Date Author Title

EMAIL PASSWORD HACKS

2018-08-22Deborah HaleEmail/password Frustration

EMAIL

2024-02-05/a>Jesse La GrewPublic Information and Email Spam
2023-03-12/a>Guy BruneauAsynRAT Trojan - Bill Payment (Pago de la factura)
2023-02-18/a>Guy BruneauSpear Phishing Handlers for Username/Password
2023-01-05/a>Brad DuncanMore Brazil malspam pushing Astaroth (Guildma) in January 2023
2022-12-30/a>Jan KoprivaSPF and DMARC use on GOV domains in different ccTLDs
2022-08-13/a>Guy BruneauPhishing HTML Attachment as Voicemail Audio Transcription
2022-05-07/a>Guy BruneauPhishing PDF Received in my ISC Mailbox
2022-05-05/a>Brad DuncanPassword-protected Excel spreadsheet pushes Remcos RAT
2022-03-04/a>Johannes UllrichScam E-Mail Impersonating Red Cross
2021-11-14/a>Didier StevensExternal Email System FBI Compromised: Sending Out Fake Warnings
2021-10-26/a>Yee Ching TokHunting for Phishing Sites Masquerading as Outlook Web Access
2021-10-22/a>Brad DuncanOctober 2021 Contest: Forensic Challenge
2021-05-22/a>Xavier Mertens"Serverless" Phishing Campaign
2021-02-26/a>Guy BruneauPretending to be an Outlook Version Update
2021-02-10/a>Brad DuncanPhishing message to the ISC handlers email distro
2020-11-18/a>Xavier MertensWhen Security Controls Lead to Security Issues
2020-10-22/a>Jan KoprivaBazarLoader phishing lures: plan a Halloween party, get a bonus and be fired in the same afternoon
2020-10-09/a>Jan KoprivaPhishing kits as far as the eye can see
2020-09-21/a>Jan KoprivaSlightly broken overlay phishing
2020-06-18/a>Jan KoprivaBroken phishing accidentally exploiting Outlook zero-day
2020-05-27/a>Jan KoprivaFrankenstein's phishing using Google Cloud Storage
2020-04-13/a>Jan KoprivaLook at the same phishing campaign 3 months apart
2020-03-22/a>Didier StevensMore COVID-19 Themed Malware
2020-02-10/a>Jan KoprivaCurrent PayPal phishing campaign or "give me all your personal information"
2020-02-03/a>Jan KoprivaAnalysis of a triple-encrypted AZORult downloader
2020-01-16/a>Jan KoprivaPicks of 2019 malware - the large, the small and the one full of null bytes
2019-12-15/a>Didier StevensVirusTotal Email Submissions
2019-12-06/a>Jan KoprivaPhishing with a self-contained credentials-stealing webpage
2019-12-05/a>Jan KoprivaE-mail from Agent Tesla
2019-12-04/a>Jan KoprivaAnalysis of a strangely poetic malware
2019-11-26/a>Jan KoprivaLessons learned from playing a willing phish
2019-10-31/a>Jan KoprivaEML attachments in O365 - a recipe for phishing
2019-10-30/a>Xavier MertensKeep an Eye on Remote Access to Mailboxes
2019-10-17/a>Jan KoprivaPhishing e-mail spoofing SPF-enabled domain
2019-04-13/a>Johannes UllrichConfiguring MTA-STS and TLS Reporting For Your Domain
2019-04-07/a>Guy BruneauFake Office 365 Payment Information Update
2019-03-21/a>Xavier MertensNew Wave of Extortion Emails: Central Intelligence Agency Case
2019-03-06/a>Xavier MertensKeep an Eye on Disposable Email Addresses
2019-02-19/a>Didier StevensIdentifying Files: Failure Happens
2019-02-11/a>Didier StevensHave You Seen an Email Virus Recently?
2018-12-21/a>Lorna HutchesonPhishing Attempts That Bypass 2FA
2018-08-23/a>Xavier MertensSimple Phishing Through formcrafts.com
2018-08-22/a>Deborah HaleEmail/password Frustration
2018-08-19/a>Didier StevensVideo: Peeking into msg files - revisited
2018-08-11/a>Didier StevensPeeking into msg files - revisited
2018-07-23/a>Didier StevensAnalyzing MSG files
2018-07-15/a>Didier StevensExtracting BTC addresses from emails
2018-06-22/a>Lorna HutchesonXPS Attachment Used for Phishing
2017-11-10/a>Bojan ZdrnjaBattling e-mail phishing
2017-10-15/a>Didier StevensPeeking into .msg files
2017-08-14/a>Didier StevensSometimes it's just SPAM
2015-02-20/a>Tom WebbFast analysis of a Tax Scam
2014-07-09/a>Daniel WesemannWho owns your typo?
2014-01-31/a>Chris MohanAttack on Yahoo mail accounts
2014-01-24/a>Johannes UllrichHow to send mass e-mail the right way
2014-01-08/a>Kevin ShorttIntercepted Email Attempts to Steal Payments
2013-10-05/a>Richard PorterAdobe Breach Notification, Notifications?
2013-03-29/a>Chris MohanFake Link removal requests
2013-02-25/a>Johannes UllrichMass-Customized Malware Lures: Don't trust your cat!
2012-06-15/a>Johannes UllrichAuthenticating E-Mail
2012-02-07/a>Johannes UllrichSecure E-Mail Access
2011-05-01/a>Deborah HaleAnother Potentially Malicious Email Making The Rounds
2011-02-21/a>Adrien de BeaupreWinamp forums compromised
2010-09-09/a>Marcus Sachs'Here You Have' Email
2010-08-29/a>Swa FrantzenAbandoned free email accounts
2010-05-23/a>Manuel Humberto Santander Pelaeze-mail scam announcing Fidel Castro's funeral ... and nasty malware to your computer.
2010-03-05/a>Kyle HaugsnessFalse scare email proclaiming North Korea nuclear launch against Japan
2009-10-15/a>Deborah HaleCyber Security Awareness Month - Day 15 - Ports 995, 465, and 993 - Secure Email
2009-10-09/a>Rob VandenBrinkTHAWTE to discontinue free Email Certificate Services and Web of Trust Service
2009-10-08/a>Johannes UllrichCyber Security Awareness Month - Day 8 - Port 25 - SMTP
2009-05-04/a>Tom ListonFacebook phishing malware
2009-01-11/a>Deborah HaleThe Frustration of Phishing Attacks
2008-11-30/a>Mari NicholsRejected Email Issues

PASSWORD

2024-02-28/a>Johannes UllrichExploit Attempts for Unknown Password Reset Vulnerability
2024-01-17/a>Jesse La GrewNumber Usage in Passwords
2024-01-06/a>Xavier MertensAre you sure of your password?
2023-10-29/a>Guy BruneauSpam or Phishing? Looking for Credentials & Passwords
2023-10-15/a>Guy BruneauDomain Name Used as Password Captured by DShield Sensor
2023-09-29/a>Xavier MertensAre You Still Storing Passwords In Plain Text Files?
2023-09-05/a>Jesse La GrewCommon usernames submitted to honeypots
2023-09-02/a>Jesse La GrewWhat is the origin of passwords submitted to honeypots?
2023-08-10/a>Bojan ZdrnjaSome things never change ? such as SQL Authentication ?encryption?
2023-08-04/a>Xavier MertensAre Leaked Credentials Dumps Used by Attackers?
2023-06-05/a>Johannes UllrichBrute Forcing Simple Archive Passwords
2023-04-19/a>Rob VandenBrinkTaking a Bite Out of Password Expiry Helpdesk Calls
2023-02-18/a>Guy BruneauSpear Phishing Handlers for Username/Password
2022-08-13/a>Guy BruneauPhishing HTML Attachment as Voicemail Audio Transcription
2022-05-17/a>Xavier MertensUse Your Browser Internal Password Vault... or Not?
2022-03-10/a>Xavier MertensCredentials Leaks on VirusTotal
2022-02-13/a>Guy BruneauDHL Spear Phishing to Capture Username/Password
2021-11-15/a>Rob VandenBrinkChanging your AD Password Using the Clipboard - Not as Easy as You'd Think!
2021-05-14/a>Xavier Mertens"Open" Access to Industrial Systems Interface is Also Far From Zero
2021-04-24/a>Guy BruneauBase64 Hashes Used in Web Scanning
2021-01-06/a>Johannes UllrichScans for Zyxel Backdoors are Commencing.
2020-07-26/a>Didier StevensCracking Maldoc VBA Project Passwords
2020-07-13/a>Didier StevensVBA Project Passwords
2020-06-10/a>Brad DuncanJob application-themed malspam pushes ZLoader
2020-04-06/a>Didier StevensPassword Protected Malicious Excel Files
2019-11-01/a>Didier StevensTip: Password Managers and 2FA
2018-12-17/a>Didier StevensPassword Protected ZIP with Maldoc
2018-08-22/a>Deborah HaleEmail/password Frustration
2018-07-12/a>Johannes UllrichNew Extortion Tricks: Now Including Your Password!
2017-11-28/a>Xavier MertensApple High Sierra Uses a Passwordless Root Account
2017-05-17/a>Richard PorterWait What? We don?t have to change passwords every 90 days?
2017-04-26/a>Johannes UllrichIf there are some unexploited MSSQL Servers With Weak Passwords Left: They got you now (again)
2017-04-10/a>Didier StevensPassword History: Insights Shared by a Reader
2017-02-07/a>Johannes UllrichMy Password is [taco] Using Emojis for Stronger Passwords
2016-12-07/a>Xavier MertensThe Passwords You Should Never Use
2016-09-15/a>Xavier MertensIn Need of a OTP Manager Soon?
2016-07-21/a>Didier StevensPractice ntds.dit File
2016-06-20/a>Xavier MertensUsing Your Password Manager to Monitor Data Leaks
2015-06-26/a>Daniel WesemannCisco default credentials - again!
2014-09-19/a>Guy BruneauAdded today in oclhashcat 131 Django [Default Auth] (PBKDF2 SHA256 Rounds Salt) Support - http://hashcat.net/hashcat/
2014-08-22/a>Richard PorterOCLHashCat 1.30 Released
2014-08-06/a>Johannes UllrichAll Passwords have been lost: What's next?
2014-05-22/a>Rob VandenBrinkAnother Site Breached - Time to Change your Passwords! (If you can that is)
2013-11-22/a>Rick WannerTales of Password Reuse
2013-07-21/a>Guy BruneauUbuntu Forums Security Breach
2013-06-11/a>Swa FrantzenStore passwords the right way in your application
2013-05-14/a>Jim ClausingSo what passwords are those ssh scanners trying?
2013-03-18/a>Kevin ShorttCisco IOS Type 4 Password Issue: http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20130318-type4
2013-01-18/a>Russ McReeInteresting reads for Friday 18 JAN 2013
2013-01-04/a>Daniel WesemannBlue for Reset?
2012-11-15/a>Jim ClausingAnother month another password disclosure breach
2012-07-16/a>Jim ClausingAn analysis of the Yahoo! passwords
2012-06-06/a>Jim ClausingPotential leak of 6.5+ million LinkedIn password hashes
2012-05-22/a>Johannes Ullrichnmap 6 released
2012-01-03/a>Rick WannerAnalysis of the Stratfor Password List
2011-10-10/a>Tom ListonWhat's In A Name?
2011-08-10/a>Johannes UllrichTheoretical and Practical Password Entropy
2011-06-28/a>Johannes UllrichHashing Passwords
2011-05-30/a>Johannes UllrichAllied Telesis Passwords Leaked
2010-12-28/a>John BambenekMozilla Notifies of Relatively Minor Security Breach
2010-12-15/a>Manuel Humberto Santander PelaezHP StorageWorks P2000 G3 MSA hardcoded user
2010-12-13/a>Deborah HaleGawker Media Breach of Security
2010-11-26/a>Mark HofmanUsing password cracking as metric/indicator for the organisation's security posture
2010-08-27/a>Mark HofmanFTP Brute Password guessing attacks
2010-02-25/a>Chris CarboniPass The Hash
2010-02-02/a>Johannes UllrichTwitter Mass Password Reset due to Phishing
2009-12-04/a>Daniel WesemannThe economics of security advice (MSFT research paper)
2009-11-02/a>Daniel WesemannPassword rules: Change them every 25 years
2009-10-23/a>Johannes UllrichLittle new tool: reversing md5/sha1 hashes http://isc.sans.org/tools/reversehash.html
2008-09-22/a>Jim ClausingLessons learned from the Palin (and other) account hijacks

HACKS

2018-08-22/a>Deborah HaleEmail/password Frustration
2008-05-08/a>Joel EslerCOMPROMISED FILE IN VIETNAMESE LANGUAGE PACK FOR FIREFOX 2
2008-03-12/a>Joel EslerAdobe security updates
2006-10-17/a>Arrigo TriulziHacking Tor, the anonymity onion routing network