US COURTS |
2008-04-14 | John Bambenek | A Federal Subpoena or Just Some More Spam & Malware? |
US |
2025-04-09/a> | Xavier Mertens | Obfuscated Malicious Python Scripts with PyArmor |
2025-04-06/a> | Johannes Ullrich | New SSH Username Report |
2025-03-10/a> | Xavier Mertens | Shellcode Encoded in UUIDs |
2025-02-19/a> | Xavier Mertens | XWorm Cocktail: A Mix of PE data with PowerShell Code |
2025-01-29/a> | Xavier Mertens | From PowerShell to a Python Obfuscation Race! |
2025-01-28/a> | Xavier Mertens | Fileless Python InfoStealer Targeting Exodus |
2024-12-23/a> | Xavier Mertens | Modiloader From Obfuscated Batch File |
2024-11-30/a> | Xavier Mertens | From a Regular Infostealer to its Obfuscated Version |
2024-10-16/a> | Johannes Ullrich | The Top 10 Not So Common SSH Usernames and Passwords |
2024-09-18/a> | Xavier Mertens | Python Infostealer Patching Windows Exodus App |
2024-09-06/a> | Jesse La Grew | Enrichment Data: Keeping it Fresh |
2024-08-26/a> | Xavier Mertens | From Highly Obfuscated Batch File to XWorm and Redline |
2024-07-26/a> | Xavier Mertens | ExelaStealer Delivered "From Russia With Love" |
2024-07-24/a> | Xavier Mertens | "Mouse Logger" Malicious Python Script |
2024-06-06/a> | Xavier Mertens | Malicious Python Script with a "Best Before" Date |
2024-04-22/a> | Jan Kopriva | It appears that the number of industrial devices accessible from the internet has risen by 30 thousand over the past three years |
2024-03-28/a> | Xavier Mertens | From JavaScript to AsyncRAT |
2024-03-13/a> | Xavier Mertens | Using ChatGPT to Deobfuscate Malicious Scripts |
2024-02-28/a> | Johannes Ullrich | Exploit Attempts for Unknown Password Reset Vulnerability |
2024-02-25/a> | Guy Bruneau | Utilizing the VirusTotal API to Query Files Uploaded to DShield Honeypot [Guest Diary] |
2024-02-09/a> | Xavier Mertens | MSIX With Heavily Obfuscated PowerShell Script |
2024-02-06/a> | Jan Kopriva | Computer viruses are celebrating their 40th birthday (well, 54th, really) |
2024-01-26/a> | Xavier Mertens | A Batch File With Multiple Payloads |
2024-01-24/a> | Johannes Ullrich | How Bad User Interfaces Make Security Tools Harmful |
2024-01-12/a> | Xavier Mertens | One File, Two Payloads |
2024-01-08/a> | Jesse La Grew | What is that User Agent? |
2023-09-05/a> | Jesse La Grew | Common usernames submitted to honeypots |
2023-06-24/a> | Guy Bruneau | Email Spam with Attachment Modiloader |
2023-06-16/a> | Xavier Mertens | Another RAT Delivered Through VBS |
2023-06-09/a> | Xavier Mertens | Undetected PowerShell Backdoor Disguised as a Profile File |
2023-05-22/a> | Johannes Ullrich | Probes for recent ABUS Security Camera Vulnerability: Attackers keep an eye on everything. |
2023-05-17/a> | Xavier Mertens | Increase in Malicious RAR SFX files |
2023-04-09/a> | Didier Stevens | Chrome's Download Tab: Dangerous Files |
2023-03-30/a> | Xavier Mertens | Bypassing PowerShell Strong Obfuscation |
2023-03-21/a> | Didier Stevens | String Obfuscation: Character Pair Reversal |
2023-03-18/a> | Xavier Mertens | Old Backdoor, New Obfuscation |
2023-02-10/a> | Xavier Mertens | Obfuscated Deactivation of Script Block Logging |
2023-01-25/a> | Xavier Mertens | A First Malicious OneNote Document |
2023-01-15/a> | Johannes Ullrich | Elon Musk Themed Crypto Scams Flooding YouTube Today |
2022-11-05/a> | Guy Bruneau | Windows Malware with VHD Extension |
2022-11-04/a> | Xavier Mertens | Remcos Downloader with Unicode Obfuscation |
2022-10-18/a> | Xavier Mertens | Python Obfuscation for Dummies |
2022-09-16/a> | Didier Stevens | Word Maldoc With CustomXML and Renamed VBAProject.bin |
2022-09-12/a> | Johannes Ullrich | VirusTotal Result Comparisons for Honeypot Malware |
2022-06-28/a> | Johannes Ullrich | Possible Scans for HiByMusic Devices |
2022-06-19/a> | Didier Stevens | Video: Decoding Obfuscated BASE64 Statistically |
2022-06-18/a> | Didier Stevens | Decoding Obfuscated BASE64 Statistically |
2022-06-17/a> | Brad Duncan | Malspam pushes Matanbuchus malware, leads to Cobalt Strike |
2022-06-16/a> | Xavier Mertens | Houdini is Back Delivered Through a JavaScript Dropper |
2022-06-01/a> | Jan Kopriva | HTML phishing attachments - now with anti-analysis features |
2022-05-09/a> | Xavier Mertens | Octopus Backdoor is Back with a New Embedded Obfuscated Bat File |
2022-04-13/a> | Jan Kopriva | How is Ukrainian internet holding up during the Russian invasion? |
2022-03-27/a> | Didier Stevens | Video: Maldoc Cleaned by Anti-Virus |
2022-03-22/a> | Johannes Ullrich | Statement by President Biden: What you need to do (or not do) |
2022-03-10/a> | Xavier Mertens | Credentials Leaks on VirusTotal |
2022-02-24/a> | Xavier Mertens | Ukraine & Russia Situation From a Domain Names Perspective |
2022-01-05/a> | Xavier Mertens | Code Reuse In the Malware Landscape |
2021-11-26/a> | Guy Bruneau | Searching for Exposed ASUS Routers Vulnerable to CVE-2021-20090 |
2021-11-18/a> | Xavier Mertens | JavaScript Downloader Delivers Agent Tesla Trojan |
2021-11-14/a> | Didier Stevens | Video: Obfuscated Maldoc: Reversed BASE64 |
2021-10-20/a> | Xavier Mertens | Thanks to COVID-19, New Types of Documents are Lost in The Wild |
2021-09-24/a> | Xavier Mertens | Keep an Eye on Your Users Mobile Devices (Simple Inventory) |
2021-09-22/a> | Didier Stevens | An XML-Obfuscated Office Document (CVE-2021-40444) |
2021-08-19/a> | Johannes Ullrich | When Lightning Strikes. What works and doesn't work. |
2021-07-13/a> | Johannes Ullrich | USPS Phishing Using Telegram to Collect Data |
2021-06-11/a> | Xavier Mertens | Keeping an Eye on Dangerous Python Modules |
2021-06-04/a> | Xavier Mertens | Russian Dolls VBS Obfuscation |
2021-05-14/a> | Xavier Mertens | "Open" Access to Industrial Systems Interface is Also Far From Zero |
2021-05-12/a> | Jan Kopriva | Number of industrial control systems on the internet is lower then in 2020...but still far from zero |
2021-04-24/a> | Guy Bruneau | Base64 Hashes Used in Web Scanning |
2021-04-16/a> | Rick Wanner | Querying Spamhaus for IP reputation |
2021-03-06/a> | Xavier Mertens | Spotting the Red Team on VirusTotal! |
2021-03-02/a> | Russ McRee | Adversary Simulation with Sim |
2021-01-18/a> | Rob VandenBrink | The CIS Benchmark for Cisco Nexus (NX-OS) 1.0 went live last week, find it here: https://www.cisecurity.org/cis-benchmarks/ |
2021-01-04/a> | Jan Kopriva | From a small BAT file to Mass Logger infostealer |
2020-12-29/a> | Jan Kopriva | Want to know what's in a folder you don't have a permission to access? Try asking your AV solution... |
2020-12-24/a> | Xavier Mertens | Malicious Word Document Delivering an Octopus Backdoor |
2020-12-05/a> | Guy Bruneau | Is IP 91.199.118.137 testing Access to aahwwx.52host.xyz? |
2020-11-25/a> | Xavier Mertens | Live Patching Windows API Calls Using PowerShell |
2020-11-21/a> | Guy Bruneau | VMware privilege escalation vulnerabilities (CVE-2020-4004, CVE-2020-4005) - https://www.vmware.com/security/advisories/VMSA-2020-0026.html |
2020-11-19/a> | Xavier Mertens | PowerShell Dropper Delivering Formbook |
2020-11-18/a> | Xavier Mertens | When Security Controls Lead to Security Issues |
2020-11-13/a> | Xavier Mertens | Old Worm But New Obfuscation Technique |
2020-11-05/a> | Xavier Mertens | Did You Spot "Invoke-Expression"? |
2020-10-14/a> | Xavier Mertens | Nicely Obfuscated Python RAT |
2020-09-04/a> | Jan Kopriva | A blast from the past - XXEncoded VB6.0 Trojan |
2020-08-31/a> | Didier Stevens | Finding The Original Maldoc |
2020-08-29/a> | Didier Stevens | Malicious Excel Sheet with a NULL VT Score: More Info |
2020-08-24/a> | Xavier Mertens | Tracking A Malware Campaign Through VT |
2020-08-19/a> | Xavier Mertens | Example of Word Document Delivering Qakbot |
2020-08-16/a> | Didier Stevens | Small Challenge: A Simple Word Maldoc - Part 3 |
2020-07-11/a> | Guy Bruneau | VMware XPC Client validation privilege escalation vulnerability - https://www.vmware.com/security/advisories/VMSA-2020-0017.html |
2020-07-08/a> | Xavier Mertens | If You Want Something Done Right, You Have To Do It Yourself... Malware Too! |
2020-06-08/a> | Didier Stevens | Translating BASE64 Obfuscated Scripts |
2020-05-06/a> | Xavier Mertens | Keeping an Eye on Malicious Files Life Time |
2020-04-27/a> | Xavier Mertens | Powershell Payload Stored in a PSCredential Object |
2020-04-24/a> | Xavier Mertens | Malicious Excel With a Strong Obfuscation and Sandbox Evasion |
2020-04-03/a> | Xavier Mertens | Obfuscated with a Simple 0x0A |
2020-02-22/a> | Xavier Mertens | Simple but Efficient VBScript Obfuscation |
2020-02-07/a> | Xavier Mertens | Sandbox Detection Tricks & Nice Obfuscation in a Single VBScript |
2020-01-27/a> | Johannes Ullrich | Network Security Perspective on Coronavirus Preparedness |
2020-01-23/a> | Xavier Mertens | Complex Obfuscation VS Simple Trick |
2019-12-15/a> | Didier Stevens | VirusTotal Email Submissions |
2019-12-12/a> | Xavier Mertens | Code & Data Reuse in the Malware Ecosystem |
2019-10-18/a> | Xavier Mertens | Quick Malicious VBS Analysis |
2019-08-14/a> | Brad Duncan | Recent example of MedusaHTTP malware |
2019-08-09/a> | Xavier Mertens | 100% JavaScript Phishing Page |
2019-07-25/a> | Rob VandenBrink | When Users Attack! Users (and Admins) Thwarting Security Controls |
2019-07-11/a> | Xavier Mertens | Russian Dolls Malicious Script Delivering Ursnif |
2019-07-05/a> | Didier Stevens | A "Stream O" Maldoc |
2019-07-02/a> | Xavier Mertens | Malicious Script With Multiple Payloads |
2019-07-01/a> | Didier Stevens | Maldoc: Payloads in User Forms |
2019-06-28/a> | Rob VandenBrink | Verifying Running Processes against VirusTotal - Domain-Wide |
2019-06-10/a> | Xavier Mertens | Interesting JavaScript Obfuscation Example |
2019-02-11/a> | Didier Stevens | Have You Seen an Email Virus Recently? |
2019-01-21/a> | Didier Stevens | Suspicious GET Request: Do You Know What This Is? |
2018-12-29/a> | Didier Stevens | Video: De-DOSfuscation Example |
2018-12-15/a> | Didier Stevens | De-DOSfuscation Example |
2018-12-12/a> | Didier Stevens | Yet Another DOSfuscation Sample |
2018-11-27/a> | Xavier Mertens | More obfuscated shell scripts: Fake MacOS Flash update |
2018-11-26/a> | Xavier Mertens | Obfuscated bash script targeting QNap boxes |
2018-11-16/a> | Xavier Mertens | Basic Obfuscation With Permissive Languages |
2018-11-06/a> | Xavier Mertens | Malicious Powershell Script Dissection |
2018-10-30/a> | Brad Duncan | Campaign evolution: Hancitor malspam starts pushing Ursnif this week |
2018-10-23/a> | Xavier Mertens | Diving into Malicious AutoIT Code |
2018-09-30/a> | Didier Stevens | When DOSfuscation Helps... |
2018-09-20/a> | Xavier Mertens | Hunting for Suspicious Processes with OSSEC |
2018-07-30/a> | Didier Stevens | Malicious Word documents using DOSfuscation |
2018-07-26/a> | Xavier Mertens | Windows Batch File Deobfuscation |
2018-07-24/a> | Brad Duncan | Recent Emotet activity |
2018-07-02/a> | Guy Bruneau | VMware ESXi, Workstation, and Fusion address multiple out-of-bounds read vulnerabilities https://www.vmware.com/security/advisories/VMSA-2018-0016.html |
2018-06-25/a> | Didier Stevens | Guilty by association |
2018-06-18/a> | Xavier Mertens | Malicious JavaScript Targeting Mobile Browsers |
2018-06-05/a> | Xavier Mertens | Malicious Post-Exploitation Batch File |
2018-05-27/a> | Guy Bruneau | Capture and Analysis of User Agents |
2018-05-25/a> | Xavier Mertens | Antivirus Evasion? Easy as 1,2,3 |
2018-05-22/a> | Guy Bruneau | VMware updates enable Hypervisor-Assisted Guest Mitigations for Speculative Store Bypass issue - https://www.vmware.com/security/advisories/VMSA-2018-0012.html |
2018-03-05/a> | Xavier Mertens | Malicious Bash Script with Multiple Features |
2018-01-01/a> | Didier Stevens | What is new? |
2017-12-19/a> | Xavier Mertens | Example of 'MouseOver' Link in a Powerpoint File |
2017-11-03/a> | Xavier Mertens | Simple Analysis of an Obfuscated JAR File |
2017-10-30/a> | Johannes Ullrich | Critical Patch For Oracle's Identity Manager |
2017-10-27/a> | Renato Marinho | "Catch-All" Google Chrome Malicious Extension Steals All Posted Data |
2017-10-06/a> | Johannes Ullrich | What's in a cable? The dangers of unauthorized cables |
2017-09-30/a> | Lorna Hutcheson | Who's Borrowing your Resources? |
2017-09-18/a> | Xavier Mertens | Getting some intelligence from malspam |
2017-09-16/a> | Guy Bruneau | VMware ESXi, vCenter Server, Fusion and Workstation updates resolve multiple security vulnerabilities - https://www.vmware.com/security/advisories/VMSA-2017-0015.html |
2017-08-29/a> | Renato Marinho | Second Google Chrome Extension Banker Malware in Two Weeks |
2017-07-08/a> | Xavier Mertens | A VBScript with Obfuscated Base64 Data |
2017-06-22/a> | Xavier Mertens | Obfuscating without XOR |
2017-06-17/a> | Guy Bruneau | Mapping Use Cases to Logs. Which Logs are the Most Important to Collect? |
2017-05-30/a> | Johannes Ullrich | FreeRadius Authentication Bypass |
2017-04-28/a> | Xavier Mertens | Another Day, Another Obfuscation Technique |
2017-04-21/a> | Xavier Mertens | Analysis of a Maldoc with Multiple Layers of Obfuscation |
2017-04-19/a> | Xavier Mertens | Hunting for Malicious Excel Sheets |
2017-03-30/a> | Xavier Mertens | Diverting built-in features for the bad |
2017-03-24/a> | Xavier Mertens | Nicely Obfuscated JavaScript Sample |
2017-03-18/a> | Xavier Mertens | Example of Multiple Stages Dropper |
2017-03-04/a> | Xavier Mertens | How your pictures may affect your website reputation |
2017-02-28/a> | Xavier Mertens | Analysis of a Simple PHP Backdoor |
2017-02-12/a> | Xavier Mertens | Analysis of a Suspicious Piece of JavaScript |
2017-01-06/a> | John Bambenek | Great Misadventures of Security Vendors: Absurd Sandboxing Edition |
2016-11-16/a> | Xavier Mertens | Example of Getting Analysts & Researchers Away |
2016-10-26/a> | Johannes Ullrich | New VMWare Security Advisory: VMSA-2016-0017 Information Disclosure in VMWare Fusion and VMWare Tools https://www.vmware.com/security/advisories/VMSA-2016-0017.html |
2016-09-09/a> | Xavier Mertens | Collecting Users Credentials from Locked Devices |
2016-08-29/a> | Russ McRee | Recommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs |
2016-08-28/a> | Guy Bruneau | Spam with Obfuscated Javascript |
2016-07-03/a> | Guy Bruneau | Is Data Privacy part of your Company's Culture? |
2016-06-22/a> | Bojan Zdrnja | Security through obscurity never works |
2016-02-20/a> | Didier Stevens | Locky: JavaScript Deobfuscation |
2016-02-07/a> | Xavier Mertens | More Malicious JavaScript Obfuscation |
2016-01-23/a> | Didier Stevens | Sigcheck and VirusTotal for Offline Machine |
2016-01-15/a> | Xavier Mertens | JavaScript Deobfuscation Tool |
2015-12-09/a> | Xavier Mertens | Enforcing USB Storage Policy with PowerShell |
2015-12-05/a> | Guy Bruneau | Are you looking to setup your own Malware Sandbox? |
2015-12-02/a> | Rob VandenBrink | Nessus and Powershell is like Chocolate and Peanut Butter! |
2015-08-16/a> | Guy Bruneau | Are you a "Hunter"? |
2015-08-06/a> | Didier Stevens | Sigcheck and virustotal-search |
2015-07-21/a> | Didier Stevens | Searching Through the VirusTotal Database |
2015-07-17/a> | Didier Stevens | Process Explorer and VirusTotal |
2015-07-17/a> | Didier Stevens | Autoruns and VirusTotal |
2015-07-17/a> | Didier Stevens | Sigcheck and VirusTotal |
2015-06-28/a> | Didier Stevens | The EICAR Test File |
2015-04-06/a> | Guy Bruneau | 'Dead Drops' Hidden USB Sticks Around the World |
2014-11-04/a> | Daniel Wesemann | Whois someone else? |
2014-10-03/a> | Johannes Ullrich | CSAM: The Power of Virustotal to Turn Harmless Binaries Malicious |
2014-09-26/a> | Richard Porter | Why We Have Moved to InfoCon:Yellow |
2014-07-18/a> | Russ McRee | Gameover Zeus reported as "returned from the dead" |
2014-06-02/a> | John Bambenek | Gameover Zeus and Cryptolocker Takedowns |
2014-05-30/a> | Johannes Ullrich | Fake Australian Electric Bill Leads to Cryptolocker |
2014-05-27/a> | Kevin Shortt | Avast forums hacked |
2014-04-05/a> | Jim Clausing | Those strange e-mails with URLs in them can lead to Android malware |
2014-02-07/a> | Rob VandenBrink | Hello Virustotal? It's Microsoft Calling. |
2014-01-24/a> | Chris Mohan | Phishing via Social Media |
2013-12-16/a> | Tom Webb | The case of Minerd |
2013-11-22/a> | Rick Wanner | Tales of Password Reuse |
2013-11-02/a> | Rick Wanner | Protecting Your Family's Computers |
2013-10-30/a> | Russ McRee | SIR v15: Five good reasons to leave Windows XP behind |
2013-10-04/a> | Johannes Ullrich | The Adobe Breach FAQ |
2013-08-26/a> | Alex Stanford | Stop, Drop and File Carve |
2013-08-19/a> | Johannes Ullrich | Running Snort on ESXi using the Distributed Switch |
2013-08-03/a> | Deborah Hale | What Anti-virus Program Is Right For You? |
2013-06-07/a> | Daniel Wesemann | 100% Compliant (for 65% of the systems) |
2013-05-20/a> | Guy Bruneau | Safe - Tools, Tactics and Techniques |
2013-05-09/a> | John Bambenek | Adobe Releases 0-day Security Advisory for Coldfusion, Exploit Code Available. Advisory here: http://www.adobe.com/support/security/advisories/apsa13-03.html |
2013-05-08/a> | Chris Mohan | Syria drops from Internet 7th May 2013 |
2013-04-26/a> | Russ McRee | What is "up to date anti-virus software"? |
2013-03-28/a> | John Bambenek | Where Were You During the Great DDoS Cybergeddon of 2013? |
2013-03-27/a> | Adam Swanger | IPv6 Focus Month: Guest Diary: Stephen Groat - IPv6 moving target defense |
2013-03-25/a> | Johannes Ullrich | IPv6 Focus Month: IPv6 over IPv4 Preference |
2013-03-19/a> | Johannes Ullrich | IPv6 Focus Month: The warm and fuzzy side of IPv6 |
2013-03-18/a> | Johannes Ullrich | IPv6 Focus Month: What is changing with DHCP |
2013-03-18/a> | Kevin Shortt | Spamhaus DDOS |
2013-03-11/a> | Richard Porter | IPv6 Focus Month: Traffic Testing, Firewalls, ACLs, pt 1 |
2013-03-09/a> | Guy Bruneau | IPv6 Focus Month: IPv6 Encapsulation - Protocol 41 |
2013-03-08/a> | Johannes Ullrich | IPv6 Focus Month: Filtering ICMPv6 at the Border |
2013-03-06/a> | Adam Swanger | IPv6 Focus Month: Guest Diary: Stephen Groat - Geolocation Using IPv6 Addresses |
2013-03-05/a> | Mark Hofman | IPv6 Focus Month: Device Defaults |
2013-03-04/a> | Johannes Ullrich | IPv6 Focus Month: Addresses |
2013-02-25/a> | Johannes Ullrich | Trustwave Trustkeeper Phish |
2013-02-19/a> | Johannes Ullrich | EDUCAUSE Breach |
2013-02-08/a> | Kevin Shortt | Is it Spam or Is it Malware? |
2013-01-15/a> | Rob VandenBrink | When Disabling IE6 (or Java, or whatever) is not an Option... |
2013-01-05/a> | Guy Bruneau | Adobe ColdFusion Security Advisory |
2013-01-03/a> | Manuel Humberto Santander Pelaez | New year and new CA compromised |
2012-12-03/a> | John Bambenek | John McAfee Exposes His Location in Photo About His Being on Run |
2012-11-29/a> | Kevin Shortt | New Apple Security Update: APPLE-SA-2012-11-29-1 Apple TV 5.1.1 |
2012-11-28/a> | Mark Hofman | McAfee releases extraDAT for W32/Autorun.worm.aaeb-h |
2012-11-28/a> | Mark Hofman | New version of wireshark is available (1.8.4), some security fixes included. |
2012-11-27/a> | Chris Mohan | Can users' phish emails be a security admin's catch of the day? |
2012-11-26/a> | John Bambenek | Online Shopping for the Holidays? Tips, News and a Fair Warning |
2012-11-20/a> | John Bambenek | Behind the Random NTP Bizarreness of Incorrect Year Being Set |
2012-11-20/a> | John Bambenek | Firefox v 17.0 just released, more here: http://www.mozilla.org/en-US/firefox/17.0/releasenotes/ |
2012-11-19/a> | John Bambenek | New Poll: Top 5 Unresolved Security Problems of 2012 |
2012-11-19/a> | John Bambenek | MoneyGram fined $100 million for aiding wire fraud - http://krebsonsecurity.com/2012/11/moneygram-fined-100-million-for-wire-fraud/ |
2012-11-17/a> | Manuel Humberto Santander Pelaez | New Sysinternal Updates: AdExplorer v1.44, Contig v1.7, Coreinfo v3.2, Procdump v5.1. See http://blogs.technet.com/b/sysinternals/archive/2012/11/16/updates-adexplorer-v1-44-contig-v1-7-coreinfo-v3-2-procdump-v5-1.aspx?Redirected=true |
2012-11-12/a> | John Bambenek | Request for info: Robocall Phishing Against Local/Regional Banks |
2012-11-09/a> | Mark Baggett | Remote Diagnostics with PSR |
2012-11-09/a> | Mark Baggett | Fresh batch of Microsoft patches next week |
2012-11-07/a> | Mark Baggett | Help eliminate unquoted path vulnerabilities |
2012-11-07/a> | Mark Baggett | Multiple 0-Days Reported! |
2012-11-07/a> | Mark Baggett | Cisco TACACS+ Authentication Bypass |
2012-11-05/a> | Johannes Ullrich | Reminder: Ongoing SMTP Brute Forcing Attacks |
2012-11-05/a> | Johannes Ullrich | Possible Fake-AV Ads from Doubleclick Servers |
2012-11-04/a> | Lorna Hutcheson | What's important on your network? |
2012-11-02/a> | Daniel Wesemann | The shortcomings of anti-virus software |
2012-10-31/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 31 - Business Continuity and Disaster Recovery |
2012-10-30/a> | Johannes Ullrich | Hurricane Sandy Update |
2012-10-30/a> | Richard Porter | Splunk 5.0 SP-CAAAHB4 http://www.splunk.com/view/SP-CAAAHB4 |
2012-10-28/a> | Tony Carothers | Firefox 16.02 Released |
2012-10-26/a> | Russ McRee | Cyber Security Awareness Month - Day 26 - Attackers use trusted domain to propagate Citadel Zeus variant |
2012-10-25/a> | Richard Porter | Cyber Security Awareness Month - Day 25 - Pro Audio & Video Packets on the Wire |
2012-10-24/a> | Russ McRee | Ongoing Windstream outage in the midwest - https://twitter.com/search?q=windstream |
2012-10-21/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 22: Connectors |
2012-10-21/a> | Lorna Hutcheson | Potential Phish for Regular Webmail Accounts |
2012-10-19/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 19: Standard log formats and CEE. |
2012-10-18/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide |
2012-10-17/a> | Mark Hofman | New Acrobat release (including reader) available. Version 11. Some security improvements more here -->http://blogs.adobe.com/adobereader/ |
2012-10-16/a> | Richard Porter | CyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook. |
2012-10-16/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 16: W3C and HTML |
2012-10-14/a> | Pedro Bueno | Cyber Security Awareness Month - Day 14 - Poor Man's File Analysis System - Part 1 |
2012-10-09/a> | Johannes Ullrich | Microsoft October 2012 Black Tuesday Update - Overview |
2012-10-07/a> | Tony Carothers | Cyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1 |
2012-10-05/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 5: Standards Body Soup, So many Flavors in the bowl. |
2012-10-05/a> | Richard Porter | VMWare Security Advisory: VMSA-2012-0014 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html |
2012-10-05/a> | Richard Porter | Reports of a Distributed Injection Scan |
2012-10-04/a> | Mark Hofman | And the SHA-3 title goes to .....Keccak |
2012-10-01/a> | Johannes Ullrich | Cyber Security Awareness Month |
2012-09-28/a> | Joel Esler | Adobe certification revocation for October 4th |
2012-09-26/a> | Johannes Ullrich | Some Android phones can be reset to factory default by clicking on links |
2012-09-26/a> | Johannes Ullrich | More Java Woes |
2012-09-21/a> | Johannes Ullrich | iOS 6 Security Roundup |
2012-09-21/a> | Guy Bruneau | Storing your Collection of Malware Samples with Malwarehouse |
2012-09-19/a> | Russ McRee | Script kiddie scavenging with Shellbot.S |
2012-09-17/a> | Rob VandenBrink | What's on your iPad? |
2012-09-14/a> | Lenny Zeltser | Scam Report - Fake Voice Mail Email Notification Redirects to Malicious Site |
2012-09-13/a> | Mark Baggett | Microsoft disrupts traffic associated with the Nitol botnet |
2012-09-13/a> | Mark Baggett | More SSL trouble |
2012-09-10/a> | Johannes Ullrich | Microsoft Patch Tuesday Pre-Release |
2012-09-10/a> | Johannes Ullrich | Godaddy DDoS Attack |
2012-09-06/a> | Johannes Ullrich | SSL Requests sent to port 80 (request for help/input) |
2012-09-04/a> | Johannes Ullrich | Another round of "Spot the Exploit E-Mail" |
2012-09-02/a> | Lorna Hutcheson | Demonstrating the value of your Intrusion Detection Program and Analysts |
2012-09-01/a> | Russ McRee | Blackhole targeting Java vulnerability via fake Microsoft Services Agreement email phish |
2012-08-30/a> | Johannes Ullrich | Editorial: The Slumlord Approach to Network Security http://isc.sans.edu/j/editorial |
2012-08-29/a> | Johannes Ullrich | "Data" URLs used for in-URL phishing |
2012-08-27/a> | Johannes Ullrich | The Good, Bad and Ugly about Assigning IPv6 Addresses |
2012-08-27/a> | Johannes Ullrich | Malware Spam harvesting Facebook Information |
2012-08-26/a> | Lorna Hutcheson | Who ya gonna contact? |
2012-08-20/a> | Manuel Humberto Santander Pelaez | Do we need test procedures in our companies before implementing Antivirus signatures? |
2012-08-19/a> | Manuel Humberto Santander Pelaez | Authentication Issues between entities during protocol message exchange in SCADA Systems |
2012-08-14/a> | Rick Wanner | Microsoft August 2012 Black Tuesday Update - Overview |
2012-08-13/a> | Rick Wanner | Interesting scan for medical certification information... |
2012-08-12/a> | Tony Carothers | Layers of the Defense-in-Depth Onion |
2012-08-12/a> | Tony Carothers | Oracle Security Alert for CVE-2012-3132 |
2012-08-09/a> | Mark Hofman | Zeus/Citadel variant causing issues in the Netherlands |
2012-08-09/a> | Mark Hofman | SQL Injection Lilupophilupop style, Part 2 |
2012-08-07/a> | Adrien de Beaupre | Who protects small business? |
2012-08-04/a> | Kevin Liston | Vendors: More Patch-Release Options Please |
2012-07-27/a> | Daniel Wesemann | Cuckoo 0.4 is out - cool new features for malware analysis http://www.cuckoosandbox.org/ |
2012-07-24/a> | Richard Porter | Wireshark 1.8.1 Released http://www.wireshark.org/ |
2012-07-24/a> | Richard Porter | Report of spike in DNS Queries gd21.net |
2012-07-20/a> | Mark Baggett | Syria Internet connection cut? |
2012-07-19/a> | Mark Baggett | Diagnosing Malware with Resource Monitor |
2012-07-19/a> | Mark Baggett | A Heap of Overflows? |
2012-07-16/a> | Richard Porter | Sysinternals Update @ http://blogs.technet.com/b/sysinternals/archive/2012/07/16/updates-handle-v3-5-process-explorer-v15-22-process-monitor-v3-03-rammap-v1-21-zoomit-v4-3.aspx |
2012-07-14/a> | Tony Carothers | User Awareness and Education |
2012-07-13/a> | Richard Porter | Yesterday (not as on the ball as Rob) at SANSFire |
2012-07-12/a> | Rick Wanner | Cisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms |
2012-07-12/a> | Rick Wanner | Cisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Recording Server - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs |
2012-07-12/a> | Rick Wanner | Cisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts |
2012-07-12/a> | Rick Wanner | Cisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Manager - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman |
2012-07-09/a> | Johannes Ullrich | The FBI will turn off the Internet on Monday (or not) |
2012-07-09/a> | Manuel Humberto Santander Pelaez | Internet Storm Center panel tonight at SANSFIRE 2012! |
2012-07-05/a> | Adrien de Beaupre | New OS X trojan backdoor MaControl variant reported |
2012-07-02/a> | Joel Esler | A rough guide to keeping your website up |
2012-07-02/a> | Dan Goldberg | Storms of June 29th 2012 in Mid Atlantic region of the USA |
2012-07-02/a> | Joel Esler | Linux & Java leap second bug |
2012-06-29/a> | Jim Clausing | Updated SysInternals tools - Autoruns, Process Explorer, Process Monitor, PSKill -- http://blogs.technet.com/b/sysinternals/archive/2012/06/28/updates-autoruns-v11-32-process-explorer-v15-21-process-monitor-v3-02-pskill-v1-15-rammap-v1-2.aspx |
2012-06-25/a> | Rick Wanner | Targeted Malware for Industrial Espionage? |
2012-06-25/a> | Guy Bruneau | Using JSDetox to Analyze and Deobfuscate Javascript |
2012-06-21/a> | Russ McRee | Analysis of drive-by attack sample set |
2012-06-21/a> | Russ McRee | Wireshark 1.8.0 released 21 JUN 2012 http://www.wireshark.org/download.html |
2012-06-19/a> | Daniel Wesemann | Vulnerabilityqueerprocessbrittleness |
2012-06-12/a> | Swa Frantzen | Adobe June 2012 Black Tuesday patches |
2012-06-11/a> | Johannes Ullrich | Microsoft Update Security |
2012-05-22/a> | Johannes Ullrich | nmap 6 released |
2012-05-16/a> | Johannes Ullrich | Avira Antivirus false positives http://forum.avira.com/wbb/index.php?page=Thread&threadID=144875 |
2012-04-26/a> | Richard Porter | Define Irony: A medical device with a Virus? |
2012-04-13/a> | Daniel Wesemann | Anti-virus scanning exclusions |
2012-04-05/a> | Johannes Ullrich | Evil hides everywhere: Web Application Exploits in Headers |
2012-03-11/a> | Johannes Ullrich | An Analysis of Jester's QR Code Attack. (Guest Diary) |
2012-03-05/a> | Johannes Ullrich | Flashback Malware now with Twitter C&C |
2012-01-22/a> | Johannes Ullrich | Javascript DDoS Tool Analysis |
2012-01-03/a> | Bojan Zdrnja | The tale of obfuscated JavaScript continues |
2011-12-13/a> | Johannes Ullrich | December 2011 Adobe Black Tuesday |
2011-10-28/a> | Russ McRee | Critical Control 19: Data Recovery Capability |
2011-08-26/a> | Daniel Wesemann | User Agent 007 |
2011-08-09/a> | Swa Frantzen | abuse handling |
2011-07-29/a> | Richard Porter | Apple Lion talking on TCP 5223 |
2011-07-11/a> | John Bambenek | Another Defense Contractor Hacked in AntiSec Hacktivism Spree |
2011-07-03/a> | Deborah Hale | Business Continuation in the Face of Disaster |
2011-07-02/a> | Pedro Bueno | Bootkits, they are back at full speed... |
2011-06-06/a> | Manuel Humberto Santander Pelaez | Phishing: Same goal, same techniques and people still falling for such scams |
2011-06-02/a> | Johannes Ullrich | Some Insight into Apple's Anti-Virus Signatures |
2011-05-31/a> | Johannes Ullrich | Apple Improving OS X Anti-Malware Feature |
2011-05-19/a> | Daniel Wesemann | Fake AV Bingo |
2011-05-01/a> | Deborah Hale | Another Potentially Malicious Email Making The Rounds |
2011-04-20/a> | Daniel Wesemann | Virustotal.com hiccup |
2011-03-17/a> | Kevin Liston | So You Got an AV Alert. Now What? |
2011-03-09/a> | Kevin Shortt | AVG Anti-Virus 2011 False Positives - Luhe.Exploit.PDF.B |
2011-03-02/a> | Chris Mohan | Cleaning house |
2011-03-01/a> | Daniel Wesemann | AV software and "sharing samples" |
2011-02-09/a> | Mark Hofman | Adobe Patches (shockwave, Flash, Reader & Coldfusion) |
2011-02-07/a> | Pedro Bueno | The Good , the Bad and the Unknown Online Scanners |
2011-02-07/a> | Richard Porter | Crime is still Crime! Pt 2 |
2011-01-18/a> | Daniel Wesemann | Yet another rogue anti-virus |
2011-01-15/a> | Jim Clausing | What's up with port 8881? |
2011-01-10/a> | Manuel Humberto Santander Pelaez | Facebook virus spreads via photo album chat messages |
2011-01-10/a> | Manuel Humberto Santander Pelaez | VirusTotal VTzilla firefox/chrome plugin |
2010-12-01/a> | Deborah Hale | A Gentle Reminder - It is that time of year again |
2010-11-22/a> | Lenny Zeltser | Brand Impersonations On-Line: Brandjacking and Social Networks |
2010-11-11/a> | Daniel Wesemann | Fake AV scams via Skype Chat |
2010-11-02/a> | Johannes Ullrich | Limited Malicious Search Engine Poisoning for Election |
2010-10-19/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - Remote User VPN Tunnels - to Split or not to Split? |
2010-10-19/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - Remote User VPN Access – Are things getting too easy, or too hard? |
2010-09-28/a> | Daniel Wesemann | Supporting the economy (in Russia and Ukraine) |
2010-09-26/a> | Daniel Wesemann | PDF analysis paper |
2010-09-09/a> | Marcus Sachs | 'Here You Have' Email |
2010-08-15/a> | Manuel Humberto Santander Pelaez | Obfuscated SQL Injection attacks |
2010-08-03/a> | Johannes Ullrich | When Lightning Strikes |
2010-06-29/a> | Johannes Ullrich | How to be a better spy: Cyber security lessons from the recent russian spy arrests |
2010-06-27/a> | Manuel Humberto Santander Pelaez | Study of clickjacking vulerabilities on popular sites |
2010-06-14/a> | Manuel Humberto Santander Pelaez | Small lot of Olympus Stylus Tough 6010 shipped with malware |
2010-06-01/a> | Mark Hofman | SPF how useful is it? |
2010-05-26/a> | Bojan Zdrnja | Malware modularization and AV detection evasion |
2010-04-20/a> | Raul Siles | Are You Ready for a Transportation Collapse...? |
2010-04-08/a> | Bojan Zdrnja | JavaScript obfuscation in PDF: Sky is the limit |
2010-04-02/a> | Guy Bruneau | Oracle Java SE and Java for Business Critical Patch Update Advisory |
2010-03-25/a> | Kevin Liston | Zeus wants to do your taxes |
2010-03-05/a> | Kyle Haugsness | Javascript obfuscators used in the wild |
2010-02-22/a> | Rob VandenBrink | New Risks in Penetration Testing |
2010-02-15/a> | Johannes Ullrich | Various Olympics Related Dangerous Google Searches |
2010-02-02/a> | Guy Bruneau | Adobe ColdFusion Information Disclosure |
2010-02-02/a> | Johannes Ullrich | Pushdo Update |
2010-01-30/a> | Stephen Hall | Got PushDo SSL packets? |
2010-01-06/a> | Guy Bruneau | Secure USB Flaw Exposed |
2009-12-19/a> | Deborah Hale | Frustrations of ISP Abuse Handling |
2009-12-03/a> | Mark Hofman | Avast false positives |
2009-11-13/a> | Deborah Hale | Pushdo/Cutwail Spambot - A Little Known BIG Problem |
2009-11-05/a> | Swa Frantzen | RIM fixes random code execution vulnerability |
2009-11-03/a> | Andre Ludwig | SURBL now posting abuse statistics for TLD's |
2009-10-27/a> | Rob VandenBrink | New VMware Desktop Products Released (Workstation, Fusion, ACE) |
2009-10-22/a> | Adrien de Beaupre | Cyber Security Awareness Month - Day 22 port 502 TCP - Modbus |
2009-10-09/a> | Rob VandenBrink | THAWTE to discontinue free Email Certificate Services and Web of Trust Service |
2009-10-02/a> | Stephen Hall | VMware Fusion updates to fixes a couple of bugs |
2009-09-25/a> | Lenny Zeltser | Categories of Common Malware Traits |
2009-09-17/a> | Bojan Zdrnja | Why is Rogue/Fake AV so successful? |
2009-08-29/a> | Guy Bruneau | Immunet Protect - Cloud and Community Malware Protection |
2009-08-26/a> | Johannes Ullrich | WSUS 3.0 SP2 released |
2009-08-26/a> | Johannes Ullrich | Malicious CD ROMs mailed to banks |
2009-08-19/a> | Daniel Wesemann | Checking your protection |
2009-08-13/a> | Johannes Ullrich | CA eTrust update crashes systems |
2009-08-13/a> | Jim Clausing | New and updated cheat sheets |
2009-07-05/a> | Bojan Zdrnja | More on ColdFusion hacks |
2009-07-03/a> | Adrien de Beaupre | FCKEditor advisory |
2009-07-02/a> | Bojan Zdrnja | Cold Fusion web sites getting compromised |
2009-06-30/a> | Chris Carboni | Obfuscated Code |
2009-06-30/a> | Chris Carboni | De-Obfuscation Submissions |
2009-05-28/a> | Jim Clausing | More new volatility plugins |
2009-05-27/a> | donald smith | Host file black lists |
2009-04-10/a> | Stephen Hall | Something for the holiday? Nessus 4 is out |
2009-04-07/a> | Bojan Zdrnja | Advanced JavaScript obfuscation (or why signature scanning is a failure) |
2009-04-06/a> | Adrien de Beaupre | Abuse addresses |
2009-03-16/a> | Johannes Ullrich | new rogue-DHCP server malware |
2009-03-08/a> | Marcus Sachs | Behind the Estonia Cyber Attacks |
2009-02-12/a> | Mark Hofman | Australian Bushfires |
2009-02-06/a> | Adrien de Beaupre | Fake stimulus payments |
2009-01-30/a> | Mark Hofman | We all "Love" USB drives |
2008-12-28/a> | Raul Siles | Level3 Outage? |
2008-12-25/a> | Maarten Van Horenbeeck | Merry Christmas, and beware of digital hitchhikers! |
2008-11-21/a> | Mark Hofman | To USB or not to USB, well not in the DoD - what do you do? |
2008-09-18/a> | Bojan Zdrnja | Monitoring HTTP User-Agent fields |
2008-09-15/a> | donald smith | Fake antivirus 2009 and search engine results |
2008-09-03/a> | Daniel Wesemann | Static analysis of Shellcode - Part 2 |
2008-07-14/a> | Daniel Wesemann | Obfuscated JavaScript Redux |
2008-04-22/a> | donald smith | Maximus root kit downloads via MySpace social engineering trick. |
2008-04-14/a> | John Bambenek | A Federal Subpoena or Just Some More Spam & Malware? |
2008-04-10/a> | Deborah Hale | Abuse Contacts |
2008-04-08/a> | Swa Frantzen | Notes file viewer vulnerabilities |
2008-04-07/a> | John Bambenek | HP USB Keys Shipped with Malware for your Proliant Server |
2008-04-06/a> | Daniel Wesemann | Advanced obfuscated JavaScript analysis |
2008-04-03/a> | Bojan Zdrnja | Mixed (VBScript and JavaScript) obfuscation |
2006-11-10/a> | Tony Carothers | A busy Black Tuesday coming up..... |
2006-10-30/a> | William Salusky | ToD - Configuration Management - maintaining security awareness |
2006-10-09/a> | Swa Frantzen | Microsoft black tuesday - October 2006 STATUS |
2006-09-01/a> | Joel Esler | CA eTrust Antivirus [was] flagging lsass.e x e |
2006-08-17/a> | Swa Frantzen | Microsoft August 2006 Patches: STATUS |
2000-01-02/a> | Deborah Hale | 2010 A Look Back - 2011 A Look Ahead |
COURTS |
2016-07-08/a> | Mark Hofman | Malware being distributed pretending to be from AU Fedcourts |
2008-04-14/a> | John Bambenek | A Federal Subpoena or Just Some More Spam & Malware? |