SPAM HABITAT FOR HUMANITY |
2010-06-02 | Rob VandenBrink | SPAM pretending to be from Habitat for Humanity |
SPAM |
2025-03-20/a> | Johannes Ullrich | Some new Data Feeds, and a little "incident". |
2024-12-31/a> | Xavier Mertens | No Holiday Season for Attackers |
2024-05-27/a> | Jan Kopriva | Files with TXZ extension used as malspam attachments |
2024-02-05/a> | Jesse La Grew | Public Information and Email Spam |
2024-01-03/a> | Jan Kopriva | Interesting large and small malspam attachments from 2023 |
2023-11-08/a> | Xavier Mertens | Example of Phishing Campaign Project File |
2023-10-29/a> | Guy Bruneau | Spam or Phishing? Looking for Credentials & Passwords |
2023-06-29/a> | Brad Duncan | GuLoader- or DBatLoader/ModiLoader-style infection for Remcos RAT |
2023-05-30/a> | Brad Duncan | Malspam pushes ModiLoader (DBatLoader) infection for Remcos RAT |
2023-04-12/a> | Brad Duncan | Recent IcedID (Bokbot) activity |
2023-01-19/a> | Jan Kopriva | SPF and DMARC use on 100k most popular domains |
2023-01-05/a> | Brad Duncan | More Brazil malspam pushing Astaroth (Guildma) in January 2023 |
2022-12-02/a> | Brad Duncan | obama224 distribution Qakbot tries .vhd (virtual hard disk) images |
2022-11-19/a> | Guy Bruneau | McAfee Fake Antivirus Phishing Campaign is Back! |
2022-10-15/a> | Guy Bruneau | Malware - Covid Vaccination Supplier Declaration |
2022-08-19/a> | Brad Duncan | Brazil malspam pushes Astaroth (Guildma) malware |
2022-07-07/a> | Brad Duncan | Emotet infection with Cobalt Strike |
2022-06-17/a> | Brad Duncan | Malspam pushes Matanbuchus malware, leads to Cobalt Strike |
2022-04-06/a> | Brad Duncan | Windows MetaStealer Malware |
2022-03-16/a> | Brad Duncan | Qakbot infection with Cobalt Strike and VNC activity |
2022-02-09/a> | Brad Duncan | Example of Cobalt Strike from Emotet infection |
2022-01-25/a> | Brad Duncan | Emotet Stops Using 0.0.0.0 in Spambot Traffic |
2021-12-31/a> | Jan Kopriva | Do you want your Agent Tesla in the 300 MB or 8 kB package? |
2021-12-22/a> | Brad Duncan | December 2021 Forensic Contest: Answers and Analysis |
2021-12-20/a> | Jan Kopriva | PowerPoint attachments, Agent Tesla and code reuse in malware |
2021-11-16/a> | Brad Duncan | Emotet Returns |
2021-10-22/a> | Brad Duncan | October 2021 Contest: Forensic Challenge |
2021-09-17/a> | Xavier Mertens | Malicious Calendar Subscriptions Are Back? |
2021-09-02/a> | Xavier Mertens | Attackers Will Always Abuse Major Events in our Lifes |
2021-08-13/a> | Brad Duncan | Example of Danabot distributed through malspam |
2021-07-26/a> | Didier Stevens | Failed Malspam: Recovering The Password |
2021-07-14/a> | Jan Kopriva | One way to fail at malspam - give recipients the wrong password for an encrypted attachment |
2021-05-29/a> | Guy Bruneau | Spear-phishing Email Targeting Outlook Mail Clients |
2021-04-16/a> | Rick Wanner | Querying Spamhaus for IP reputation |
2021-04-06/a> | Jan Kopriva | Malspam with Lokibot vs. Outlook and RFCs |
2021-03-05/a> | Xavier Mertens | Spam Farm Spotted in the Wild |
2021-02-24/a> | Brad Duncan | Malspam pushes GuLoader for Remcos RAT |
2021-02-17/a> | Brad Duncan | Malspam pushing Trickbot gtag rob13 |
2021-01-20/a> | Brad Duncan | Qakbot activity resumes after holiday break |
2021-01-13/a> | Brad Duncan | Hancitor activity resumes after a hoilday break |
2020-12-09/a> | Brad Duncan | Recent Qakbot (Qbot) activity |
2020-10-31/a> | Didier Stevens | More File Selection Gaffes |
2020-10-14/a> | Brad Duncan | More TA551 (Shathak) Word docs push IcedID (Bokbot) |
2020-08-07/a> | Brad Duncan | TA551 (Shathak) Word docs push IcedID (Bokbot) |
2020-07-10/a> | Brad Duncan | Excel spreasheet macro kicks off Formbook infection |
2020-06-16/a> | Johannes Ullrich | Odd "Protest" Spam (Scam?) Targeting Atlanta Police Foundation |
2020-06-10/a> | Brad Duncan | Job application-themed malspam pushes ZLoader |
2020-05-13/a> | Brad Duncan | Malspam with links to zip archives pushes Dridex malware |
2020-04-08/a> | Brad Duncan | German malspam pushes ZLoader malware |
2020-04-01/a> | Brad Duncan | Qakbot malspam sent from an infected Windows host |
2020-03-25/a> | Brad Duncan | Recent Dridex activity |
2020-03-05/a> | Xavier Mertens | Will You Put Your Password in a Survey? |
2020-02-12/a> | Brad Duncan | Malpsam pushes Ursnif through Italian language Word docs |
2020-02-03/a> | Jan Kopriva | Analysis of a triple-encrypted AZORult downloader |
2020-01-22/a> | Brad Duncan | German language malspam pushes Ursnif |
2020-01-16/a> | Jan Kopriva | Picks of 2019 malware - the large, the small and the one full of null bytes |
2019-12-18/a> | Brad Duncan | Emotet infection with spambot activity |
2019-12-11/a> | Brad Duncan | German language malspam pushes yet another wave of Trickbot |
2019-12-03/a> | Brad Duncan | Ursnif infection with Dridex |
2019-11-20/a> | Brad Duncan | Hancitor infection with Pony, Evil Pony, Ursnif, and Cobalt Strike |
2019-11-13/a> | Brad Duncan | An example of malspam pushing Lokibot malware, November 2019 |
2019-11-09/a> | Guy Bruneau | Fake Netflix Update Request by Text |
2019-11-06/a> | Brad Duncan | More malspam pushing Formbook |
2019-10-02/a> | Brad Duncan | A recent example of Emotet malspam |
2019-10-01/a> | Johannes Ullrich | A Quick Look at Some Current Comment Spam |
2019-09-25/a> | Brad Duncan | Malspam pushing Quasar RAT |
2019-09-18/a> | Brad Duncan | Emotet malspam is back |
2019-06-18/a> | Brad Duncan | Malspam with password-protected Word docs pushing Dridex |
2019-04-07/a> | Guy Bruneau | Fake Office 365 Payment Information Update |
2019-03-21/a> | Xavier Mertens | New Wave of Extortion Emails: Central Intelligence Agency Case |
2019-03-13/a> | Brad Duncan | Malspam pushes Emotet with Qakbot as the follow-up malware |
2019-03-06/a> | Brad Duncan | Malspam with password-protected word docs still pushing IcedID (Bokbot) with Trickbot |
2019-02-20/a> | Brad Duncan | More Russian language malspam pushing Shade (Troldesh) ransomware |
2019-02-06/a> | Brad Duncan | Hancitor malspam and infection traffic from Tuesday 2019-02-05 |
2019-01-24/a> | Brad Duncan | Malspam with Word docs uses macro to run Powershell script and steal system data |
2019-01-16/a> | Brad Duncan | Emotet infections and follow-up malware |
2019-01-10/a> | Brad Duncan | Heartbreaking Emails: "Love You" Malspam |
2018-12-18/a> | Brad Duncan | Malspam links to password-protected Word docs that push IcedID (Bokbot) |
2018-12-05/a> | Brad Duncan | Campaign evolution: Hancitor changes its Word macros |
2018-12-04/a> | Brad Duncan | Malspam pushing Lokibot malware |
2018-11-29/a> | Brad Duncan | Russian language malspam pushing Shade (Troldesh) ransomware |
2018-11-15/a> | Brad Duncan | Emotet infection with IcedID banking Trojan |
2018-11-14/a> | Brad Duncan | Day in the life of a researcher: Finding a wave of Trickbot malspam |
2018-10-31/a> | Brad Duncan | More malspam using password-protected Word docs |
2018-10-30/a> | Brad Duncan | Campaign evolution: Hancitor malspam starts pushing Ursnif this week |
2018-10-05/a> | Jim Clausing | A strange spam |
2018-09-26/a> | Brad Duncan | One Emotet infection leads to three follow-up malware infections |
2018-08-15/a> | Brad Duncan | More malspam pushing password-protected Word docs for AZORult and Hermes Ransomware |
2018-08-02/a> | Brad Duncan | DHL-themed malspam reveals embedded malware in animated gif |
2018-07-27/a> | Brad Duncan | Malspam with password-protected Word docs pushes Hermes ransomware |
2018-07-24/a> | Brad Duncan | Recent Emotet activity |
2018-06-18/a> | Xavier Mertens | Malicious JavaScript Targeting Mobile Browsers |
2018-06-13/a> | Xavier Mertens | A Bunch of Compromized Wordpress Sites |
2018-03-02/a> | Xavier Mertens | Common Patterns Used in Phishing Campaigns Files |
2018-02-01/a> | Xavier Mertens | Adaptive Phishing Kit |
2017-12-18/a> | Didier Stevens | Phish or scam? - Part 2 |
2017-12-17/a> | Didier Stevens | Phish or scam? - Part 1 |
2017-11-30/a> | Brad Duncan | More Malspam pushing Emotet malware |
2017-10-19/a> | Brad Duncan | HSBC-themed malspam uses ISO attachments to push Loki Bot malware |
2017-10-17/a> | Brad Duncan | Hancitor malspam uses DDE attack |
2017-09-18/a> | Xavier Mertens | Getting some intelligence from malspam |
2017-09-01/a> | Brad Duncan | Malspam pushing Locky ransomware tries HoeflerText notifications for Chrome and FireFox |
2017-08-14/a> | Didier Stevens | Sometimes it's just SPAM |
2017-07-26/a> | Brad Duncan | Malspam pushing Emotet malware |
2017-07-14/a> | Brad Duncan | NemucodAES and the malspam that distributes it |
2017-06-28/a> | Brad Duncan | Catching up with Blank Slate: a malspam campaign still going strong |
2017-05-24/a> | Brad Duncan | Jaff ransomware gets a makeover |
2017-04-11/a> | Brad Duncan | Dridex malspam seen on Monday 2017-04-10 |
2017-03-28/a> | Xavier Mertens | Logical & Physical Security Correlation |
2017-02-10/a> | Brad Duncan | Hancitor/Pony malspam |
2016-10-25/a> | Xavier Mertens | Another Day, Another Spam... |
2016-10-19/a> | Xavier Mertens | Spam Delivered via .ICS Files |
2016-06-20/a> | Xavier Mertens | Ongoing Spam Campaign Related to Swift |
2016-05-12/a> | Xavier Mertens | Another Day, Another Wave of Phishing Emails |
2015-12-06/a> | Mark Hofman | Malware SPAM a new run has started. |
2015-09-01/a> | Daniel Wesemann | Gift card from Marriott? |
2015-06-22/a> | Johannes Ullrich | SMTP Brute Forcing |
2015-04-09/a> | Brad Duncan | An example of the malicious emails sometimes sent to the ISC handler addresses |
2015-03-23/a> | Rick Wanner | Interesting Home Depot Spam |
2015-01-31/a> | Guy Bruneau | Beware of Phishing and Spam Super Bowl Fans! |
2014-09-17/a> | Daniel Wesemann | Your online background check is now public! |
2014-08-05/a> | Johannes Ullrich | Legal Threat Spam: Sometimes it Gets Personal |
2014-06-17/a> | Rob VandenBrink | Canada's Anti-Spam Legislation (CASL) 2014 |
2014-06-08/a> | Guy Bruneau | efax Spam Containing Malware |
2014-04-05/a> | Jim Clausing | Those strange e-mails with URLs in them can lead to Android malware |
2014-03-22/a> | Guy Bruneau | How the Compromise of a User Account Lead to a Spam Incident |
2014-02-21/a> | Johannes Ullrich | UPS Malware Spam Using Fake SPF Headers |
2014-01-24/a> | Johannes Ullrich | How to send mass e-mail the right way |
2013-12-24/a> | Daniel Wesemann | Mr Jones wants you to appear in court! |
2013-10-17/a> | Adrien de Beaupre | New spamming technique - onmicrosoft.com |
2013-09-30/a> | Adrien de Beaupre | Twitter DM spam/malware |
2013-09-03/a> | Rob VandenBrink | Is "Reputation Backscatter" a Thing? |
2013-07-18/a> | Chris Mohan | Blog Spam - annoying junk or a source of intelligence? |
2013-03-28/a> | John Bambenek | Where Were You During the Great DDoS Cybergeddon of 2013? |
2013-03-26/a> | Daniel Wesemann | How your Webhosting Account is Getting Abused |
2013-03-18/a> | Kevin Shortt | Spamhaus DDOS |
2013-02-08/a> | Kevin Shortt | Is it Spam or Is it Malware? |
2012-12-06/a> | Daniel Wesemann | Rich Quick Make Money! |
2012-10-10/a> | Kevin Shortt | Facebook Scam Spam |
2012-09-09/a> | Guy Bruneau | Phishing/Spam Pretending to be from BBB |
2012-08-22/a> | Adrien de Beaupre | Phishing/spam via SMS |
2012-03-21/a> | Johannes Ullrich | Virus Bulletin Spam Filter Test |
2012-02-17/a> | Mark Hofman | Intersting Facebook SPAM |
2011-11-28/a> | Rob VandenBrink | It's Cyber Monday - Click Here! |
2011-11-16/a> | Adrien de Beaupre | GET BACK TO ME ASAP |
2011-10-20/a> | Johannes Ullrich | Evil Printers Sending Mail |
2011-08-31/a> | Johannes Ullrich | Phishing e-mail to custom e-mail addresses |
2011-06-30/a> | Guy Bruneau | Symantec Report - Spam Surge against Social Networks |
2011-06-27/a> | Kevin Shortt | Phishy Spam |
2011-06-08/a> | Johannes Ullrich | Spam from compromised Hotmail accounts |
2011-03-29/a> | Daniel Wesemann | Requesting deletion of "free" email and chat accounts |
2011-01-11/a> | Kevin Shortt | Spam Cannons on Holiday |
2010-12-03/a> | Mark Hofman | T'is the season to be SPAMMY, trallalalaa la la la laaa |
2010-11-22/a> | Lenny Zeltser | Adobe Acrobat Spam Going Strong - More to Come? |
2010-09-18/a> | Rick Wanner | I'm fine, thanks! |
2010-08-29/a> | Swa Frantzen | Abandoned free email accounts |
2010-07-15/a> | Deborah Hale | Be on the Alert |
2010-07-03/a> | Deborah Hale | Delivery Status Failure Notice That Packed A Wallop |
2010-06-21/a> | Adrien de Beaupre | GoDaddy Scam/Phish/Spam |
2010-06-10/a> | Deborah Hale | Another Morning of Fun |
2010-06-02/a> | Rob VandenBrink | SPAM pretending to be from Habitat for Humanity |
2010-04-22/a> | Deborah Hale | Don't Be Fooled by Twitter Spam in Your Inbox |
2010-04-13/a> | Johannes Ullrich | More Legal Threat Malware E-Mail |
2010-03-17/a> | Deborah Hale | Spam was killing us! Here is what we did to help! |
2010-03-15/a> | Adrien de Beaupre | Spamassassin Milter Plugin Remote Root Attack |
2010-02-03/a> | Johannes Ullrich | Anatomy of a Form Spam Campaign (in progress against isc.sans.org right now) https://blogs.sans.org/appsecstreetfighter/ |
2009-12-02/a> | Rob VandenBrink | SPAM and Malware taking advantage of H1N1 concerns |
2009-11-03/a> | Andre Ludwig | SURBL now posting abuse statistics for TLD's |
2009-10-12/a> | Mark Hofman | Some interesting SSL SPAM |
2009-10-08/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 8 - Port 25 - SMTP |
2009-10-07/a> | Joel Esler | Spam rate increase is seen |
2009-09-10/a> | Johannes Ullrich | Healthcare Spam |
2009-07-28/a> | Adrien de Beaupre | Twitter spam/phish |
2009-06-25/a> | Mark Hofman | Michael J & Farrah F death SPAM |
2009-06-20/a> | Scott Fendley | Situational Awareness: Spam Crisis and China |
2009-04-06/a> | Adrien de Beaupre | Abuse addresses |
2009-01-25/a> | Rick Wanner | Twam?? Twammers? |
2009-01-16/a> | G. N. White | ...and all that SPAM - Evolution of Spam Bots in 2009 |
2008-09-09/a> | Swa Frantzen | The complaint that's an attack |
2008-08-13/a> | Adrien de Beaupre | CNN switched to MSNBC |
2008-08-10/a> | Stephen Hall | Fake IE 7 update spam doing the rounds |
2008-08-06/a> | Bojan Zdrnja | When spammers use your own e-mails |
2008-08-05/a> | Daniel Wesemann | The news update you never asked for |
2008-05-02/a> | Adrien de Beaupre | Hi, remember me?... |
2008-04-22/a> | donald smith | Spam to your calendar via Google agenda? |
2008-03-26/a> | Raul Siles | ORDB.org blocklisting all IP addresses |
2006-10-08/a> | Swa Frantzen | Spam Backscatter |
HABITAT |
2010-06-02/a> | Rob VandenBrink | SPAM pretending to be from Habitat for Humanity |
FOR |
2025-01-06/a> | Xavier Mertens | Make Malware Happy |
2024-05-27/a> | Jan Kopriva | Files with TXZ extension used as malspam attachments |
2024-05-15/a> | Rob VandenBrink | Got MFA? If not, Now is the Time! |
2024-05-08/a> | Xavier Mertens | Analyzing Synology Disks on Linux |
2024-03-29/a> | Xavier Mertens | Quick Forensics Analysis of Apache logs |
2024-03-19/a> | Johannes Ullrich | Attacker Hunting Firewalls |
2024-02-28/a> | Johannes Ullrich | Exploit Attempts for Unknown Password Reset Vulnerability |
2023-12-13/a> | Guy Bruneau | T-shooting Terraform for DShield Honeypot in Azure [Guest Diary] |
2023-12-06/a> | Guy Bruneau | Revealing the Hidden Risks of QR Codes [Guest Diary] |
2023-07-12/a> | Brad Duncan | Loader activity for Formbook "QM18" |
2023-06-17/a> | Brad Duncan | Formbook from Possible ModiLoader (DBatLoader) |
2023-01-26/a> | Tom Webb | Live Linux IR with UAC |
2023-01-02/a> | Xavier Mertens | NetworkMiner 2.8 Released |
2022-10-22/a> | Didier Stevens | rtfdump's Find Option |
2022-10-07/a> | Xavier Mertens | Critical Fortinet Vulnerability Ahead |
2022-06-15/a> | Johannes Ullrich | Terraforming Honeypots. Installing DShield Sensors in the Cloud |
2022-03-23/a> | Brad Duncan | Arkei Variants: From Vidar to Mars Stealer |
2021-12-22/a> | Brad Duncan | December 2021 Forensic Contest: Answers and Analysis |
2021-12-16/a> | Brad Duncan | How the "Contact Forms" campaign tricks people |
2021-12-08/a> | Brad Duncan | December 2021 Forensic Challenge |
2021-11-19/a> | Xavier Mertens | Downloader Disguised as Excel Add-In (XLL) |
2021-11-04/a> | Tom Webb | Xmount for Disk Images |
2021-10-31/a> | Didier Stevens | Video: Phishing ZIP With Malformed Filename |
2021-10-24/a> | Didier Stevens | Phishing ZIP With Malformed Filename |
2021-10-22/a> | Brad Duncan | October 2021 Contest: Forensic Challenge |
2021-10-14/a> | Xavier Mertens | Port-Forwarding with Windows for the Win |
2021-10-13/a> | Johannes Ullrich | Please fix your E-Mail Brute forcing tool! |
2021-06-30/a> | Brad Duncan | June 2021 Forensic Contest: Answers and Analysis |
2021-06-18/a> | Daniel Wesemann | Network Forensics on Azure VMs (Part #2) |
2021-06-17/a> | Daniel Wesemann | Network Forensics on Azure VMs (Part #1) |
2021-06-12/a> | Guy Bruneau | Fortinet Targeted for Unpatched SSL VPN Discovery Activity |
2021-05-19/a> | Brad Duncan | May 2021 Forensic Contest: Answers and Analysis |
2021-05-07/a> | Daniel Wesemann | Exposed Azure Storage Containers |
2021-05-05/a> | Brad Duncan | May 2021 Forensic Contest |
2021-04-01/a> | Brad Duncan | April 2021 Forensic Quiz |
2021-02-25/a> | Daniel Wesemann | Forensicating Azure VMs |
2020-12-29/a> | Jan Kopriva | Want to know what's in a folder you don't have a permission to access? Try asking your AV solution... |
2020-12-16/a> | Daniel Wesemann | DNS Logs in Public Clouds |
2020-11-19/a> | Xavier Mertens | PowerShell Dropper Delivering Formbook |
2020-08-20/a> | Rob VandenBrink | Office 365 Mail Forwarding Rules (and other Mail Rules too) |
2020-07-10/a> | Brad Duncan | Excel spreasheet macro kicks off Formbook infection |
2020-06-16/a> | Xavier Mertens | Sextortion to The Next Level |
2020-04-26/a> | Didier Stevens | Video: Malformed .docm File |
2020-03-15/a> | Guy Bruneau | VPN Access and Activity Monitoring |
2019-11-06/a> | Brad Duncan | More malspam pushing Formbook |
2019-10-25/a> | Rob VandenBrink | More on DNS Archeology (with PowerShell) |
2019-08-21/a> | Russ McRee | KAPE: Kroll Artifact Parser and Extractor |
2019-07-10/a> | Rob VandenBrink | Dumping File Contents in Hex (in PowerShell) |
2019-07-05/a> | Didier Stevens | A "Stream O" Maldoc |
2019-07-01/a> | Didier Stevens | Maldoc: Payloads in User Forms |
2018-08-23/a> | Xavier Mertens | Simple Phishing Through formcrafts.com |
2018-01-26/a> | Xavier Mertens | Investigating Microsoft BITS Activity |
2018-01-09/a> | Jim Clausing | Are you watching for brute force attacks on IPv6? |
2017-10-03/a> | Brad Duncan | Malspam pushing Formbook info stealer |
2017-10-02/a> | Xavier Mertens | Investigating Security Incidents with Passive DNS |
2017-09-28/a> | Xavier Mertens | The easy way to analyze huge amounts of PCAP data |
2017-09-24/a> | Jim Clausing | Forensic use of mount --bind |
2017-09-19/a> | Jim Clausing | New tool: mac-robber.py |
2017-08-07/a> | Xavier Mertens | Increase of phpMyAdmin scans |
2017-07-09/a> | Russ McRee | Adversary hunting with SOF-ELK |
2017-04-26/a> | Johannes Ullrich | If there are some unexploited MSSQL Servers With Weak Passwords Left: They got you now (again) |
2017-01-12/a> | Mark Baggett | System Resource Utilization Monitor |
2016-10-31/a> | Russ McRee | SEC505 DFIR capture script: snapshot.ps1 |
2016-08-11/a> | Pasquale Stirparo | Looking for the insider: Forensic Artifacts on iOS Messaging App |
2016-06-01/a> | Xavier Mertens | Docker Containers Logging |
2016-05-22/a> | Pasquale Stirparo | The strange case of WinZip MRU Registry key |
2016-03-28/a> | Xavier Mertens | Improving Bash Forensics Capabilities |
2016-03-11/a> | Jim Clausing | Forensicating Docker, Part 1 |
2016-02-18/a> | Xavier Mertens | Hunting for Executable Code in Windows Environments |
2016-01-21/a> | Jim Clausing | Scanning for Fortinet ssh backdoor |
2016-01-06/a> | Russ McRee | toolsmith #112: Red vs Blue - PowerSploit vs PowerForensics |
2015-06-23/a> | Kevin Shortt | XOR DDOS Mitigation and Analysis |
2015-06-22/a> | Johannes Ullrich | SMTP Brute Forcing |
2015-04-24/a> | Basil Alawi S.Taher | Fileless Malware |
2015-04-17/a> | Didier Stevens | Memory Forensics Of Network Devices |
2015-03-18/a> | Daniel Wesemann | New SANS memory forensics poster |
2015-02-03/a> | Johannes Ullrich | Another Network Forensic Tool for the Toolbox - Dshell |
2014-09-07/a> | Johannes Ullrich | Odd Persistent Password Bruteforcing |
2014-08-29/a> | Johannes Ullrich | False Positive or Not? Difficult to Analyze Javascript |
2014-08-10/a> | Basil Alawi S.Taher | Incident Response with Triage-ir |
2014-08-09/a> | Adrien de Beaupre | Complete application ownage via Multi-POST XSRF |
2014-07-23/a> | Johannes Ullrich | New Feature: "Live" SSH Brute Force Logs and New Kippo Client |
2014-07-22/a> | Daniel Wesemann | WordPress brute force attack via wp.getUsersBlogs |
2014-06-22/a> | Russ McRee | OfficeMalScanner helps identify the source of a compromise |
2014-06-03/a> | Basil Alawi S.Taher | An Introduction to RSA Netwitness Investigator |
2014-05-27/a> | Kevin Shortt | Avast forums hacked |
2014-05-18/a> | Russ McRee | sed and awk will always rock |
2014-03-11/a> | Basil Alawi S.Taher | Introduction to Memory Analysis with Mandiant Redline |
2014-03-07/a> | Tom Webb | Linux Memory Dump with Rekall |
2014-02-09/a> | Basil Alawi S.Taher | Mandiant Highlighter 2 |
2014-01-10/a> | Basil Alawi S.Taher | Windows Autorun-3 |
2013-12-12/a> | Basil Alawi S.Taher | Acquiring Memory Images with Dumpit |
2013-12-02/a> | Richard Porter | Reports of higher than normal SSH Attacks |
2013-11-21/a> | Mark Baggett | "In the end it is all PEEKS and POKES." |
2013-11-20/a> | Mark Baggett | Searching live memory on a running machine with winpmem |
2013-11-19/a> | Mark Baggett | Winpmem - Mild mannered memory aquisition tool?? |
2013-10-02/a> | John Bambenek | Obamacare related domain registration spike, Government shutdown domain registration beginning |
2013-08-26/a> | Alex Stanford | Stop, Drop and File Carve |
2013-08-14/a> | Johannes Ullrich | Imaging LUKS Encrypted Drives |
2013-07-31/a> | Johannes Ullrich | POP3 Server Brute Forcing Attempts Using Polycom Credentials |
2013-07-21/a> | Guy Bruneau | Ubuntu Forums Security Breach |
2013-07-20/a> | Manuel Humberto Santander Pelaez | Do you have rogue Internet gateways in your network? Check it with nmap |
2013-07-12/a> | Rob VandenBrink | Hmm - where did I save those files? |
2013-06-23/a> | Kevin Liston | Is SSH no more secure than telnet? |
2013-05-23/a> | Adrien de Beaupre | MoVP II |
2013-04-25/a> | Adam Swanger | SANS 2013 Forensics Survey - https://www.surveymonkey.com/s/2013SANSForensicsSurvey |
2013-02-17/a> | Guy Bruneau | HP ArcSight Connector Appliance and Logger Vulnerabilities |
2012-12-16/a> | Tony Carothers | SSH Brute Force on Non-Standard Ports |
2012-11-02/a> | Daniel Wesemann | The shortcomings of anti-virus software |
2012-10-11/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 11 - Vendor Agnostic Standards (Center for Internet Security) |
2012-09-14/a> | Lenny Zeltser | Analyzing Malicious RTF Files Using OfficeMalScanner's RTFScan |
2012-06-04/a> | Lenny Zeltser | Decoding Common XOR Obfuscation in Malicious Code |
2012-05-22/a> | Johannes Ullrich | nmap 6 released |
2012-01-03/a> | Rick Wanner | Analysis of the Stratfor Password List |
2011-12-25/a> | Deborah Hale | Another Company Falls Victim |
2011-12-04/a> | Guy Bruneau | SSH Password Brute Forcing may be on the Rise |
2011-11-06/a> | Tom Liston | New, odd SSH brute force behavior |
2011-09-29/a> | Daniel Wesemann | The SSD dilemma |
2011-08-05/a> | Johannes Ullrich | Forensics: SIFT Kit 2.1 now available for download http://computer-forensics.sans.org/community/downloads |
2011-08-02/a> | Mark Hofman | SSH Brute Force attacks |
2011-07-31/a> | Daniel Wesemann | Anatomy of a Unix breach |
2011-07-17/a> | Mark Hofman | SSH Brute Force |
2011-03-09/a> | Chris Mohan | Possible Issue with Forefront Update KB2508823 |
2011-03-01/a> | Daniel Wesemann | AV software and "sharing samples" |
2011-02-19/a> | Guy Bruneau | Snort Data Acquisition Library |
2011-02-05/a> | Guy Bruneau | OpenSSH Legacy Certificate Information Disclosure Vulnerability |
2011-01-29/a> | Mark Hofman | Sourceforge attack |
2011-01-12/a> | Richard Porter | How Many Loyalty Cards do you Carry? |
2010-11-17/a> | Guy Bruneau | Reference on Open Source Digital Forensics |
2010-11-12/a> | Guy Bruneau | Honeynet Forensic Challenge - Analyzing Malicious Portable Destructive Files |
2010-10-22/a> | Manuel Humberto Santander Pelaez | Intypedia project |
2010-09-07/a> | Bojan Zdrnja | SSH password authentication insight and analysis by DRG |
2010-08-25/a> | Pedro Bueno | Adobe released security update for Shockwave player that fix several CVEs: APSB1020 |
2010-07-24/a> | Manuel Humberto Santander Pelaez | Transmiting logon information unsecured in the network |
2010-07-13/a> | Jim Clausing | Forensic challenge results |
2010-06-18/a> | Tom Liston | IMPORTANT INFORMATION: Distributed SSH Brute Force Attacks |
2010-06-18/a> | Adrien de Beaupre | Distributed SSH Brute Force Attempts on the rise again |
2010-06-15/a> | Manuel Humberto Santander Pelaez | iPhone 4 Order Security Breach Exposes Private Information |
2010-06-04/a> | Rick Wanner | New Honeynet Project Forensic Challenge |
2010-06-02/a> | Rob VandenBrink | SPAM pretending to be from Habitat for Humanity |
2010-05-22/a> | Rick Wanner | SANS 2010 Digital Forensics Summit - APT Based Forensic Challenge |
2010-05-21/a> | Rick Wanner | 2010 Digital Forensics and Incident Response Summit |
2010-05-04/a> | Rick Wanner | SIFT review in the ISSA Toolsmith |
2010-04-30/a> | Kevin Liston | The Importance of Small Files |
2010-04-21/a> | Guy Bruneau | Google Chrome Security Update v4.1.249.1059 Released: http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html |
2010-04-11/a> | Marcus Sachs | Network and process forensics toolset |
2010-03-28/a> | Rick Wanner | Honeynet Project: 2010 Forensic Challenge #3 |
2010-03-27/a> | Guy Bruneau | HP-UX Running NFS/ONCplus, Inadvertently Enabled NFS |
2010-03-26/a> | Daniel Wesemann | SIFT2.0 SANS Investigative Forensics Toolkit released |
2010-03-10/a> | Rob VandenBrink | Microsoft re-release of KB973811 - attacks on Extended Protection for Authentication |
2010-01-23/a> | Lorna Hutcheson | The necessary evils: Policies, Processes and Procedures |
2010-01-19/a> | Jim Clausing | Forensic challenges |
2010-01-01/a> | G. N. White | Dealing With Unwanted SSH Bruteforcing |
2009-12-14/a> | Adrien de Beaupre | Anti-forensics, COFEE vs. DECAF |
2009-11-30/a> | Bojan Zdrnja | Distributed Wordpress admin account cracking |
2009-11-29/a> | Patrick Nolan | A Cloudy Weekend |
2009-11-25/a> | Jim Clausing | Updates to my GREM Gold scripts and a new script |
2009-10-04/a> | Guy Bruneau | Samba Security Information Disclosure and DoS |
2009-08-18/a> | Daniel Wesemann | Forensics: Mounting partitions from full-disk 'dd' images |
2009-08-13/a> | Jim Clausing | New and updated cheat sheets |
2009-07-17/a> | John Bambenek | Cross-Platform, Cross-Browser DoS Vulnerability |
2009-07-10/a> | Guy Bruneau | WordPress Fixes Multiple vulnerabilities |
2009-07-02/a> | Daniel Wesemann | Getting the EXE out of the RTF |
2009-04-17/a> | Daniel Wesemann | Guess what? SSH again! |
2009-03-30/a> | Daniel Wesemann | Watch your Internet routers! |
2009-03-02/a> | Swa Frantzen | Obama's leaked chopper blueprints: anything we can learn? |
2009-02-02/a> | Stephen Hall | How do you audit your production code? |
2009-01-30/a> | Mark Hofman | Request for info - Scan and webmail |
2009-01-02/a> | Rick Wanner | Tools on my Christmas list. |
2008-12-16/a> | donald smith | Microsoft announces an out of band patch for IE zero day |
2008-11-17/a> | Marcus Sachs | New Tool: NetWitness Investigator |
2008-10-02/a> | Kyle Haugsness | Low, slow, distributed SSH username brute forcing |
2008-09-11/a> | David Goldsmith | CookieMonster is coming to Pown (err, Town) |
2008-08-17/a> | Kevin Liston | Volatility 1.3 Released |
2008-08-15/a> | Jim Clausing | OMFW 2008 reflections |
2008-06-09/a> | Scott Fendley | So Where Are Those OpenSSH Key-based Attacks? |
2008-05-12/a> | Scott Fendley | Brute-force SSH Attacks on the Rise |
2008-04-07/a> | John Bambenek | HP USB Keys Shipped with Malware for your Proliant Server |
2007-01-03/a> | Toby Kohlenberg | VLC Media Player udp URL handler Format String Vulnerability |
HUMANITY |
2010-06-02/a> | Rob VandenBrink | SPAM pretending to be from Habitat for Humanity |