Date Author Title

CREDENTIAL THEFT

2021-05-29Guy BruneauSpear-phishing Email Targeting Outlook Mail Clients

CREDENTIAL

2024-03-10/a>Guy BruneauWhat happens when you accidentally leak your AWS API keys? [Guest Diary]
2024-03-07/a>Jesse La Grew[Guest Diary] AWS Deployment Risks - Configuration and Credential File Targeting
2023-10-29/a>Guy BruneauSpam or Phishing? Looking for Credentials & Passwords
2023-08-04/a>Xavier MertensAre Leaked Credentials Dumps Used by Attackers?
2022-10-04/a>Johannes UllrichCredential Harvesting with Telegram API
2022-03-10/a>Xavier MertensCredentials Leaks on VirusTotal
2021-11-08/a>Xavier Mertens(Ab)Using Security Tools & Controls for the Bad
2021-05-29/a>Guy BruneauSpear-phishing Email Targeting Outlook Mail Clients
2020-11-18/a>Xavier MertensWhen Security Controls Lead to Security Issues
2020-04-27/a>Xavier MertensPowershell Payload Stored in a PSCredential Object
2016-09-09/a>Xavier MertensCollecting Users Credentials from Locked Devices
2015-03-18/a>Daniel WesemannPass the hash!
2015-01-31/a>Guy BruneauBeware of Phishing and Spam Super Bowl Fans!
2014-09-12/a>Chris MohanAre credential dumps worth reviewing?

THEFT

2021-05-29/a>Guy BruneauSpear-phishing Email Targeting Outlook Mail Clients
2019-01-30/a>Russ McReeCR19-010: The United States vs. Huawei
2008-10-15/a>Rick WannerDay 15 - Containing the Damage From a Lost or Stolen Laptop
2006-09-29/a>Kevin ListonA Report from the Field