Date Author Title

US COURTS

2008-04-14John BambenekA Federal Subpoena or Just Some More Spam & Malware?

US

2024-11-30/a>Xavier MertensFrom a Regular Infostealer to its Obfuscated Version
2024-10-16/a>Johannes UllrichThe Top 10 Not So Common SSH Usernames and Passwords
2024-09-18/a>Xavier MertensPython Infostealer Patching Windows Exodus App
2024-09-06/a>Jesse La GrewEnrichment Data: Keeping it Fresh
2024-08-26/a>Xavier MertensFrom Highly Obfuscated Batch File to XWorm and Redline
2024-07-26/a>Xavier MertensExelaStealer Delivered "From Russia With Love"
2024-07-24/a>Xavier Mertens"Mouse Logger" Malicious Python Script
2024-06-06/a>Xavier MertensMalicious Python Script with a "Best Before" Date
2024-04-22/a>Jan KoprivaIt appears that the number of industrial devices accessible from the internet has risen by 30 thousand over the past three years
2024-03-28/a>Xavier MertensFrom JavaScript to AsyncRAT
2024-03-13/a>Xavier MertensUsing ChatGPT to Deobfuscate Malicious Scripts
2024-02-28/a>Johannes UllrichExploit Attempts for Unknown Password Reset Vulnerability
2024-02-25/a>Guy BruneauUtilizing the VirusTotal API to Query Files Uploaded to DShield Honeypot [Guest Diary]
2024-02-09/a>Xavier MertensMSIX With Heavily Obfuscated PowerShell Script
2024-02-06/a>Jan KoprivaComputer viruses are celebrating their 40th birthday (well, 54th, really)
2024-01-26/a>Xavier MertensA Batch File With Multiple Payloads
2024-01-24/a>Johannes UllrichHow Bad User Interfaces Make Security Tools Harmful
2024-01-12/a>Xavier MertensOne File, Two Payloads
2024-01-08/a>Jesse La GrewWhat is that User Agent?
2023-09-05/a>Jesse La GrewCommon usernames submitted to honeypots
2023-06-24/a>Guy BruneauEmail Spam with Attachment Modiloader
2023-06-16/a>Xavier MertensAnother RAT Delivered Through VBS
2023-06-09/a>Xavier MertensUndetected PowerShell Backdoor Disguised as a Profile File
2023-05-22/a>Johannes UllrichProbes for recent ABUS Security Camera Vulnerability: Attackers keep an eye on everything.
2023-05-17/a>Xavier MertensIncrease in Malicious RAR SFX files
2023-04-09/a>Didier StevensChrome's Download Tab: Dangerous Files
2023-03-30/a>Xavier MertensBypassing PowerShell Strong Obfuscation
2023-03-21/a>Didier StevensString Obfuscation: Character Pair Reversal
2023-03-18/a>Xavier MertensOld Backdoor, New Obfuscation
2023-02-10/a>Xavier MertensObfuscated Deactivation of Script Block Logging
2023-01-25/a>Xavier MertensA First Malicious OneNote Document
2023-01-15/a>Johannes UllrichElon Musk Themed Crypto Scams Flooding YouTube Today
2022-11-05/a>Guy BruneauWindows Malware with VHD Extension
2022-11-04/a>Xavier MertensRemcos Downloader with Unicode Obfuscation
2022-10-18/a>Xavier MertensPython Obfuscation for Dummies
2022-09-16/a>Didier StevensWord Maldoc With CustomXML and Renamed VBAProject.bin
2022-09-12/a>Johannes UllrichVirusTotal Result Comparisons for Honeypot Malware
2022-06-28/a>Johannes UllrichPossible Scans for HiByMusic Devices
2022-06-19/a>Didier StevensVideo: Decoding Obfuscated BASE64 Statistically
2022-06-18/a>Didier StevensDecoding Obfuscated BASE64 Statistically
2022-06-17/a>Brad DuncanMalspam pushes Matanbuchus malware, leads to Cobalt Strike
2022-06-16/a>Xavier MertensHoudini is Back Delivered Through a JavaScript Dropper
2022-06-01/a>Jan KoprivaHTML phishing attachments - now with anti-analysis features
2022-05-09/a>Xavier MertensOctopus Backdoor is Back with a New Embedded Obfuscated Bat File
2022-04-13/a>Jan KoprivaHow is Ukrainian internet holding up during the Russian invasion?
2022-03-27/a>Didier StevensVideo: Maldoc Cleaned by Anti-Virus
2022-03-22/a>Johannes UllrichStatement by President Biden: What you need to do (or not do)
2022-03-10/a>Xavier MertensCredentials Leaks on VirusTotal
2022-02-24/a>Xavier MertensUkraine & Russia Situation From a Domain Names Perspective
2022-01-05/a>Xavier MertensCode Reuse In the Malware Landscape
2021-11-26/a>Guy BruneauSearching for Exposed ASUS Routers Vulnerable to CVE-2021-20090
2021-11-18/a>Xavier MertensJavaScript Downloader Delivers Agent Tesla Trojan
2021-11-14/a>Didier StevensVideo: Obfuscated Maldoc: Reversed BASE64
2021-10-20/a>Xavier MertensThanks to COVID-19, New Types of Documents are Lost in The Wild
2021-09-24/a>Xavier MertensKeep an Eye on Your Users Mobile Devices (Simple Inventory)
2021-09-22/a>Didier StevensAn XML-Obfuscated Office Document (CVE-2021-40444)
2021-08-19/a>Johannes UllrichWhen Lightning Strikes. What works and doesn't work.
2021-07-13/a>Johannes UllrichUSPS Phishing Using Telegram to Collect Data
2021-06-11/a>Xavier MertensKeeping an Eye on Dangerous Python Modules
2021-06-04/a>Xavier MertensRussian Dolls VBS Obfuscation
2021-05-14/a>Xavier Mertens"Open" Access to Industrial Systems Interface is Also Far From Zero
2021-05-12/a>Jan KoprivaNumber of industrial control systems on the internet is lower then in 2020...but still far from zero
2021-04-24/a>Guy BruneauBase64 Hashes Used in Web Scanning
2021-04-16/a>Rick WannerQuerying Spamhaus for IP reputation
2021-03-06/a>Xavier MertensSpotting the Red Team on VirusTotal!
2021-03-02/a>Russ McReeAdversary Simulation with Sim
2021-01-18/a>Rob VandenBrinkThe CIS Benchmark for Cisco Nexus (NX-OS) 1.0 went live last week, find it here: https://www.cisecurity.org/cis-benchmarks/
2021-01-04/a>Jan KoprivaFrom a small BAT file to Mass Logger infostealer
2020-12-29/a>Jan KoprivaWant to know what's in a folder you don't have a permission to access? Try asking your AV solution...
2020-12-24/a>Xavier MertensMalicious Word Document Delivering an Octopus Backdoor
2020-12-05/a>Guy BruneauIs IP 91.199.118.137 testing Access to aahwwx.52host.xyz?
2020-11-25/a>Xavier MertensLive Patching Windows API Calls Using PowerShell
2020-11-21/a>Guy BruneauVMware privilege escalation vulnerabilities (CVE-2020-4004, CVE-2020-4005) - https://www.vmware.com/security/advisories/VMSA-2020-0026.html
2020-11-19/a>Xavier MertensPowerShell Dropper Delivering Formbook
2020-11-18/a>Xavier MertensWhen Security Controls Lead to Security Issues
2020-11-13/a>Xavier MertensOld Worm But New Obfuscation Technique
2020-11-05/a>Xavier MertensDid You Spot "Invoke-Expression"?
2020-10-14/a>Xavier MertensNicely Obfuscated Python RAT
2020-09-04/a>Jan KoprivaA blast from the past - XXEncoded VB6.0 Trojan
2020-08-31/a>Didier StevensFinding The Original Maldoc
2020-08-29/a>Didier StevensMalicious Excel Sheet with a NULL VT Score: More Info
2020-08-24/a>Xavier MertensTracking A Malware Campaign Through VT
2020-08-19/a>Xavier MertensExample of Word Document Delivering Qakbot
2020-08-16/a>Didier StevensSmall Challenge: A Simple Word Maldoc - Part 3
2020-07-11/a>Guy BruneauVMware XPC Client validation privilege escalation vulnerability - https://www.vmware.com/security/advisories/VMSA-2020-0017.html
2020-07-08/a>Xavier MertensIf You Want Something Done Right, You Have To Do It Yourself... Malware Too!
2020-06-08/a>Didier StevensTranslating BASE64 Obfuscated Scripts
2020-05-06/a>Xavier MertensKeeping an Eye on Malicious Files Life Time
2020-04-27/a>Xavier MertensPowershell Payload Stored in a PSCredential Object
2020-04-24/a>Xavier MertensMalicious Excel With a Strong Obfuscation and Sandbox Evasion
2020-04-03/a>Xavier MertensObfuscated with a Simple 0x0A
2020-02-22/a>Xavier MertensSimple but Efficient VBScript Obfuscation
2020-02-07/a>Xavier MertensSandbox Detection Tricks & Nice Obfuscation in a Single VBScript
2020-01-27/a>Johannes UllrichNetwork Security Perspective on Coronavirus Preparedness
2020-01-23/a>Xavier MertensComplex Obfuscation VS Simple Trick
2019-12-15/a>Didier StevensVirusTotal Email Submissions
2019-12-12/a>Xavier MertensCode & Data Reuse in the Malware Ecosystem
2019-10-18/a>Xavier MertensQuick Malicious VBS Analysis
2019-08-14/a>Brad DuncanRecent example of MedusaHTTP malware
2019-08-09/a>Xavier Mertens100% JavaScript Phishing Page
2019-07-25/a>Rob VandenBrinkWhen Users Attack! Users (and Admins) Thwarting Security Controls
2019-07-11/a>Xavier MertensRussian Dolls Malicious Script Delivering Ursnif
2019-07-05/a>Didier StevensA "Stream O" Maldoc
2019-07-02/a>Xavier MertensMalicious Script With Multiple Payloads
2019-07-01/a>Didier StevensMaldoc: Payloads in User Forms
2019-06-28/a>Rob VandenBrinkVerifying Running Processes against VirusTotal - Domain-Wide
2019-06-10/a>Xavier MertensInteresting JavaScript Obfuscation Example
2019-02-11/a>Didier StevensHave You Seen an Email Virus Recently?
2019-01-21/a>Didier StevensSuspicious GET Request: Do You Know What This Is?
2018-12-29/a>Didier StevensVideo: De-DOSfuscation Example
2018-12-15/a>Didier StevensDe-DOSfuscation Example
2018-12-12/a>Didier StevensYet Another DOSfuscation Sample
2018-11-27/a>Xavier MertensMore obfuscated shell scripts: Fake MacOS Flash update
2018-11-26/a>Xavier MertensObfuscated bash script targeting QNap boxes
2018-11-16/a>Xavier MertensBasic Obfuscation With Permissive Languages
2018-11-06/a>Xavier MertensMalicious Powershell Script Dissection
2018-10-30/a>Brad DuncanCampaign evolution: Hancitor malspam starts pushing Ursnif this week
2018-10-23/a>Xavier MertensDiving into Malicious AutoIT Code
2018-09-30/a>Didier StevensWhen DOSfuscation Helps...
2018-09-20/a>Xavier MertensHunting for Suspicious Processes with OSSEC
2018-07-30/a>Didier StevensMalicious Word documents using DOSfuscation
2018-07-26/a>Xavier MertensWindows Batch File Deobfuscation
2018-07-24/a>Brad DuncanRecent Emotet activity
2018-07-02/a>Guy BruneauVMware ESXi, Workstation, and Fusion address multiple out-of-bounds read vulnerabilities https://www.vmware.com/security/advisories/VMSA-2018-0016.html
2018-06-25/a>Didier StevensGuilty by association
2018-06-18/a>Xavier MertensMalicious JavaScript Targeting Mobile Browsers
2018-06-05/a>Xavier MertensMalicious Post-Exploitation Batch File
2018-05-27/a>Guy BruneauCapture and Analysis of User Agents
2018-05-25/a>Xavier MertensAntivirus Evasion? Easy as 1,2,3
2018-05-22/a>Guy BruneauVMware updates enable Hypervisor-Assisted Guest Mitigations for Speculative Store Bypass issue - https://www.vmware.com/security/advisories/VMSA-2018-0012.html
2018-03-05/a>Xavier MertensMalicious Bash Script with Multiple Features
2018-01-01/a>Didier StevensWhat is new?
2017-12-19/a>Xavier MertensExample of 'MouseOver' Link in a Powerpoint File
2017-11-03/a>Xavier MertensSimple Analysis of an Obfuscated JAR File
2017-10-30/a>Johannes UllrichCritical Patch For Oracle's Identity Manager
2017-10-27/a>Renato Marinho"Catch-All" Google Chrome Malicious Extension Steals All Posted Data
2017-10-06/a>Johannes UllrichWhat's in a cable? The dangers of unauthorized cables
2017-09-30/a>Lorna HutchesonWho's Borrowing your Resources?
2017-09-18/a>Xavier MertensGetting some intelligence from malspam
2017-09-16/a>Guy BruneauVMware ESXi, vCenter Server, Fusion and Workstation updates resolve multiple security vulnerabilities - https://www.vmware.com/security/advisories/VMSA-2017-0015.html
2017-08-29/a>Renato MarinhoSecond Google Chrome Extension Banker Malware in Two Weeks
2017-07-08/a>Xavier MertensA VBScript with Obfuscated Base64 Data
2017-06-22/a>Xavier MertensObfuscating without XOR
2017-06-17/a>Guy BruneauMapping Use Cases to Logs. Which Logs are the Most Important to Collect?
2017-05-30/a>Johannes UllrichFreeRadius Authentication Bypass
2017-04-28/a>Xavier MertensAnother Day, Another Obfuscation Technique
2017-04-21/a>Xavier MertensAnalysis of a Maldoc with Multiple Layers of Obfuscation
2017-04-19/a>Xavier MertensHunting for Malicious Excel Sheets
2017-03-30/a>Xavier MertensDiverting built-in features for the bad
2017-03-24/a>Xavier MertensNicely Obfuscated JavaScript Sample
2017-03-18/a>Xavier MertensExample of Multiple Stages Dropper
2017-03-04/a>Xavier MertensHow your pictures may affect your website reputation
2017-02-28/a>Xavier MertensAnalysis of a Simple PHP Backdoor
2017-02-12/a>Xavier MertensAnalysis of a Suspicious Piece of JavaScript
2017-01-06/a>John BambenekGreat Misadventures of Security Vendors: Absurd Sandboxing Edition
2016-11-16/a>Xavier MertensExample of Getting Analysts & Researchers Away
2016-10-26/a>Johannes UllrichNew VMWare Security Advisory: VMSA-2016-0017 Information Disclosure in VMWare Fusion and VMWare Tools https://www.vmware.com/security/advisories/VMSA-2016-0017.html
2016-09-09/a>Xavier MertensCollecting Users Credentials from Locked Devices
2016-08-29/a>Russ McReeRecommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
2016-08-28/a>Guy BruneauSpam with Obfuscated Javascript
2016-07-03/a>Guy BruneauIs Data Privacy part of your Company's Culture?
2016-06-22/a>Bojan ZdrnjaSecurity through obscurity never works
2016-02-20/a>Didier StevensLocky: JavaScript Deobfuscation
2016-02-07/a>Xavier MertensMore Malicious JavaScript Obfuscation
2016-01-23/a>Didier StevensSigcheck and VirusTotal for Offline Machine
2016-01-15/a>Xavier MertensJavaScript Deobfuscation Tool
2015-12-09/a>Xavier MertensEnforcing USB Storage Policy with PowerShell
2015-12-05/a>Guy BruneauAre you looking to setup your own Malware Sandbox?
2015-12-02/a>Rob VandenBrinkNessus and Powershell is like Chocolate and Peanut Butter!
2015-08-16/a>Guy BruneauAre you a "Hunter"?
2015-08-06/a>Didier StevensSigcheck and virustotal-search
2015-07-21/a>Didier StevensSearching Through the VirusTotal Database
2015-07-17/a>Didier StevensProcess Explorer and VirusTotal
2015-07-17/a>Didier StevensAutoruns and VirusTotal
2015-07-17/a>Didier StevensSigcheck and VirusTotal
2015-06-28/a>Didier StevensThe EICAR Test File
2015-04-06/a>Guy Bruneau'Dead Drops' Hidden USB Sticks Around the World
2014-11-04/a>Daniel WesemannWhois someone else?
2014-10-03/a>Johannes UllrichCSAM: The Power of Virustotal to Turn Harmless Binaries Malicious
2014-09-26/a>Richard PorterWhy We Have Moved to InfoCon:Yellow
2014-07-18/a>Russ McReeGameover Zeus reported as "returned from the dead"
2014-06-02/a>John BambenekGameover Zeus and Cryptolocker Takedowns
2014-05-30/a>Johannes UllrichFake Australian Electric Bill Leads to Cryptolocker
2014-05-27/a>Kevin ShorttAvast forums hacked
2014-04-05/a>Jim ClausingThose strange e-mails with URLs in them can lead to Android malware
2014-02-07/a>Rob VandenBrinkHello Virustotal? It's Microsoft Calling.
2014-01-24/a>Chris MohanPhishing via Social Media
2013-12-16/a>Tom WebbThe case of Minerd
2013-11-22/a>Rick WannerTales of Password Reuse
2013-11-02/a>Rick WannerProtecting Your Family's Computers
2013-10-30/a>Russ McReeSIR v15: Five good reasons to leave Windows XP behind
2013-10-04/a>Johannes UllrichThe Adobe Breach FAQ
2013-08-26/a>Alex StanfordStop, Drop and File Carve
2013-08-19/a>Johannes UllrichRunning Snort on ESXi using the Distributed Switch
2013-08-03/a>Deborah HaleWhat Anti-virus Program Is Right For You?
2013-06-07/a>Daniel Wesemann100% Compliant (for 65% of the systems)
2013-05-20/a>Guy BruneauSafe - Tools, Tactics and Techniques
2013-05-09/a>John BambenekAdobe Releases 0-day Security Advisory for Coldfusion, Exploit Code Available. Advisory here: http://www.adobe.com/support/security/advisories/apsa13-03.html
2013-05-08/a>Chris MohanSyria drops from Internet 7th May 2013
2013-04-26/a>Russ McReeWhat is "up to date anti-virus software"?
2013-03-28/a>John BambenekWhere Were You During the Great DDoS Cybergeddon of 2013?
2013-03-27/a>Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - IPv6 moving target defense
2013-03-25/a>Johannes UllrichIPv6 Focus Month: IPv6 over IPv4 Preference
2013-03-19/a>Johannes UllrichIPv6 Focus Month: The warm and fuzzy side of IPv6
2013-03-18/a>Johannes UllrichIPv6 Focus Month: What is changing with DHCP
2013-03-18/a>Kevin ShorttSpamhaus DDOS
2013-03-11/a>Richard PorterIPv6 Focus Month: Traffic Testing, Firewalls, ACLs, pt 1
2013-03-09/a>Guy BruneauIPv6 Focus Month: IPv6 Encapsulation - Protocol 41
2013-03-08/a>Johannes UllrichIPv6 Focus Month: Filtering ICMPv6 at the Border
2013-03-06/a>Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - Geolocation Using IPv6 Addresses
2013-03-05/a>Mark HofmanIPv6 Focus Month: Device Defaults
2013-03-04/a>Johannes UllrichIPv6 Focus Month: Addresses
2013-02-25/a>Johannes UllrichTrustwave Trustkeeper Phish
2013-02-19/a>Johannes UllrichEDUCAUSE Breach
2013-02-08/a>Kevin ShorttIs it Spam or Is it Malware?
2013-01-15/a>Rob VandenBrinkWhen Disabling IE6 (or Java, or whatever) is not an Option...
2013-01-05/a>Guy BruneauAdobe ColdFusion Security Advisory
2013-01-03/a>Manuel Humberto Santander PelaezNew year and new CA compromised
2012-12-03/a>John BambenekJohn McAfee Exposes His Location in Photo About His Being on Run
2012-11-29/a>Kevin ShorttNew Apple Security Update: APPLE-SA-2012-11-29-1 Apple TV 5.1.1
2012-11-28/a>Mark HofmanMcAfee releases extraDAT for W32/Autorun.worm.aaeb-h
2012-11-28/a>Mark HofmanNew version of wireshark is available (1.8.4), some security fixes included.
2012-11-27/a>Chris MohanCan users' phish emails be a security admin's catch of the day?
2012-11-26/a>John BambenekOnline Shopping for the Holidays? Tips, News and a Fair Warning
2012-11-20/a>John BambenekBehind the Random NTP Bizarreness of Incorrect Year Being Set
2012-11-20/a>John BambenekFirefox v 17.0 just released, more here: http://www.mozilla.org/en-US/firefox/17.0/releasenotes/
2012-11-19/a>John BambenekMoneyGram fined $100 million for aiding wire fraud - http://krebsonsecurity.com/2012/11/moneygram-fined-100-million-for-wire-fraud/
2012-11-19/a>John BambenekNew Poll: Top 5 Unresolved Security Problems of 2012
2012-11-17/a>Manuel Humberto Santander PelaezNew Sysinternal Updates: AdExplorer v1.44, Contig v1.7, Coreinfo v3.2, Procdump v5.1. See http://blogs.technet.com/b/sysinternals/archive/2012/11/16/updates-adexplorer-v1-44-contig-v1-7-coreinfo-v3-2-procdump-v5-1.aspx?Redirected=true
2012-11-12/a>John BambenekRequest for info: Robocall Phishing Against Local/Regional Banks
2012-11-09/a>Mark BaggettRemote Diagnostics with PSR
2012-11-09/a>Mark BaggettFresh batch of Microsoft patches next week
2012-11-07/a>Mark BaggettHelp eliminate unquoted path vulnerabilities
2012-11-07/a>Mark BaggettMultiple 0-Days Reported!
2012-11-07/a>Mark BaggettCisco TACACS+ Authentication Bypass
2012-11-05/a>Johannes UllrichPossible Fake-AV Ads from Doubleclick Servers
2012-11-05/a>Johannes UllrichReminder: Ongoing SMTP Brute Forcing Attacks
2012-11-04/a>Lorna HutchesonWhat's important on your network?
2012-11-02/a>Daniel WesemannThe shortcomings of anti-virus software
2012-10-31/a>Johannes UllrichCyber Security Awareness Month - Day 31 - Business Continuity and Disaster Recovery
2012-10-30/a>Johannes UllrichHurricane Sandy Update
2012-10-30/a>Richard PorterSplunk 5.0 SP-CAAAHB4 http://www.splunk.com/view/SP-CAAAHB4
2012-10-28/a>Tony CarothersFirefox 16.02 Released
2012-10-26/a>Russ McReeCyber Security Awareness Month - Day 26 - Attackers use trusted domain to propagate Citadel Zeus variant
2012-10-25/a>Richard PorterCyber Security Awareness Month - Day 25 - Pro Audio & Video Packets on the Wire
2012-10-24/a>Russ McReeOngoing Windstream outage in the midwest - https://twitter.com/search?q=windstream
2012-10-21/a>Johannes UllrichCyber Security Awareness Month - Day 22: Connectors
2012-10-21/a>Lorna HutchesonPotential Phish for Regular Webmail Accounts
2012-10-19/a>Johannes UllrichCyber Security Awareness Month - Day 19: Standard log formats and CEE.
2012-10-18/a>Rob VandenBrinkCyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide
2012-10-17/a>Mark HofmanNew Acrobat release (including reader) available. Version 11. Some security improvements more here -->http://blogs.adobe.com/adobereader/
2012-10-16/a>Richard PorterCyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook.
2012-10-16/a>Johannes UllrichCyber Security Awareness Month - Day 16: W3C and HTML
2012-10-14/a>Pedro BuenoCyber Security Awareness Month - Day 14 - Poor Man's File Analysis System - Part 1
2012-10-09/a>Johannes UllrichMicrosoft October 2012 Black Tuesday Update - Overview
2012-10-07/a>Tony CarothersCyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1
2012-10-05/a>Johannes UllrichCyber Security Awareness Month - Day 5: Standards Body Soup, So many Flavors in the bowl.
2012-10-05/a>Richard PorterVMWare Security Advisory: VMSA-2012-0014 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html
2012-10-05/a>Richard PorterReports of a Distributed Injection Scan
2012-10-04/a>Mark HofmanAnd the SHA-3 title goes to .....Keccak
2012-10-01/a>Johannes UllrichCyber Security Awareness Month
2012-09-28/a>Joel EslerAdobe certification revocation for October 4th
2012-09-26/a>Johannes UllrichSome Android phones can be reset to factory default by clicking on links
2012-09-26/a>Johannes UllrichMore Java Woes
2012-09-21/a>Johannes UllrichiOS 6 Security Roundup
2012-09-21/a>Guy BruneauStoring your Collection of Malware Samples with Malwarehouse
2012-09-19/a>Russ McReeScript kiddie scavenging with Shellbot.S
2012-09-17/a>Rob VandenBrinkWhat's on your iPad?
2012-09-14/a>Lenny ZeltserScam Report - Fake Voice Mail Email Notification Redirects to Malicious Site
2012-09-13/a>Mark BaggettMicrosoft disrupts traffic associated with the Nitol botnet
2012-09-13/a>Mark BaggettMore SSL trouble
2012-09-10/a>Johannes UllrichMicrosoft Patch Tuesday Pre-Release
2012-09-10/a>Johannes UllrichGodaddy DDoS Attack
2012-09-06/a>Johannes UllrichSSL Requests sent to port 80 (request for help/input)
2012-09-04/a>Johannes UllrichAnother round of "Spot the Exploit E-Mail"
2012-09-02/a>Lorna HutchesonDemonstrating the value of your Intrusion Detection Program and Analysts
2012-09-01/a>Russ McReeBlackhole targeting Java vulnerability via fake Microsoft Services Agreement email phish
2012-08-30/a>Johannes UllrichEditorial: The Slumlord Approach to Network Security http://isc.sans.edu/j/editorial
2012-08-29/a>Johannes Ullrich"Data" URLs used for in-URL phishing
2012-08-27/a>Johannes UllrichThe Good, Bad and Ugly about Assigning IPv6 Addresses
2012-08-27/a>Johannes UllrichMalware Spam harvesting Facebook Information
2012-08-26/a>Lorna HutchesonWho ya gonna contact?
2012-08-20/a>Manuel Humberto Santander PelaezDo we need test procedures in our companies before implementing Antivirus signatures?
2012-08-19/a>Manuel Humberto Santander PelaezAuthentication Issues between entities during protocol message exchange in SCADA Systems
2012-08-14/a>Rick WannerMicrosoft August 2012 Black Tuesday Update - Overview
2012-08-13/a>Rick WannerInteresting scan for medical certification information...
2012-08-12/a>Tony CarothersLayers of the Defense-in-Depth Onion
2012-08-12/a>Tony CarothersOracle Security Alert for CVE-2012-3132
2012-08-09/a>Mark HofmanZeus/Citadel variant causing issues in the Netherlands
2012-08-09/a>Mark HofmanSQL Injection Lilupophilupop style, Part 2
2012-08-07/a>Adrien de BeaupreWho protects small business?
2012-08-04/a>Kevin ListonVendors: More Patch-Release Options Please
2012-07-27/a>Daniel WesemannCuckoo 0.4 is out - cool new features for malware analysis http://www.cuckoosandbox.org/
2012-07-24/a>Richard PorterWireshark 1.8.1 Released http://www.wireshark.org/
2012-07-24/a>Richard PorterReport of spike in DNS Queries gd21.net
2012-07-20/a>Mark BaggettSyria Internet connection cut?
2012-07-19/a>Mark BaggettDiagnosing Malware with Resource Monitor
2012-07-19/a>Mark BaggettA Heap of Overflows?
2012-07-16/a>Richard PorterSysinternals Update @ http://blogs.technet.com/b/sysinternals/archive/2012/07/16/updates-handle-v3-5-process-explorer-v15-22-process-monitor-v3-03-rammap-v1-21-zoomit-v4-3.aspx
2012-07-14/a>Tony CarothersUser Awareness and Education
2012-07-13/a>Richard PorterYesterday (not as on the ball as Rob) at SANSFire
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Recording Server - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Manager - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman
2012-07-09/a>Johannes UllrichThe FBI will turn off the Internet on Monday (or not)
2012-07-09/a>Manuel Humberto Santander PelaezInternet Storm Center panel tonight at SANSFIRE 2012!
2012-07-05/a>Adrien de BeaupreNew OS X trojan backdoor MaControl variant reported
2012-07-02/a>Joel EslerA rough guide to keeping your website up
2012-07-02/a>Dan GoldbergStorms of June 29th 2012 in Mid Atlantic region of the USA
2012-07-02/a>Joel EslerLinux & Java leap second bug
2012-06-29/a>Jim ClausingUpdated SysInternals tools - Autoruns, Process Explorer, Process Monitor, PSKill -- http://blogs.technet.com/b/sysinternals/archive/2012/06/28/updates-autoruns-v11-32-process-explorer-v15-21-process-monitor-v3-02-pskill-v1-15-rammap-v1-2.aspx
2012-06-25/a>Rick WannerTargeted Malware for Industrial Espionage?
2012-06-25/a>Guy BruneauUsing JSDetox to Analyze and Deobfuscate Javascript
2012-06-21/a>Russ McReeAnalysis of drive-by attack sample set
2012-06-21/a>Russ McReeWireshark 1.8.0 released 21 JUN 2012 http://www.wireshark.org/download.html
2012-06-19/a>Daniel Wesemann Vulnerabilityqueerprocessbrittleness
2012-06-12/a>Swa FrantzenAdobe June 2012 Black Tuesday patches
2012-06-11/a>Johannes UllrichMicrosoft Update Security
2012-05-22/a>Johannes Ullrichnmap 6 released
2012-05-16/a>Johannes UllrichAvira Antivirus false positives http://forum.avira.com/wbb/index.php?page=Thread&threadID=144875
2012-04-26/a>Richard PorterDefine Irony: A medical device with a Virus?
2012-04-13/a>Daniel WesemannAnti-virus scanning exclusions
2012-04-05/a>Johannes UllrichEvil hides everywhere: Web Application Exploits in Headers
2012-03-11/a>Johannes UllrichAn Analysis of Jester's QR Code Attack. (Guest Diary)
2012-03-05/a>Johannes UllrichFlashback Malware now with Twitter C&C
2012-01-22/a>Johannes UllrichJavascript DDoS Tool Analysis
2012-01-03/a>Bojan ZdrnjaThe tale of obfuscated JavaScript continues
2011-12-13/a>Johannes UllrichDecember 2011 Adobe Black Tuesday
2011-10-28/a>Russ McReeCritical Control 19: Data Recovery Capability
2011-08-26/a>Daniel WesemannUser Agent 007
2011-08-09/a>Swa Frantzenabuse handling
2011-07-29/a>Richard PorterApple Lion talking on TCP 5223
2011-07-11/a>John BambenekAnother Defense Contractor Hacked in AntiSec Hacktivism Spree
2011-07-03/a>Deborah HaleBusiness Continuation in the Face of Disaster
2011-07-02/a>Pedro BuenoBootkits, they are back at full speed...
2011-06-06/a>Manuel Humberto Santander PelaezPhishing: Same goal, same techniques and people still falling for such scams
2011-06-02/a>Johannes UllrichSome Insight into Apple's Anti-Virus Signatures
2011-05-31/a>Johannes UllrichApple Improving OS X Anti-Malware Feature
2011-05-19/a>Daniel WesemannFake AV Bingo
2011-05-01/a>Deborah HaleAnother Potentially Malicious Email Making The Rounds
2011-04-20/a>Daniel WesemannVirustotal.com hiccup
2011-03-17/a>Kevin ListonSo You Got an AV Alert. Now What?
2011-03-09/a>Kevin ShorttAVG Anti-Virus 2011 False Positives - Luhe.Exploit.PDF.B
2011-03-02/a>Chris MohanCleaning house
2011-03-01/a>Daniel WesemannAV software and "sharing samples"
2011-02-09/a>Mark HofmanAdobe Patches (shockwave, Flash, Reader & Coldfusion)
2011-02-07/a>Richard PorterCrime is still Crime! Pt 2
2011-02-07/a>Pedro BuenoThe Good , the Bad and the Unknown Online Scanners
2011-01-18/a>Daniel WesemannYet another rogue anti-virus
2011-01-15/a>Jim ClausingWhat's up with port 8881?
2011-01-10/a>Manuel Humberto Santander PelaezFacebook virus spreads via photo album chat messages
2011-01-10/a>Manuel Humberto Santander PelaezVirusTotal VTzilla firefox/chrome plugin
2010-12-01/a>Deborah HaleA Gentle Reminder - It is that time of year again
2010-11-22/a>Lenny ZeltserBrand Impersonations On-Line: Brandjacking and Social Networks
2010-11-11/a>Daniel WesemannFake AV scams via Skype Chat
2010-11-02/a>Johannes UllrichLimited Malicious Search Engine Poisoning for Election
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - Remote User VPN Tunnels - to Split or not to Split?
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - Remote User VPN Access – Are things getting too easy, or too hard?
2010-09-28/a>Daniel WesemannSupporting the economy (in Russia and Ukraine)
2010-09-26/a>Daniel WesemannPDF analysis paper
2010-09-09/a>Marcus Sachs'Here You Have' Email
2010-08-15/a>Manuel Humberto Santander PelaezObfuscated SQL Injection attacks
2010-08-03/a>Johannes UllrichWhen Lightning Strikes
2010-06-29/a>Johannes UllrichHow to be a better spy: Cyber security lessons from the recent russian spy arrests
2010-06-27/a>Manuel Humberto Santander PelaezStudy of clickjacking vulerabilities on popular sites
2010-06-14/a>Manuel Humberto Santander PelaezSmall lot of Olympus Stylus Tough 6010 shipped with malware
2010-06-01/a>Mark HofmanSPF how useful is it?
2010-05-26/a>Bojan ZdrnjaMalware modularization and AV detection evasion
2010-04-20/a>Raul SilesAre You Ready for a Transportation Collapse...?
2010-04-08/a>Bojan ZdrnjaJavaScript obfuscation in PDF: Sky is the limit
2010-04-02/a>Guy BruneauOracle Java SE and Java for Business Critical Patch Update Advisory
2010-03-25/a>Kevin ListonZeus wants to do your taxes
2010-03-05/a>Kyle HaugsnessJavascript obfuscators used in the wild
2010-02-22/a>Rob VandenBrinkNew Risks in Penetration Testing
2010-02-15/a>Johannes UllrichVarious Olympics Related Dangerous Google Searches
2010-02-02/a>Guy BruneauAdobe ColdFusion Information Disclosure
2010-02-02/a>Johannes UllrichPushdo Update
2010-01-30/a>Stephen HallGot PushDo SSL packets?
2010-01-06/a>Guy BruneauSecure USB Flaw Exposed
2009-12-19/a>Deborah HaleFrustrations of ISP Abuse Handling
2009-12-03/a>Mark HofmanAvast false positives
2009-11-13/a>Deborah HalePushdo/Cutwail Spambot - A Little Known BIG Problem
2009-11-05/a>Swa FrantzenRIM fixes random code execution vulnerability
2009-11-03/a>Andre LudwigSURBL now posting abuse statistics for TLD's
2009-10-27/a>Rob VandenBrinkNew VMware Desktop Products Released (Workstation, Fusion, ACE)
2009-10-22/a>Adrien de BeaupreCyber Security Awareness Month - Day 22 port 502 TCP - Modbus
2009-10-09/a>Rob VandenBrinkTHAWTE to discontinue free Email Certificate Services and Web of Trust Service
2009-10-02/a>Stephen HallVMware Fusion updates to fixes a couple of bugs
2009-09-25/a>Lenny ZeltserCategories of Common Malware Traits
2009-09-17/a>Bojan ZdrnjaWhy is Rogue/Fake AV so successful?
2009-08-29/a>Guy BruneauImmunet Protect - Cloud and Community Malware Protection
2009-08-26/a>Johannes UllrichWSUS 3.0 SP2 released
2009-08-26/a>Johannes UllrichMalicious CD ROMs mailed to banks
2009-08-19/a>Daniel WesemannChecking your protection
2009-08-13/a>Jim ClausingNew and updated cheat sheets
2009-08-13/a>Johannes UllrichCA eTrust update crashes systems
2009-07-05/a>Bojan ZdrnjaMore on ColdFusion hacks
2009-07-03/a>Adrien de BeaupreFCKEditor advisory
2009-07-02/a>Bojan ZdrnjaCold Fusion web sites getting compromised
2009-06-30/a>Chris CarboniObfuscated Code
2009-06-30/a>Chris CarboniDe-Obfuscation Submissions
2009-05-28/a>Jim ClausingMore new volatility plugins
2009-05-27/a>donald smithHost file black lists
2009-04-10/a>Stephen HallSomething for the holiday? Nessus 4 is out
2009-04-07/a>Bojan ZdrnjaAdvanced JavaScript obfuscation (or why signature scanning is a failure)
2009-04-06/a>Adrien de BeaupreAbuse addresses
2009-03-16/a>Johannes Ullrichnew rogue-DHCP server malware
2009-03-08/a>Marcus SachsBehind the Estonia Cyber Attacks
2009-02-12/a>Mark HofmanAustralian Bushfires
2009-02-06/a>Adrien de BeaupreFake stimulus payments
2009-01-30/a>Mark HofmanWe all "Love" USB drives
2008-12-28/a>Raul SilesLevel3 Outage?
2008-12-25/a>Maarten Van HorenbeeckMerry Christmas, and beware of digital hitchhikers!
2008-11-21/a>Mark HofmanTo USB or not to USB, well not in the DoD - what do you do?
2008-09-18/a>Bojan ZdrnjaMonitoring HTTP User-Agent fields
2008-09-15/a>donald smithFake antivirus 2009 and search engine results
2008-09-03/a>Daniel WesemannStatic analysis of Shellcode - Part 2
2008-07-14/a>Daniel WesemannObfuscated JavaScript Redux
2008-04-22/a>donald smithMaximus root kit downloads via MySpace social engineering trick.
2008-04-14/a>John BambenekA Federal Subpoena or Just Some More Spam & Malware?
2008-04-10/a>Deborah HaleAbuse Contacts
2008-04-08/a>Swa FrantzenNotes file viewer vulnerabilities
2008-04-07/a>John BambenekHP USB Keys Shipped with Malware for your Proliant Server
2008-04-06/a>Daniel WesemannAdvanced obfuscated JavaScript analysis
2008-04-03/a>Bojan ZdrnjaMixed (VBScript and JavaScript) obfuscation
2006-11-10/a>Tony CarothersA busy Black Tuesday coming up.....
2006-10-30/a>William SaluskyToD - Configuration Management - maintaining security awareness
2006-10-09/a>Swa FrantzenMicrosoft black tuesday - October 2006 STATUS
2006-09-01/a>Joel EslerCA eTrust Antivirus [was] flagging lsass.e x e
2006-08-17/a>Swa FrantzenMicrosoft August 2006 Patches: STATUS
2000-01-02/a>Deborah Hale2010 A Look Back - 2011 A Look Ahead

COURTS

2016-07-08/a>Mark HofmanMalware being distributed pretending to be from AU Fedcourts
2008-04-14/a>John BambenekA Federal Subpoena or Just Some More Spam & Malware?