Date Author Title
2024-03-28Xavier MertensFrom JavaScript to AsyncRAT
2024-03-14Jan KoprivaIncrease in the number of phishing messages pointing to IPFS and to R2 buckets
2024-03-05Johannes UllrichApple Releases iOS/iPadOS Updates with Zero Day Fixes.
2024-02-21Jan KoprivaPhishing pages hosted on archive.org
2024-01-22Johannes UllrichApple Updates Everything - New 0 Day in WebKit
2024-01-12Xavier MertensOne File, Two Payloads
2023-12-11Johannes UllrichApple Patches Everything
2023-12-09Didier StevensIPv4-mapped IPv6 Address Used For Obfuscation
2023-11-17Jan KoprivaPhishing page with trivial anti-analysis features
2023-10-25Johannes UllrichApple Patches Everything. Releases iOS 17.1, MacOS 14.1 and updates for older versions fixing exploited vulnerability
2023-10-23Johannes UllrichHow an AppleTV may take down your (#IPv6) network
2023-10-09Didier StevensZIP's DOSTIME & DOSDATE Formats
2023-10-07Didier StevensBinary IPv6 Addresses
2023-10-05Jim ClausingNew tool: le-hex-to-ip.py
2023-08-23Xavier MertensMore Exotic Excel Files Dropping AgentTesla
2023-07-29Xavier MertensDo Attackers Pay More Attention to IPv6?
2023-07-26Xavier MertensSuspicious IP Addresses Avoided by Malware Samples
2023-06-24Guy BruneauEmail Spam with Attachment Modiloader
2023-06-22Brad DuncanQakbot (Qbot) activity, obama271 distribution tag
2023-06-22Johannes UllrichApple Patches Exploited Vulnerabilities in iOS/iPadOS, macOS, watchOS and Safari
2023-06-11Guy BruneauDShield Honeypot Activity for May 2023
2023-06-05Johannes UllrichBrute Forcing Simple Archive Passwords
2023-05-20Xavier MertensPhishing Kit Collecting Victim's IP Address
2023-05-18Johannes UllrichA Quick Survey of .zip Domains: Your highest risk is running into Rick Astley.
2023-05-16Jesse La GrewSignals Defense With Faraday Bags & Flipper Zero
2023-03-27Johannes UllrichApple Updates Everything (including Studio Display)
2023-03-25Guy BruneauMicrosoft Released an Update for Windows Snipping Tool Vulnerability
2023-03-22Didier StevensWindows 11 Snipping Tool Privacy Bug: Inspecting PNG Files
2023-02-28Brad DuncanBB17 distribution Qakbot (Qbot) activity
2023-02-06Johannes UllrichAPIs Used by Bots to Detect Public IP address
2023-01-24Johannes UllrichApple Updates (almost) Everything: Patch Overview
2023-01-17Johannes UllrichPacket Tuesday: IPv6 Router Advertisements https://www.youtube.com/watch?v=uRWpB_lYIZ8
2022-11-17Johannes UllrichLessons Learned from Automatic Failover: When 8.8.8.8 "disappears". IPv6 to the Rescue?
2022-11-04Xavier MertensRemcos Downloader with Unicode Obfuscation
2022-10-21Brad Duncansczriptzzbn inject pushes malware for NetSupport RAT
2022-10-16Didier StevensVideo: Analysis of a Malicious HTML File (QBot)
2022-10-13Didier StevensAnalysis of a Malicious HTML File (QBot)
2022-10-07Xavier MertensCritical Fortinet Vulnerability Ahead
2022-08-17Johannes UllrichA Quick VoIP Experiment
2022-08-14Johannes UllrichRealtek SDK SIP ALG Vulnerability: A Big Deal, but not much you can do about it. CVE 2022-27255
2022-08-11Xavier MertensInfoStealer Script Based on Curl and NSudo
2022-07-20Johannes UllrichApple Patches Everything Day
2022-07-09Didier Stevens7-Zip Editing & MoW
2022-07-04Didier Stevens7-Zip & MoW: "For Office files"
2022-07-03Didier Stevens7-Zip & MoW
2022-06-26Didier StevensMy Paste Command
2022-06-25Xavier MertensMalicious Code Passed to PowerShell via the Clipboard
2022-06-22Xavier MertensMalicious PowerShell Targeting Cryptocurrency Browser Extensions
2022-06-16Xavier MertensHoudini is Back Delivered Through a JavaScript Dropper
2022-06-04Guy BruneauSpam Email Contains a Very Large ISO file
2022-06-01Jan KoprivaHTML phishing attachments - now with anti-analysis features
2022-05-20Xavier MertensA 'Zip Bomb' to Bypass Security Controls & Sandboxes
2022-05-13Johannes UllrichFrom 0-Day to Mirai: 7 days of BIG-IP Exploits
2022-05-09Xavier MertensOctopus Backdoor is Back with a New Embedded Obfuscated Bat File
2022-05-08Johannes UllrichF5 BIG-IP Unauthenticated RCE Vulnerability (CVE-2022-1388)
2022-04-21Xavier MertensMulti-Cryptocurrency Clipboard Swapper
2022-04-20Brad Duncan"aa" distribution Qakbot (Qbot) infection with DarkVNC traffic
2022-03-31Johannes UllrichApple Patches Actively Exploited Vulnerability in macOS, iOS and iPadOS,
2022-03-14Johannes UllrichApple Updates Everything: MacOS 12.3, XCode 13.3, tvOS 15.4, watchOS 8.5, iPadOS 15.4 and more
2022-03-10Xavier MertensCredentials Leaks on VirusTotal
2022-02-25Didier StevensWindows, Fixed IPv4 Addresses and APIPA
2022-02-18Xavier MertensRemcos RAT Delivered Through Double Compressed Archive
2022-02-10Johannes UllrichiOS/iPadOS and MacOS Update: Single WebKit 0-Day Vulnerability Patched
2022-01-27Johannes UllrichApple Patches Everything
2022-01-18Jan KoprivaPhishing e-mail with...an advertisement?
2022-01-04Xavier MertensA Simple Batch File That Blocks People
2021-11-18Xavier MertensJavaScript Downloader Delivers Agent Tesla Trojan
2021-11-15Rob VandenBrinkChanging your AD Password Using the Clipboard - Not as Easy as You'd Think!
2021-10-31Didier StevensVideo: Phishing ZIP With Malformed Filename
2021-10-24Didier StevensPhishing ZIP With Malformed Filename
2021-10-21Brad Duncan"Stolen Images Evidence" campaign pushes Sliver-based malware
2021-10-07Johannes UllrichWho Is Hunting For Your IPTV Set-Top Box?
2021-09-17Xavier MertensMalicious Calendar Subscriptions Are Back?
2021-09-08Brad Duncan"Stolen Images Evidence" Campaign Continues Pushing BazarLoader Malware
2021-09-07Johannes UllrichWhy I Gave Up on IPv6. And no, it is not because of security issues.
2021-08-30Xavier MertensCryptocurrency Clipboard Swapper Delivered With Love
2021-08-29Guy BruneauFilter JSON Data by Value with Linux jq
2021-08-13Brad DuncanExample of Danabot distributed through malspam
2021-07-26Didier StevensFailed Malspam: Recovering The Password
2021-05-28Xavier MertensMalicious PowerShell Hosted on script.google.com
2021-05-22Xavier Mertens"Serverless" Phishing Campaign
2021-05-18Xavier MertensFrom RunDLL32 to JavaScript then PowerShell
2021-05-10Johannes UllrichCorrectly Validating IP Addresses: Why encoding matters for input validation.
2021-05-08Guy BruneauWho is Probing the Internet for Research Purposes?
2021-04-28Xavier MertensDeeper Analyzis of my Last Malicious PowerPoint Add-On
2021-03-19Xavier MertensPastebin.com Used As a Simple C2 Channel
2021-02-13Guy BruneauUsing Logstash to Parse IPtables Firewall Logs
2020-12-22Xavier MertensMalware Victim Selection Through WiFi Identification
2020-11-13Xavier MertensOld Worm But New Obfuscation Technique
2020-11-09Xavier MertensHow Attackers Brush Up Their Malicious Scripts
2020-11-06Johannes UllrichRediscovering Limitations of Stateful Firewalls: "NAT Slipstreaming" ? Implications, Detections and Mitigations
2020-10-24Guy BruneauAn Alternative to Shodan, Censys with User-Agent CensysInspect/1.1
2020-10-14Brad DuncanMore TA551 (Shathak) Word docs push IcedID (Bokbot)
2020-09-11Rob VandenBrinkWhat's in Your Clipboard? Pillaging and Protecting the Clipboard
2020-08-07Brad DuncanTA551 (Shathak) Word docs push IcedID (Bokbot)
2020-07-28Johannes UllrichAll I want this Tuesday: More Data
2020-07-27Johannes UllrichIn Memory of Donald Smith
2020-07-24Xavier MertensCompromized Desktop Applications by Web Technologies
2020-07-06Johannes UllrichSummary of CVE-2020-5902 F5 BIG-IP RCE Vulnerability Exploits
2020-07-05Didier StevensCVE-2020-5902 F5 BIG-IP Exploitation Attempt
2020-06-11Xavier MertensAnti-Debugging JavaScript Techniques
2020-06-08Didier StevensTranslating BASE64 Obfuscated Scripts
2020-05-13Brad DuncanMalspam with links to zip archives pushes Dridex malware
2020-05-08Xavier MertensUsing Nmap As a Lightweight Vulnerability Scanner
2020-05-03Didier StevensZIP & AES
2020-04-26Didier StevensVideo: Malformed .docm File
2020-04-08Brad DuncanGerman malspam pushes ZLoader malware
2020-04-04Didier StevensNew Bypass Technique or Corrupt Word Document?
2020-03-27Xavier MertensMalicious JavaScript Dropping Payload in the Registry
2020-03-25Brad DuncanRecent Dridex activity
2020-02-28Xavier MertensShow me Your Clipboard Data!
2020-02-22Xavier MertensSimple but Efficient VBScript Obfuscation
2020-02-07Xavier MertensSandbox Detection Tricks & Nice Obfuscation in a Single VBScript
2020-01-22Brad DuncanGerman language malspam pushes Ursnif
2020-01-15Johannes UllrichCVE-2020-0601 Followup
2019-09-27Xavier MertensNew Scans for Polycom Autoconfiguration Files
2019-09-26Rob VandenBrinkMining MAC Address and OUI Information
2019-08-30Xavier MertensMalware Dropping a Local Node.js Instance
2019-08-22Xavier MertensSimple Mimikatz & RDPWrapper Dropper
2019-08-09Xavier Mertens100% JavaScript Phishing Page
2019-06-20Xavier MertensUsing a Travel Packing App for Infosec Purpose
2019-06-10Xavier MertensInteresting JavaScript Obfuscation Example
2019-03-15Remco VerhoefBinary Analysis with Jupyter and Radare2
2019-03-14Didier StevensTip: Ghidra & ZIP Files
2019-02-24Guy BruneauPacket Editor and Builder by Colasoft
2019-02-21Xavier MertensSimple Powershell Keyloggers are Back
2019-02-07Xavier Mertens Phishing Kit with JavaScript Keylogger
2019-01-29Johannes UllrichA Not So Well Done Phish (Why Attackers need to Implement IPv6 Now! ;-) )
2018-12-17Didier StevensPassword Protected ZIP with Maldoc
2018-11-26Russ McReeViperMonkey: VBA maldoc deobfuscation
2018-07-17Xavier MertensSearching for Geographically Improbable Login Attempts
2018-07-13Xavier MertensCryptominer Delivered Though Compromized JavaScript File
2018-06-19Xavier MertensPowerShell: ScriptBlock Logging... Or Not?
2018-06-18Xavier MertensMalicious JavaScript Targeting Mobile Browsers
2018-05-01Xavier MertensDiving into a Simple Maldoc Generator
2018-03-01Johannes UllrichWhy Does Emperor Xi Dislike Winnie the Pooh and Scrambled Eggs?
2018-01-19Jim ClausingFollowup to IPv6 brute force and IPv6 blocking
2018-01-09Jim ClausingAre you watching for brute force attacks on IPv6?
2017-11-17Xavier MertensTop-100 Malicious IP STIX Feed
2017-10-25Mark HofmanDUHK attack, continuing a week of named issues
2017-09-13Rob VandenBrinkNo IPv6? Challenge Accepted! (Part 1)
2017-08-26Didier StevensMalware analysis: searching for dots
2017-08-10Didier StevensMaldoc Analysis with ViperMonkey
2017-07-08Xavier MertensA VBScript with Obfuscated Base64 Data
2017-06-22Xavier MertensObfuscating without XOR
2017-04-02Guy BruneauIPFire - A Household Multipurpose Security Gateway
2017-03-24Xavier MertensNicely Obfuscated JavaScript Sample
2017-03-10Xavier MertensThe Side Effect of GeoIP Filters
2017-03-04Xavier MertensHow your pictures may affect your website reputation
2017-02-28Johannes UllrichMy Catch Of 4 Months In The Amazon IP Address Space
2017-02-12Xavier MertensAnalysis of a Suspicious Piece of JavaScript
2017-02-02Rick WannerMultiple vulnerabilities discovered in popular printer models
2016-12-13Xavier MertensUAC Bypass in JScript Dropper
2016-11-22Didier StevensUpdate:ZIP With Comment
2016-11-21Didier StevensZIP With Comment
2016-09-01Xavier MertensMaxmind.com (Ab)used As Anti-Analysis Technique
2016-08-28Guy BruneauSpam with Obfuscated Javascript
2016-07-26Johannes UllrichCommand and Control Channels Using "AAAA" DNS Records
2016-06-18Rob VandenBrinkControlling JavaScript Malware Before it Runs
2016-04-27Tom WebbKippos Cousin Cowrie
2016-02-20Didier StevensLocky: JavaScript Deobfuscation
2016-02-07Xavier MertensMore Malicious JavaScript Obfuscation
2016-02-06Jim ClausingMore updates to kippo-log2db
2016-02-02Johannes UllrichTargeted IPv6 Scans Using pool.ntp.org .
2016-01-15Xavier MertensJavaScript Deobfuscation Tool
2015-12-22Rick WannerThe other Juniper vulnerability - CVE-2015-7756
2015-08-07Tony CarothersCritical Firefox Update Today
2015-06-02Alex StanfordGuest Diary: Xavier Mertens - Playing with IP Reputation with Dshield & OSSEC
2015-03-12Johannes UllrichWho got the bad SSL Certificate? Using tshark to analyze the SSL handshake.
2015-02-07Jim ClausingUpdate to kippo-log2db.pl
2014-11-10Chris MohanLessons Learn from attacks on Kippo honeypots
2014-09-19Guy BruneauCipherShed Fork from TrueCrypt Project, Support Windows, Mac OS and Linux - https://ciphershed.org
2014-09-03Johannes UllrichF5 BigIP Unauthenticated rsync Vulnerability
2014-08-29Johannes UllrichFalse Positive or Not? Difficult to Analyze Javascript
2014-08-12Adrien de BeaupreHost discovery with nmap
2014-07-23Johannes UllrichNew Feature: "Live" SSH Brute Force Logs and New Kippo Client
2014-07-22Daniel WesemannApp "telemetry"
2014-07-02Johannes UllrichSimple Javascript Extortion Scheme Advertised via Bing
2014-07-01Johannes UllrichMicrosoft No-IP Takedown
2014-06-19Tony CarothersNew Supermicro IPMI/BMC Vulnerability
2014-04-03Bojan ZdrnjaWatching the watchers
2014-03-20Johannes UllrichNormalizing IPv6 Addresses
2014-02-10Rob VandenBrinkIsn't it About Time to Get Moving on Chip and PIN?
2014-01-30Johannes UllrichIPv6 and isc.sans.edu (Update)
2014-01-17Russ McReeMassive RFI scans likely a free web app vuln scanner rather than bots
2014-01-13Johannes UllrichGot an IPv6 Firewall?
2014-01-01Russ McReeSix degrees of celebration: Juniper, ANT, Shodan, Maltego, Cisco, and Tails
2013-12-21Guy BruneauStrange DNS Queries - Request for Packets
2013-12-19Rob VandenBrinkTarget US - Credit Card Data Breach
2013-11-19Jim ClausingUpdated dumpdns.pl
2013-11-06Johannes UllrichRapid7 Discloses IPMI Vulnerabilities
2013-11-04Manuel Humberto Santander PelaezWhen attackers use your DNS to check for the sites you are visiting
2013-10-25Rob VandenBrinkKaspersky flags TCPIP.SYS as Malware
2013-09-05Rob VandenBrinkBuilding Your Own GPU Enabled Private Cloud
2013-09-05Rob VandenBrinkWhat's Next for IPS?
2013-09-02Guy BruneauMultiple Cisco Security Notice
2013-08-07Johannes UllrichFirefox 23 and Mixed Active Content
2013-07-25Johannes UllrichA Couple of SSH Brute Force Compromises
2013-07-20Manuel Humberto Santander PelaezDo you have rogue Internet gateways in your network? Check it with nmap
2013-07-12Johannes UllrichMicrosoft Teredo Server "Sunset"
2013-07-01Manuel Humberto Santander PelaezUsing nmap scripts to enhance vulnerability asessment results
2013-06-12Johannes UllrichStupid Little IPv6 Tricks
2013-05-20Johannes UllrichUbuntu Package available to submit firewall logs to DShield
2013-05-17Johannes UllrichSSL: Another reason not to ignore IPv6
2013-04-23Russ McReeMicrosoft's Security Intelligence Report (SIRv14) released
2013-03-27Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - IPv6 moving target defense
2013-03-25Johannes UllrichIPv6 Focus Month: IPv6 over IPv4 Preference
2013-03-21Jim ClausingIPv6 Focus Month: Guest Diary: Matthew Newton - IPv6 Cat Feeder - Turning those extra bits into bytes, literally
2013-03-19Johannes UllrichIPv6 Focus Month: The warm and fuzzy side of IPv6
2013-03-18Johannes UllrichIPv6 Focus Month: What is changing with DHCP
2013-03-13Johannes UllrichIPv6 Focus Month: Kaspersky Firewall IPv6 Vulnerability
2013-03-12Swa FrantzenIPv6 Focus Month: How to say no!
2013-03-11Richard PorterIPv6 Focus Month: Traffic Testing, Firewalls, ACLs, pt 1
2013-03-09Guy BruneauIPv6 Focus Month: IPv6 Encapsulation - Protocol 41
2013-03-08Johannes UllrichIPv6 Focus Month: Filtering ICMPv6 at the Border
2013-03-07Rob VandenBrinkIPv6 Focus Month: Barriers to Implementing IPv6
2013-03-06Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - Geolocation Using IPv6 Addresses
2013-03-05Mark HofmanIPv6 Focus Month: Device Defaults
2013-03-04Johannes UllrichIPv6 Focus Month: Addresses
2013-03-01Jim ClausingIPv6 Focus Month at the Internet Storm Center
2013-02-11John BambenekIs This Chinese Registrar Really Trying to XSS Me?
2013-02-08Kevin ShorttIs it Spam or Is it Malware?
2013-02-04Russ McReeAn expose of a recent SANS GIAC XSS vulnerability
2013-01-31Johannes UllrichIPv6 Focus Month
2013-01-30Richard PorterGetting Involved with the Local Community
2013-01-25Johannes UllrichVulnerability Scans via Search Engines (Request for Logs)
2013-01-10Rob VandenBrinkWhat Else runs Telnets? Or, Pentesters Love Video Conferencing Units Too!
2012-12-06Johannes UllrichHow to identify if you are behind a "Transparent Proxy"
2012-10-06Manuel Humberto Santander PelaezCyber Security Awareness Month - Day 6 - NERC: The standard that enforces security on power SCADA
2012-10-04Johannes UllrichCyber Security Awareness Month - Day 4: Crypto Standards
2012-09-05Rob VandenBrinkAuditing a Network for VOIP Call Quality Metrics
2012-08-16Johannes UllrichA Poor Man's DNS Anomaly Detection Script
2012-07-21Rick WannerTippingPoint DNS Version Request increase
2012-07-18Rob VandenBrinkSnort Updated today
2012-06-25Guy BruneauUsing JSDetox to Analyze and Deobfuscate Javascript
2012-06-07Johannes UllrichIPMI: Hacking servers that are turned "off"
2012-06-01Johannes UllrichWhat Does "IPv6 Day" mean to you?
2012-05-31Johannes UllrichSCADA@Home: Your health is no secret no more!
2012-05-22Johannes Ullrichnmap 6 released
2012-05-17Johannes UllrichNew IPv6 Video: IPv6 Router Advertisements https://isc.sans.edu/ipv6videos
2012-05-07Guy BruneauiOS 5.1.1 Software Update for iPod, iPhone, iPad
2012-05-06Jim ClausingTool updates and Win 8
2012-04-25Daniel WesemannBlacole's obfuscated JavaScript
2012-01-22Johannes UllrichJavascript DDoS Tool Analysis
2012-01-12Rob VandenBrinkStuff I Learned Scripting - Fun with STDERR
2012-01-03Bojan ZdrnjaThe tale of obfuscated JavaScript continues
2011-12-21Chris MohanThe off switch
2011-12-07Lenny ZeltserV8 as an Alternative to SpiderMonkey for JavaScript Deobfuscation
2011-11-10Rob VandenBrinkStuff I Learned Scripting - - Parsing XML in a One-Liner
2011-11-07Rob VandenBrinkStuff I Learned Scripting - Evaluating a Remote SSL Certificate
2011-11-07Rob VandenBrinkJuniper BGP issues causing locallized Internet Problems
2011-11-04Guy BruneauNew Poll: In the coming 12 months, what is your deployment plan or status with IPv6?
2011-10-23Guy Bruneautcpdump and IPv6
2011-09-29Daniel WesemannThe SSD dilemma
2011-09-09Guy BruneauIPv6 and DNS Sinkhole
2011-08-24Rob VandenBrinkCitrix Access Gateway Cross Site Scripting vulnerability and fix ==> http://support.citrix.com/article/CTX129971
2011-08-22Jim ClausingAre your tools ready for IPv6? (part 2)
2011-08-04Jim ClausingAre your tools ready for IPv6? (part 1)
2011-07-27Johannes UllrichInternet Storm Center iPhone App now available. Feedback/Feature Requests welcome. Search App Store for "ISC Reader"
2011-07-09Tony CarothersCopyright Alert System - What say you?
2011-06-17Richard PorterWhen do you stop owning Technology?
2011-06-09Johannes UllrichIPv6 Day Summary
2011-06-08Johannes UllrichIPv6 Day Started
2011-06-06Manuel Humberto Santander PelaezPhishing: Same goal, same techniques and people still falling for such scams
2011-06-02Johannes UllrichIPv6 RA-Guard: How it works and how to defeat it
2011-06-01Johannes UllrichEnabling Privacy Enhanced Addresses for IPv6
2011-05-03Johannes UllrichAnalyzing Teredo with tshark and Wireshark
2011-04-25Rob VandenBrinkWhat's Your (IP) Address Worth?
2011-04-23Manuel Humberto Santander PelaezImage search can lead to malware download
2011-04-22Manuel Humberto Santander PelaeziPhoneMap: iPhoneTracker port to Linux
2011-04-20Johannes UllrichiPhone GPS Data Storage
2011-04-11Johannes UllrichLayer 2 DoS and other IPv6 Tricks
2011-04-05Johannes UllrichIPv6 MITM via fake router advertisements
2011-02-08Johannes UllrichTippingpoint Releases Details on Unpatched Bugs
2011-02-01Johannes UllrichThe End Of IP As We Know It
2011-01-24Rob VandenBrinkWhere have all the COM Ports Gone? - How enumerating COM ports led to me finding a “misplaced” Microsoft tool
2011-01-05Johannes Ullrichipv6finder : How ready are you for IPv6?
2010-12-02Kevin JohnsonRobert Hansen and our happiness
2010-11-29Stephen HalliPhone phishing - What you see, isn't what you get
2010-11-08Manuel Humberto Santander PelaezNetwork Security Perimeter: How to choose the correct firewall and IPS for your environment?
2010-08-06Rob VandenBrinkFOXIT PDF Reader update to resolve iPhone/iPad Jailbreak issue ==> http://www.foxitsoftware.com/announcements/2010861227.html
2010-08-01Manuel Humberto Santander PelaezEvation because IPS fails to validate TCP checksums?
2010-07-29Rob VandenBrinkNoScript 2.0 released
2010-07-29Rob VandenBrinkFBI, Slovenian and Spanish Police announce more arrests of Mariposa Botnet Creator, Operators
2010-07-04Manuel Humberto Santander PelaezMalware inside PDF Files
2010-06-23Johannes UllrichIPv6 Support in iOS 4
2010-06-15Manuel Humberto Santander PelaezTCP evasions for IDS/IPS
2010-06-15Manuel Humberto Santander PelaeziPhone 4 Order Security Breach Exposes Private Information
2010-06-10Deborah HaleiPad Owners Exposed
2010-04-15Mark HofmanSIP Attacks on internet connected port5060 targeting Asterix servers
2010-03-24Kyle HaugsnessWikipedia outage
2010-03-21Scott FendleySkipfish - Web Application Security Tool
2010-03-05Kyle HaugsnessJavascript obfuscators used in the wild
2010-02-26Rick WannerNIST Guidelines for Secure Deployment of IPv6 - http://csrc.nist.gov/publications/drafts/800-119/draft-sp800-119_feb2010.pdf
2010-02-16Johannes UllrichTeredo "stray packet" analysis
2010-02-16Jim ClausingTeredo request for packets
2010-02-03Rob VandenBrinkAPPLE-SA-2010-02-02-1 iPhone OS 3.1.3 and iPhone OS 3.1.3 for iPod touch
2010-02-02Johannes UllrichNew IPv6 Screencast Videos: http://isc.sans.org/ipv6videos (Today: blocking and detecting IPv6 in Linux)
2010-01-19Jim Clausing49Gbps DDoS, IPv4 exhaustion, and DNSSEC, oh my!
2010-01-12Johannes UllrichIPv6 and isc.sans.org
2010-01-06Johannes UllrichDenial of Service Attack Aftermath (and what did Iran have to do with it?)
2010-01-06Johannes UllrichNew Tool: IPv6 conversions http://isc.sans.org/tools/ipv6.html
2009-12-21Marcus SachsiPhone Botnet Analysis
2009-11-09Chris Carboni80's Flashback on Jailbroken iPhones
2009-11-08Bojan ZdrnjaiPhone worm in the wild
2009-10-20Raul SilesCyber Security Awareness Month - Day 20 - Ports 5060 & 5061 - SIP (VoIP)
2009-09-12Jim ClausingApple Updates
2009-09-07Jim ClausingRequest for packets
2009-08-28Adrien de BeaupreWPA with TKIP done
2009-07-31Deborah HaleThe iPhone patch is out
2009-07-30Deborah HaleiPhone Hijack
2009-06-06Patrick NolanARRA/HIPAA Breach Reporting Dates Approaching
2009-05-09Patrick NolanUnusable, Unreadable, or Indecipherable? No Breach reporting required
2009-05-04Tom ListonAdobe Reader/Acrobat Critical Vulnerability
2009-04-30Marcus SachsARIN Notification Concerning IPv6
2009-04-18Johannes UllrichTwitter Packet Challenge Solution
2009-04-07Bojan ZdrnjaAdvanced JavaScript obfuscation (or why signature scanning is a failure)
2009-04-02Bojan ZdrnjaJavaScript insertion and log deletion attack tools
2009-03-24G. N. WhitePSYB0T: A MIPS-device (mipsel) IRC Bot
2009-03-22Mari NicholsDealing with Security Challenges
2009-03-01Jim ClausingCool combination of tools
2009-02-25Andre LudwigAdobe Acrobat pdf 0-day exploit, No JavaScript needed!
2009-02-25Andre LudwigPreview/Iphone/Linux pdf issues
2009-02-13Kevin ListonCanada Calling
2008-12-13Jim ClausingFollowup from last shift and some research to do.
2008-11-17Jim ClausingHow are you coming with that IPv6 migration?
2008-10-20Johannes UllrichFraudulent ATM Reactivation Phone Calls.
2008-10-01Rick WannerHandler Mailbag
2008-09-10Adrien de BeaupreApple updates iPod Touch + Bonjour for Windows
2008-09-08Raul SilesVoIP Attacks: Reverse Vhising, SEO and Phone Number Authentication
2008-07-14Daniel WesemannObfuscated JavaScript Redux
2008-07-11Jim ClausingHandling the load
2008-06-30Marcus SachsMore SQL Injection with Fast Flux hosting
2008-06-18Chris CarboniCisco Security Advisory
2008-05-20Raul SilesList of malicious domains inserted through SQL injection
2008-04-29Bojan ZdrnjaScripts in ASF files
2008-04-06Daniel WesemannAdvanced obfuscated JavaScript analysis
2008-04-03Bojan ZdrnjaMixed (VBScript and JavaScript) obfuscation