Bojan Zdrnja Diaries
- Gift Card Scams on the rise
- Phishing Attempts That Bypass 2FA
- XPS Attachment Used for Phishing
- SMTP Strangeness - Possible C2
- Vulnerabilities on the Rise?
- Who's Borrowing your Resources?
- Good Analysis = Understanding(tools + logs + normal)
- What is going on with Port 83?
- File2pcap - A new tool for your toolkit!
- BitTorrent or Something Else?
- Cisco - Issue with Clock Signal Component
- Packet Analysis - Where do you start?
- For or Against: Port Security for Network Access Control
- Fedora RedHat Vulnerabilty Released
- Is it Really an Attack?
- What's important on your network?
- Potential Phish for Regular Webmail Accounts
- Demonstrating the value of your Intrusion Detection Program and Analysts
- Who ya gonna contact?
- Who's tracking phone calls that target your computer? Stay Tuned to the ISC
- Mailbag - "Attacks"
- Several Sites Defaced
- Logs - The Foundation of Good Security Monitoring
- Monitoring Virtual Machines
- The Sad Reality of Spam/Phishing Attempts
- Call for Packets - Unassigned TCP Options
- Network Visualization
- Network Traffic Analysis in Reverse
- The necessary evils: Policies, Processes and Procedures
- Cyber Security Awareness Month - Day 25 - Port 80 and 443
- Encrypting Data
- Its summer...Do you know what your kids are doing?
- VMWare Patches Released
- Blackberry Server Vulnerability
- To filter or not to filter?
- UDP Ports 54929, 46304, 23010
- What's on your network?
- What's Your 2009 Threat Prediction for the New Year?
- Security During Deployments
- Day 19 - Eradication: Forensic Analysis Tools - What Happened?
- 10 signs you might be compromised, and don't even know it
- Malware Analysis: Tools are only so good
- Survival Time on the Internet
- Good Always Comes Out of Bad
- Another Call for Packets - Port 502
- Call for Packets - Port 19905
- Malware Detection - Take the Blinders Off
- XP SP3 Issues
- Update - Tools for the Home User
- ActiveX FAQ
- Tools for the Home User
- Solution: Christmas Packet Challenge
- A Christmas Packet Challenge
- Facebook and PGP
- Cyber Security Awareness Tip #13: Patches and Updates
- Packet Call
- Riding out yet Another Storm Wave
- PHP Exploit Code in a GIF
- Massive MPACK Compromise
- The National Weather Service has issued...
- Deformed TCP Options - Got Packets?
- Its been a malware kind of Day
- It's 10 p.m. Do you know where your children are?
- Solution for: The Twelve Days of Christmas Packet Challenge
- New, Unpatched Office Vulnerability
- All I want for christmas are my exploits....
- The Twelve Days of Christmas Packet Challenge
- MS06-072: Cumulative Security Update for Internet Explorer (925454)
- Update: Malware Analysis: Tools of the Trade
- An ISC Back to School Special
- What's up on Port 139?
- eEye Releases Free Scanner for MS06-040
- MS06-050: Vulnerabilities in Microsoft Windows Hyperlink Object Library Could Allow Remote Code Execution (920670)
- MS06-043: Vulnerability in Microsoft Windows Could Allow Remote Code Execution (920214)
- Packet Analysis Challenge: The Solution
- Malware Analysis Project: Tools of the Trade
- Packet Analysis Challenge
- Potential Patch Problem with MS06-025
- Vulnerability in Microsoft Exchange Could Allow Remote Code Execution (916803)
- Vulnerability in Microsoft Distributed Transaction Coordinator Could Allow Denial of Service (913580)
- It's that time again!
- Vulnerabilities in Macromedia Flash Player from Adobe Could Allow Remote Code Execution (913433)
- Oh Yeah....I forgot about that
- Modified Malware for the IE Expoit
- New IE Vulnerability
- Deja Vu - Snow.A
- Followup on challenge "Spam, Recon or ??"
- Malware: When <!-- comments --> become commands
- Google Desktop Has New Features
- Check Point Outbound Traffic Mystery
- Spam, Recon or ??: You make the call!!
- CME-24 Analysis: The destruction does not appear to spread across Windows network shares
- Another day, another bot being spammed
- What? No URL?
- Mail Call Time: More Sony Info and Snort Signatures
- Cisco 7920 Wireless IP Phone
- Possible Patch Problems
- Increased activity on TCP port 5250
- Possible New Zero-Day Exploit for Realplayer
- New Handler Pages Are Here!
- AWSTATS
- Nachia Decline; Increased Activity on Port 1026
- Perl/Exploit SQLinject; Increased Activity on Port 1039
- Patch Refresher; MS05-038 Issues
- Cash from the Cache; Port 32772
- Moving Precautions for the Security Paranoid Types
- IM and Malware
- DNS problems at Network Solutions; Potential Problems with MS05-019; Filtering SSL
- Malicious Script; Phish, Bots and What-Nots
- Port 8181 update; Trojan.Comxt.B; Mail Bag
- Wireless Thoughts - Part II; Netgear Vulnerabilties;Phishing Creativity
- Secunia Advisory for IE; meeneemee.exe
- More IFRAME, phishing and BHOs; Java Security
- More Fragmentation; What is Normal Part II
- What is Normal? Fake RedHat Advisory; JPEG Repair Utility
- Port 6346 increase; Mail bag: trojan Win32/Small.AR; SSH Advice for Repeated Hack Attempts
- SSH Scanning Resolved; First Things First Guide
- Update to MS04-025; Windows 2003 Guides Released; Port 3072; Your Daily Phish
- A Good Day for Phishing; SSH Followup; NIMDA, Still There; Tip for the Day
- Updated: MS04-011 LSASRV Exploit; Sasser Worm Update: Sasser.b
- New LSASS RPC exploit; Port 443; The Week Ahead
- Activity increase on Port 12345; More Phishing; Ethereal Exploit
- New version of Netsky
- WFTPD unpatched exploit and potential DDoS against anti-spyware forums
- Port 39999; Possible Vesser/W32.HLLW.Deadhat activity
- Pretty Quiet Day