2025-04-15 | Xavier Mertens | Online Services Again Abused to Exfiltrate Data |
2025-03-12 | Guy Bruneau | File Hashes Analysis with Power BI from Data Stored in DShield SIEM |
2024-04-23 | Johannes Ullrich | Struts "devmode": Still a problem ten years later? |
2022-11-04 | Xavier Mertens | Remcos Downloader with Unicode Obfuscation |
2022-09-25 | Didier Stevens | Downloading Samples From Takendown Domains |
2022-03-24 | Xavier Mertens | Malware Delivered Through Free Sharing Tool |
2022-02-11 | Xavier Mertens | CinaRAT Delivered Through HTML ID Attributes |
2021-11-19 | Xavier Mertens | Downloader Disguised as Excel Add-In (XLL) |
2021-11-10 | Xavier Mertens | Shadow IT Makes People More Vulnerable to Phishing |
2021-01-22 | Xavier Mertens | Another File Extension to Block in your MTA: .jnlp |
2019-12-05 | Jan Kopriva | E-mail from Agent Tesla |
2019-11-08 | Xavier Mertens | Microsoft Apps Diverted from Their Main Use |
2019-07-02 | Xavier Mertens | Malicious Script With Multiple Payloads |
2018-01-26 | Xavier Mertens | Investigating Microsoft BITS Activity |
2017-12-14 | Russ McRee | Security Planner: Improve your online safety |
2016-12-27 | Guy Bruneau | Using daemonlogger as a Software Tap |
2014-08-17 | Rick Wanner | Part 1: Is your home network unwittingly contributing to NTP DDOS attacks? |
2014-02-05 | Johannes Ullrich | To Merrillville or Sochi: How Dangerous is it to travel? |
2013-07-10 | Johannes Ullrich | .NL Registrar Compromisse |
2013-06-19 | Kevin Liston | WinLink Check-In |
2012-11-26 | John Bambenek | Online Shopping for the Holidays? Tips, News and a Fair Warning |
2012-03-01 | Bojan Zdrnja | Monitoring Remote Desktop Services logs ... or not? |
2011-03-11 | Guy Bruneau | Snort IDS Sensor with Sguil Framework ISO |
2010-10-04 | Mark Hofman | Online Voting |
2010-03-24 | Johannes Ullrich | ".sys" Directories Delivering Driveby Downloads |
2010-01-08 | Rob VandenBrink | Microsoft OfficeOnline, Searching for Trust and Malware |