Date Author Title

LOCK ICON

2018-05-30Bojan ZdrnjaThe end of the lock icon

LOCK

2023-07-26/a>Xavier MertensSuspicious IP Addresses Avoided by Malware Samples
2022-07-17/a>Didier StevensPython: Files In Use By Another Process
2022-01-04/a>Xavier MertensA Simple Batch File That Blocks People
2021-05-21/a>Xavier MertensLocking Kernel32.dll As Anti-Debugging Technique
2020-08-18/a>Rick WannerISC Blocked
2020-07-23/a>Xavier MertensSimple Blocklisting with MISP & pfSense
2020-04-16/a>Johannes UllrichUsing AppLocker to Prevent Living off the Land Attacks
2019-09-19/a>Xavier MertensBlocklisting or Whitelisting in the Right Way
2018-12-26/a>Didier StevensBitcoin "Blocklists"
2018-11-13/a>Johannes UllrichNovember 2018 Microsoft Patch Tuesday
2018-11-12/a>Rick WannerUsing the Neutrino ip-blocklist API to test general badness of an IP
2018-06-19/a>Xavier MertensPowerShell: ScriptBlock Logging... Or Not?
2018-05-30/a>Bojan ZdrnjaThe end of the lock icon
2018-05-24/a>Xavier Mertens"Blocked" Does Not Mean "Forget It"
2018-02-25/a>Guy BruneauBlackhole Advertising Sites with Pi-hole
2017-09-20/a>Renato MarinhoOngoing Ykcol (Locky) campaign
2017-09-01/a>Brad DuncanMalspam pushing Locky ransomware tries HoeflerText notifications for Chrome and FireFox
2017-06-02/a>Xavier MertensPhishing Campaigns Follow Trends
2017-04-05/a>Xavier MertensWhitelists: The Holy Grail of Attackers
2016-03-06/a>Jim ClausingNovel method for slowing down Locky on Samba server using fail2ban
2016-02-20/a>Didier StevensLocky: JavaScript Deobfuscation
2016-01-09/a>Xavier MertensVirtual Bitlocker Containers
2015-04-30/a>Brad DuncanDalexis/CTB-Locker malspam campaign
2015-02-23/a>Richard PorterSubscribing to the DShield Top 20 on a Palo Alto Networks Firewall
2014-08-15/a>Tom WebbAppLocker Event Logs with OSSEC 2.8
2014-08-05/a>Johannes UllrichSynolocker: Why OFFLINE Backups are important
2014-06-02/a>John BambenekGameover Zeus and Cryptolocker Takedowns
2014-05-30/a>Johannes UllrichFake Australian Electric Bill Leads to Cryptolocker
2014-02-18/a>Johannes UllrichMore Details About "TheMoon" Linksys Worm
2014-01-04/a>Tom WebbMonitoring Windows Networks Using Syslog (Part One)
2013-11-02/a>Rick WannerProtecting Your Family's Computers
2013-10-22/a>John BambenekCryptolocker Update, Request for Info
2013-10-16/a>Adrien de BeaupreAccess denied and blockliss
2013-09-03/a>Rob VandenBrinkIs "Reputation Backscatter" a Thing?
2013-04-30/a>Russ McReeApache binary backdoor adds malicious redirect to Blackhole
2013-04-23/a>Russ McReeMicrosoft's Security Intelligence Report (SIRv14) released
2013-03-07/a>Guy BruneauApple Blocking Java Web plug-in
2012-09-01/a>Russ McReeBlackhole targeting Java vulnerability via fake Microsoft Services Agreement email phish
2012-06-26/a>Daniel WesemannRun, Forest! (Update)
2012-04-25/a>Daniel WesemannBlacole's shell code
2012-04-25/a>Daniel WesemannBlacole's obfuscated JavaScript
2011-12-06/a>Pedro BuenoThe RedRet connection...
2011-11-22/a>Pedro BuenoUpdates on ZeroAccess and BlackHole front...
2011-11-03/a>Richard PorterAn Apple, Inc. Sandbox to play in.
2011-05-30/a>Johannes UllrichLockheed Martin and RSA Tokens
2009-01-12/a>William SaluskyDownadup / Conficker - MS08-067 exploit and Windows domain account lockout
2008-05-28/a>Johannes UllrichReminder: Proper use of DShield data
2006-12-18/a>Toby KohlenbergORDB Shutting down

ICON

2021-04-19/a>Jan KoprivaHunting phishing websites with favicon hashes
2018-05-30/a>Bojan ZdrnjaThe end of the lock icon
2018-03-12/a>Xavier MertensPayload delivery via SMB
2016-01-01/a>Didier StevensFailure Is An Option
2014-04-26/a>Guy BruneauAndroid Users - Beware of Bitcoin Mining Malware
2006-09-30/a>Swa FrantzenYellow: WebViewFolderIcon setslice exploit spreading