TARGETED ATTACKS SOCIAL ENGINEERING |
2009-01-18 | Maarten Van Horenbeeck | Targeted social engineering |
TARGETED |
2010-12-23/a> | Mark Hofman | White house greeting cards |
2009-06-04/a> | Raul Siles | Targeted e-mail attacks asking to verify wire transfer details |
2009-02-25/a> | Swa Frantzen | Targeted link diversion attempts |
2009-01-18/a> | Maarten Van Horenbeeck | Targeted social engineering |
2008-09-22/a> | Maarten Van Horenbeeck | Data exfiltration and the use of anonymity providers |
2008-07-09/a> | Johannes Ullrich | Unpatched Word Vulnerability |
2008-05-26/a> | Marcus Sachs | Predictable Response |
2008-04-24/a> | Maarten Van Horenbeeck | Targeted attacks using malicious PDF files |
2008-03-27/a> | Maarten Van Horenbeeck | Guarding the guardians: a story of PGP key ring theft |
ATTACKS |
2024-01-08/a> | Jesse La Grew | What is that User Agent? |
2022-08-10/a> | Johannes Ullrich | And Here They Come Again: DNS Reflection Attacks |
2021-02-01/a> | Rob VandenBrink | Taking a Shot at Reverse Shell Attacks, CNC Phone Home and Data Exfil from Servers |
2019-08-25/a> | Guy Bruneau | Are there any Advantages of Buying Cyber Security Insurance? |
2016-11-02/a> | Rob VandenBrink | What Does a Pentest Look Like? |
2016-06-03/a> | Tom Liston | MySQL is YourSQL |
2015-02-19/a> | Daniel Wesemann | DNS-based DDoS |
2014-02-26/a> | Russ McRee | Ongoing NTP Amplification Attacks |
2014-02-17/a> | Chris Mohan | NTP reflection attacks continue |
2013-08-19/a> | Guy Bruneau | Business Risks and Cyber Attacks |
2013-07-27/a> | Scott Fendley | Defending Against Web Server Denial of Service Attacks |
2011-12-28/a> | Daniel Wesemann | Hash collisions vulnerability in web servers |
2010-08-16/a> | Raul Siles | DDOS: State of the Art |
2010-08-13/a> | Tom Liston | The Strange Case of Doctor Jekyll and Mr. ED |
2010-01-29/a> | Johannes Ullrich | Analyzing isc.sans.org weblogs, part 2, RFI attacks |
2009-02-25/a> | Swa Frantzen | Targeted link diversion attempts |
2009-01-18/a> | Maarten Van Horenbeeck | Targeted social engineering |
2008-12-03/a> | Andre Ludwig | New ISC Poll! Has your organization suffered a DDoS (Distributed Denial of Service) attack in the last year? |
SOCIAL |
2024-12-05/a> | Jesse La Grew | [Guest Diary] Business Email Compromise |
2022-11-29/a> | Johannes Ullrich | Identifying Groups of "Bot" Accounts on LinkedIn |
2022-03-02/a> | Johannes Ullrich | The More Often Something is Repeated, the More True It Becomes: Dealing with Social Media |
2017-07-16/a> | Renato Marinho | SMS Phishing induces victims to photograph its own token card |
2015-11-21/a> | Didier Stevens | Maldoc Social Engineering Trick |
2014-08-20/a> | Kevin Shortt | Social Engineering Alive and Well |
2014-01-24/a> | Chris Mohan | Phishing via Social Media |
2013-07-13/a> | Lenny Zeltser | Decoy Personas for Safeguarding Online Identity Using Deception |
2013-07-08/a> | Richard Porter | Why do we Click? |
2013-02-25/a> | Johannes Ullrich | Mass-Customized Malware Lures: Don't trust your cat! |
2012-04-06/a> | Johannes Ullrich | Social Share Privacy |
2011-05-25/a> | Lenny Zeltser | Monitoring Social Media for Security References to Your Organization |
2011-05-10/a> | Swa Frantzen | Changing MO in scamming our users ? |
2010-12-29/a> | Daniel Wesemann | Beware of strange web sites bearing gifts ... |
2010-11-22/a> | Lenny Zeltser | Brand Impersonations On-Line: Brandjacking and Social Networks |
2010-09-16/a> | Johannes Ullrich | Facebook "Like Pages" |
2010-07-07/a> | Kevin Shortt | Facebook, Facebook, What Do YOU See? |
2010-06-14/a> | Manuel Humberto Santander Pelaez | New way of social engineering on IRC |
2010-06-10/a> | Deborah Hale | Top 5 Social Networking Media Risks |
2010-05-02/a> | Mari Nichols | Zbot Social Engineering |
2010-04-29/a> | Bojan Zdrnja | Who needs exploits when you have social engineering? |
2010-04-13/a> | Johannes Ullrich | More Legal Threat Malware E-Mail |
2009-06-01/a> | G. N. White | Yet another "Digital Certificate" malware campaign |
2009-04-24/a> | Pedro Bueno | Did you check your conference goodies? |
2009-01-18/a> | Maarten Van Horenbeeck | Targeted social engineering |
ENGINEERING |
2024-12-05/a> | Jesse La Grew | [Guest Diary] Business Email Compromise |
2017-07-16/a> | Renato Marinho | SMS Phishing induces victims to photograph its own token card |
2015-11-21/a> | Didier Stevens | Maldoc Social Engineering Trick |
2014-08-20/a> | Kevin Shortt | Social Engineering Alive and Well |
2013-07-08/a> | Richard Porter | Why do we Click? |
2012-09-14/a> | Lenny Zeltser | Analyzing Malicious RTF Files Using OfficeMalScanner's RTFScan |
2012-06-04/a> | Lenny Zeltser | Decoding Common XOR Obfuscation in Malicious Code |
2011-05-10/a> | Swa Frantzen | Changing MO in scamming our users ? |
2010-12-29/a> | Daniel Wesemann | Beware of strange web sites bearing gifts ... |
2010-11-18/a> | Chris Carboni | Stopping the ZeroAccess Rootkit |
2010-06-14/a> | Manuel Humberto Santander Pelaez | New way of social engineering on IRC |
2010-05-02/a> | Mari Nichols | Zbot Social Engineering |
2010-04-29/a> | Bojan Zdrnja | Who needs exploits when you have social engineering? |
2010-04-13/a> | Johannes Ullrich | More Legal Threat Malware E-Mail |
2009-06-01/a> | G. N. White | Yet another "Digital Certificate" malware campaign |
2009-04-24/a> | Pedro Bueno | Did you check your conference goodies? |
2009-01-18/a> | Maarten Van Horenbeeck | Targeted social engineering |