Internet Storm Center
Sign In
Sign Up
Participate: Learn more about our honeypot network
https://isc.sans.edu/tools/honeypot/
Handler on Duty:
Xavier Mertens
Threat Level:
green
Date
Author
Title
2023-05-15
Jan Kopriva
Ongoing Facebook phishing campaign without a sender and (almost) without links
2023-05-01
Jan Kopriva
"Passive" analysis of a phishing attachment
2023-03-15
Jan Kopriva
IPFS phishing and the need for correctly set HTTP security headers
2023-02-19
Didier Stevens
"Unsupported 16-bit Application" or HTML?
2023-02-16
Jan Kopriva
HTML phishing attachment with browser-in-the-browser technique
2022-12-02
Brad Duncan
obama224 distribution Qakbot tries .vhd (virtual hard disk) images
2022-10-16
Didier Stevens
Video: Analysis of a Malicious HTML File (QBot)
2022-10-13
Didier Stevens
Analysis of a Malicious HTML File (QBot)
2022-07-13
Xavier Mertens
Using Referers to Detect Phishing Attacks
2022-02-11
Xavier Mertens
CinaRAT Delivered Through HTML ID Attributes
2021-10-03
Didier Stevens
Video: CVE-2021-40444 Maldocs: Extracting URLs
2021-09-19
Didier Stevens
Video: Simple Analysis Of A CVE-2021-40444 .docx Document
2020-06-15
Rick Wanner
HTML based Phishing Run
2018-09-13
Xavier Mertens
Malware Delivered Through MHT Files
2014-01-13
Johannes Ullrich
Special Webcast today: HTML5, Risky Business or Hidden Security Toolchest? https://www.sans.org/webcasts/html5-risky-business-hidden-security-tool-chest-mobile-web-app-authentication-97650
2011-12-22
Johannes Ullrich
Firefox 9 Security Fixes
Homepage
Diaries
Podcasts
Jobs
Data
TCP/UDP Port Activity
Port Trends
SSH/Telnet Scanning Activity
Weblogs
Threat Feeds Activity
Threat Feeds Map
Useful InfoSec Links
Presentations & Papers
Research Papers
API
Tools
DShield Sensor
DNS Looking Glass
Honeypot (RPi/AWS)
InfoSec Glossary
Contact Us
Contact Us
About Us
Handlers
Slack Channel
Mastodon
Twitter
Learn
about the Internet Storm Center
and our
volunteer InfoSec handlers