2025-02-20 | Guy Bruneau | Using ES|QL in Kibana to Queries DShield Honeypot Logs |
2024-03-10 | Guy Bruneau | What happens when you accidentally leak your AWS API keys? [Guest Diary] |
2024-02-03 | Guy Bruneau | DShield Sensor Log Collection with Elasticsearch |
2023-07-23 | Guy Bruneau | Install & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs |
2023-04-27 | Johannes Ullrich | SANS.edu Research Journal: Volume 3 |
2023-03-16 | Xavier Mertens | Simple Shellcode Dissection |
2023-01-21 | Guy Bruneau | DShield Sensor JSON Log to Elasticsearch |
2021-09-11 | Guy Bruneau | Shipping to Elasticsearch Microsoft DNS Logs |
2021-09-09 | Johannes Ullrich | Updates to Our Datafeeds/API |
2021-05-08 | Guy Bruneau | Who is Probing the Internet for Research Purposes? |
2021-02-13 | Guy Bruneau | Using Logstash to Parse IPtables Firewall Logs |
2020-12-19 | Guy Bruneau | Secure Communication using TLS in Elasticsearch |
2020-05-29 | Johannes Ullrich | The Impact of Researchers on Our Data |
2019-11-29 | Russ McRee | ISC Snapshot: Search with SauronEye |
2018-11-30 | Remco Verhoef | CoinMiners searching for hosts |
2018-11-14 | Brad Duncan | Day in the life of a researcher: Finding a wave of Trickbot malspam |
2017-05-18 | Xavier Mertens | My Little CVE Bot |
2015-11-22 | Guy Bruneau | OpenDNS Research Used to Predict Threat |
2015-11-04 | Johannes Ullrich | Internet Wide Scanners Wanted |
2015-08-16 | Guy Bruneau | Are you a "Hunter"? |
2015-07-21 | Didier Stevens | Searching Through the VirusTotal Database |
2010-02-15 | Johannes Ullrich | Various Olympics Related Dangerous Google Searches |
2010-01-08 | Rob VandenBrink | Microsoft OfficeOnline, Searching for Trust and Malware |