Date Author Title
2024-03-10Guy BruneauWhat happens when you accidentally leak your AWS API keys? [Guest Diary]
2024-03-07Jesse La Grew[Guest Diary] AWS Deployment Risks - Configuration and Credential File Targeting
2023-11-15Xavier MertensRedline Dropped Through MSIX Package
2023-10-29Guy BruneauSpam or Phishing? Looking for Credentials & Passwords
2023-08-04Xavier MertensAre Leaked Credentials Dumps Used by Attackers?
2022-10-04Johannes UllrichCredential Harvesting with Telegram API
2022-09-15Xavier MertensMalicious Word Document with a Frameset
2022-07-08Johannes UllrichISC Website Redesign
2022-03-10Xavier MertensCredentials Leaks on VirusTotal
2022-03-07Johannes UllrichNo Bitcoin - No Problem: Follow Up to Last Weeks Donation Scam
2022-03-04Johannes UllrichScam E-Mail Impersonating Red Cross
2022-01-20Xavier MertensRedLine Stealer Delivered Through FTP
2022-01-16Guy Bruneau10 Most Popular Targeted Ports in the Past 3 Weeks
2021-11-08Xavier Mertens(Ab)Using Security Tools & Controls for the Bad
2021-06-18Daniel WesemannOpen redirects ... and why Phishers love them
2021-05-29Guy BruneauSpear-phishing Email Targeting Outlook Mail Clients
2021-03-06Xavier MertensSpotting the Red Team on VirusTotal!
2020-11-18Xavier MertensWhen Security Controls Lead to Security Issues
2020-07-16John BambenekHunting for SigRed Exploitation
2020-07-15Johannes UllrichPATCH NOW - SIGRed - CVE-2020-1350 - Microsoft DNS Server Vulnerability
2020-04-27Xavier MertensPowershell Payload Stored in a PSCredential Object
2020-02-27Xavier MertensOffensive Tools Are For Blue Teams Too
2020-02-25Jan KoprivaQuick look at a couple of current online scam campaigns
2019-11-29Russ McReeISC Snapshot: Search with SauronEye
2019-11-09Guy BruneauFake Netflix Update Request by Text
2019-11-08Xavier MertensMicrosoft Apps Diverted from Their Main Use
2019-08-28Johannes Ullrich[Guest Diary] Open Redirect: A Small But Very Common Vulnerability
2019-08-21Russ McReeKAPE: Kroll Artifact Parser and Extractor
2019-07-16Russ McReeCommando VM: The Complete Mandiant Offensive VM
2019-04-05Russ McReeBeagle: Graph transforms for DFIR data & logs
2018-10-17Russ McReeRedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence
2018-03-08Xavier MertensCRIMEB4NK IRC Bot
2017-12-27Guy BruneauWhat are your Security Challenges for 2018?
2016-09-09Xavier MertensCollecting Users Credentials from Locked Devices
2016-06-29Xavier MertensPhishing Campaign with Blurred Images
2016-01-05Guy BruneauWhat are you Concerned the Most in 2016?
2015-05-23Guy BruneauBusiness Value in "Big Data"
2015-03-18Daniel WesemannPass the hash!
2015-01-31Guy BruneauBeware of Phishing and Spam Super Bowl Fans!
2014-11-24Richard PorterSomeone is using this? PoS: Compressor
2014-09-12Chris MohanAre credential dumps worth reviewing?
2014-07-03Johannes UllrichCredit Card Processing in 700 Words or Less
2014-06-13Richard PorterA welcomed response, PF Chang's
2013-12-19Rob VandenBrinkTarget US - Credit Card Data Breach
2013-09-23Rob VandenBrinkHow do you spell "PSK"?
2013-07-12Johannes UllrichDNS resolution is failing for Microsofts Teredo server (teredo.ipv6.microsoft.com)
2013-07-12Johannes UllrichMicrosoft Teredo Server "Sunset"
2013-03-09Guy BruneauIPv6 Focus Month: IPv6 Encapsulation - Protocol 41
2013-02-21Pedro BuenoNBC site redirecting to Exploit kit
2011-05-03Johannes UllrichAnalyzing Teredo with tshark and Wireshark
2011-01-03Johannes UllrichWhat Will Matter in 2011
2010-07-24Manuel Humberto Santander PelaezTransmiting logon information unsecured in the network
2010-06-15Manuel Humberto Santander PelaezMastercard delivering cards with OTP device included
2010-04-22John BambenekData Redaction: You're Doing it Wrong
2010-02-16Jim ClausingTeredo request for packets
2010-02-16Johannes UllrichTeredo "stray packet" analysis
2009-07-28Adrien de BeaupreYYAMCCBA
2009-05-18Rick WannerJSRedir-R/Gumblar badness