata [Guest Diary]
2024-09-18/a>Guy BruneauTime-to-Live Analysis of DShield Data with Vega-Lite
2024-09-17/a>Xavier Mertens23:59, Time to Exfiltrate!
2024-09-16/a>Xavier MertensManaging PE Files With Overlays
2024-09-11/a>Guy BruneauHygiene, Hygiene, Hygiene! [Guest Diary]
2024-09-04/a>Guy Bruneau Attack Surface [Guest Diary]
2024-08-30/a>Jesse La GrewSimulating Traffic With Scapy
2024-08-29/a>Xavier MertensLive Patching DLLs with Python
2024-08-27/a>Guy BruneauVega-Lite with Kibana to Parse and Display IP Activity over Time
2024-08-20/a>Guy BruneauMapping Threats with DNSTwist and the Internet Storm Center [Guest Diary]
2024-08-16/a>Jesse La Grew[Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools
2024-08-14/a>Xavier MertensMultiple Malware Dropped Through MSI Package
2024-08-07/a>Guy BruneauSame Scripts, Different Day: What My DShield Honeypot Taught Me About the Importance of Security Fundamentals [Guest Diary]
2024-08-01/a>Johannes UllrichTracking Proxy Scans with IPv4.Games
2024-07-25/a>Xavier MertensXWorm Hidden With Process Hollowing
2024-07-24/a>Xavier Mertens"Mouse Logger" Malicious Python Script
2024-07-23/a>Johannes UllrichNew Exploit Variation Against D-Link NAS Devices (CVE-2024-3273)
2024-07-16/a>Jan Kopriva"Reply-chain phishing" with a twist
2024-07-16/a>Guy BruneauWho You Gonna Call? AndroxGh0st Busters! [Guest Diary]
2024-07-13/a>Didier Stevens16-bit Hash Collisions in .xls Spreadsheets
2024-07-10/a>Jesse La GrewFinding Honeypot Data Clusters Using DBSCAN: Part 1
2024-07-08/a>Xavier MertensKunai: Keep an Eye on your Linux Hosts Activity
2024-07-01/a>Johannes UllrichSSH "regreSSHion" Remote Code Execution Vulnerability in OpenSSH.
2024-06-26/a>Guy BruneauWhat Setting Live Traps for Cybercriminals Taught Me About Security [Guest Diary]
2024-06-20/a>Guy BruneauNo Excuses, Free Tools to Help Secure Authentication in Ubuntu Linux [Guest Diary]
2024-06-17/a>Xavier MertensNew NetSupport Campaign Delivered Through MSIX Packages
2024-06-13/a>Guy BruneauThe Art of JQ and Command-line Fu [Guest Diary]
2024-06-06/a>Xavier MertensMalicious Python Script with a "Best Before" Date
2024-06-04/a>Johannes UllrichNo-Defender, Yes-Defender
2024-05-31/a>Xavier Mertens"K1w1" InfoStealer Uses gofile.io for Exfiltration
2024-05-30/a>Xavier MertensFeeding MISP with OSSEC
2024-05-28/a>Guy BruneauIs that It? Finding the Unknown: Correlations Between Honeypot Logs & PCAPs [Guest Diary]
2024-05-27/a>Jan KoprivaFiles with TXZ extension used as malspam attachments
2024-05-22/a>Guy BruneauAnalysis of ?redtail? File Uploads to ICS Honeypot, a Multi-Architecture Coin Miner [Guest Diary]
2024-05-15/a>Rob VandenBrinkGot MFA? If not, Now is the Time!
2024-05-08/a>Xavier MertensAnalyzing Synology Disks on Linux
2024-05-06/a>Johannes UllrichDetecting XFinity/Comcast DNS Spoofing
2024-04-23/a>Johannes UllrichStruts "devmode": Still a problem ten years later?
2024-04-17/a>Xavier MertensMalicious PDF File Used As Delivery Mechanism
2024-04-15/a>Johannes UllrichQuick Palo Alto Networks Global Protect Vulnerablity Update (CVE-2024-3400)
2024-04-13/a>Johannes UllrichCritical Palo Alto GlobalProtect Vulnerability Exploited (CVE-2024-3400)
2024-04-11/a>Yee Ching TokEvolution of Artificial Intelligence Systems and Ensuring Trustworthiness
2024-04-07/a>Guy BruneauA Use Case for Adding Threat Hunting to Your Security Operations Team. Detecting Adversaries Abusing Legitimate Tools in A Customer Environment. [Guest Diary]
2024-03-29/a>Xavier MertensQuick Forensics Analysis of Apache logs
2024-03-19/a>Johannes UllrichAttacker Hunting Firewalls
2024-03-17/a>Guy BruneauGamified Learning: Using Capture the Flag Challenges to Supplement Cybersecurity Training [Guest Diary]
2024-03-15/a>Yee Ching Tok5Ghoul Revisited: Three Months Later
2024-03-14/a>Jan KoprivaIncrease in the number of phishing messages pointing to IPFS and to R2 buckets
2024-03-13/a>Xavier MertensUsing ChatGPT to Deobfuscate Malicious Scripts
2024-03-10/a>Guy BruneauWhat happens when you accidentally leak your AWS API keys? [Guest Diary]
2024-03-06/a>Bojan ZdrnjaScanning and abusing the QUIC protocol
2024-02-29/a>Jesse La Grew[Guest Diary] Dissecting DarkGate: Modular Malware Delivery and Persistence as a Service.
2024-02-28/a>Johannes UllrichExploit Attempts for Unknown Password Reset Vulnerability
2024-02-22/a>Johannes UllrichLarge AT&T Wireless Network Outage #att #outage
2024-02-21/a>Jan KoprivaPhishing pages hosted on archive.org
2024-02-15/a>Jesse La Grew[Guest Diary] Learning by doing: Iterative adventures in troubleshooting
2024-02-08/a>Xavier MertensA Python MP3 Player with Builtin Keylogger Capability
2024-02-03/a>Guy BruneauDShield Sensor Log Collection with Elasticsearch
2024-01-25/a>Xavier MertensFacebook AdsManager Targeted by a Python Infostealer
2024-01-19/a>Xavier MertensmacOS Python Script Replacing Wallet Applications with Rogue Apps
2024-01-12/a>Xavier MertensOne File, Two Payloads
2024-01-08/a>Jesse La GrewWhat is that User Agent?
2024-01-06/a>Xavier MertensAre you sure of your password?
2024-01-02/a>Johannes UllrichFingerprinting SSH Identification Strings
2023-12-31/a>Tom WebbPi-Hole Pi4 Docker Deployment
2023-12-23/a>Xavier MertensPython Keylogger Using Mailtrap.io
2023-12-22/a>Xavier MertensShall We Play a Game?
2023-12-10/a>Guy BruneauHoneypots: From the Skeptical Beginner to the Tactical Enthusiast
2023-12-07/a>Yee Ching Tok5Ghoul: Impacts, Implications and Next Steps
2023-12-06/a>Guy BruneauRevealing the Hidden Risks of QR Codes [Guest Diary]
2023-11-22/a>Guy BruneauCVE-2023-1389: A New Means to Expand Botnets
2023-11-20/a>Jesse La GrewOverflowing Web Honeypot Logs
2023-11-17/a>Jan KoprivaPhishing page with trivial anti-analysis features
2023-11-15/a>Xavier MertensRedline Dropped Through MSIX Package
2023-11-09/a>Guy BruneauRouters Targeted for Gafgyt Botnet [Guest Diary]
2023-11-08/a>Xavier MertensExample of Phishing Campaign Project File
2023-10-29/a>Guy BruneauSpam or Phishing? Looking for Credentials & Passwords
2023-10-28/a>Xavier MertensSize Matters for Many Security Controls
2023-10-16/a>Jan KoprivaAre typos still relevant as an indicator of phishing?
2023-09-26/a>Jan KoprivaA new spin on the ZeroFont phishing technique
2023-09-23/a>Guy BruneauScanning for Laravel - a PHP Framework for Web Artisants
2023-09-18/a>Johannes UllrichInternet Wide Multi VPN Search From Single /24 Network
2023-09-03/a>Didier StevensAnalysis of a Defective Phishing PDF
2023-08-31/a>Jan KoprivaThe low, low cost of (committing) cybercrime
2023-08-31/a>Guy BruneauPotential Weaponizing of Honeypot Logs [Guest Diary]
2023-08-25/a>Xavier MertensPython Malware Using Postgresql for C2 Communications
2023-08-23/a>Xavier MertensMore Exotic Excel Files Dropping AgentTesla
2023-08-23/a>Guy BruneauHow I made a qwerty ?keyboard walk? password generator with ChatGPT [Guest Diary]
2023-08-22/a>Xavier MertensHave You Ever Heard of the Fernet Encryption Algorithm?
2023-08-21/a>Xavier MertensQuick Malware Triage With Inotify Tools
2023-08-20/a>Guy BruneauSystemBC Malware Activity
2023-08-18/a>Xavier MertensFrom a Zalando Phishing to a RAT
2023-08-17/a>Jesse La GrewCommand Line Parsing - Are These Really Unique Strings?
2023-08-11/a>Xavier MertensShow me All Your Windows!
2023-07-28/a>Xavier MertensShellCode Hidden with Steganography
2023-07-23/a>Guy BruneauInstall & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-07-18/a>Johannes UllrichExploit Attempts for "Stagil navigation for Jira Menus & Themes" CVE-2023-26255 and CVE-2023-26256
2023-07-07/a>Xavier MertensDSSuite (Didier's Toolbox) Docker Image Update
2023-07-01/a>Russ McReeSandfly Security
2023-06-29/a>Brad DuncanGuLoader- or DBatLoader/ModiLoader-style infection for Remcos RAT
2023-06-27/a>Xavier MertensThe Importance of Malware Triage
2023-06-21/a>Yee Ching TokAnalyzing a YouTube Sponsorship Phishing Mail and Malware Targeting Content Creators
2023-06-16/a>Xavier MertensAnother RAT Delivered Through VBS
2023-06-15/a>Yee Ching TokSupervision and Verification in Vulnerability Management
2023-05-30/a>Brad DuncanMalspam pushes ModiLoader (DBatLoader) infection for Remcos RAT
2023-05-28/a>Guy BruneauWe Can no Longer Ignore the Cost of Cybersecurity
2023-05-26/a>Xavier MertensUsing DFIR Techniques To Recover From Infrastructure Outages
2023-05-24/a>Tom WebbIR Case/Alert Management
2023-05-20/a>Xavier MertensPhishing Kit Collecting Victim's IP Address
2023-05-19/a>Xavier MertensWhen the Phisher Messes Up With Encoding
2023-05-16/a>Jesse La GrewSignals Defense With Faraday Bags & Flipper Zero
2023-05-15/a>Jan KoprivaOngoing Facebook phishing campaign without a sender and (almost) without links
2023-05-14/a>Guy BruneauVMware Aria Operations addresses multiple Local Privilege Escalations and a Deserialization issue
2023-05-14/a>Guy BruneauDShield Sensor Update
2023-05-09/a>Russ McReeExploratory Data Analysis with CISSM Cyber Attacks Database - Part 2
2023-05-07/a>Didier StevensQuickly Finding Encoded Payloads in Office Documents
2023-05-03/a>Xavier MertensIncreased Number of Configuration File Scans
2023-05-01/a>Jan Kopriva"Passive" analysis of a phishing attachment
2023-04-26/a>Yee Ching TokStrolling through Cyberspace and Hunting for Phishing Sites
2023-04-18/a>Johannes UllrichUDDIs are back? Attackers rediscovering old exploits.
2023-04-09/a>Didier StevensChrome's Download Tab: Dangerous Files
2023-04-08/a>Xavier MertensMicrosoft Netlogon: Potential Upcoming Impacts of CVE-2022-38023
2023-04-07/a>Xavier MertensDetecting Suspicious API Usage with YARA Rules
2023-04-03/a>Johannes UllrichTax Season Risks
2023-03-31/a>Guy BruneauUsing Linux grep and Windows findstr to Manipulate Files
2023-03-31/a>Jan KoprivaUse of X-Frame-Options and CSP frame-ancestors security headers on 1 million most popular domains
2023-03-25/a>Guy BruneauMicrosoft Released an Update for Windows Snipping Tool Vulnerability
2023-03-22/a>Didier StevensWindows 11 Snipping Tool Privacy Bug: Inspecting PNG Files
2023-03-20/a>Xavier MertensFrom Phishing Kit To Telegram... or Not!
2023-03-15/a>Jan KoprivaIPFS phishing and the need for correctly set HTTP security headers
2023-03-12/a>Guy BruneauAsynRAT Trojan - Bill Payment (Pago de la factura)
2023-03-11/a>Xavier MertensOverview of a Mirai Payload Generator
2023-03-09/a>Rob VandenBrinkToday I Learned .. a new thing about GREP
2023-03-01/a>Xavier MertensPython Infostealer Targeting Gamers
2023-02-28/a>Brad DuncanBB17 distribution Qakbot (Qbot) activity
2023-02-27/a>Xavier MertensPhishing Again and Again
2023-02-21/a>Xavier MertensPhishing Page Branded with Your Corporate Website
2023-02-18/a>Guy BruneauSpear Phishing Handlers for Username/Password
2023-02-16/a>Jan KoprivaHTML phishing attachment with browser-in-the-browser technique
2023-02-10/a>Xavier MertensObfuscated Deactivation of Script Block Logging
2023-01-21/a>Guy BruneauDShield Sensor JSON Log to Elasticsearch
2023-01-17/a>Rob VandenBrinkFinding that one GPO Setting in a Pool of Hundreds of GPOs
2023-01-16/a>Johannes UllrichPSA: Why you must run an ad blocker when using Google
2023-01-12/a>Russ McReeProwler v3: AWS & Azure security assessments
2023-01-08/a>Guy BruneauDShield Sensor JSON Log Analysis
2023-01-05/a>Brad DuncanMore Brazil malspam pushing Astaroth (Guildma) in January 2023
2022-12-22/a>Guy BruneauExchange OWASSRF Exploited for Remote Code Execution
2022-12-21/a>Guy BruneauDShield Sensor Setup in Azure
2022-12-20/a>Xavier MertensLinux File System Monitoring & Actions
2022-12-19/a>Xavier MertensHunting for Mastodon Servers
2022-12-10/a>Didier StevensOpen Now: 2022 SANS Holiday Hack Challenge & KringleCon
2022-12-04/a>Didier StevensFinger.exe LOLBin
2022-12-02/a>Brad Duncanobama224 distribution Qakbot tries .vhd (virtual hard disk) images
2022-11-24/a>Xavier MertensAttackers Keep Phishing Victims Under Stress
2022-11-19/a>Guy BruneauMcAfee Fake Antivirus Phishing Campaign is Back!
2022-11-10/a>Xavier MertensDo you collect "Observables" or "IOCs"?
2022-10-27/a>Tom WebbSupersizing your DUO and 365 Integration
2022-10-23/a>Didier StevensVideo: PNG Analysis
2022-10-22/a>Didier Stevensrtfdump's Find Option
2022-10-16/a>Didier StevensVideo: Analysis of a Malicious HTML File (QBot)
2022-10-15/a>Guy BruneauMalware - Covid Vaccination Supplier Declaration
2022-10-13/a>Didier StevensAnalysis of a Malicious HTML File (QBot)
2022-10-07/a>Xavier MertensPowershell Backdoor with DGA Capability
2022-10-07/a>Xavier MertensCritical Fortinet Vulnerability Ahead
2022-10-04/a>Johannes UllrichCredential Harvesting with Telegram API
2022-09-29/a>Didier StevensPNG Analysis
2022-09-21/a>Xavier MertensPhishing Campaigns Use Free Online Resources
2022-09-18/a>Didier StevensVideo: Grep & Tail -f With Notepad++
2022-09-10/a>Guy BruneauPhishing Word Documents with Suspicious URL
2022-09-05/a>Didier StevensQuickie: Grep & Tail -f With Notepad++
2022-09-03/a>Didier StevensVideo: James Webb JPEG With Malware
2022-09-02/a>Didier StevensJames Webb JPEG With Malware
2022-09-01/a>Johannes UllrichJolokia Scans: Possible Hunt for Vulnerable Apache Geode Servers (CVE-2022-37021)
2022-08-26/a>Xavier MertensPaypal Phishing/Coinbase in One Image
2022-08-26/a>Guy BruneauHTTP/2 Packet Analysis with Wireshark
2022-08-23/a>Xavier MertensWho's Looking at Your security.txt File?
2022-08-19/a>Brad DuncanBrazil malspam pushes Astaroth (Guildma) malware
2022-08-14/a>Johannes UllrichRealtek SDK SIP ALG Vulnerability: A Big Deal, but not much you can do about it. CVE 2022-27255
2022-08-13/a>Guy BruneauPhishing HTML Attachment as Voicemail Audio Transcription
2022-07-28/a>Johannes UllrichExfiltrating Data With Bookmarks
2022-07-23/a>Guy BruneauAnalysis of SSH Honeypot Data with PowerBI
2022-07-22/a>Yee Ching TokAn Analysis of a Discerning Phishing Website
2022-07-20/a>Xavier MertensMalicious Python Script Behaving Like a Rubber Ducky
2022-07-20/a>Johannes UllrichApple Patches Everything Day
2022-07-13/a>Xavier MertensUsing Referers to Detect Phishing Attacks
2022-07-09/a>Didier Stevens7-Zip Editing & MoW
2022-07-08/a>Johannes UllrichISC Website Redesign
2022-06-24/a>Xavier MertensPython (ab)using The Windows GUI
2022-06-23/a>Xavier MertensFLOSS 2.0 Has Been Released
2022-06-02/a>Johannes UllrichQuick Answers in Incident Response: RECmd.exe
2022-06-01/a>Jan KoprivaHTML phishing attachments - now with anti-analysis features
2022-05-29/a>Didier StevensExtracting The Overlay Of A PE File
2022-05-28/a>Didier StevensHuge Signed PE File: Keeping The Signature
2022-05-26/a>Didier StevensHuge Signed PE File
2022-05-18/a>Jan KoprivaDo you want 30 BTC? Nothing is easier (or cheaper) in this phishing campaign...
2022-05-14/a>Didier StevensQuick Analysis Of Phishing MSG
2022-05-13/a>Johannes UllrichFrom 0-Day to Mirai: 7 days of BIG-IP Exploits
2022-05-08/a>Johannes UllrichF5 BIG-IP Unauthenticated RCE Vulnerability (CVE-2022-1388)
2022-05-07/a>Guy BruneauPhishing PDF Received in my ISC Mailbox
2022-04-25/a>Xavier MertensSimple PDF Linking to Malicious Content
2022-04-24/a>Didier StevensAnalyzing a Phishing Word Document
2022-04-23/a>Guy BruneauAre Roku Streaming Devices Safe from Exploitation?
2022-04-19/a>Johannes UllrichResetting Linux Passwords with U-Boot Bootloaders
2022-04-11/a>Johannes UllrichSpring: It isn't just about Spring4Shell. Spring Cloud Function Vulnerabilities are being probed too.
2022-04-10/a>Didier StevensVideo: Method For String Extraction Filtering
2022-04-09/a>Didier StevensMethod For String Extraction Filtering
2022-04-07/a>Johannes UllrichWhat is BIMI and how is it supposed to help with Phishing.
2022-04-05/a>Johannes UllrichWebLogic Crypto Miner Malware Disabling Alibaba Cloud Monitoring Tools
2022-04-04/a>Johannes UllrichEmptying the Phishtank: Are WordPress sites the Mosquitoes of the Internet?
2022-03-31/a>Johannes UllrichSpring Vulnerability Update - Exploitation Attempts CVE-2022-22965
2022-03-30/a>Johannes UllrichPossible new Java Spring Framework Vulnerability (Updated: not a Spring problem)
2022-03-30/a>Johannes UllrichJava Springtime Confusion: What Vulnerability are We Talking About
2022-03-29/a>Johannes UllrichMore Fake/Typosquatting Twitter Accounts Asking for Ukraine Crytocurrency Donations
2022-03-24/a>Xavier MertensMalware Delivered Through Free Sharing Tool
2022-03-15/a>Xavier MertensClean Binaries with Suspicious Behaviour
2022-03-02/a>Johannes UllrichThe More Often Something is Repeated, the More True It Becomes: Dealing with Social Media
2022-02-23/a>Johannes UllrichThe Rise and Fall of log4shell
2022-02-18/a>Xavier MertensRemcos RAT Delivered Through Double Compressed Archive
2022-02-16/a>Brad DuncanAstaroth (Guildma) infection
2022-02-13/a>Guy BruneauDHL Spear Phishing to Capture Username/Password
2022-02-05/a>Didier StevensPower over Ethernet and Thermal Imaging
2022-02-01/a>Xavier MertensAutomation is Nice But Don't Replace Your Knowledge
2022-01-31/a>Xavier MertensBe careful with RPMSG files
2022-01-29/a>Guy BruneauSIEM In this Decade, Are They Better than the Last?
2022-01-28/a>Xavier MertensMalicious ISO Embedded in an HTML Page
2022-01-18/a>Jan KoprivaPhishing e-mail with...an advertisement?
2022-01-17/a>Johannes UllrichLog4Shell Attacks Getting "Smarter"
2022-01-06/a>Xavier MertensMalicious Python Script Targeting Chinese People
2022-01-03/a>Xavier MertensMcAfee Phishing Campaign with a Nice Fake Scan
2022-01-02/a>Guy BruneauExchange Server - Email Trapped in Transport Queues
2022-01-01/a>Didier StevensExpect Regressions
2021-12-31/a>Jan KoprivaDo you want your Agent Tesla in the 300 MB or 8 kB package?
2021-12-30/a>Brad DuncanAgent Tesla Updates SMTP Data Exfiltration Technique
2021-12-29/a>Russ McReeLog4j 2 Security Vulnerabilities Update Guide
2021-12-28/a>Russ McReeLotL Classifier tests for shells, exfil, and miners
2021-12-23/a>Xavier MertensNicely Crafted indeed.com Login Page
2021-12-23/a>Johannes Ullrichlog4shell and cloud provider internal meta data services (IMDS)
2021-12-23/a>Johannes UllrichDefending Cloud IMDS Against log4shell (and more)
2021-12-22/a>Brad DuncanDecember 2021 Forensic Contest: Answers and Analysis
2021-12-21/a>Xavier MertensMore Undetected PowerShell Dropper
2021-12-20/a>Jan KoprivaPowerPoint attachments, Agent Tesla and code reuse in malware
2021-12-16/a>Brad DuncanHow the "Contact Forms" campaign tricks people
2021-12-14/a>Johannes UllrichLog4j: Getting ready for the long haul (CVE-2021-44228)
2021-12-11/a>Johannes UllrichLog4j / Log4Shell Followup: What we see and how to defend (and how to access our data)
2021-12-10/a>Bojan ZdrnjaRCE in log4j, Log4Shell, or how things can get bad quickly
2021-12-09/a>Yee Ching TokPhishing Direct Messages via Discord
2021-12-08/a>Brad DuncanDecember 2021 Forensic Challenge
2021-12-06/a>Xavier MertensThe Importance of Out-of-Band Networks
2021-12-04/a>Guy BruneauA Review of Year 2021
2021-11-25/a>Didier StevensYARA's Private Strings
2021-11-24/a>Jan KoprivaPhishing page hiding itself using dynamically adjusted IP-based allow list
2021-11-18/a>Xavier MertensJavaScript Downloader Delivers Agent Tesla Trojan
2021-11-15/a>Rob VandenBrinkChanging your AD Password Using the Clipboard - Not as Easy as You'd Think!
2021-11-10/a>Xavier MertensShadow IT Makes People More Vulnerable to Phishing
2021-11-04/a>Tom WebbXmount for Disk Images
2021-10-30/a>Guy BruneauRemote Desktop Protocol (RDP) Discovery
2021-10-26/a>Yee Ching TokHunting for Phishing Sites Masquerading as Outlook Web Access
2021-10-21/a>Brad Duncan"Stolen Images Evidence" campaign pushes Sliver-based malware
2021-10-14/a>Xavier MertensPort-Forwarding with Windows for the Win
2021-10-13/a>Johannes UllrichPlease fix your E-Mail Brute forcing tool!
2021-10-11/a>Johannes UllrichThings that go "Bump" in the Night: Non HTTP Requests Hitting Web Servers
2021-10-09/a>Guy BruneauScanning for Previous Oracle WebLogic Vulnerabilities
2021-10-04/a>Johannes UllrichFacebook Outage: Yes, its DNS (sort of). A super quick analysis of what is going on.
2021-09-29/a>Yee Ching TokKeeping Track of Time: Network Time Protocol and a GPSD Bug
2021-09-25/a>Didier StevensStrings Analysis: VBA & Excel4 Maldoc
2021-09-25/a>Didier StevensVideo: Strings Analysis: VBA & Excel4 Maldoc
2021-09-24/a>Xavier MertensKeep an Eye on Your Users Mobile Devices (Simple Inventory)
2021-09-20/a>Johannes Ullrich#OMIGOD Exploits Captured in the Wild. Researchers responsible for half of scans for related ports.
2021-09-16/a>Jan KoprivaPhishing 101: why depend on one suspicious message subject when you can use many?
2021-09-15/a>Brad DuncanHancitor campaign abusing Microsoft's OneDrive
2021-09-11/a>Guy BruneauShipping to Elasticsearch Microsoft DNS Logs
2021-09-02/a>Xavier MertensAttackers Will Always Abuse Major Events in our Lifes
2021-08-24/a>Johannes UllrichAttackers Hunting For Twilio Credentials
2021-08-20/a>Xavier MertensWaiting for the C2 to Show Up
2021-08-19/a>Johannes UllrichWhen Lightning Strikes. What works and doesn't work.
2021-08-17/a>Johannes UllrichLaravel (<=v8.4.2) exploit attempts for CVE-2021-3129 (debug mode: Remote code execution)
2021-08-13/a>Guy BruneauScanning for Microsoft Exchange eDiscovery
2021-08-04/a>Yee Ching TokPivoting and Hunting for Shenanigans from a Reported Phishing Domain
2021-08-03/a>Johannes UllrichIs this the Weirdest Phishing (SMishing?) Attempt Ever?
2021-07-30/a>Xavier MertensInfected With a .reg File
2021-07-29/a>Xavier MertensMalicious Content Delivered Through archive.org
2021-07-28/a>Jan KoprivaA sextortion e-mail from...IT support?!
2021-07-24/a>Xavier MertensAgent.Tesla Dropped via a .daa Image and Talking to Telegram
2021-07-16/a>Xavier MertensMultiple BaseXX Obfuscations
2021-07-14/a>Jan KoprivaOne way to fail at malspam - give recipients the wrong password for an encrypted attachment
2021-07-13/a>Johannes UllrichUSPS Phishing Using Telegram to Collect Data
2021-07-10/a>Guy BruneauScanning for Microsoft Secure Socket Tunneling Protocol
2021-07-08/a>Xavier MertensUsing Sudo with Python For More Security Controls
2021-07-06/a>Xavier MertensPython DLL Injection Check
2021-07-03/a>Didier StevensFinding Strings With oledump.py
2021-06-30/a>Johannes UllrichCVE-2021-1675: Incomplete Patch and Leaked RCE Exploit
2021-06-30/a>Brad DuncanJune 2021 Forensic Contest: Answers and Analysis
2021-06-28/a>Didier StevensCFBF Files Strings Analysis
2021-06-26/a>Guy BruneauCVE-2019-9670: Zimbra Collaboration Suite XXE vulnerability
2021-06-22/a>Jan KoprivaPhishing asking recipients not to report abuse
2021-06-18/a>Daniel WesemannOpen redirects ... and why Phishers love them
2021-06-18/a>Daniel WesemannNetwork Forensics on Azure VMs (Part #2)
2021-06-12/a>Guy BruneauFortinet Targeted for Unpatched SSL VPN Discovery Activity
2021-06-11/a>Xavier MertensKeeping an Eye on Dangerous Python Modules
2021-06-04/a>Xavier MertensRussian Dolls VBS Obfuscation
2021-05-29/a>Guy BruneauSpear-phishing Email Targeting Outlook Mail Clients
2021-05-28/a>Xavier MertensMalicious PowerShell Hosted on script.google.com
2021-05-27/a>Jan KoprivaAll your Base are...nearly equal when it comes to AV evasion, but 64-bit executables are not
2021-05-22/a>Xavier Mertens"Serverless" Phishing Campaign
2021-05-21/a>Xavier MertensLocking Kernel32.dll As Anti-Debugging Technique
2021-05-08/a>Guy BruneauWho is Probing the Internet for Research Purposes?
2021-05-07/a>Daniel WesemannExposed Azure Storage Containers
2021-05-06/a>Xavier MertensAlternative Ways To Perform Basic Tasks
2021-05-02/a>Didier StevensPuTTY And FileZilla Use The Same Fingerprint Registry Keys
2021-04-30/a>Remco VerhoefQiling: A true instrumentable binary emulation framework
2021-04-26/a>Didier StevensCAD: .DGN and .MVBA Files
2021-04-24/a>Guy BruneauBase64 Hashes Used in Web Scanning
2021-04-22/a>Xavier MertensHow Safe Are Your Docker Images?
2021-04-19/a>Jan KoprivaHunting phishing websites with favicon hashes
2021-04-10/a>Guy BruneauBuilding an IDS Sensor with Suricata & Zeek with Logs to ELK
2021-03-18/a>Xavier MertensSimple Python Keylogger
2021-03-17/a>Xavier MertensDefenders, Know Your Operating System Like Attackers Do!
2021-03-12/a>Guy BruneauMicrosoft DHCP Logs Shipped to ELK
2021-03-11/a>Johannes UllrichPiktochart - Phishing with Infographics
2021-03-04/a>Xavier MertensFrom VBS, PowerShell, C Sharp, Process Hollowing to RAT
2021-03-03/a>Johannes UllrichMicrosoft Releases Exchange Emergency Patch to Fix Actively Exploited Vulnerability
2021-02-26/a>Guy BruneauPretending to be an Outlook Version Update
2021-02-24/a>Brad DuncanMalspam pushes GuLoader for Remcos RAT
2021-02-17/a>Xavier MertensThe new "LinkedInSecureMessage" ?
2021-02-13/a>Guy BruneauUsing Logstash to Parse IPtables Firewall Logs
2021-02-12/a>Xavier MertensAgentTesla Dropped Through Automatic Click in Microsoft Help File
2021-02-11/a>Jan KoprivaAgent Tesla hidden in a historical anti-malware tool
2021-02-10/a>Brad DuncanPhishing message to the ISC handlers email distro
2021-01-30/a>Guy BruneauPacketSifter as Network Parsing and Telemetry Tool
2021-01-30/a>Guy BruneauWireshark 3.2.11 is now available which contains Bug Fixes - https://www.wireshark.org
2021-01-19/a>Russ McReeGordon for fast cyber reputation checks
2021-01-17/a>Didier StevensNew Release of Sysmon Adding Detection for Process Tampering
2021-01-15/a>Brad DuncanThrowback Friday: An Example of Rig Exploit Kit
2021-01-10/a>Didier StevensMaldoc Analysis With CyberChef
2021-01-09/a>Didier StevensMaldoc Strings Analysis
2021-01-05/a>Johannes UllrichNetfox Detective: An Alternative Open-Source Packet Analysis Tool
2021-01-01/a>Didier StevensStrings 2021
2020-12-26/a>Didier Stevensbase64dump.py Supported Encodings
2020-12-22/a>Xavier MertensMalware Victim Selection Through WiFi Identification
2020-12-14/a>Johannes UllrichSolarWinds Breach Used to Infiltrate Customer Networks (Solarigate)
2020-12-13/a>Didier StevensKringleCon 2020
2020-12-10/a>Xavier MertensPython Backdoor Talking to a C2 Through Ngrok
2020-12-08/a>Johannes UllrichDecember 2020 Microsoft Patch Tuesday: Exchange, Sharepoint, Dynamics and DNS Spoofing
2020-12-05/a>Guy BruneauIs IP 91.199.118.137 testing Access to aahwwx.52host.xyz?
2020-12-04/a>Guy BruneauDetecting Actors Activity with Threat Intel
2020-11-12/a>Daniel WesemannExposed Blob Storage in Azure
2020-11-12/a>Daniel WesemannPreventing Exposed Azure Blob Storage
2020-11-07/a>Guy BruneauCryptojacking Targeting WebLogic TCP/7001
2020-11-06/a>Johannes UllrichRediscovering Limitations of Stateful Firewalls: "NAT Slipstreaming" ? Implications, Detections and Mitigations
2020-10-29/a>Johannes UllrichPATCH NOW: CVE-2020-14882 Weblogic Actively Exploited Against Honeypots
2020-10-28/a>Jan KoprivaSMBGhost - the critical vulnerability many seem to have forgotten to patch
2020-10-25/a>Didier StevensVideo: Pascal Strings
2020-10-24/a>Guy BruneauAn Alternative to Shodan, Censys with User-Agent CensysInspect/1.1
2020-10-22/a>Jan KoprivaBazarLoader phishing lures: plan a Halloween party, get a bonus and be fired in the same afternoon
2020-10-21/a>Daniel WesemannShipping dangerous goods
2020-10-12/a>Didier StevensNested .MSGs: Turtles All The Way Down
2020-10-11/a>Didier StevensAnalyzing MSG Files With plugin_msg_summary
2020-10-09/a>Jan KoprivaPhishing kits as far as the eye can see
2020-10-03/a>Guy BruneauScanning for SOHO Routers
2020-10-02/a>Xavier MertensAnalysis of a Phishing Kit
2020-10-01/a>Daniel WesemannMaking sense of Azure AD (AAD) activity logs
2020-09-28/a>Xavier MertensSome Tyler Technologies Customers Targeted with The Installation of a Bomgar Client
2020-09-24/a>Xavier MertensParty in Ibiza with PowerShell
2020-09-21/a>Jan KoprivaSlightly broken overlay phishing
2020-09-20/a>Guy BruneauAnalysis of a Salesforce Phishing Emails
2020-09-09/a>Johannes UllrichA First Look at macOS 11 Big Sur Network Traffic (New! Now with more GREASE!)
2020-08-30/a>Johannes UllrichCenturyLink Outage Causing Internet Wide Problems
2020-08-25/a>Xavier MertensKeep An Eye on LOLBins
2020-08-24/a>Xavier MertensTracking A Malware Campaign Through VT
2020-08-22/a>Guy BruneauRemote Desktop (TCP/3389) and Telnet (TCP/23), What might they have in Common?
2020-08-20/a>Rob VandenBrinkOffice 365 Mail Forwarding Rules (and other Mail Rules too)
2020-08-14/a>Jan KoprivaDefinition of 'overkill' - using 130 MB executable to hide 24 kB malware
2020-08-10/a>Bojan ZdrnjaScoping web application and web service penetration tests
2020-08-08/a>Guy BruneauScanning Activity Include Netcat Listener
2020-08-03/a>Johannes UllrichA Word of Caution: Helping Out People Being Stalked Online
2020-08-02/a>Didier StevensSmall Challenge: A Simple Word Maldoc
2020-07-27/a>Johannes UllrichIn Memory of Donald Smith
2020-07-26/a>Didier StevensCracking Maldoc VBA Project Passwords
2020-07-23/a>Xavier MertensSimple Blocklisting with MISP & pfSense
2020-07-19/a>Guy BruneauScanning Activity for ZeroShell Unauthenticated Access
2020-07-16/a>John BambenekHunting for SigRed Exploitation
2020-07-15/a>Johannes UllrichPATCH NOW - SIGRed - CVE-2020-1350 - Microsoft DNS Server Vulnerability
2020-07-12/a>Didier StevensMaldoc: VBA Purging Example
2020-07-11/a>Guy BruneauVMware XPC Client validation privilege escalation vulnerability - https://www.vmware.com/security/advisories/VMSA-2020-0017.html
2020-07-11/a>Guy BruneauScanning Home Internet Facing Devices to Exploit
2020-07-06/a>Johannes UllrichSummary of CVE-2020-5902 F5 BIG-IP RCE Vulnerability Exploits
2020-07-05/a>Didier StevensCVE-2020-5902 F5 BIG-IP Exploitation Attempt
2020-07-04/a>Russ McReeHappy FouRth of July from the Internet Storm Center
2020-06-19/a>Remco VerhoefSigma rules! The generic signature format for SIEM systems.
2020-06-18/a>Jan KoprivaBroken phishing accidentally exploiting Outlook zero-day
2020-06-15/a>Rick WannerHTML based Phishing Run
2020-06-13/a>Guy BruneauMirai Botnet Activity
2020-06-11/a>Xavier MertensAnti-Debugging JavaScript Techniques
2020-06-08/a>Didier StevensTranslating BASE64 Obfuscated Scripts
2020-06-04/a>Xavier MertensAnti-Debugging Technique based on Memory Protection
2020-06-01/a>Jim ClausingStackstrings, type 2
2020-05-29/a>Johannes UllrichThe Impact of Researchers on Our Data
2020-05-27/a>Jan KoprivaFrankenstein's phishing using Google Cloud Storage
2020-05-23/a>Xavier MertensAgentTesla Delivered via a Malicious PowerPoint Add-In
2020-05-22/a>Didier StevensSome Strings to Remember
2020-05-21/a>Xavier MertensMalware Triage with FLOSS: API Calls Based Behavior
2020-05-16/a>Guy BruneauScanning for Outlook Web Access (OWA) & Microsoft Exchange Control Panel (ECP)
2020-05-14/a>Rob VandenBrinkPatch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe
2020-05-06/a>Xavier MertensKeeping an Eye on Malicious Files Life Time
2020-05-05/a>Russ McReeCloud Security Features Don't Replace the Need for Personnel Security Capabilities
2020-05-02/a>Guy BruneauPhishing PDF with Unusual Hostname
2020-04-30/a>Xavier MertensCollecting IOCs from IMAP Folder
2020-04-29/a>Johannes UllrichPrivacy Preserving Protocols to Trace Covid19 Exposure
2020-04-28/a>Jan KoprivaAgent Tesla delivered by the same phishing campaign for over a year
2020-04-27/a>Xavier MertensPowershell Payload Stored in a PSCredential Object
2020-04-18/a>Guy BruneauMaldoc Falsely Represented as DOCX Invoice Redirecting to Fake Apple Store
2020-04-17/a>Xavier MertensWeaponized RTF Document Generator & Mailer in PowerShell
2020-04-16/a>Johannes UllrichUsing AppLocker to Prevent Living off the Land Attacks
2020-04-13/a>Jan KoprivaLook at the same phishing campaign 3 months apart
2020-04-07/a>Johannes UllrichIncrease in RDP Scanning
2020-04-03/a>Xavier MertensObfuscated with a Simple 0x0A
2020-03-27/a>Xavier MertensMalicious JavaScript Dropping Payload in the Registry
2020-03-24/a>Russ McReeAnother Critical COVID-19 Shortage: Digital Security
2020-03-21/a>Guy BruneauHoneypot - Scanning and Targeting Devices & Services
2020-03-15/a>Guy BruneauVPN Access and Activity Monitoring
2020-03-14/a>Didier StevensPhishing PDF With Incremental Updates.
2020-03-11/a>Xavier MertensAgent Tesla Delivered via Fake Canon EOS Notification on Free OwnCloud Account
2020-03-05/a>Xavier MertensWill You Put Your Password in a Survey?
2020-02-29/a>Guy BruneauHazelcast IMDG Discover Scan
2020-02-28/a>Xavier MertensShow me Your Clipboard Data!
2020-02-16/a>Guy BruneauSOAR or not to SOAR?
2020-02-14/a>Xavier MertensKeep an Eye on Command-Line Browsers
2020-02-12/a>Rob VandenBrinkMarch Patch Tuesday is Coming - the LDAP Changes will Change Your Life!
2020-02-10/a>Jan KoprivaCurrent PayPal phishing campaign or "give me all your personal information"
2020-02-05/a>Brad DuncanFake browser update pages are "still a thing"
2020-02-03/a>Jan KoprivaAnalysis of a triple-encrypted AZORult downloader
2020-02-02/a>Didier StevensVideo: Stego & Cryptominers
2020-01-25/a>Guy BruneauIs Threat Hunting the new Fad?
2020-01-24/a>Xavier MertensWhy Phishing Remains So Popular?
2020-01-21/a>Russ McReeDeepBlueCLI: Powershell Threat Hunting
2020-01-16/a>Jan KoprivaPicks of 2019 malware - the large, the small and the one full of null bytes
2020-01-12/a>Guy BruneauELK Dashboard and Logstash parser for tcp-honeypot Logs
2020-01-06/a>Johannes UllrichIncrease in Number of Sources January 3rd and 4th: spoofed
2020-01-05/a>Didier Stevensetl2pcapng: Convert .etl Capture Files To .pcapng Format
2020-01-04/a>Didier StevensKringleCon 2019
2019-12-26/a>Xavier MertensBypassing UAC to Install a Cryptominer
2019-12-22/a>Didier StevensExtracting VBA Macros From .DWG Files
2019-12-16/a>Didier StevensMalicious .DWG Files?
2019-12-13/a>Jan KoprivaInternet banking sites and their use of TLS... and SSLv3... and SSLv2?!
2019-12-07/a>Guy BruneauIntegrating Pi-hole Logs in ELK with Logstash
2019-12-06/a>Jan KoprivaPhishing with a self-contained credentials-stealing webpage
2019-12-05/a>Jan KoprivaE-mail from Agent Tesla
2019-12-04/a>Jan KoprivaAnalysis of a strangely poetic malware
2019-11-27/a>Brad DuncanFinding an Agent Tesla malware sample
2019-11-26/a>Jan KoprivaLessons learned from playing a willing phish
2019-11-23/a>Guy BruneauLocal Malware Analysis with Malice
2019-11-22/a>Xavier MertensAbusing Web Filters Misconfiguration for Reconnaissance
2019-11-03/a>Didier StevensYou Too? "Unusual Activity with Double Base64 Encoding"
2019-11-01/a>Didier StevensTip: Password Managers and 2FA
2019-10-31/a>Jan KoprivaEML attachments in O365 - a recipe for phishing
2019-10-30/a>Xavier MertensKeep an Eye on Remote Access to Mailboxes
2019-10-29/a>Xavier MertensGenerating PCAP Files from YAML
2019-10-27/a>Guy BruneauUnusual Activity with Double Base64 Encoding
2019-10-27/a>Didier StevensUsing scdbg to Find Shellcode
2019-10-24/a>Johannes UllrichYour Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment?
2019-10-20/a>Guy BruneauScanning Activity for NVMS-9000 Digital Video Recorder
2019-10-17/a>Jan KoprivaPhishing e-mail spoofing SPF-enabled domain
2019-10-16/a>Xavier MertensSecurity Monitoring: At Network or Host Level?
2019-10-10/a>Rob VandenBrinkMining Live Networks for OUI Data Oddness
2019-09-27/a>Xavier MertensNew Scans for Polycom Autoconfiguration Files
2019-09-19/a>Xavier MertensAgent Tesla Trojan Abusing Corporate Email Accounts
2019-09-19/a>Xavier MertensBlocklisting or Whitelisting in the Right Way
2019-09-17/a>Rob VandenBrinkInvestigating Gaps in your Windows Event Logs
2019-09-07/a>Guy BruneauUnidentified Scanning Activity
2019-09-03/a>Johannes Ullrich[Guest Diary] Tricky LNK points to TrickBot
2019-08-15/a>Didier StevensAnalysis of a Spearphishing Maldoc
2019-08-14/a>Brad DuncanRecent example of MedusaHTTP malware
2019-08-09/a>Xavier Mertens100% JavaScript Phishing Page
2019-08-08/a>Johannes Ullrich[Guest Diary] The good, the bad and the non-functional, or "how not to do an attack campaign"
2019-07-25/a>Rob VandenBrinkWhen Users Attack! Users (and Admins) Thwarting Security Controls
2019-07-17/a>Xavier MertensAnalyzis of DNS TXT Records
2019-07-13/a>Guy BruneauGuidance to Protect DNS Against Hijacking & Scanning for Version.BIND Still a Thing
2019-07-09/a>John BambenekSolving the WHOIS and Privacy Problem: A Draft of Implementing WHOIS in DNS
2019-06-27/a>Rob VandenBrinkFinding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell
2019-06-25/a>Brad DuncanRig Exploit Kit sends Pitou.B Trojan
2019-06-24/a>Johannes UllrichExtensive BGP Issues Affecting Cloudflare and possibly others
2019-06-20/a>Xavier MertensUsing a Travel Packing App for Infosec Purpose
2019-06-19/a>Johannes UllrichCritical Actively Exploited WebLogic Flaw Patched CVE-2019-2729
2019-06-17/a>Brad DuncanAn infection from Rig exploit kit
2019-06-14/a>Jim ClausingA few Ghidra tips for IDA users, part 4 - function call graphs
2019-06-06/a>Xavier MertensKeep an Eye on Your WMI Logs
2019-05-30/a>Didier StevensAnalyzing First Stage Shellcode
2019-05-19/a>Guy BruneauIs Metadata Only Approach, Good Enough for Network Traffic Analysis?
2019-05-13/a>Xavier MertensFrom Phishing To Ransomware?
2019-05-06/a>Didier StevensText and Text
2019-05-03/a>Jim ClausingA few Ghidra tips for IDA users, part 3 - conversion, labels, and comments
2019-05-01/a>Xavier MertensAnother Day, Another Suspicious UDF File
2019-04-28/a>Johannes UllrichUpdate about Weblogic CVE-2019-2725 (Exploits Used in the Wild, Patch Status)
2019-04-25/a>Rob VandenBrinkUnpatched Vulnerability Alert - WebLogic Zero Day
2019-04-17/a>Jim ClausingA few Ghidra tips for IDA users, part 2 - strings and parameters
2019-04-17/a>Xavier MertensMalware Sample Delivered Through UDF Image
2019-04-08/a>Jim ClausingA few Ghidra tips for IDA users, part 1 - the decompiler/unreachable code
2019-04-05/a>Russ McReeBeagle: Graph transforms for DFIR data & logs
2019-04-03/a>Jim ClausingA few Ghidra tips for IDA users, part 0 - automatic comments for API call parameters
2019-03-27/a>Xavier MertensRunning your Own Passive DNS Service
2019-03-14/a>Didier StevensTip: Ghidra & ZIP Files
2019-03-08/a>Remco VerhoefAnalysing meterpreter payload with Ghidra
2019-02-28/a>Tom WebbPhishing impersonations
2019-02-21/a>Xavier MertensSimple Powershell Keyloggers are Back
2019-02-18/a>Didier StevensKnow What You Are Logging
2019-02-14/a>Xavier MertensOld H-Worm Delivered Through GitHub
2019-02-07/a>Xavier Mertens Phishing Kit with JavaScript Keylogger
2019-02-06/a>Brad DuncanHancitor malspam and infection traffic from Tuesday 2019-02-05
2019-02-05/a>Rob VandenBrinkMitigations against Mimikatz Style Attacks
2019-02-03/a>Didier StevensVideo: Analyzing a Simple HTML Phishing Attachment
2019-01-31/a>Xavier MertensTracking Unexpected DNS Changes
2019-01-29/a>Johannes UllrichA Not So Well Done Phish (Why Attackers need to Implement IPv6 Now! ;-) )
2019-01-28/a>Bojan ZdrnjaRelaying Exchange?s NTLM authentication to domain admin (and more)
2019-01-21/a>Didier StevensSuspicious GET Request: Do You Know What This Is?
2019-01-16/a>Brad DuncanEmotet infections and follow-up malware
2019-01-14/a>Rob VandenBrinkMicrosoft LAPS - Blue Team / Red Team
2019-01-10/a>Brad DuncanHeartbreaking Emails: "Love You" Malspam
2019-01-09/a>Russ McReegganimate: Animate YouR Security Analysis
2019-01-05/a>Didier StevensA Malicious JPEG? Second Example
2019-01-04/a>Didier StevensA Malicious JPEG?
2019-01-02/a>Lorna HutchesonGift Card Scams on the rise
2018-12-27/a>Didier StevensMatryoshka Phish
2018-12-23/a>Guy BruneauScanning Activity, end Goal is to add Hosts to Mirai Botnet
2018-12-22/a>Didier StevensKringleCon 2018
2018-12-21/a>Lorna HutchesonPhishing Attempts That Bypass 2FA
2018-12-19/a>Xavier MertensUsing OSSEC Active-Response as a DFIR Framework
2018-12-16/a>Guy BruneauRandom Port Scan for Open RDP Backdoor
2018-12-13/a>Xavier MertensPhishing Attack Through Non-Delivery Notification
2018-12-09/a>Didier StevensQuickie: String Analysis is Still Useful
2018-11-20/a>Xavier MertensQuerying DShield from Cortex
2018-11-19/a>Xavier MertensThe Challenge of Managing Your Digital Library
2018-11-18/a>Guy BruneauMultipurpose PCAP Analysis Tool
2018-11-17/a>Xavier MertensQuickly Investigating Websites with Lookyloo
2018-11-15/a>Brad DuncanEmotet infection with IcedID banking Trojan
2018-11-11/a>Pasquale StirparoCommunity contribution: joining forces or multiply solutions?
2018-10-21/a>Didier StevensMSG Files: Compressed RTF
2018-10-17/a>Russ McReeRedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence
2018-09-24/a>Didier StevensAnalyzing Encoded Shellcode with scdbg
2018-09-20/a>Xavier MertensHunting for Suspicious Processes with OSSEC
2018-09-08/a>Didier StevensVideo: Using scdbg to analyze shellcode
2018-09-03/a>Didier StevensAnother quickie: Using scdbg to analyze shellcode
2018-08-26/a>Didier StevensIdentifying numeric obfuscation
2018-08-23/a>Xavier MertensSimple Phishing Through formcrafts.com
2018-08-19/a>Didier StevensVideo: Peeking into msg files - revisited
2018-08-12/a>Didier StevensA URL shortener handy for phishers
2018-08-11/a>Didier StevensPeeking into msg files - revisited
2018-08-10/a>Remco VerhoefHunting SSL/TLS clients using JA3
2018-08-06/a>Didier StevensNumeric obfuscation: another example
2018-08-04/a>Didier StevensDealing with numeric obfuscation in malicious scripts
2018-08-02/a>Brad DuncanDHL-themed malspam reveals embedded malware in animated gif
2018-07-30/a>Xavier MertensExploiting the Power of Curl
2018-07-29/a>Guy BruneauUsing RITA for Threat Analysis
2018-07-23/a>Didier StevensAnalyzing MSG files
2018-07-20/a>Kevin ListonWeblogic Exploit Code Made Public (CVE-2018-2893)
2018-07-17/a>Xavier MertensSearching for Geographically Improbable Login Attempts
2018-07-03/a>Didier StevensProgress indication for scripts on Windows
2018-07-02/a>Guy BruneauHello Peppa! - PHP Scans
2018-07-01/a>Didier StevensVideo: Analyzing XPS Files
2018-06-30/a>Didier StevensXPS samples
2018-06-26/a>Didier StevensAnalyzing XPS files
2018-06-22/a>Lorna HutchesonXPS Attachment Used for Phishing
2018-06-21/a>Xavier MertensAre Your Hunting Rules Still Working?
2018-06-19/a>Xavier MertensPowerShell: ScriptBlock Logging... Or Not?
2018-06-13/a>Xavier MertensA Bunch of Compromized Wordpress Sites
2018-06-07/a>Remco VerhoefAutomated twitter loot collection
2018-06-06/a>Xavier MertensConverting PCAP Web Traffic to Apache Log
2018-06-04/a>Rob VandenBrinkDigging into Authenticode Certificates
2018-05-27/a>Guy BruneauCapture and Analysis of User Agents
2018-05-24/a>Xavier Mertens"Blocked" Does Not Mean "Forget It"
2018-05-20/a>Didier StevensDASAN GPON home routers exploits in-the-wild
2018-05-16/a>Mark HofmanEFAIL, a weakness in openPGP and S\MIME
2018-05-09/a>Xavier MertensNice Phishing Sample Delivering Trickbot
2018-05-03/a>Renato MarinhoWebLogic Exploited in the Wild (Again)
2018-04-25/a>Johannes UllrichYet Another Drupal RCE Vulnerability
2018-03-12/a>Xavier MertensPayload delivery via SMB
2018-03-06/a>Mark HofmanThe joys of changing Privacy Laws
2018-03-02/a>Xavier MertensCommon Patterns Used in Phishing Campaigns Files
2018-02-25/a>Guy BruneauBlackhole Advertising Sites with Pi-hole
2018-02-25/a>Didier StevensRetrieving malware over Tor on Windows
2018-02-01/a>Xavier MertensAdaptive Phishing Kit
2018-01-31/a>Tom WebbTax Phishing Time
2018-01-23/a>John BambenekLife after GDPR: Implications for Cybersecurity
2018-01-20/a>Didier StevensAn RTF phish
2018-01-18/a>Xavier MertensComment your Packet Captures!
2018-01-12/a>Bojan ZdrnjaThose pesky registry keys required by critical security patches
2018-01-11/a>Xavier MertensMining or Nothing!
2018-01-10/a>Russ McReeGitHub InfoSec Threepeat: HELK, ptf, and VulnWhisperer
2018-01-07/a>Guy BruneauSSH Scans by Clients Types
2018-01-03/a>John BambenekPhishing to Rural America Leads to Six-figure Wire Fraud Losses
2018-01-02/a>Didier StevensPDF documents & URLs: video
2018-01-01/a>Didier StevensWhat is new?
2017-12-27/a>Guy BruneauWhat are your Security Challenges for 2018?
2017-12-13/a>Xavier MertensTracking Newly Registered Domains
2017-12-02/a>Xavier MertensUsing Bad Material for the Good
2017-12-01/a>Xavier MertensPhishing Kit (Ab)Using Cloud Services
2017-11-28/a>Xavier MertensApple High Sierra Uses a Passwordless Root Account
2017-11-25/a>Guy BruneauBenefits associated with the use of Open Source Software
2017-11-23/a>Xavier MertensProactive Malicious Domain Search
2017-11-17/a>Xavier MertensTop-100 Malicious IP STIX Feed
2017-11-15/a>Xavier MertensIf you want something done right, do it yourself!
2017-11-13/a>Guy Bruneaujsonrpc Scanning for root account
2017-11-10/a>Bojan ZdrnjaBattling e-mail phishing
2017-11-05/a>Didier StevensExtracting the text from PDF documents
2017-11-04/a>Didier StevensPDF documents & URLs
2017-11-01/a>Rob VandenBrinkSecuring SSH Services - Go Blue Team!!
2017-10-30/a>Johannes UllrichCritical Patch For Oracle's Identity Manager
2017-10-24/a>Xavier MertensStop relying on file extensions
2017-10-18/a>Renato MarinhoBaselining Servers to Detect Outliers
2017-10-15/a>Didier StevensPeeking into .msg files
2017-10-12/a>Xavier MertensVersion control tools aren't only for Developers
2017-10-08/a>Didier StevensA strange JPEG file
2017-10-06/a>Johannes UllrichWhat's in a cable? The dangers of unauthorized cables
2017-10-02/a>Xavier MertensInvestigating Security Incidents with Passive DNS
2017-09-29/a>Lorna HutchesonGood Analysis = Understanding(tools + logs + normal)
2017-09-25/a>Renato MarinhoXPCTRA Malware Steals Banking and Digital Wallet User's Credentials
2017-09-22/a>Russell EubanksWhat is the State of Your Union?
2017-09-18/a>Xavier MertensGetting some intelligence from malspam
2017-09-18/a>Johannes UllrichSANS Securingthehuman posted a follow up to their Equifax breach webcast: https://securingthehuman.sans.org/blog/2017/09/15/equifax-webcast-follow-up
2017-09-11/a>Russ McReeWindows Auditing with WINspect
2017-09-10/a>Didier StevensAnalyzing JPEG files
2017-09-06/a>Adrien de BeaupreModern Web Application Penetration Testing , Hash Length Extension Attacks
2017-09-02/a>Xavier MertensAutoIT based malware back in the wild
2017-08-22/a>Xavier MertensDefang all the things!
2017-08-18/a>Renato MarinhoEngineBox Malware Supports 10+ Brazilian Banks
2017-08-16/a>Xavier MertensAnalysis of a Paypal phishing kit
2017-08-15/a>Brad DuncanMalspam pushing Trickbot banking Trojan
2017-08-15/a>Renato Marinho(Banker(GoogleChromeExtension)).targeting("Brazil")
2017-08-13/a>Didier StevensThe Good Phishing Email
2017-07-30/a>Guy BruneauText Banking Scams
2017-07-16/a>Renato MarinhoSMS Phishing induces victims to photograph its own token card
2017-07-12/a>Xavier MertensBackup Scripts, the FIM of the Poor
2017-07-09/a>Russ McReeAdversary hunting with SOF-ELK
2017-07-05/a>Didier StevensSelecting domains with random names
2017-06-28/a>Brad DuncanCatching up with Blank Slate: a malspam campaign still going strong
2017-06-27/a>Brad DuncanA Tale of Two Phishies
2017-06-17/a>Guy BruneauMapping Use Cases to Logs. Which Logs are the Most Important to Collect?
2017-06-15/a>Bojan ZdrnjaUberscammers
2017-06-14/a>Xavier MertensSystemd Could Fallback to Google DNS?
2017-06-08/a>Tom WebbSummer STEM for Kids
2017-06-02/a>Xavier MertensPhishing Campaigns Follow Trends
2017-06-01/a>Xavier MertensSharing Private Data with Webcast Invitations
2017-05-31/a>Pasquale StirparoAnalysis of Competing Hypotheses, WCry and Lazarus (ACH part 2)
2017-05-28/a>Pasquale StirparoAnalysis of Competing Hypotheses (ACH part 1)
2017-05-28/a>Guy BruneauCyberChef a Must Have Tool in your Tool bag!
2017-05-20/a>Xavier MertensTyposquatting: Awareness and Hunting
2017-05-17/a>Richard PorterWait What? We don?t have to change passwords every 90 days?
2017-05-13/a>Guy BruneauHas anyone Tested WannaCry Killswitch? - https://blog.didierstevens.com/2017/05/13/quickpost-wcry-killswitch-check-is-not-proxy-aware/
2017-05-06/a>Xavier MertensThe story of the CFO and CEO...
2017-05-03/a>Bojan ZdrnjaOAUTH phishing against Google Docs ? beware!
2017-04-27/a>Johannes UllrichBGP Hijacking: The Internet is Still/Again Broken
2017-04-22/a>Jim ClausingWTF tcp port 81
2017-04-20/a>Xavier MertensDNS Query Length... Because Size Does Matter
2017-04-18/a>Johannes UllrichYet Another Apple Phish and Some DNS Lessons Learned From It
2017-04-16/a>Johannes UllrichTool to Detect Active Phishing Attacks Using Unicode Look-Alike Domains
2017-04-13/a>Rob VandenBrinkPacket Captures Filtered by Process
2017-04-02/a>Guy BruneauIPFire - A Household Multipurpose Security Gateway
2017-03-28/a>Xavier MertensLogical & Physical Security Correlation
2017-03-24/a>Xavier MertensNicely Obfuscated JavaScript Sample
2017-03-19/a>Xavier MertensSearching for Base64-encoded PE Files
2017-03-15/a>Xavier MertensRetro Hunting!
2017-03-10/a>Xavier MertensThe Side Effect of GeoIP Filters
2017-03-06/a>Renato MarinhoA very convincing Typosquatting + Social Engineering campaign is targeting Santander corporate customers in Brazil
2017-02-28/a>Xavier MertensAmazon S3 Outage
2017-02-25/a>Guy BruneauUnpatched Microsoft Edge and IE Bug
2017-02-09/a>Brad DuncanCryptoShield Ransomware from Rig EK
2017-02-01/a>Xavier MertensQuick Analysis of Data Left Available by Attackers
2017-01-24/a>Xavier MertensMalicious SVG Files in the Wild
2017-01-11/a>Johannes UllrichJanuary 2017 Edition of Ouch! Security Awareness Newsletter Released: https://securingthehuman.sans.org/ouch
2017-01-10/a>Johannes UllrichRealtors Be Aware: You Are a Target
2017-01-10/a>Johannes UllrichPort 37777 "MapTable" Requests
2017-01-06/a>John BambenekGreat Misadventures of Security Vendors: Absurd Sandboxing Edition
2017-01-05/a>John BambenekNew Year's Resolution: Build Your Own Malware Lab?
2017-01-04/a>John BambenekMixed Messages : Novel Phishing Attempts Trying to Steal Your E-mail Password Goes Wrong
2016-12-29/a>Rick WannerMore on Protocol 47 denys
2016-12-29/a>Rick WannerIncrease in Protocol 47 denys
2016-12-27/a>Guy BruneauUsing daemonlogger as a Software Tap
2016-12-11/a>Russ McReeSteganography in Action: Image Steganography & StegExpose
2016-12-09/a>Rick WannerMirai - now with DGA
2016-12-06/a>Bojan ZdrnjaAttacking NoSQL applications
2016-11-16/a>Xavier MertensExample of Getting Analysts & Researchers Away
2016-11-02/a>Rob VandenBrinkWhat Does a Pentest Look Like?
2016-10-25/a>Xavier MertensAnother Day, Another Spam...
2016-10-10/a>Didier StevensRadare2: rahash2
2016-10-08/a>Russell EubanksUnauthorized Change Detected!
2016-10-02/a>Guy BruneauIs there an Infosec Cybersecurity Talent Shortage?
2016-09-25/a>Pasquale StirparoDefining Threat Intelligence Requirements
2016-09-04/a>Russ McReeKali Linux 2016.2 Release: https://www.kali.org/news/kali-linux-20162-release/
2016-09-01/a>Xavier MertensMaxmind.com (Ab)used As Anti-Analysis Technique
2016-08-31/a>Deborah HaleAngler Exploit Kits Reported
2016-08-29/a>Russ McReeRecommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
2016-08-23/a>Xavier MertensVoice Message Notifications Deliver Ransomware
2016-08-21/a>Rick WannerCisco ASA SNMP Remote Code Execution Vulnerability
2016-08-01/a>Daniel WesemannAre you getting I-CANNED ?
2016-07-31/a>Pasquale StirparoSharing (intel) is caring... or not?
2016-07-27/a>Xavier MertensCritical Xen PV guests vulnerabilities
2016-07-21/a>Didier StevensPractice ntds.dit File
2016-07-15/a>Xavier MertensName All the Things!
2016-07-12/a>Xavier MertensHunting for Malicious Files with MISP + OSSEC
2016-07-03/a>Guy BruneauIs Data Privacy part of your Company's Culture?
2016-06-29/a>Xavier MertensPhishing Campaign with Blurred Images
2016-06-23/a>Russell EubanksAn Approach to Vulnerability Management
2016-06-20/a>Xavier MertensUsing Your Password Manager to Monitor Data Leaks
2016-06-18/a>Rob VandenBrinkControlling JavaScript Malware Before it Runs
2016-06-15/a>Richard PorterWarp Speed Ahead, L7 Open Source Packet Generator: Warp17
2016-06-03/a>Tom ListonMySQL is YourSQL
2016-06-01/a>Xavier MertensDocker Containers Logging
2016-05-22/a>Pasquale StirparoThe strange case of WinZip MRU Registry key
2016-05-18/a>Russ McReeResources: Windows Auditing & Monitoring, Linux 2FA
2016-05-12/a>Xavier MertensAnother Day, Another Wave of Phishing Emails
2016-05-02/a>Rick WannerLean Threat Intelligence
2016-04-21/a>Daniel WesemannDecoding Pseudo-Darkleech (#1)
2016-04-21/a>Daniel WesemannDecoding Pseudo-Darkleech (Part #2)
2016-04-02/a>Russell EubanksWhy Can't We Be Friends?
2016-03-30/a>Xavier MertensWhat to watch with your FIM?
2016-03-21/a>Xavier MertensIP Addresses Triage
2016-03-07/a>Xavier MertensOSX Ransomware Spread via a Rogue BitTorrent Client Installer
2016-02-28/a>Guy BruneauRFC 6598 - Carrier Grade NAT
2016-02-27/a>Guy BruneauWireshark Fixes Several Bugs and Vulnerabilities
2016-02-07/a>Xavier MertensMore Malicious JavaScript Obfuscation
2016-02-02/a>Johannes UllrichTargeted IPv6 Scans Using pool.ntp.org .
2016-01-29/a>Xavier MertensScripting Web Categorization
2016-01-23/a>Didier StevensSigcheck and VirusTotal for Offline Machine
2016-01-21/a>Jim ClausingScanning for Fortinet ssh backdoor
2016-01-20/a>Xavier Mertens/tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters!
2016-01-13/a>Alex StanfordYou Have Got a New Audio Message - Guest Diary by Pasquale Stirparo
2016-01-11/a>Didier StevensBlackEnergy .XLS Dropper
2016-01-05/a>Guy BruneauWhat are you Concerned the Most in 2016?
2015-12-24/a>Xavier MertensUnity Makes Strength
2015-12-13/a>Didier StevensUse The Privilege
2015-12-12/a>Russell EubanksWhat Signs Are You Missing?
2015-12-10/a>Rob VandenBrinkNew Burp Feature - ClickBandit
2015-12-04/a>Tom WebbAutomating Phishing Analysis using BRO
2015-11-21/a>Didier StevensMaldoc Social Engineering Trick
2015-11-09/a>John BambenekICYMI: Widespread Unserialize Vulnerability in Java
2015-10-20/a>Bojan ZdrnjaWhen encoding saves the day
2015-10-12/a>Guy BruneauData Visualization,What is your Tool of Choice?
2015-10-11/a>Tony CarothersGnuPG (GPG) 2.1.9 release announced
2015-09-23/a>Daniel WesemannMaking our users unlearn what we taught them
2015-09-21/a>Xavier MertensDetecting XCodeGhost Activity
2015-09-08/a>Lenny ZeltserA Close Look at PayPal Overpayment Scams That Target Craigslist Sellers
2015-09-03/a>Xavier MertensQuerying the DShield API from RTIR
2015-09-01/a>Daniel WesemannHow to hack
2015-08-19/a>Bojan ZdrnjaOutsourcing critical infrastructure (such as DNS)
2015-08-16/a>Guy BruneauAre you a "Hunter"?
2015-08-06/a>Didier StevensSigcheck and virustotal-search
2015-07-31/a>Russ McReeTech tip: Invoke a system command in R
2015-07-31/a>Russ McReeTech tip follow-up: Using the data Invoked with R's system command
2015-07-28/a>Rick WannerAndroid Stagefright multimedia viewer prone to remote exploitation
2015-07-27/a>Daniel WesemannAngler's best friends
2015-07-23/a>Mark HofmanSome more 0-days from ZDI
2015-07-18/a>Russell EubanksThe Value a "Fresh Set Of Eyes" (FSOE)
2015-07-17/a>Didier StevensSigcheck and VirusTotal
2015-06-22/a>Johannes UllrichSMTP Brute Forcing
2015-06-01/a>Tom WebbSubmit Dshield ASA Logs
2015-05-30/a>Russell EubanksWeekend Learning - Spoofer Project
2015-05-23/a>Guy BruneauBusiness Value in "Big Data"
2015-05-20/a>Brad DuncanLogjam - vulnerabilities in Diffie-Hellman key exchange affect browsers and servers using TLS
2015-05-10/a>Didier StevensWireshark TCP Flags: How To Install On Windows Video
2015-04-27/a>Richard PorterWhen Prevention Fails, Incident Response Begins
2015-04-23/a>Bojan ZdrnjaWhen automation does not help
2015-04-17/a>Didier StevensMemory Forensics Of Network Devices
2015-04-05/a>Didier StevensWireshark TCP Flags
2015-04-03/a>Didier StevensSSH Fingerprints Are Important
2015-04-02/a>Brad DuncanAngler Exploit Kit - Recent Traffic Patterns
2015-04-01/a>Brad DuncanRig Exploit Kit Changes Traffic Patterns
2015-03-26/a>Daniel WesemannPin-up on your Smartphone!
2015-03-11/a>Rob VandenBrinkSyslog Skeet Shooting - Targetting Real Problems in Event Logs
2015-03-11/a>Rob VandenBrinkApple iTunes Store is seeing an extended outage (11 Mar) - watch https://www.apple.com/support/systemstatus/ for status changes. (12 Mar) - service restored, all green!
2015-03-01/a>Rick WannerAdvisory: Seagate NAS Remote Code Execution
2015-02-19/a>Daniel WesemannDNS-based DDoS
2015-02-12/a>Johannes UllrichDid You Remove That Debug Code? Netatmo Weather Station Sending WPA Passphrase in the Clear
2015-02-11/a>Johannes UllrichMicrosoft Hardens GPO by Fixing Two Serious Vulnerabilities.
2015-02-03/a>Johannes UllrichWhat is using this library?
2015-02-01/a>Rick WannerImproving SSL Warnings
2015-01-31/a>Guy BruneauBeware of Phishing and Spam Super Bowl Fans!
2015-01-27/a>Johannes UllrichNew Critical GLibc Vulnerability CVE-2015-0235 (aka GHOST)
2014-12-23/a>John BambenekHow I learned to stop worrying and love malware DGAs....
2014-12-06/a>Rick WannerGoogle App Engine Java Security Sandbox bypasses
2014-11-27/a>Russ McReeSyrian Electronic Army attack leads to malvertising
2014-11-19/a>Rob VandenBrink"Big Data" Needs a Trip to the Security Chiropracter!
2014-11-04/a>Daniel WesemannWhois someone else?
2014-09-27/a>Guy BruneauWhat has Bash and Heartbleed Taught Us?
2014-09-26/a>Richard PorterWhy We Have Moved to InfoCon:Yellow
2014-09-22/a>Johannes UllrichFake LogMeIn Certificate Update with Bad AV Detection Rate
2014-09-19/a>Guy BruneauWeb Scan looking for /info/whitelist.pac
2014-09-19/a>Guy BruneauPHP Fixes Several Bugs in Version 5.4 and 5.5
2014-09-16/a>Daniel Wesemannhttps://yourfakebank.support -- TLD confusion starts!
2014-09-15/a>Johannes UllrichGoogle DNS Server IP Address Spoofed for SNMP reflective Attacks
2014-09-12/a>Chris MohanAre credential dumps worth reviewing?
2014-09-03/a>Johannes UllrichF5 BigIP Unauthenticated rsync Vulnerability
2014-08-27/a>Rob VandenBrinkOne More Day of Trolling in POS Memory
2014-08-22/a>Richard PorterOCLHashCat 1.30 Released
2014-08-20/a>Kevin ShorttSocial Engineering Alive and Well
2014-08-15/a>Tom WebbAppLocker Event Logs with OSSEC 2.8
2014-08-09/a>Adrien de BeaupreComplete application ownage via Multi-POST XSRF
2014-08-05/a>Johannes UllrichLegal Threat Spam: Sometimes it Gets Personal
2014-08-05/a>Johannes UllrichSynolocker: Why OFFLINE Backups are important
2014-08-04/a>Russ McReeThreats & Indicators: A Security Intelligence Lifecycle
2014-07-30/a>Rick WannerSymantec Endpoint Protection Privilege Escalation Zero Day
2014-07-23/a>Johannes UllrichNew Feature: "Live" SSH Brute Force Logs and New Kippo Client
2014-07-18/a>Russ McReeGameover Zeus reported as "returned from the dead"
2014-07-15/a>Daniel WesemannOracle July 2014 CPU (patch bundle)
2014-07-14/a>Johannes UllrichThe Internet of Things: How do you "on-board" devices?
2014-07-14/a>Daniel WesemannE-ZPass phishing scam
2014-07-11/a>Rob VandenBrinkEgress Filtering? What - do we have a bird problem?
2014-07-09/a>Daniel WesemannWho owns your typo?
2014-07-09/a>Daniel WesemannWho inherits your IP address?
2014-07-08/a>Johannes UllrichHardcoded Netgear Prosafe Switch Password
2014-07-02/a>Johannes UllrichJuly Ouch! Security Awareness Newsletter Released. E-mail Do's and Don'ts http://www.securingthehuman.org/resources/newsletters/ouch/2014#july2014
2014-06-13/a>Richard PorterA welcomed response, PF Chang's
2014-06-04/a>Richard Porterp0f, Got Packets?
2014-06-02/a>Rick WannerUsing nmap to scan for DDOS reflectors
2014-06-02/a>John BambenekGameover Zeus and Cryptolocker Takedowns
2014-05-30/a>Johannes UllrichFake Australian Electric Bill Leads to Cryptolocker
2014-05-23/a>Richard PorterHighlights from Cisco Live 2014 - The Internet of Everything
2014-05-22/a>Rob VandenBrinkAnother Site Breached - Time to Change your Passwords! (If you can that is)
2014-05-18/a>Russ McReesed and awk will always rock
2014-05-07/a>Johannes UllrichDe-Clouding your Life: Things that should not go into the cloud.
2014-05-01/a>Johannes UllrichBusybox Honeypot Fingerprinting and a new DVR scanner
2014-04-27/a>Tony CarothersThe Dreaded "D" Word of IT
2014-04-26/a>Guy BruneauAndroid Users - Beware of Bitcoin Mining Malware
2014-04-21/a>Daniel WesemannFinding the bleeders
2014-04-12/a>Guy BruneauInterested in a Heartbleed Challenge?
2014-04-08/a>Guy BruneauOpenSSL CVE-2014-0160 Fixed
2014-04-05/a>Jim ClausingThose strange e-mails with URLs in them can lead to Android malware
2014-04-04/a>Rob VandenBrinkDealing with Disaster - A Short Malware Incident Response
2014-04-01/a>Johannes Ullrichcmd.so Synology Scanner Also Found on Routers
2014-03-31/a>Johannes UllrichMore Device Malware: This is why your DVR attacked my Synology Disk Station (and now with Bitcoin Miner!)
2014-03-28/a>Johannes UllrichWar of the Bots: When DVRs attack NASs
2014-03-27/a>Alex StanfordApple Credential Phishing via appleidconfirm.net
2014-03-26/a>Johannes UllrichLet's Finally "Nail" This Port 5000 Traffic - Synology owners needed.
2014-03-17/a>Johannes UllrichScans for FCKEditor File Manager
2014-03-13/a>Daniel WesemannWeb server logs containing RS=^ ?
2014-03-12/a>Johannes UllrichWordpress "Pingback" DDoS Attacks
2014-03-04/a>Daniel WesemannTriple Handshake Cookie Cutter
2014-03-02/a>Stephen HallSunday Reading
2014-02-28/a>Daniel WesemannOversharing
2014-02-19/a>Russ McReeThreat modeling in the name of security
2014-02-18/a>Johannes UllrichMore Details About "TheMoon" Linksys Worm
2014-02-15/a>Rob VandenBrinkMore on HNAP - What is it, How to Use it, How to Find it
2014-02-14/a>Chris MohanScanning activity for /siemens/bootstrapping/JnlpBrowser/Development/
2014-02-13/a>Johannes UllrichLinksys Worm ("TheMoon") Captured
2014-02-12/a>Johannes UllrichSuspected Mass Exploit Against Linksys E1000 / E1200 Routers
2014-02-10/a>Rob VandenBrinkA Tale of Two Admins (and no Change Control)
2014-02-09/a>Basil Alawi S.TaherMandiant Highlighter 2
2014-02-04/a>Johannes UllrichOdd ICMP Echo Request Payload
2014-01-30/a>Johannes UllrichNew gTLDs appearing in the root zone
2014-01-27/a>Basil Alawi S.TaherLog Parsing with Mandiant Highlighter (1)
2014-01-24/a>Johannes UllrichHow to send mass e-mail the right way
2014-01-24/a>Chris MohanPhishing via Social Media
2014-01-23/a>Chris MohanLearning from the breaches that happens to others Part 2
2014-01-17/a>Russ McReeMassive RFI scans likely a free web app vuln scanner rather than bots
2014-01-14/a>Chris MohanSpamming and scanning botnets - is there something I can do to block them from my site?
2014-01-11/a>Guy Bruneautcpflow 1.4.4 and some of its most Interesting Features
2014-01-04/a>Tom WebbMonitoring Windows Networks Using Syslog (Part One)
2014-01-02/a>John BambenekOpenSSL.org Defaced by Attackers Gaining Access to Hypervisor
2014-01-01/a>Russ McReeSix degrees of celebration: Juniper, ANT, Shodan, Maltego, Cisco, and Tails
2013-12-28/a>Russ McReeWeekend Reading List 27 DEC
2013-12-28/a>Bojan ZdrnjaDRG online challenge(s)
2013-12-23/a>Rob VandenBrinkHow-To's for the Holidays - Java Whitelisting using AD Group Policy
2013-12-21/a>Daniel WesemannAdobe phishing underway
2013-12-19/a>Rob VandenBrinkPassive Scanning Two Ways - How-Tos for the Holidays
2013-12-19/a>Rob VandenBrinkTarget US - Credit Card Data Breach
2013-12-11/a>Johannes UllrichFacebook Phishing and Malware via Tumblr Redirects
2013-12-09/a>Rob VandenBrinkScanning without Scanning
2013-12-07/a>Guy BruneauSuspected Active Rovnix Botnet Controller
2013-12-03/a>Rob VandenBrinkEven in the Quietest Moments ...
2013-11-29/a>Russ McReeMS Exchange update, includes failed backup fix: http://support.microsoft.com/kb/2892464
2013-11-27/a>Rob VandenBrinkATM Traffic + TCPDump + Video = Good or Evil?
2013-11-22/a>Rick WannerPort 0 DDOS
2013-11-22/a>Rick WannerTales of Password Reuse
2013-11-16/a>Guy BruneauSagan as a Log Normalizer
2013-11-15/a>Johannes UllrichThe Security Impact of HTTP Caching Headers
2013-11-11/a>Johannes UllrichWhat Happened to the SANS Ads?
2013-11-05/a>Daniel WesemannTIFF images in MS-Office documents used in targeted attacks
2013-11-04/a>Manuel Humberto Santander PelaezWhen attackers use your DNS to check for the sites you are visiting
2013-11-01/a>Russ McReeSecunia's PSI Country Report - Q3 2013
2013-10-30/a>Russ McReeSIR v15: Five good reasons to leave Windows XP behind
2013-10-25/a>Johannes UllrichPHP.net compromise aftermath: Why Code Signing Beats Hashes
2013-10-25/a>Rob VandenBrinkKaspersky flags TCPIP.SYS as Malware
2013-10-24/a>Johannes UllrichFalse Positive: php.net Malware Alert
2013-10-22/a>Richard PorterGreenbone and OpenVAS Scanner
2013-10-21/a>Johannes UllrichNew tricks that may bring DNS spoofing back or: "Why you should enable DNSSEC even if it is a pain to do"
2013-10-18/a>Rob VandenBrinkCSAM - Why am I seeing DNS Requests to IANA.ORG in my Firewall Logs?
2013-10-17/a>Adrien de BeaupreInternet wide DNS scanning
2013-10-10/a>Johannes Ullrichgoogle.com.my DNS hijack
2013-10-10/a>Mark HofmanCSAM Some more unusual scans
2013-10-04/a>Pedro BuenoCSAM: WebHosting BruteForce logs
2013-10-02/a>John BambenekObamacare related domain registration spike, Government shutdown domain registration beginning
2013-09-24/a>Tom WebbIDS, NSM, and Log Management with Security Onion 12.04.3
2013-09-11/a>Alex StanfordGetting Started with Rsyslog Filters
2013-09-05/a>Rob VandenBrinkBuilding Your Own GPU Enabled Private Cloud
2013-09-02/a>Guy BruneauSnort IDS Sensor with Sguil New ISO Released
2013-08-26/a>Alex StanfordStop, Drop and File Carve
2013-08-22/a>Russ McReeRead of the Week: A Fuzzy Future in Malware Research
2013-08-21/a>Alex StanfordPsst. Your Browser Knows All Your Secrets.
2013-08-19/a>Rob VandenBrinkZMAP 1.02 released
2013-08-15/a>Johannes UllrichMicrosoft Pulls MS013-061 due to problems with Exchange Server 2013 http://blogs.technet.com/b/exchange/archive/2013/08/14/exchange-2013-security-update-ms13-061-status-update.aspx
2013-08-14/a>Johannes Ullrich.GOV zones may not resolve due to DNSSEC problems.
2013-08-14/a>Johannes UllrichImaging LUKS Encrypted Drives
2013-08-09/a>Kevin ShorttCopy Machines - Changing Scanned Content
2013-08-05/a>Chris MohanDMARC: another step forward in the fight against phishing?
2013-07-31/a>Johannes UllrichPOP3 Server Brute Forcing Attempts Using Polycom Credentials
2013-07-29/a>Adrien de BeaupreBGP multiple banking addresses hijacked
2013-07-28/a>Guy BruneauWireshark 1.8.9 and 1.10.1 Security Update
2013-07-21/a>Guy BruneauWhy use Regular Expressions?
2013-07-20/a>Manuel Humberto Santander PelaezDo you have rogue Internet gateways in your network? Check it with nmap
2013-07-19/a>Stephen HallCyber Intelligence Tsunami
2013-07-18/a>Chris MohanBlog Spam - annoying junk or a source of intelligence?
2013-07-16/a>Johannes UllrichWhy don't we see more examples of web app attacks via POST?
2013-07-13/a>Lenny ZeltserDecoy Personas for Safeguarding Online Identity Using Deception
2013-07-10/a>Johannes Ullrich.NL Registrar Compromisse
2013-07-08/a>Richard PorterWhy do we Click?
2013-07-06/a>Guy BruneauIs Metadata the Magic in Modern Network Security?
2013-07-01/a>Manuel Humberto Santander PelaezUsing nmap scripts to enhance vulnerability asessment results
2013-06-29/a>Johannes UllrichInstagram "Fruit" Spam
2013-06-22/a>Guy BruneauFacebook Reports a Potential Leak of User Data
2013-06-21/a>Guy BruneauSysinternals Updates for Autoruns, Strings & ZoomIt http://blogs.technet.com/b/sysinternals/archive/2013/06/20/updates-autoruns-v11-61-strings-v2-52-zoomit-v4-5.aspx
2013-06-18/a>Russ McReeEMET 4.0 is now available for download
2013-06-10/a>Johannes UllrichWhen Google isn't Google
2013-05-23/a>Adrien de BeaupreMoVP II
2013-05-22/a>Adrien de BeauprePrivilege escalation, why should I care?
2013-05-21/a>Adrien de BeaupreMoore, Oklahoma tornado charitable organization scams, malware, and phishing
2013-05-20/a>Guy BruneauSysinternals Updates for Accesschk, Procdump, RAMMap and Strings http://blogs.technet.com/b/sysinternals/archive/2013/05/17/updates-accesschk-v5-11-procdump-v6-0-rammap-v1-22-strings-v2-51.aspx
2013-05-19/a>Kevin ShorttPort 51616 - Got Packets?
2013-05-17/a>Johannes UllrichSSL: Another reason not to ignore IPv6
2013-05-16/a>Daniel WesemannExtracting signatures from Apple .apps
2013-05-08/a>Chris MohanSyria drops from Internet 7th May 2013
2013-05-07/a>Jim ClausingIs there an epidemic of typo squatting?
2013-05-07/a>Jim ClausingNGINX updates address buffer overflow (CVE-2013-2028) see http://nginx.org/en/CHANGES-1.4
2013-05-04/a>Kevin ShorttThe Zero-Day Pendulum Swings
2013-04-25/a>Adam SwangerGuest Diary: Dylan Johnson - A week in the life of some Perimeter Firewalls
2013-04-23/a>Russ McReeMicrosoft's Security Intelligence Report (SIRv14) released
2013-04-21/a>John BambenekA Chargen-based DDoS? Chargen is still a thing?
2013-04-17/a>Richard PorterApple iTunes Services Outage
2013-04-16/a>John BambenekFake Boston Marathon Scams Update
2013-04-15/a>John BambenekPlease send any spam (full headers), URLs or other suspicious content scamming off Boston Marathon explosions to handlers@sans.org
2013-04-10/a>Manuel Humberto Santander PelaezMassive Google scam sent by email to Colombian domains
2013-04-04/a>Johannes UllrichPostgresql Patches Critical Vulnerability
2013-03-29/a>Chris MohanFake Link removal requests
2013-03-27/a>Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - IPv6 moving target defense
2013-03-19/a>Johannes UllrichIPv6 Focus Month: The warm and fuzzy side of IPv6
2013-03-18/a>Kevin ShorttSpamhaus DDOS
2013-03-07/a>Guy BruneauApple Blocking Java Web plug-in
2013-03-06/a>Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - Geolocation Using IPv6 Addresses
2013-03-02/a>Scott FendleyApple Blocks Older Insecure Versions of Flash Player
2013-02-28/a>Daniel WesemannParsing Windows Eventlogs in Powershell
2013-02-27/a>Adam SwangerGuest Diary: Dylan Johnson - There's value in them there logs!
2013-02-25/a>Johannes UllrichPunkspider enumerates web application vulnerabilities
2013-02-25/a>Rob VandenBrinkSilent Traitors - Embedded Devices in your Datacenter
2013-02-22/a>Chris MohanPHP 5.4.12 and PHP 5.3.22 released http://www.php.net/ChangeLog-5.php
2013-02-17/a>Guy BruneauHP ArcSight Connector Appliance and Logger Vulnerabilities
2013-02-11/a>John BambenekIs This Chinese Registrar Really Trying to XSS Me?
2013-02-06/a>Johannes UllrichHTTP Range Header and Partial Downloads
2013-02-06/a>Johannes UllrichAre you losing system logging information (and don't know it)?
2013-02-04/a>Russ McReeAn expose of a recent SANS GIAC XSS vulnerability
2013-02-04/a>Adam SwangerSAN Securing The Human Monthly Awareness Video - Advanced Persistent Threat (APT) http://www.securingthehuman.org/resources/ncsam
2013-01-30/a>Richard PorterGetting Involved with the Local Community
2013-01-25/a>Johannes UllrichVulnerability Scans via Search Engines (Request for Logs)
2013-01-15/a>Rob VandenBrinkWhen Disabling IE6 (or Java, or whatever) is not an Option...
2013-01-10/a>Rob VandenBrinkWhat Else runs Telnets? Or, Pentesters Love Video Conferencing Units Too!
2013-01-09/a>Rob VandenBrinkHotmail seeing some temporary access issues
2013-01-02/a>Chris MohanStarting the New Year on the right foot
2012-12-27/a>John BambenekIt's 3pm 2 days after Christmas, do you know where your unmanaged SSH keys are?
2012-12-20/a>Daniel WesemannWhite House strategy on security information sharing and safeguarding
2012-12-18/a>Dan GoldbergMitigating the impact of organizational change: a risk assessment
2012-12-13/a>Johannes UllrichWhat if Tomorrow Was the Day?
2012-12-06/a>Daniel WesemannFake tech support calls - revisited
2012-12-06/a>Daniel WesemannRich Quick Make Money!
2012-12-03/a>John BambenekJohn McAfee Exposes His Location in Photo About His Being on Run
2012-12-02/a>Guy BruneauCollecting Logs from Security Devices at Home
2012-11-30/a>Daniel WesemannNmap 6.25 released - lots of new goodies, see http://nmap.org/changelog.html
2012-11-29/a>Kevin ShorttNew Apple Security Update: APPLE-SA-2012-11-29-1 Apple TV 5.1.1
2012-11-28/a>Mark HofmanMcAfee releases extraDAT for W32/Autorun.worm.aaeb-h
2012-11-28/a>Mark HofmanNew version of wireshark is available (1.8.4), some security fixes included.
2012-11-27/a>Chris MohanCan users' phish emails be a security admin's catch of the day?
2012-11-26/a>John BambenekOnline Shopping for the Holidays? Tips, News and a Fair Warning
2012-11-23/a>Rob VandenBrinkWhat's in Your Change Control Form?
2012-11-20/a>John BambenekBehind the Random NTP Bizarreness of Incorrect Year Being Set
2012-11-20/a>John BambenekFirefox v 17.0 just released, more here: http://www.mozilla.org/en-US/firefox/17.0/releasenotes/
2012-11-19/a>John BambenekMoneyGram fined $100 million for aiding wire fraud - http://krebsonsecurity.com/2012/11/moneygram-fined-100-million-for-wire-fraud/
2012-11-19/a>John BambenekNew Poll: Top 5 Unresolved Security Problems of 2012
2012-11-17/a>Manuel Humberto Santander PelaezNew Sysinternal Updates: AdExplorer v1.44, Contig v1.7, Coreinfo v3.2, Procdump v5.1. See http://blogs.technet.com/b/sysinternals/archive/2012/11/16/updates-adexplorer-v1-44-contig-v1-7-coreinfo-v3-2-procdump-v5-1.aspx?Redirected=true
2012-11-13/a>Jim ClausingMicrosoft November 2012 Black Tuesday Update - Overview
2012-11-12/a>John BambenekRequest for info: Robocall Phishing Against Local/Regional Banks
2012-11-09/a>Mark BaggettRemote Diagnostics with PSR
2012-11-09/a>Mark BaggettFresh batch of Microsoft patches next week
2012-11-08/a>Daniel WesemannGet a 40% discount on your hotel room!
2012-11-07/a>Mark BaggettHelp eliminate unquoted path vulnerabilities
2012-11-07/a>Mark BaggettMultiple 0-Days Reported!
2012-11-07/a>Mark BaggettCisco TACACS+ Authentication Bypass
2012-11-05/a>Johannes UllrichReminder: Ongoing SMTP Brute Forcing Attacks
2012-11-05/a>Johannes UllrichPossible Fake-AV Ads from Doubleclick Servers
2012-11-04/a>Lorna HutchesonWhat's important on your network?
2012-10-31/a>Johannes UllrichCyber Security Awareness Month - Day 31 - Business Continuity and Disaster Recovery
2012-10-30/a>Johannes UllrichHurricane Sandy Update
2012-10-30/a>Richard PorterSplunk 5.0 SP-CAAAHB4 http://www.splunk.com/view/SP-CAAAHB4
2012-10-30/a>Mark HofmanCyber Security Awareness Month - Day 30 - DSD 35 mitigating controls
2012-10-28/a>Tony CarothersFirefox 16.02 Released
2012-10-26/a>Adam SwangerSecuring the Human Special Webcast - October 30, 2012
2012-10-26/a>Russ McReeCyber Security Awareness Month - Day 26 - Attackers use trusted domain to propagate Citadel Zeus variant
2012-10-25/a>Richard PorterCyber Security Awareness Month - Day 25 - Pro Audio & Video Packets on the Wire
2012-10-24/a>Russ McReeOngoing Windstream outage in the midwest - https://twitter.com/search?q=windstream
2012-10-23/a>Rob VandenBrinkCyber Security Awareness Month - Day 23: Character Encoding Standards - ASCII and Successors
2012-10-21/a>Johannes UllrichCyber Security Awareness Month - Day 22: Connectors
2012-10-21/a>Lorna HutchesonPotential Phish for Regular Webmail Accounts
2012-10-19/a>Johannes UllrichCyber Security Awareness Month - Day 19: Standard log formats and CEE.
2012-10-18/a>Rob VandenBrinkCyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide
2012-10-17/a>Mark HofmanOracle Critical Patch Update October
2012-10-17/a>Mark HofmanNew Acrobat release (including reader) available. Version 11. Some security improvements more here -->http://blogs.adobe.com/adobereader/
2012-10-16/a>Richard PorterCyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook.
2012-10-16/a>Johannes UllrichCyber Security Awareness Month - Day 16: W3C and HTML
2012-10-14/a>Pedro BuenoCyber Security Awareness Month - Day 14 - Poor Man's File Analysis System - Part 1
2012-10-09/a>Johannes UllrichMicrosoft October 2012 Black Tuesday Update - Overview
2012-10-07/a>Tony CarothersCyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1
2012-10-05/a>Johannes UllrichCyber Security Awareness Month - Day 5: Standards Body Soup, So many Flavors in the bowl.
2012-10-05/a>Richard PorterVMWare Security Advisory: VMSA-2012-0014 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html
2012-10-05/a>Richard PorterReports of a Distributed Injection Scan
2012-10-04/a>Mark HofmanAnd the SHA-3 title goes to .....Keccak
2012-10-04/a>Johannes UllrichCyber Security Awareness Month - Day 4: Crypto Standards
2012-10-03/a>Kevin ShorttFake Support Calls Reported
2012-10-02/a>Russ McReeCyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines
2012-10-01/a>Johannes UllrichCyber Security Awareness Month
2012-09-28/a>Joel EslerAdobe certification revocation for October 4th
2012-09-26/a>Johannes UllrichSome Android phones can be reset to factory default by clicking on links
2012-09-26/a>Johannes UllrichMore Java Woes
2012-09-21/a>Johannes UllrichiOS 6 Security Roundup
2012-09-21/a>Guy BruneauStoring your Collection of Malware Samples with Malwarehouse
2012-09-20/a>Russ McReeFinancial sector advisory: attacks and threats against financial institutions
2012-09-19/a>Russ McReeScript kiddie scavenging with Shellbot.S
2012-09-17/a>Rob VandenBrinkWhat's on your iPad?
2012-09-14/a>Lenny ZeltserAnalyzing Malicious RTF Files Using OfficeMalScanner's RTFScan
2012-09-14/a>Lenny ZeltserScam Report - Fake Voice Mail Email Notification Redirects to Malicious Site
2012-09-13/a>Mark BaggettTCP Fuzzing with Scapy
2012-09-13/a>Mark BaggettMicrosoft disrupts traffic associated with the Nitol botnet
2012-09-13/a>Mark BaggettMore SSL trouble
2012-09-10/a>Johannes UllrichMicrosoft Patch Tuesday Pre-Release
2012-09-10/a>Johannes UllrichGodaddy DDoS Attack
2012-09-10/a>donald smithBlue Toad publishing co compromise lead to UDID release. http://redtape.nbcnews.com/_news/2012/09/10/13781440-exclusive-the-real-source-of-apple-device-ids-leaked-by-anonymous-last-week?lite
2012-09-09/a>Guy BruneauPhishing/Spam Pretending to be from BBB
2012-09-06/a>Johannes UllrichSSL Requests sent to port 80 (request for help/input)
2012-09-04/a>Johannes UllrichAnother round of "Spot the Exploit E-Mail"
2012-09-02/a>Lorna HutchesonDemonstrating the value of your Intrusion Detection Program and Analysts
2012-09-01/a>Russ McReeBlackhole targeting Java vulnerability via fake Microsoft Services Agreement email phish
2012-08-31/a>Russ McReeNot so fast: Java 7 Update 7 critical vulnerability discovered in less than 24 hours
2012-08-30/a>Bojan ZdrnjaAnalyzing outgoing network traffic (part 2)
2012-08-30/a>Johannes UllrichEditorial: The Slumlord Approach to Network Security http://isc.sans.edu/j/editorial
2012-08-29/a>Johannes Ullrich"Data" URLs used for in-URL phishing
2012-08-27/a>Johannes UllrichThe Good, Bad and Ugly about Assigning IPv6 Addresses
2012-08-27/a>Johannes UllrichMalware Spam harvesting Facebook Information
2012-08-26/a>Lorna HutchesonWho ya gonna contact?
2012-08-23/a>Bojan ZdrnjaAnalyzing outgoing network traffic
2012-08-22/a>Adrien de BeaupreApple Remote Desktop update fixes no encryption issue
2012-08-22/a>Adrien de BeauprePhishing/spam via SMS
2012-08-21/a>Adrien de BeaupreYYABCAFU - Yes Yet Another Bleeping Critical Adobe Flash Update
2012-08-21/a>Adrien de BeaupreRuggedCom fails key management 101 on Rugged Operating System (ROS)
2012-08-20/a>Manuel Humberto Santander PelaezDo we need test procedures in our companies before implementing Antivirus signatures?
2012-08-19/a>Manuel Humberto Santander PelaezAuthentication Issues between entities during protocol message exchange in SCADA Systems
2012-08-17/a>Guy BruneauSuspicious eFax Spear Phishing Messages
2012-08-14/a>Rick WannerMicrosoft August 2012 Black Tuesday Update - Overview
2012-08-12/a>Tony CarothersLayers of the Defense-in-Depth Onion
2012-08-12/a>Tony CarothersOracle Security Alert for CVE-2012-3132
2012-08-09/a>Mark HofmanSQL Injection Lilupophilupop style, Part 2
2012-08-09/a>Mark HofmanZeus/Citadel variant causing issues in the Netherlands
2012-08-07/a>Adrien de BeaupreWho protects small business?
2012-08-05/a>Daniel WesemannPhishing for Payroll with unpatched Java
2012-08-04/a>Kevin ListonVendors: More Patch-Release Options Please
2012-08-01/a>Johannes UllrichGoogle Chrome 21 and getUserMedia API
2012-07-27/a>Daniel WesemannCuckoo 0.4 is out - cool new features for malware analysis http://www.cuckoosandbox.org/
2012-07-25/a>Johannes UllrichMicrosoft Exchange/Sharepoint and others: Oracle Outside In Vulnerability
2012-07-24/a>Richard PorterWireshark 1.8.1 Released http://www.wireshark.org/
2012-07-24/a>Richard PorterReport of spike in DNS Queries gd21.net
2012-07-21/a>Rick WannerTippingPoint DNS Version Request increase
2012-07-20/a>Mark BaggettSyria Internet connection cut?
2012-07-19/a>Mark BaggettDiagnosing Malware with Resource Monitor
2012-07-19/a>Mark BaggettA Heap of Overflows?
2012-07-16/a>Richard PorterSysinternals Update @ http://blogs.technet.com/b/sysinternals/archive/2012/07/16/updates-handle-v3-5-process-explorer-v15-22-process-monitor-v3-03-rammap-v1-21-zoomit-v4-3.aspx
2012-07-16/a>Jim ClausingAn analysis of the Yahoo! passwords
2012-07-13/a>Russ McReeYahoo service SQL injection vuln leads to account exposure
2012-07-13/a>Richard PorterYesterday (not as on the ball as Rob) at SANSFire
2012-07-13/a>Russ McRee2 for 1: SANSFIRE & MSRA presentations
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Recording Server - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Manager - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman
2012-07-11/a>Rick WannerExcellent Security Education Resources
2012-07-09/a>Johannes UllrichThe FBI will turn off the Internet on Monday (or not)
2012-07-09/a>Manuel Humberto Santander PelaezInternet Storm Center panel tonight at SANSFIRE 2012!
2012-07-05/a>Adrien de BeaupreNew OS X trojan backdoor MaControl variant reported
2012-07-02/a>Joel EslerA rough guide to keeping your website up
2012-07-02/a>Joel EslerLinux & Java leap second bug
2012-06-29/a>Jim ClausingUpdated SysInternals tools - Autoruns, Process Explorer, Process Monitor, PSKill -- http://blogs.technet.com/b/sysinternals/archive/2012/06/28/updates-autoruns-v11-32-process-explorer-v15-21-process-monitor-v3-02-pskill-v1-15-rammap-v1-2.aspx
2012-06-28/a>Chris MohanMassive spike in BGP traffic - Possible BGP poisoning?
2012-06-27/a>Daniel WesemannWhat's up with port 79 ?
2012-06-25/a>Guy BruneauIssues with Windows Update Agent
2012-06-25/a>Rick WannerTargeted Malware for Industrial Espionage?
2012-06-22/a>Kevin ListonUpdated Poll: Which Patch Delivery Schedule Works the Best for You?
2012-06-21/a>Russ McReeAnalysis of drive-by attack sample set
2012-06-21/a>Russ McReeWireshark 1.8.0 released 21 JUN 2012 http://www.wireshark.org/download.html
2012-06-20/a>Raul SilesCVE-2012-0217 (from MS12-042) applies to other environments too
2012-06-19/a>Daniel Wesemann Vulnerabilityqueerprocessbrittleness
2012-06-15/a>Johannes UllrichAuthenticating E-Mail
2012-06-14/a>Johannes UllrichSpot the Phish: Verizon Wireless
2012-06-10/a>Scott FendleyPreying on Users After Major Security Incidents
2012-06-04/a>Lenny ZeltserDecoding Common XOR Obfuscation in Malicious Code
2012-06-04/a>Rob VandenBrinkvSphere 5.0 Hardening Guide Officially Released
2012-05-30/a>Rob VandenBrinkToo Big to Fail / Too Big to Learn?
2012-05-30/a>Rob VandenBrinkIt's Phishing Season! In fact, it's ALWAYS Phishing Season!
2012-05-25/a>Guy BruneauApple PGP Product Security key update - https://www.apple.com/support/security/pgp/
2012-05-25/a>Guy BruneauGoogle Publish Transparency Report
2012-05-23/a>Mark BaggettProblems with MS12-035 affecting XP, SBS and Windows 2003?
2012-05-16/a>Johannes UllrichNew Version of Google Chrome released (19.0.1084.46)
2012-05-14/a>Chris MohanLaptops at Security Conferences
2012-05-06/a>Jim ClausingTool updates and Win 8
2012-05-02/a>Bojan ZdrnjaMonitoring VMWare logs
2012-04-30/a>Rob VandenBrinkFCC posts Enquiry Documents on Google Wardriving
2012-04-23/a>Russ McReeEmergency Operations Centers & Security Incident Management: A Correlation
2012-04-21/a>Guy BruneauWordPress Release Security Update
2012-04-16/a>Mark BaggettChallenge: What can you do with Funky Directory Names (Part 2)
2012-04-11/a>Mark BaggettChallenge: What can you do with funky directory names?
2012-04-08/a>Chris MohanBlog Log: More noise or a rich source of intelligence?
2012-04-06/a>Johannes UllrichSocial Share Privacy
2012-04-05/a>Johannes UllrichEvil hides everywhere: Web Application Exploits in Headers
2012-04-02/a>Johannes UllrichSHA 1-2-3
2012-03-27/a>Guy BruneauWireshark 1.6.6 and 1.4.2 Released
2012-03-27/a>Guy BruneauOpera 11.62 for Windows patch several bugs and vulnerabilities - http://www.opera.com/docs/changelogs/windows/1162/
2012-03-16/a>Swa FrantzenINFOCON Yellow - Microsoft RDP - MS12-020
2012-02-29/a>Johannes UllrichCOX Network Outage
2012-02-24/a>Guy BruneauFlashback Trojan in the Wild
2012-02-23/a>donald smithDNS-Changer "clean DNS" extension requested
2012-02-20/a>Johannes UllrichThe Ultimate OS X Hardening Guide Collection
2012-02-20/a>Pedro BuenoSimple Malware Research Tools
2012-02-20/a>Rick WannerDNSChanger resolver shutdown deadline is March 8th
2012-01-31/a>Russ McReeOSINT tactics: parsing from FOCA for Maltego
2012-01-24/a>Bojan ZdrnjaIs it time to get rid of NetBIOS?
2012-01-22/a>Lorna HutchesonMailbag - "Attacks"
2012-01-13/a>Guy BruneauNew Generic Top-Level Domains (gTLDs) out for Sale
2012-01-12/a>Rob VandenBrinkStuff I Learned Scripting - Fun with STDERR
2011-12-25/a>Deborah HaleMerry Christmas, Happy Holidays
2011-12-12/a>Daniel WesemannYou won 100$ or a free iPad!
2011-11-28/a>Tom ListonA Puzzlement...
2011-11-19/a>Kevin ListonMonitoring your Log Monitoring Process
2011-11-16/a>Adrien de BeaupreGET BACK TO ME ASAP
2011-11-11/a>Rick WannerWhat's up with fbi.gov DNS?
2011-11-10/a>Rob VandenBrinkStuff I Learned Scripting - - Parsing XML in a One-Liner
2011-11-09/a>Russ McReeOperation Ghost Click: FBI bags crime ring responsible for $14 million in losses
2011-11-07/a>Rob VandenBrinkJuniper BGP issues causing locallized Internet Problems
2011-10-28/a>Russ McReeCritical Control 19: Data Recovery Capability
2011-10-26/a>Rick WannerCritical Control 17:Penetration Tests and Red Team Exercises
2011-10-26/a>Rob VandenBrinkThe Theoretical "SSL Renegotiation" Issue gets a Whole Lot More Real !
2011-10-25/a>Chris MohanRecurring reporting made easy?
2011-10-21/a>Johannes UllrichNew Flash Click Jacking Exploit
2011-10-17/a>Rob VandenBrinkCritical Control 11: Account Monitoring and Control
2011-10-10/a>Tom ListonWhat's In A Name?
2011-09-29/a>Daniel WesemannThe SSD dilemma
2011-09-27/a>donald smithNew feature in JUNOS to drop or ignore path attributes.
2011-09-20/a>Swa FrantzenDiginotar declared bankrupt
2011-09-19/a>Guy BruneauMS Security Advisory Update - Fraudulent DigiNotar Certificates
2011-09-18/a>Guy BruneauGoogle Chrome Security Updates
2011-09-15/a>Swa FrantzenDigiNotar looses their accreditation for qualified certificates
2011-09-13/a>Swa FrantzenGlobalSign back in operation
2011-09-13/a>Swa FrantzenMore DigiNotar intermediate certificates blocklisted at Microsoft
2011-09-09/a>Johannes UllrichLarge power outage in Southern California may last until Friday. http://www.sdge.com
2011-09-07/a>Lenny ZeltserAnalyzing Mobile Device Malware - Honeynet Forensic Challenge 9 and Some Tools
2011-09-07/a>Lenny ZeltserGlobalSign Temporarily Stops Issuing Certificates to Investigate a Potential Breach
2011-09-06/a>Swa FrantzenDigiNotar audit - intermediate report available
2011-09-06/a>Johannes UllrichMicrosoft Releases Diginotar Related Patch and Advisory
2011-09-01/a>Swa FrantzenDigiNotar breach - the story so far
2011-08-31/a>Johannes UllrichFirefox/Thunderbird 6.0.1 released to blocklist bad DigiNotar SSL certificates
2011-08-31/a>Johannes UllrichPhishing e-mail to custom e-mail addresses
2011-08-31/a>Johannes UllrichKernel.org Compromise
2011-08-26/a>Daniel WesemannUser Agent 007
2011-08-24/a>Rob VandenBrinkGoogle Chrome 13.0.782.215 Released, several security updates ==> http://googlechromereleases.blogspot.com/2011/08/stable-channel-update_22.html
2011-08-24/a>Rob VandenBrinkCitrix Access Gateway Cross Site Scripting vulnerability and fix ==> http://support.citrix.com/article/CTX129971
2011-08-17/a>Rob VandenBrinkPutting all of Your Eggs in One Basket - or How NOT to do Layoffs
2011-08-16/a>Scott FendleyPhishing Scam Victim Response
2011-08-15/a>Rob VandenBrink8 Years since the Eastern Seaboard Blackout - Has it Been that Long?
2011-08-08/a>Rob VandenBrinkPing is Bad (Sometimes)
2011-08-05/a>donald smithNew Mac Trojan: BASH/QHost.WB
2011-08-03/a>Johannes UllrichMalicious Images: What's a QR Code
2011-07-21/a>Mark HofmanLion Released
2011-07-17/a>Mark HofmanSSH Brute Force
2011-07-13/a>Guy BruneauNew Sguil HTTPRY Agent
2011-07-09/a>Tony CarothersCopyright Alert System - What say you?
2011-07-09/a>Johannes UllrichUpdated PGP key for blocklist added to https://isc.sans.edu/PGPKEYS.txt
2011-07-07/a>Rob VandenBrink"There's a Patch for that" (or maybe not)
2011-07-06/a>Rob VandenBrink"Too Important to Patch" - Wait? What?
2011-07-03/a>Deborah HaleBusiness Continuation in the Face of Disaster
2011-06-28/a>Johannes UllrichUpdate: Google Chrome 12.0.742.112 released http://googlechromereleases.blogspot.com/2011/06/stable-channel-update_28.html
2011-06-26/a>Rick WannerNagios script for ISC threat level http://www.aj-services.com/?p=275
2011-06-22/a>Guy BruneauHow Good is your Employee Termination Policy?
2011-06-21/a>Chris MohanAustralian government security audit report shows tough love to agencies
2011-06-20/a>Chris MohanLog files - are you reviewing yours?
2011-06-19/a>Guy BruneauSega Pass Compromised - 1.29 Million Customers Data Leaked
2011-06-17/a>Richard PorterWhen do you stop owning Technology?
2011-06-13/a>Bojan ZdrnjaHarry Potter and the Rogue anti-virus: Part 1
2011-06-12/a>Mark HofmanCloud thoughts
2011-06-08/a>Johannes UllrichSpam from compromised Hotmail accounts
2011-06-06/a>Manuel Humberto Santander PelaezPhishing: Same goal, same techniques and people still falling for such scams
2011-05-25/a>Lenny ZeltserMonitoring Social Media for Security References to Your Organization
2011-05-19/a>Daniel WesemannFake AV Bingo
2011-05-17/a>Johannes UllrichA Couple Days of Logs: Looking for the Russian Business Network
2011-05-11/a>Swa FrantzenTime to disable WebGL ?
2011-05-10/a>Swa FrantzenChanging MO in scamming our users ?
2011-05-06/a>Richard PorterUpdated Exploit Index for Microsoft
2011-04-28/a>Chris MohanGathering and use of location information fears - or is it all a bit too late
2011-04-26/a>John BambenekIs the Insider Threat Really Over?
2011-04-25/a>Rob VandenBrinkSony PlayStation Network Outage - Day 5
2011-04-23/a>Manuel Humberto Santander PelaezImage search can lead to malware download
2011-04-22/a>Manuel Humberto Santander PelaeziPhoneMap: iPhoneTracker port to Linux
2011-04-21/a>Guy BruneauSilverlight Update Available
2011-04-20/a>Johannes UllrichiPhone GPS Data Storage
2011-04-11/a>Johannes UllrichGMail User Using 2FA Warned of Access From China
2011-04-07/a>Chris MohanBeing a good internet neighbour
2011-04-03/a>Richard PorterExtreme Disclosure? Not yet but a great trend!
2011-03-29/a>Daniel WesemannMaking sense of RSA ACE server audit logs
2011-03-22/a>Chris MohanRead only USB stick trick
2011-03-14/a>Bojan ZdrnjaTsunami in Japan and self modifying RogueAV code
2011-03-11/a>Guy BruneauSnort IDS Sensor with Sguil Framework ISO
2011-03-09/a>Kevin ShorttAVG Anti-Virus 2011 False Positives - Luhe.Exploit.PDF.B
2011-03-07/a>Bojan ZdrnjaOracle padding attacks (Codegate crypto 400 writeup)
2011-03-03/a>Manuel Humberto Santander PelaezRogue apps inside Android Marketplace
2011-02-28/a>Deborah HalePossible Botnet Scanning
2011-02-22/a>Bojan ZdrnjaHBGary hack: lessons learned
2011-02-11/a>Kevin Johnson Two-Factor Auth: Can we just Google the response?
2011-02-09/a>Mark HofmanAdobe Patches (shockwave, Flash, Reader & Coldfusion)
2011-02-08/a>Johannes UllrichTippingpoint Releases Details on Unpatched Bugs
2011-02-07/a>Richard PorterCrime is still Crime! Pt 2
2011-02-02/a>Johannes UllrichHaving Phish on Friday
2011-01-30/a>Richard PorterThe Modern Dark Ages?
2011-01-29/a>Mark HofmanSourceforge attack
2011-01-25/a>Chris MohanReviewing our preconceptions
2011-01-24/a>Rob VandenBrinkWhere have all the COM Ports Gone? - How enumerating COM ports led to me finding a “misplaced” Microsoft tool
2011-01-13/a>Rob VandenBrinkIs Infosec seeing "Death by a Thousand Budget Cuts"?
2011-01-13/a>Rob VandenBrinkGoogle Chrome 8.0.552.237 and Chrome OS 8.0.552.334 released ==> http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html and http://www.kb.cert.org/vuls/id/258423
2011-01-12/a>Richard PorterHas Big Brother gone Global?
2011-01-12/a>Richard PorterYet Another Data Broker? AOL Lifestream.
2011-01-10/a>Manuel Humberto Santander PelaezVirusTotal VTzilla firefox/chrome plugin
2010-12-30/a>Rick WannerObvious Lessons from the Skype outage
2010-12-29/a>Daniel WesemannBeware of strange web sites bearing gifts ...
2010-12-24/a>Daniel WesemannA question of class
2010-12-23/a>Mark HofmanSkoudis' Annual Xmas Hacking Challenge - The Nightmare Before Charlie Brown's Christmas
2010-12-23/a>Mark HofmanWhite house greeting cards
2010-12-22/a>John BambenekIIS 7.5 0-Day DoS (processing FTP requests)
2010-12-15/a>Manuel Humberto Santander PelaezHP StorageWorks P2000 G3 MSA hardcoded user
2010-12-13/a>Deborah HaleGawker Media Breach of Security
2010-12-10/a>Mark HofmanMicrosoft patches
2010-12-03/a>Mark HofmanAVG Update Bricking windows 7 64 bit
2010-11-29/a>Stephen HalliPhone phishing - What you see, isn't what you get
2010-11-26/a>Mark HofmanUsing password cracking as metric/indicator for the organisation's security posture
2010-11-24/a>Bojan ZdrnjaPrivilege escalation 0-day in almost all Windows versions
2010-11-22/a>Lenny ZeltserBrand Impersonations On-Line: Brandjacking and Social Networks
2010-11-19/a>Jason LamExchanging and sharing of assessment results
2010-11-18/a>Chris CarboniStopping the ZeroAccess Rootkit
2010-11-17/a>Guy BruneauCisco Unified Videoconferencing Affected by Multiple Vulnerabilities
2010-11-17/a>Guy BruneauReference on Open Source Digital Forensics
2010-11-12/a>Guy BruneauHoneynet Forensic Challenge - Analyzing Malicious Portable Destructive Files
2010-11-11/a>Johannes UllrichOS X 10.6.5 released with security patches. Careful: issues with PGP WDE! (see PGP support forums)
2010-11-02/a>Johannes UllrichLimited Malicious Search Engine Poisoning for Election
2010-10-26/a>Pedro BuenoBe (even more) careful with public hotspots. Firesheep released yesterday. Brilliant and scary.
2010-10-22/a>Manuel Humberto Santander PelaezIntypedia project
2010-10-20/a>Jim ClausingTools updates - Oct 2010
2010-10-11/a>Adrien de BeaupreOT: Happy Thanksgiving Day Canada
2010-10-04/a>Mark HofmanOnline Voting
2010-10-03/a>Adrien de BeaupreCanada's Cyber Security Strategy released today
2010-09-28/a>Daniel WesemannSupporting the economy (in Russia and Ukraine)
2010-09-16/a>Johannes UllrichFacebook "Like Pages"
2010-09-14/a>Adrien de BeaupreBlackEnergy DDoS
2010-09-07/a>Bojan ZdrnjaSSH password authentication insight and analysis by DRG
2010-08-27/a>Mark HofmanFTP Brute Password guessing attacks
2010-08-23/a>Bojan ZdrnjaDLL hijacking vulnerabilities
2010-08-23/a>Manuel Humberto Santander PelaezFirefox plugins to perform penetration testing activities
2010-08-19/a>Rob VandenBrinkChange is Good. Change is Bad. Change is Life.
2010-08-17/a>Bojan ZdrnjaDo you like Bing? So do the RogueAV guys!
2010-08-16/a>Raul SilesBlind Elephant: A New Web Application Fingerprinting Tool
2010-08-13/a>Guy BruneauShadowserver Binary Whitelisting Service
2010-08-10/a>Daniel WesemannSSH - new brute force tool?
2010-08-07/a>Stephen HallCountdown to Tuesday...
2010-08-04/a>Tom ListonIncident Reporting - Liston's "How-To" Guide
2010-08-03/a>Johannes UllrichWhen Lightning Strikes
2010-07-29/a>Rob VandenBrinkSnort 2.8.6.1 and Snort 2.9 Beta Released
2010-07-24/a>Manuel Humberto Santander PelaezGnuPG gpgsm bug
2010-07-24/a>Manuel Humberto Santander PelaezTransmiting logon information unsecured in the network
2010-07-20/a>Manuel Humberto Santander PelaezLowering infocon back to green
2010-07-18/a>Manuel Humberto Santander PelaezSAGAN: An open-source event correlation system - Part 1: Installation
2010-07-18/a>Manuel Humberto Santander PelaezNew metasploit GUI written in Java
2010-07-13/a>Jim ClausingVMware Studio Security Update
2010-07-13/a>Jim ClausingForensic challenge results
2010-07-07/a>Kevin ShorttFacebook, Facebook, What Do YOU See?
2010-07-04/a>Manuel Humberto Santander PelaezInteresting analysis of the PHP SplObjectStorage Vulnerability
2010-07-01/a>Bojan ZdrnjaDown the RogueAV and Blackhat SEO rabbit hole (part 2)
2010-06-29/a>donald smithInteresting idea to help prevent RogueAV from using SEO without being noticed:)
2010-06-28/a>Bojan ZdrnjaDown the RogueAV and Blackhat SEO rabbit hole
2010-06-27/a>Manuel Humberto Santander PelaezStudy of clickjacking vulerabilities on popular sites
2010-06-21/a>Adrien de BeaupreGoDaddy Scam/Phish/Spam
2010-06-16/a>Kevin ShorttMaltego 3
2010-06-15/a>Manuel Humberto Santander PelaeziPhone 4 Order Security Breach Exposes Private Information
2010-06-14/a>Manuel Humberto Santander PelaezNew way of social engineering on IRC
2010-06-14/a>Manuel Humberto Santander PelaezAnother way to get protection for application-level attacks
2010-06-14/a>Manuel Humberto Santander PelaezRogue facebook application acting like a worm
2010-06-11/a>Mark Hofmanollydbg your favourite debugger version 2.0 is released If you downloaded on 2 or 3 June you'll need the fixed version from June 4. 32 bit only at this stage. 64 bit is planned for 2.01
2010-06-10/a>Deborah HaleTop 5 Social Networking Media Risks
2010-06-06/a>Manuel Humberto Santander PelaezNice OS X exploit tutorial
2010-06-04/a>Rick WannerNew Honeynet Project Forensic Challenge
2010-06-02/a>Bojan ZdrnjaClickjacking attacks on Facebook's Like plugin
2010-05-25/a>donald smithFace book “joke” leads to firing.
2010-05-22/a>Rick WannerSANS 2010 Digital Forensics Summit - APT Based Forensic Challenge
2010-05-21/a>Rick Wanner2010 Digital Forensics and Incident Response Summit
2010-05-19/a>Jason LamEFF paper about browser tracking
2010-05-15/a>Deborah HaleGoogle Acknowledges Grabbing Personal Data
2010-05-07/a>Rob VandenBrinkSecurity Awareness – Many Audiences, Many Messages (Part 2)
2010-05-06/a>Rick WannerLearn about web app hacking and defense
2010-05-04/a>Rick WannerSIFT review in the ISSA Toolsmith
2010-05-02/a>Mari NicholsZbot Social Engineering
2010-04-29/a>Bojan ZdrnjaWho needs exploits when you have social engineering?
2010-04-21/a>Guy BruneauMcAfee DAT 5958 Update Issues
2010-04-21/a>Guy BruneauGoogle Chrome Security Update v4.1.249.1059 Released: http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html
2010-04-20/a>Raul SilesAre You Ready for a Transportation Collapse...?
2010-04-19/a>Daniel WesemannLinked into scams?
2010-04-14/a>Mark HofmanAnd let the patching games continue
2010-04-13/a>Adrien de BeaupreWeb App Testing Tools
2010-04-13/a>Johannes UllrichMore Legal Threat Malware E-Mail
2010-04-12/a>Adrien de BeaupreGet yer bogons out!
2010-04-10/a>Andre LudwigNew bug/exploit for javaws
2010-04-09/a>Mark HofmanOutage Update - isc.sans.org
2010-04-07/a>Johannes Ullrichour primary datacenter is currently experiencing a network outage
2010-04-06/a>Daniel WesemannApplication Logs
2010-04-04/a>Mari NicholsFinancial Management of Cyber Risk
2010-03-30/a>Marcus SachsZigbee Analysis Tools
2010-03-28/a>Rick WannerHoneynet Project: 2010 Forensic Challenge #3
2010-03-27/a>Guy BruneauCreate a Summary of IP Addresses from PCAP Files using Unix Tools
2010-03-24/a>Kyle HaugsnessWikipedia outage
2010-03-18/a>Bojan ZdrnjaDangers of copy&paste
2010-03-15/a>Adrien de BeaupreSpamassassin Milter Plugin Remote Root Attack
2010-03-10/a>Rob VandenBrinkWhat's My Firewall Telling Me? (Part 4)
2010-03-06/a>Tony CarothersIntegration and the Security of New Technologies
2010-03-05/a>Kyle HaugsnessWhat is your firewall log telling you - responses
2010-02-26/a>Rick WannerNew version of FireBug Firefox plug-in - http://getfirebug.com/
2010-02-23/a>Mark HofmanWhat is your firewall telling you and what is TCP249?
2010-02-22/a>Rob VandenBrinkNew Risks in Penetration Testing
2010-02-20/a>Mari NicholsIs "Green IT" Defeating Security?
2010-02-17/a>Rob VandenBrinkDefining Clouds - " A Cloud by any Other Name Would be a Lot Less Confusing"
2010-02-17/a>Rob VandenBrinkCisco Security Agent Security Updates: cisco-sa-20100217-csa
2010-02-15/a>Johannes UllrichVarious Olympics Related Dangerous Google Searches
2010-02-13/a>Lorna HutchesonNetwork Traffic Analysis in Reverse
2010-02-10/a>Johannes UllrichTwitpic, EXIF and GPS: I Know Where You Did it Last Summer
2010-02-06/a>Guy BruneauOracle WebLogic Server Security Alert
2010-02-03/a>Rob VandenBrinkSupport for Legacy Browsers
2010-02-02/a>Johannes UllrichTwitter Mass Password Reset due to Phishing
2010-02-01/a>Rob VandenBrinkNMAP 5.21 - Is UDP Protocol Specific Scanning Important? Why Should I Care?
2010-01-29/a>Johannes UllrichAnalyzing isc.sans.org weblogs, part 2, RFI attacks
2010-01-27/a>Raul SilesEuropean Union Security Challenge (Campus Party 2010)
2010-01-26/a>Rob VandenBrinkVMware vSphere Hardening Guide Draft posted for public review
2010-01-20/a>Johannes UllrichWeathering the Storm Part 1: An analysis of our SANS ISC weblogs http://appsecstreetfighter.com
2010-01-19/a>Jim ClausingForensic challenges
2010-01-14/a>Bojan ZdrnjaRogue AV exploiting Haiti earthquake
2010-01-14/a>Bojan ZdrnjaDRG (Dragon Research Group) Distro available for general release
2010-01-09/a>G. N. WhiteWhat's Up With All The Port Scanning Using TCP/6000 As A Source Port?
2010-01-06/a>Guy BruneauSecure USB Flaw Exposed
2009-12-30/a>Guy BruneauReady to use IDS Sensor with Sguil
2009-12-28/a>Johannes Ullrich8 Basic Rules to Implement Secure File Uploads http://jbu.me/48 (inspired by IIS ; bug)
2009-12-17/a>Daniel Wesemannoverlay.xul is back
2009-12-16/a>Rob VandenBrinkBeware the Attack of the Christmas Greeting Cards !
2009-12-09/a>Swa FrantzenOSSEC 2.3 released
2009-12-04/a>Daniel WesemannThe economics of security advice (MSFT research paper)
2009-11-29/a>Patrick Nolan A Cloudy Weekend
2009-11-24/a>Johannes UllrichThe ISC and DShield websites will be unavailable on Wednesday Nov 25th from 8-8:30 am EST.
2009-11-24/a>John BambenekBIND Security Advisory (DNSSEC only)
2009-11-13/a>Adrien de BeaupreTLS & SSLv3 renegotiation vulnerability explained
2009-11-13/a>Adrien de BeaupreFlash Origin Policy Attack
2009-11-09/a>Chris Carboni80's Flashback on Jailbroken iPhones
2009-11-08/a>Kevin ListonEven More Thoughts on Legacy Systems
2009-11-05/a>Swa FrantzenLegacy systems
2009-11-02/a>Rob VandenBrinkMicrosoft releases v1.02 of Enhanced Mitigation Evaluation Toolkit (EMET)
2009-10-26/a>Johannes UllrichWeb honeypot Update
2009-10-26/a>Johannes UllrichToday: ISC Login bugfix day. If you have issues logging in using OpenID, please email a copy of your OpenID URL to jullrich\at\sans.edu
2009-10-23/a>donald smithCyber Security Awareness Month - Day 23 port 179 TCP - Border Gateway Protocol
2009-10-19/a>Daniel WesemannScam Email
2009-10-17/a>Rick WannerMozilla disables Microsoft plug-ins?
2009-10-17/a>Rick WannerUnusual traffic from Loopback to Unused ARIN address
2009-10-16/a>Adrien de BeaupreDisable MS09-054 patch, or Firefox Plugin?
2009-10-15/a>Deborah HaleYet another round of Viral Spam
2009-10-13/a>Daniel WesemannAdobe Reader and Acrobat - Black Tuesday continues
2009-10-08/a>Johannes UllrichFirefox Plugin Collections
2009-10-02/a>Stephen HallNew SysInternal fun for the weekend
2009-09-27/a>Stephen HallUse Emerging Threats signatures? READ THIS!
2009-09-25/a>Deborah HaleMalware delivered over Google and Yahoo Ad's?
2009-09-17/a>Bojan ZdrnjaWhy is Rogue/Fake AV so successful?
2009-09-01/a>Guy BruneauGmail Down
2009-08-31/a>Pedro BuenoMicrosoft IIS 5/6 FTP 0Day released
2009-08-28/a>Adrien de Beaupreapache.org compromised
2009-08-26/a>Johannes UllrichCisco over-the-air-provisioning skyjacking exploit
2009-08-19/a>Daniel WesemannChecking your protection
2009-08-18/a>Deborah HaleDomain tcpdump.org unavailable
2009-08-18/a>Deborah HaleWebsite compromises - what's happening?
2009-08-13/a>Jim ClausingNew and updated cheat sheets
2009-08-03/a>Mark HofmanSwitch hardening on your network
2009-07-31/a>Deborah HaleGoogle Safe Browsing
2009-07-27/a>Raul SilesNew Hacker Challenge: Prison Break - Breaking, Entering & Decoding
2009-07-17/a>John BambenekCross-Platform, Cross-Browser DoS Vulnerability
2009-07-13/a>Adrien de BeaupreSecurity Update available for Wyse Device Manager
2009-07-11/a>Marcus SachsImageshack
2009-07-02/a>Daniel WesemannTime to update updating on PCs for 3rd party apps
2009-07-02/a>Daniel WesemannUnpatched Bloatware on new PCs
2009-06-26/a>Mark HofmanPHPMYADMIN scans
2009-06-24/a>Kyle HaugsnessTCP scanning increase for 4899
2009-06-21/a>Bojan ZdrnjaApache HTTP DoS tool mitigation
2009-06-16/a>John BambenekIran Internet Blackout: Using Twitter for Operational Intelligence
2009-06-16/a>John BambenekURL Shortening Service Cligs Hacked
2009-06-12/a>Adrien de BeaupreGoogle updates for Chrome
2009-06-12/a>Adrien de BeaupreGreen Dam
2009-06-11/a>Rick WannerMIR-ROR Motile Incident Response - Respond Objectively Remediate
2009-06-11/a>Rick WannerWHO Declares Flu A(H1N1) a Pandemic
2009-06-09/a>Swa FrantzenAdobe June Black Tuesday upgrades
2009-06-04/a>Raul SilesTargeted e-mail attacks asking to verify wire transfer details
2009-06-01/a>G. N. WhiteYet another "Digital Certificate" malware campaign
2009-05-28/a>Jim ClausingStego in TCP retransmissions
2009-05-24/a>Raul SilesFacebook phising using Belgium (.be) domains
2009-05-22/a>Mark HofmanPatching and Adobe
2009-05-22/a>Mark HofmanPatching and Apple - Java issue
2009-05-21/a>Adrien de BeaupreGumblar analysis and writeup
2009-05-19/a>Rick WannerNew Version of Mandiant Highlighter
2009-05-18/a>Rick WannerCisco SAFE Security Reference Guide Updated
2009-05-18/a>Rick WannerJSRedir-R/Gumblar badness
2009-05-12/a>Swa FrantzenApple patches and updates
2009-05-04/a>Tom ListonFacebook phishing malware
2009-05-01/a>Adrien de BeaupreIncident Management
2009-04-26/a>Johannes UllrichOdd DNS Resolution for Google via OpenDNS
2009-04-24/a>Pedro BuenoDid you check your conference goodies?
2009-04-21/a>Bojan ZdrnjaWeb application vulnerabilities
2009-04-20/a>Jason LamDigital Content on TV
2009-04-16/a>Adrien de BeaupreIncident Response vs. Incident Handling
2009-04-16/a>Adrien de BeaupreStrange Windows Event Log entry
2009-04-10/a>Stephen HallHosted javascript leading to .cn PDF malware
2009-04-09/a>Johannes UllrichConficker update with payload
2009-04-03/a>Johannes UllrichCyber Security Act of 2009
2009-04-02/a>Handlers A view from the CWG Trenches
2009-03-27/a>Mark HofmanThere is some SMiShing going on in the EU
2009-03-26/a>Mark HofmanWebhoneypot fun
2009-03-20/a>donald smithStealthier then a MBR rootkit, more powerful then ring 0 control, it’s the soon to be developed SMM root kit.
2009-03-11/a>Bojan ZdrnjaMassive ARP spoofing attacks on web sites
2009-03-10/a>Swa FrantzenBrowser plug-ins, transparent proxies and same origin policies
2009-03-01/a>Jim ClausingCool combination of tools
2009-02-25/a>Swa FrantzenTargeted link diversion attempts
2009-02-24/a>G. N. WhiteGmail Access Issues Early This AM
2009-02-20/a>Mark HofmanPhishing with a small twist
2009-02-05/a>Rick WannerMandiant Memoryze review, Hilighter, other Mandiant tools!
2009-02-01/a>Chris CarboniScanning for Trixbox vulnerabilities
2009-01-31/a>Swa FrantzenDNS DDoS - let's use a long term solution
2009-01-31/a>John BambenekGoogle Search Engine's Malware Detection Broken
2009-01-20/a>Adrien de BeaupreObamamania
2009-01-18/a>Maarten Van HorenbeeckTargeted social engineering
2009-01-12/a>William SaluskyWeb Application Firewalls (WAF) - Have you deployed WAF technology?
2009-01-11/a>Deborah HaleThe Frustration of Phishing Attacks
2009-01-09/a>Johannes UllrichSANS Log Management Survey
2009-01-07/a>William SaluskyBIND 9.x security patch - resolves potentially new DNS poisoning vector
2009-01-04/a>Rick WannerTwitter/Facebook Phishing Attempt
2008-12-28/a>Raul SilesLevel3 Outage?
2008-12-28/a>Raul SilesAT&T Wireless Outage
2008-12-12/a>Swa FrantzenBrowser Security Handbook
2008-12-02/a>Deborah HaleSonicwall License Manager Failure
2008-11-25/a>Andre LudwigTmobile G1 handsets having DNS problems?
2008-11-25/a>Andre LudwigThe beginnings of a collaborative approach to IDS
2008-11-25/a>Andre LudwigOS X Dns Changers part three
2008-11-12/a>John BambenekThoughts on Security Intelligence (McColo Corp alleged spam/malware host knocked offline)
2008-11-11/a>Swa FrantzenPhishing for Google adwords
2008-11-05/a>donald smithIf you missed President Elect Obamas speech have some malware instead
2008-11-02/a>Adrien de BeaupreDaylight saving time
2008-10-31/a>Rick WannerSprint-Cogent Peering Issue
2008-10-31/a>Rick WannerDay 31 - Legal Awareness
2008-10-30/a>Kevin ListonMaking Intelligence Actionable: Part 2
2008-10-29/a>Deborah HaleDay 29 - Should I Switch Software Vendors?
2008-10-29/a>Deborah HaleEnom Phishing - Caution Enom Registrars
2008-10-20/a>Raul SilesGoogle Webmaster Tools warning about hackable sites
2008-10-20/a>Johannes UllrichFraudulent ATM Reactivation Phone Calls.
2008-10-17/a>Patrick NolanDay 17 - Containing a DNS Hijacking
2008-10-10/a>Marcus SachsFake Microsoft Update Email
2008-10-08/a>Johannes UllrichDomaincontrol (GoDaddy) Nameservers DNS Poisoning
2008-10-07/a>Kyle HaugsnessCogent peering problems
2008-09-22/a>Maarten Van HorenbeeckData exfiltration and the use of anonymity providers
2008-09-20/a>Rick WannerNew (to me) nmap Features
2008-09-18/a>Bojan ZdrnjaMonitoring HTTP User-Agent fields
2008-09-16/a>donald smithDon't open that invoice.zip file its not from UPS
2008-09-03/a>donald smithNew bgp hijack isn't very new.
2008-08-19/a>Johannes UllrichA morning stroll through my web logs
2008-08-15/a>Jim ClausingOMFW 2008 reflections
2008-08-14/a>Mari NicholsSBC Outage?
2008-08-09/a>Deborah HaleCleveland Outage
2008-08-05/a>Daniel WesemannWatching those DNS logs
2008-08-02/a>Maarten Van HorenbeeckA little of that human touch
2008-07-29/a>Kyle HaugsnessGoogle SSL cert expired for POP/IMAP users
2008-07-18/a>Adrien de BeaupreExit process?
2008-07-11/a>Jim ClausingAnd you thought the DNS issue was an old one...
2008-07-09/a>Johannes UllrichUnpatched Word Vulnerability
2008-07-08/a>Johannes UllrichMulitple Vendors DNS Spoofing Vulnerability
2008-07-08/a>Swa FrantzenSecurity implications in HVAC equipment
2008-07-07/a>Pedro BuenoBad url classification
2008-06-24/a>Jason LamSQL Injection mitigation in ASP
2008-06-23/a>donald smithPreventing SQL injection
2008-06-18/a>Chris CarboniCisco Security Advisory
2008-06-17/a>Kyle HaugsnessWhy go high-tech?
2008-06-10/a>Swa FrantzenRansomware keybreaking
2008-06-09/a>Scott FendleySo Where Are Those OpenSSH Key-based Attacks?
2008-06-02/a>Jim ClausingEmergingthreats.net and ThePlanet
2008-06-01/a>Mark HofmanFree Yahoo email account! Sign me up, Ok well maybe not.
2008-06-01/a>Swa FrantzenThe Planet outage - what can we all learn from it?
2008-05-26/a>Marcus SachsPredictable Response
2008-05-22/a>Chris CarboniFrom the mailbag
2008-05-19/a>Maarten Van HorenbeeckText message and telephone aid scams
2008-05-19/a>Maarten Van HorenbeeckRoute filtering and its impact on the DNS fabric
2008-05-15/a>Bojan ZdrnjaINFOCon yellow: update your Debian generated keys/certs ASAP
2008-05-15/a>Bojan ZdrnjaDebian and Ubuntu users: fix your keys/certificates NOW
2008-04-24/a>Maarten Van HorenbeeckTargeted attacks using malicious PDF files
2008-04-23/a>Mari NicholsWhat's New, Old and Morphing?
2008-04-16/a>William StearnsPasser, a aassive machine and service sniffer
2008-04-14/a>John BambenekA Federal Subpoena or Just Some More Spam & Malware?
2008-04-11/a>John BambenekADSL Router / Cable Modem / Home Wireless AP Hardening in 5 Steps
2008-04-10/a>Deborah HaleSymantec Threatcon Level 2
2008-04-08/a>Swa FrantzenSymantec's Global Internet Security Threat Report
2008-04-07/a>John BambenekNetwork Solutions Technical Difficulties? Enom too
2008-04-06/a>Tony CarothersHappenings in the Northeast US
2008-04-04/a>Daniel WesemannTax day scams
2008-03-30/a>Mark HofmanMail Anyone?
2008-03-27/a>Maarten Van HorenbeeckGuarding the guardians: a story of PGP key ring theft
2008-03-25/a>Raul SilesNew Security Challenge - It Happened One Friday
2008-03-23/a>Johannes UllrichFinding hidden gems (easter eggs) in your logs (packet challenge!)
2008-03-12/a>Joel EslerAdobe security updates
2008-03-12/a>Joel EslerDon't use G-Archiver
2007-01-03/a>Toby KohlenbergVLC Media Player udp URL handler Format String Vulnerability
2006-12-12/a>Swa FrantzenOffline Microsoft Patching
2006-10-05/a>John BambenekThere are no more Passive Exploits
2006-10-02/a>Jim ClausingReader's tip of the day: ratios vs. raw counts
2006-09-19/a>Swa FrantzenYet another MSIE 0-day: VML
2006-09-18/a>Jim ClausingLog analysis follow up
2006-09-12/a>Swa FrantzenAdobe Flash player upgrade time
2006-09-09/a>Jim ClausingLog Analysis tips?
2006-09-09/a>Jim ClausingNew feature at isc.sans.org
2006-09-09/a>Jim ClausingA few preliminary log analysis thoughts
2006-08-31/a>Swa FrantzenMailbag grab