UPDATE ON PORT 5000 SCANS |
2014-03-06 | Mark Baggett | Port 5000 traffic and snort signature |
UPDATE |
2023-04-22/a> | Didier Stevens | YARA v4.3.1 Release |
2023-04-02/a> | Didier Stevens | YARA v4.3.0 Release |
2023-01-07/a> | Didier Stevens | YARA v4.3.0-rc1 --skip-larger |
2022-12-05/a> | Didier Stevens | VLC's Check For Updates: No Updates? |
2022-08-20/a> | Didier Stevens | YARA 4.2.3 Released |
2022-07-02/a> | Didier Stevens | YARA 4.2.2 Released |
2022-04-30/a> | Didier Stevens | YARA 4.2.1 Released |
2022-03-14/a> | Johannes Ullrich | Apple Updates Everything: MacOS 12.3, XCode 13.3, tvOS 15.4, watchOS 8.5, iPadOS 15.4 and more |
2021-11-29/a> | Didier Stevens | Wireshark 3.6.0 Released |
2021-10-31/a> | Didier Stevens | Sysinternals: Autoruns and Sysmon updates |
2021-10-28/a> | Yee Ching Tok | Multiple Apple Patches for October 2021 |
2021-10-10/a> | Didier Stevens | Wireshark 3.4.9 Released |
2021-08-21/a> | Didier Stevens | New Versions Of Sysinternals Tools |
2021-07-25/a> | Didier Stevens | Wireshark 3.4.7 Released |
2021-04-25/a> | Didier Stevens | Wireshark 3.4.5 Released |
2021-03-14/a> | Didier Stevens | Wireshark 3.4.4 Released |
2021-02-06/a> | Didier Stevens | YARA v4.0.5 |
2021-01-31/a> | Didier Stevens | YARA v4.0.4 |
2020-12-20/a> | Didier Stevens | Wireshark 3.4.2 Released |
2020-12-13/a> | Didier Stevens | Wireshark 3.4.1 Released |
2020-09-27/a> | Didier Stevens | Wireshark 3.2.7 Released |
2020-08-15/a> | Didier Stevens | Wireshark 3.2.6 Released |
2020-05-24/a> | Didier Stevens | Wireshark 3.2.4 Released |
2020-04-11/a> | Didier Stevens | Wireshark 3.2.3 Released: Mac Users Pay Attention Please |
2020-03-14/a> | Didier Stevens | Phishing PDF With Incremental Updates. |
2020-03-07/a> | Didier Stevens | Wireshark 3.2.2 Released: Windows' Users Pay Attention Please |
2020-02-05/a> | Brad Duncan | Fake browser update pages are "still a thing" |
2020-02-01/a> | Didier Stevens | Wireshark 3.2.1 Released |
2019-12-21/a> | Didier Stevens | Wireshark 3.2.0 Released |
2019-12-08/a> | Didier Stevens | Wireshark 3.0.7 Released |
2019-10-27/a> | Didier Stevens | Wireshark 3.0.6 Released |
2019-09-21/a> | Didier Stevens | Wireshark 3.0.5 Release: Potential Windows Crash when Updating |
2019-07-09/a> | John Bambenek | MSFT July 2019 Patch Tuesday |
2017-07-30/a> | Guy Bruneau | Re-release of MS Oulook Security Patches https://portal.msrc.microsoft.com/en-us/security-guidance/summary |
2016-09-13/a> | Rob VandenBrink | Apple iOS 10 and 10.0.1 Released |
2016-02-27/a> | Guy Bruneau | OpenSSL Security Update Planned for 1 March Release |
2015-10-09/a> | Guy Bruneau | Adobe Acrobat and Reader Pre-Announcement |
2015-04-04/a> | Didier Stevens | VMware Product Updates Address Critical Information Disclosure Issue In JRE |
2014-08-22/a> | Richard Porter | PHP 5.4.32 Released http://www.php.net/ChangeLog-5.php#5.4.32 |
2014-08-22/a> | Richard Porter | PHP 5.5.16 is available http://www.php.net/ChangeLog-5.php#5.5.16 |
2014-08-12/a> | Adrien de Beaupre | Adobe updates for 2014/08 |
2014-08-01/a> | Chris Mohan | WireShark 1.10.9 and 1.12.0 has been released |
2014-07-11/a> | Rob VandenBrink | Metasploit Update Alert |
2014-06-12/a> | Guy Bruneau | BIND Security Update for CVE-2014-3859 |
2014-04-24/a> | Rob VandenBrink | Apple IOS updates to 7.1.1, OSX Security update 2014-002, Airport Updates - http://support.apple.com/kb/HT1222, http://support.apple.com/kb/HT6208, http://support.apple.com/kb/HT6207, http://support.apple.com/kb/HT6203 |
2014-04-12/a> | Guy Bruneau | Critical Security Update for JetPack WordPress Plugin. Bug has existed since Jetpack 1.9, released in October 2012. - http://jetpack.me/2014/04/10/jetpack-security-update/ |
2014-04-02/a> | Kevin Shortt | Apple Security Update for Safari 6.1.3/7.0.3: http://support.apple.com/kb/HT6181 |
2014-03-06/a> | Mark Baggett | Port 5000 traffic and snort signature |
2014-02-14/a> | Chris Mohan | SYM14-004 Symantec Endpoint Protection Management Vulnerabilities - http://www.symantec.com/business/support/index?page=content&id=TECH214866 |
2013-12-18/a> | Adrien de Beaupre | Wireshark 1.10.4 and 1.8.12 are available |
2013-12-17/a> | Adrien de Beaupre | Apple security updates Mac OS X and Safari |
2013-10-17/a> | Adrien de Beaupre | Chrome updated http://googlechromereleases.blogspot.ca/2013/10/stable-channel-update_15.html |
2013-10-15/a> | Rob VandenBrink | Java Quarterly Updates |
2013-07-28/a> | Guy Bruneau | Wireshark 1.8.9 and 1.10.1 Security Update |
2013-07-03/a> | Kevin Shortt | Apple Security Update 2013-003 |
2013-06-05/a> | Richard Porter | Windows Sysinternals Updated http://technet.microsoft.com/en-us/sysinternals/default.aspx |
2013-05-22/a> | Adrien de Beaupre | Apple QuickTime 7.7.4 for Windows updated, MANY security vulnerabilities: http://support.apple.com/kb/HT1222 |
2013-05-22/a> | Adrien de Beaupre | Chrome 24.0.1312.52 has been updated for Windows, Mac, Linux, and Chrome Frame |
2013-04-19/a> | Russ McRee | Java 8 release schedule delayed for renewed focus on security |
2013-04-03/a> | Mark Hofman | Firefox 20 and Thunderbird 17.0.5 updates |
2013-03-07/a> | Guy Bruneau | Wireshark Security Updates |
2013-02-27/a> | Adam Swanger | Adobe Flash Player Security Update - http://www.adobe.com/support/security/bulletins/apsb13-08.html |
2013-02-22/a> | Chris Mohan | PHP 5.4.12 and PHP 5.3.22 released http://www.php.net/ChangeLog-5.php |
2013-02-22/a> | Chris Mohan | Chrome 25.0.1364.87 addresses multiple vulnerabilities http://googlechromereleases.blogspot.com.au/2013/02/stable-channel-update_21.html |
2013-02-12/a> | Adam Swanger | Microsoft February 2013 Black Tuesday Update - Overview |
2013-02-01/a> | Jim Clausing | Oracle quitely releases Java 7u13 early |
2013-01-17/a> | Russ McRee | PHP 5.4.11 and PHP 5.3.21 released |
2013-01-09/a> | Rob VandenBrink | SQL Injection Flaw in Ruby on Rails |
2013-01-09/a> | Rob VandenBrink | Firefox and Thunderbird Updates |
2013-01-09/a> | Rob VandenBrink | Security Updates for Adobe Flash - http://www.adobe.com/support/security/bulletins/apsb13-01.html |
2013-01-09/a> | Johannes Ullrich | New Format for Monthly Threat Update |
2013-01-08/a> | Richard Porter | Firefox 18 Released, Security Fixes http://www.mozilla.org/security/known-vulnerabilities/firefox.html |
2012-12-11/a> | John Bambenek | Microsoft December 2012 Black Tuesday Update - Overview |
2012-11-13/a> | Jim Clausing | Microsoft November 2012 Black Tuesday Update - Overview |
2012-10-28/a> | Tony Carothers | Firefox 16.02 Released |
2012-09-21/a> | Guy Bruneau | Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 (2755801) |
2012-09-20/a> | Russ McRee | Apple and Cisco Security Advisories 19 SEP 2012 |
2012-08-22/a> | Adrien de Beaupre | Apple Remote Desktop update fixes no encryption issue |
2012-08-21/a> | Adrien de Beaupre | YYABCAFU - Yes Yet Another Bleeping Critical Adobe Flash Update |
2012-08-15/a> | Guy Bruneau | Wireshark Security Update |
2012-08-02/a> | Guy Bruneau | Opera Security Update |
2012-07-18/a> | Rob VandenBrink | Snort Updated today |
2012-06-25/a> | Guy Bruneau | Issues with Windows Update Agent |
2012-06-20/a> | Raul Siles | Firefox 13.0.1 Update |
2012-06-06/a> | Jim Clausing | Firefox, Thunderbird, and Seamonkey Security Updates |
2012-05-04/a> | Guy Bruneau | Adobe Security Flash Update |
2012-03-06/a> | Mark Hofman | Websense posted a small article relating to mass injection into wordpress sites (thanks Chris) More info Here --> http://community.websense.com/blogs/securitylabs/archive/2012/03/05/mass-injection-of-wordpress-sites.aspx |
2012-02-04/a> | Scott Fendley | Apple Security Advisory 2012-001 v1.1 |
2011-11-02/a> | Russ McRee | Wireshark updates: 1.6.3 and 1.4.10 released |
2011-10-22/a> | Guy Bruneau | Oracle Java SE Critical Patch Update |
2011-10-01/a> | Mark Hofman | Hot on the heels fo FF, Thunderbird v 7.0.1 and SeaMonkey v 2.4.1 have been updated. |
2011-09-18/a> | Guy Bruneau | Google Chrome Security Updates |
2011-09-06/a> | Guy Bruneau | Firefox 6.0.2 released to removed trust to DigiNotar certificate authority http://www.mozilla.org/en-US/firefox/6.0.2/releasenotes/ |
2011-09-05/a> | Raul Siles | Java 7 Officially Released |
2011-07-15/a> | Deborah Hale | Apple Software Updates |
2011-06-28/a> | Johannes Ullrich | Update: Thunderbird 5.0 released. https://www.mozilla.org/en-US/thunderbird/ |
2011-06-23/a> | Jim Clausing | Apple Security Updates 2011-004 |
2011-06-09/a> | Richard Porter | Chrome Version 12.0.742.91 Released |
2011-06-01/a> | Adrien de Beaupre | Wireshark 1.4.7 and 1.2.17 Released - http://www.wireshark.org/news/20110531.html |
2011-05-20/a> | Guy Bruneau | Sysinternals Updates, Analyzing Stuxnet Infection with Sysinternals Tools Part 3 |
2011-05-16/a> | Jason Lam | Firefox 3.5 forced upgrade coming soon |
2011-05-04/a> | Richard Porter | Microsoft Sysinterals Update |
2011-05-01/a> | Deborah Hale | Java 6.25 Is Now Available |
2011-04-14/a> | Adrien de Beaupre | Sysinternals updates, a new blog post, and webcast |
2011-03-21/a> | Kevin Shortt | APPLE-SA-2011-03-21-1 Mac OS X v10.6.7 and Security Update 2011-001 |
2011-03-09/a> | Chris Mohan | Possible Issue with Forefront Update KB2508823 |
2011-03-02/a> | Chris Mohan | Microsoft’s Autorun update v2.1 now automatically deployed from Windows Update |
2011-02-21/a> | Adrien de Beaupre | Kaspersky update servers unreachable |
2011-01-27/a> | Chris Carboni | Opera Updates |
2010-12-03/a> | Mark Hofman | AVG Update Bricking windows 7 64 bit |
2010-11-30/a> | Joel Esler | VMWare Security Advisory |
2010-11-16/a> | Guy Bruneau | Mac OS X Server v10.6.5 (10H575) Security Update: http://support.apple.com/kb/HT4452 |
2010-08-25/a> | Pedro Bueno | Adobe released security update for Shockwave player that fix several CVEs: APSB1020 |
2010-08-19/a> | Rob VandenBrink | Don points us to multiple Adobe updates (Reader and Acrobat 9.3.4 among them) ==> http://www.adobe.com/support/downloads/new.jsp |
2010-08-10/a> | Jason Lam | Adobe critical security updates |
2010-08-10/a> | Daniel Wesemann | New Apple security updates for iPad/Pod/Phone. See http://support.apple.com/kb/ht1222 |
2010-07-21/a> | Adrien de Beaupre | Update on .LNK vulnerability |
2010-06-29/a> | donald smith | Adobe Reader 9.3.3/8.2.3 addressing CVE-2010-1297 |
2010-05-12/a> | Rob VandenBrink | Adobe Shockwave Update |
2010-04-13/a> | Adrien de Beaupre | Security update available for Adobe Reader and Acrobat |
2010-04-02/a> | Guy Bruneau | Foxit Reader Security Update |
2010-03-29/a> | Adrien de Beaupre | APPLE-SA-2010-03-29-1 Security Update 2010-002 / Mac OS X v10.6.3 |
2010-03-29/a> | Adrien de Beaupre | OOB Update for Internet Explorer MS10-018 |
2010-03-22/a> | Guy Bruneau | New Opera 10.51 available with security fixes. More information available at: http://www.opera.com/docs/changelogs/windows/1051/ |
2010-03-12/a> | Mark Hofman | Firefox 3.6 is being pushed out to users. http://www.mozilla.com/en-US/firefox/3.6/releasenotes/ |
2010-03-11/a> | Mark Hofman | A new version of Safari is out. Looks like for Mac and Windows. Plenty of security fixes (mostly for Windows Safari users http://support.apple.com/kb/HT4070 ) |
2010-03-10/a> | Rob VandenBrink | Microsoft re-release of KB973811 - attacks on Extended Protection for Authentication |
2010-03-08/a> | Raul Siles | Microsoft announced two important bulletins (fixing multiple vulns. affecting Windows and Office) for tomorrow: http://www.microsoft.com/technet/security/Bulletin/MS10-mar.mspx |
2010-03-01/a> | Mark Hofman | Microsoft will drop support for Vista (without any Service Packs) on April 13 and support for XP SP2 ends July 13. (i.e. no more security updates). If you are still running these, it it time to update. |
2010-02-27/a> | Guy Bruneau | PHP 5.2.13 Security Update |
2010-02-11/a> | Deborah Hale | The Mysterious Blue Screen |
2010-01-06/a> | Guy Bruneau | Firefox security and stability update for version 3.5.7 and 3.0.17 available for download |
2009-12-16/a> | Rob VandenBrink | Seamonkey Update to 2.0.1, find the release notes here ==> http://www.seamonkey-project.org/releases/seamonkey2.0.1 |
2009-12-03/a> | Mark Hofman | Apple released some Java updates today APPLE-SA-2009-12-03-1 & 2 (for 10.5 and 10.6). Fixes a number of security issues so updating is a good idea. |
2009-12-02/a> | Rob VandenBrink | Microsoft Black Screen of Death - Fact of Fiction? |
2009-11-25/a> | Jim Clausing | Tool updates |
2009-11-25/a> | Jim Clausing | Microsoft Updates requiring reboot |
2009-11-11/a> | Rob VandenBrink | Apple Safari 4.0.4 Released |
2009-11-09/a> | Guy Bruneau | Apple Security Update 2009-006 for Mac OS X v10.6.2 |
2009-11-06/a> | Mark Hofman | A new version of Firefox (3.5.5) just became available. According to the release notes they are stability improvements. |
2009-10-22/a> | Adrien de Beaupre | Sysinternals updates: Disk2vhd v1.1, ZoomIt v4.1, Coreinfo v2.0, VMMap v2.4 |
2009-09-24/a> | Jim Clausing | A couple more tools |
2009-09-04/a> | Adrien de Beaupre | SeaMonkey Security Update |
2009-08-05/a> | donald smith | Security Update 2009-003 / Mac OS X v10.5.8 |
2009-08-04/a> | donald smith | Java Security Update |
2009-07-18/a> | Patrick Nolan | Chrome update contains Security fixes |
2009-06-10/a> | Swa Frantzen | Java 6 update 14 released |
2009-06-02/a> | Deborah Hale | Another Quicktime Update |
2009-05-26/a> | Jason Lam | Vista & Win2K8 SP2 available |
2009-02-10/a> | Swa Frantzen | Java up to date ? |
2008-11-29/a> | Pedro Bueno | Ubuntu users: Time to update! |
2008-11-13/a> | Jim Clausing | Some recently updated tools |
2008-10-10/a> | Marcus Sachs | Fake Microsoft Update Email |
2008-09-10/a> | Adrien de Beaupre | Apple updates iPod Touch + Bonjour for Windows |
2008-07-11/a> | Jim Clausing | Updates to some of our favorite tools |
2008-04-20/a> | Joel Esler | Software Update -- Did Apple Do Enough? |
2008-03-20/a> | Joel Esler | APPLE-SA-2008-03-19 AirPort Extreme Base Station Firmware 7.3.1 |
2008-03-20/a> | Joel Esler | Potential Vulnerability in Flash CS3 Professional, Flash Professional 8 and Flash Basic 8? |
ON |
2025-03-31/a> | Johannes Ullrich | Apple Patches Everything: March 31st 2025 Edition |
2025-03-18/a> | Xavier Mertens | Python Bot Delivered Through DLL Side-Loading |
2025-03-10/a> | Xavier Mertens | Shellcode Encoded in UUIDs |
2025-03-06/a> | Guy Bruneau | DShield Traffic Analysis using ELK |
2025-02-19/a> | Xavier Mertens | XWorm Cocktail: A Mix of PE data with PowerShell Code |
2025-02-17/a> | Russ McRee | ModelScan - Protection Against Model Serialization Attacks |
2025-02-14/a> | Xavier Mertens | Fake BSOD Delivered by Malicious Python Script |
2025-02-13/a> | Guy Bruneau | DShield SIEM Docker Updates |
2025-02-12/a> | Yee Ching Tok | An ontology for threats, cybercrime and digital forensic investigation on Smart City Infrastructure |
2025-02-06/a> | Xavier Mertens | The Unbreakable Multi-Layer Anti-Debugging System |
2025-01-29/a> | Xavier Mertens | From PowerShell to a Python Obfuscation Race! |
2025-01-28/a> | Xavier Mertens | Fileless Python InfoStealer Targeting Exodus |
2025-01-21/a> | Johannes Ullrich | Geolocation and Starlink |
2025-01-18/a> | Jim Clausing | New tool: immutable.py |
2025-01-16/a> | Jesse La Grew | Extracting Practical Observations from Impractical Datasets |
2025-01-15/a> | Yee Ching Tok | The Curious Case of a 12-Year-Old Netgear Router Vulnerability |
2025-01-13/a> | Johannes Ullrich | Hikvision Password Reset Brute Forcing |
2025-01-06/a> | Xavier Mertens | Make Malware Happy |
2025-01-03/a> | Xavier Mertens | SwaetRAT Delivery Through Python |
2024-12-31/a> | Xavier Mertens | No Holiday Season for Attackers |
2024-12-26/a> | Jesse La Grew | Capturing Honeypot Data Beyond the Logs |
2024-12-23/a> | Xavier Mertens | Modiloader From Obfuscated Batch File |
2024-12-17/a> | Xavier Mertens | Python Delivering AnyDesk Client as RAT |
2024-12-17/a> | Guy Bruneau | Command Injection Exploit For PHPUnit before 4.8.28 and 5.x before 5.6.3 [Guest Diary] |
2024-12-09/a> | Jesse La Grew | CURLing for Crypto on Honeypots |
2024-11-30/a> | Xavier Mertens | From a Regular Infostealer to its Obfuscated Version |
2024-11-22/a> | Xavier Mertens | An Infostealer Searching for « BIP-0039 » Data |
2024-11-19/a> | Xavier Mertens | Detecting the Presence of a Debugger in Linux |
2024-11-07/a> | Xavier Mertens | Steam Account Checker Poisoned with Infostealer |
2024-11-06/a> | Jesse La Grew | [Guest Diary] Insights from August Web Traffic Surge |
2024-11-05/a> | Xavier Mertens | Python RAT with a Nice Screensharing Feature |
2024-10-31/a> | Guy Bruneau | October 2024 Activity with Username chenzilong |
2024-10-07/a> | Xavier Mertens | macOS Sequoia: System/Network Admins, Hold On! |
2024-09-25/a> | Johannes Ullrich | DNS Reflection Update and Odd Corrupted DNS Requests |
2024-09-18/a> | Xavier Mertens | Python Infostealer Patching Windows Exodus App |
2024-09-17/a> | Xavier Mertens | 23:59, Time to Exfiltrate! |
2024-09-16/a> | Xavier Mertens | Managing PE Files With Overlays |
2024-09-13/a> | Jesse La Grew | Finding Honeypot Data Clusters Using DBSCAN: Part 2 |
2024-09-11/a> | Xavier Mertens | Python Libraries Used for Malicious Purposes |
2024-09-06/a> | Jesse La Grew | Enrichment Data: Keeping it Fresh |
2024-08-30/a> | Jesse La Grew | Simulating Traffic With Scapy |
2024-08-29/a> | Xavier Mertens | Live Patching DLLs with Python |
2024-08-27/a> | Xavier Mertens | Why Is Python so Popular to Infect Windows Hosts? |
2024-08-26/a> | Xavier Mertens | From Highly Obfuscated Batch File to XWorm and Redline |
2024-08-23/a> | Jesse La Grew | Pandas Errors: What encoding are my logs in? |
2024-08-19/a> | Xavier Mertens | Do you Like Donuts? Here is a Donut Shellcode Delivered Through PowerShell/Python |
2024-08-16/a> | Jesse La Grew | [Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools |
2024-07-26/a> | Xavier Mertens | ExelaStealer Delivered "From Russia With Love" |
2024-07-25/a> | Xavier Mertens | XWorm Hidden With Process Hollowing |
2024-07-24/a> | Xavier Mertens | "Mouse Logger" Malicious Python Script |
2024-07-10/a> | Jesse La Grew | Finding Honeypot Data Clusters Using DBSCAN: Part 1 |
2024-07-08/a> | Xavier Mertens | Kunai: Keep an Eye on your Linux Hosts Activity |
2024-07-01/a> | Johannes Ullrich | SSH "regreSSHion" Remote Code Execution Vulnerability in OpenSSH. |
2024-06-15/a> | Didier Stevens | Overview of My Tools That Handle JSON Data |
2024-06-13/a> | Guy Bruneau | The Art of JQ and Command-line Fu [Guest Diary] |
2024-06-06/a> | Xavier Mertens | Malicious Python Script with a "Best Before" Date |
2024-05-31/a> | Xavier Mertens | "K1w1" InfoStealer Uses gofile.io for Exfiltration |
2024-05-30/a> | Xavier Mertens | Feeding MISP with OSSEC |
2024-04-29/a> | Johannes Ullrich | D-Link NAS Device Backdoor Abused |
2024-04-25/a> | Jesse La Grew | Does it matter if iptables isn't running on my honeypot? |
2024-04-22/a> | Jan Kopriva | It appears that the number of industrial devices accessible from the internet has risen by 30 thousand over the past three years |
2024-04-17/a> | Xavier Mertens | Malicious PDF File Used As Delivery Mechanism |
2024-04-17/a> | Rob VandenBrink | The CVE's They are A-Changing! |
2024-03-28/a> | Xavier Mertens | From JavaScript to AsyncRAT |
2024-03-13/a> | Xavier Mertens | Using ChatGPT to Deobfuscate Malicious Scripts |
2024-03-10/a> | Guy Bruneau | What happens when you accidentally leak your AWS API keys? [Guest Diary] |
2024-03-07/a> | Jesse La Grew | [Guest Diary] AWS Deployment Risks - Configuration and Credential File Targeting |
2024-03-03/a> | Guy Bruneau | Capturing DShield Packets with a LAN Tap [Guest Diary] |
2024-02-28/a> | Johannes Ullrich | Exploit Attempts for Unknown Password Reset Vulnerability |
2024-02-25/a> | Guy Bruneau | Utilizing the VirusTotal API to Query Files Uploaded to DShield Honeypot [Guest Diary] |
2024-02-20/a> | Xavier Mertens | Python InfoStealer With Dynamic Sandbox Detection |
2024-02-18/a> | Guy Bruneau | Mirai-Mirai On The Wall... [Guest Diary] |
2024-02-15/a> | Jesse La Grew | [Guest Diary] Learning by doing: Iterative adventures in troubleshooting |
2024-02-09/a> | Xavier Mertens | MSIX With Heavily Obfuscated PowerShell Script |
2024-02-08/a> | Xavier Mertens | A Python MP3 Player with Builtin Keylogger Capability |
2024-02-03/a> | Guy Bruneau | DShield Sensor Log Collection with Elasticsearch |
2024-01-30/a> | Johannes Ullrich | What did I say to make you stop talking to me? |
2024-01-29/a> | Johannes Ullrich | Exploit Flare Up Against Older Altassian Confluence Vulnerability |
2024-01-26/a> | Xavier Mertens | A Batch File With Multiple Payloads |
2024-01-25/a> | Xavier Mertens | Facebook AdsManager Targeted by a Python Infostealer |
2024-01-19/a> | Xavier Mertens | macOS Python Script Replacing Wallet Applications with Rogue Apps |
2024-01-17/a> | Jesse La Grew | Number Usage in Passwords |
2024-01-12/a> | Xavier Mertens | One File, Two Payloads |
2024-01-08/a> | Jesse La Grew | What is that User Agent? |
2024-01-02/a> | Johannes Ullrich | Fingerprinting SSH Identification Strings |
2023-12-27/a> | Guy Bruneau | Unveiling the Mirai: Insights into Recent DShield Honeypot Activity [Guest Diary] |
2023-12-23/a> | Xavier Mertens | Python Keylogger Using Mailtrap.io |
2023-12-22/a> | Xavier Mertens | Shall We Play a Game? |
2023-12-20/a> | Guy Bruneau | How to Protect your Webserver from Directory Enumeration Attack ? Apache2 [Guest Diary] |
2023-12-16/a> | Xavier Mertens | An Example of RocketMQ Exploit Scanner |
2023-12-13/a> | Guy Bruneau | T-shooting Terraform for DShield Honeypot in Azure [Guest Diary] |
2023-12-10/a> | Guy Bruneau | Honeypots: From the Skeptical Beginner to the Tactical Enthusiast |
2023-11-30/a> | John Bambenek | Prophetic Post by Intern on CVE-2023-1389 Foreshadows Mirai Botnet Expansion Today |
2023-11-27/a> | Guy Bruneau | Decoding the Patterns: Analyzing DShield Honeypot Activity [Guest Diary] |
2023-11-22/a> | Guy Bruneau | CVE-2023-1389: A New Means to Expand Botnets |
2023-11-20/a> | Jesse La Grew | Overflowing Web Honeypot Logs |
2023-11-09/a> | Xavier Mertens | Visual Examples of Code Injection |
2023-10-31/a> | Xavier Mertens | Multiple Layers of Anti-Sandboxing Techniques |
2023-10-29/a> | Guy Bruneau | Spam or Phishing? Looking for Credentials & Passwords |
2023-10-15/a> | Guy Bruneau | Domain Name Used as Password Captured by DShield Sensor |
2023-10-03/a> | Tom Webb | Are Local LLMs Useful in Incident Response? |
2023-09-30/a> | Xavier Mertens | Simple Netcat Backdoor in Python Script |
2023-09-26/a> | Johannes Ullrich | Apple Releases MacOS Sonoma Including Numerous Security Patches |
2023-09-14/a> | Jesse La Grew | DShield and qemu Sitting in a Tree: L-O-G-G-I-N-G |
2023-09-09/a> | Guy Bruneau | ?Anyone get the ASN of the Truck that Hit Me?!?: Creating a PowerShell Function to Make 3rd Party API Calls for Extending Honeypot Information [Guest Diary] |
2023-09-05/a> | Jesse La Grew | Common usernames submitted to honeypots |
2023-09-02/a> | Jesse La Grew | What is the origin of passwords submitted to honeypots? |
2023-08-31/a> | Guy Bruneau | Potential Weaponizing of Honeypot Logs [Guest Diary] |
2023-08-25/a> | Xavier Mertens | Python Malware Using Postgresql for C2 Communications |
2023-08-23/a> | Xavier Mertens | More Exotic Excel Files Dropping AgentTesla |
2023-08-23/a> | Guy Bruneau | How I made a qwerty ?keyboard walk? password generator with ChatGPT [Guest Diary] |
2023-08-22/a> | Xavier Mertens | Have You Ever Heard of the Fernet Encryption Algorithm? |
2023-08-21/a> | Xavier Mertens | Quick Malware Triage With Inotify Tools |
2023-08-17/a> | Jesse La Grew | Command Line Parsing - Are These Really Unique Strings? |
2023-08-12/a> | Guy Bruneau | DShield Sensor Monitoring with a Docker ELK Stack [Guest Diary] |
2023-08-11/a> | Xavier Mertens | Show me All Your Windows! |
2023-07-28/a> | Xavier Mertens | ShellCode Hidden with Steganography |
2023-07-26/a> | Xavier Mertens | Suspicious IP Addresses Avoided by Malware Samples |
2023-07-23/a> | Guy Bruneau | Install & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs |
2023-07-13/a> | Jesse La Grew | DShield Honeypot Maintenance and Data Retention |
2023-07-06/a> | Jesse La Grew | IDS Comparisons with DShield Honeypot Data |
2023-07-01/a> | Russ McRee | Sandfly Security |
2023-06-27/a> | Xavier Mertens | The Importance of Malware Triage |
2023-06-20/a> | Xavier Mertens | Malicious Code Can Be Anywhere |
2023-06-16/a> | Xavier Mertens | Another RAT Delivered Through VBS |
2023-06-11/a> | Guy Bruneau | DShield Honeypot Activity for May 2023 |
2023-06-09/a> | Xavier Mertens | Undetected PowerShell Backdoor Disguised as a Profile File |
2023-05-28/a> | Guy Bruneau | We Can no Longer Ignore the Cost of Cybersecurity |
2023-05-20/a> | Xavier Mertens | Phishing Kit Collecting Victim's IP Address |
2023-05-17/a> | Xavier Mertens | Increase in Malicious RAR SFX files |
2023-05-14/a> | Guy Bruneau | VMware Aria Operations addresses multiple Local Privilege Escalations and a Deserialization issue |
2023-05-14/a> | Guy Bruneau | DShield Sensor Update |
2023-05-09/a> | Russ McRee | Exploratory Data Analysis with CISSM Cyber Attacks Database - Part 2 |
2023-05-03/a> | Xavier Mertens | Increased Number of Configuration File Scans |
2023-04-28/a> | Xavier Mertens | Quick IOC Scan With Docker |
2023-04-17/a> | Jan Kopriva | The strange case of Great honeypot of China |
2023-04-08/a> | Xavier Mertens | Microsoft Netlogon: Potential Upcoming Impacts of CVE-2022-38023 |
2023-04-05/a> | Jesse La Grew | Exploration of DShield Cowrie Data with jq |
2023-03-31/a> | Jan Kopriva | Use of X-Frame-Options and CSP frame-ancestors security headers on 1 million most popular domains |
2023-03-30/a> | Xavier Mertens | Bypassing PowerShell Strong Obfuscation |
2023-03-29/a> | Didier Stevens | Extracting Multiple Streams From OLE Files |
2023-03-28/a> | Jesse La Grew | Network Data Collector Placement Makes a Difference |
2023-03-21/a> | Didier Stevens | String Obfuscation: Character Pair Reversal |
2023-03-18/a> | Xavier Mertens | Old Backdoor, New Obfuscation |
2023-03-11/a> | Xavier Mertens | Overview of a Mirai Payload Generator |
2023-03-02/a> | Didier Stevens | YARA: Detect The Unexpected ... |
2023-03-01/a> | Xavier Mertens | Python Infostealer Targeting Gamers |
2023-02-22/a> | Johannes Ullrich | Internet Wide Scan Fingerprinting Confluence Servers |
2023-02-15/a> | Rob VandenBrink | DNS Recon Redux - Zone Transfers (plus a time machine) for When You Can't do a Zone Transfer |
2023-02-10/a> | Xavier Mertens | Obfuscated Deactivation of Script Block Logging |
2023-02-09/a> | Xavier Mertens | A Backdoor with Smart Screenshot Capability |
2023-02-05/a> | Didier Stevens | Video: Analyzing Malicious OneNote Documents |
2023-02-04/a> | Guy Bruneau | Assemblyline as a Malware Analysis Sandbox |
2023-02-01/a> | Didier Stevens | Detecting (Malicious) OneNote Files |
2023-01-31/a> | Jesse La Grew | DShield Honeypot Setup with pfSense |
2023-01-26/a> | Tom Webb | Live Linux IR with UAC |
2023-01-25/a> | Xavier Mertens | A First Malicious OneNote Document |
2023-01-23/a> | Xavier Mertens | Who's Resolving This Domain? |
2023-01-21/a> | Guy Bruneau | DShield Sensor JSON Log to Elasticsearch |
2023-01-08/a> | Guy Bruneau | DShield Sensor JSON Log Analysis |
2022-12-29/a> | Jesse La Grew | Opening the Door for a Knock: Creating a Custom DShield Listener |
2022-12-28/a> | Rob VandenBrink | Playing with Powershell and JSON (and Amazon and Firewalls) |
2022-12-21/a> | Guy Bruneau | DShield Sensor Setup in Azure |
2022-12-20/a> | Xavier Mertens | Linux File System Monitoring & Actions |
2022-12-19/a> | Xavier Mertens | Hunting for Mastodon Servers |
2022-12-03/a> | Guy Bruneau | Linux LOLBins Applications Available in Windows |
2022-11-14/a> | Jesse La Grew | Extracting 'HTTP CONNECT' Requests with Python |
2022-11-05/a> | Guy Bruneau | Windows Malware with VHD Extension |
2022-11-04/a> | Xavier Mertens | Remcos Downloader with Unicode Obfuscation |
2022-10-24/a> | Xavier Mertens | C2 Communications Through outlook.com |
2022-10-22/a> | Didier Stevens | rtfdump's Find Option |
2022-10-19/a> | Xavier Mertens | Are Internet Scanning Services Good or Bad for You? |
2022-10-18/a> | Xavier Mertens | Python Obfuscation for Dummies |
2022-10-08/a> | Didier Stevens | Sysmon v14.1 Release |
2022-09-26/a> | Xavier Mertens | Easy Python Sandbox Detection |
2022-09-14/a> | Xavier Mertens | Easy Process Injection within Python |
2022-09-12/a> | Johannes Ullrich | VirusTotal Result Comparisons for Honeypot Malware |
2022-09-07/a> | Johannes Ullrich | PHP Deserialization Exploit attempt |
2022-08-28/a> | Didier Stevens | Sysinternals Updates: Sysmon v14.0 and ZoomIt v6.01 |
2022-08-26/a> | Xavier Mertens | Paypal Phishing/Coinbase in One Image |
2022-08-24/a> | Brad Duncan | Monster Libra (TA551/Shathak) --> IcedID (Bokbot) --> Cobalt Strike & DarkVNC |
2022-08-19/a> | Johannes Ullrich | Windows Security Blocks UPX Compressed (packed) Binaries |
2022-08-18/a> | Johannes Ullrich | Honeypot Attack Summaries with Python |
2022-08-08/a> | Johannes Ullrich | JSON All the Logs! |
2022-07-28/a> | Johannes Ullrich | Exfiltrating Data With Bookmarks |
2022-07-20/a> | Xavier Mertens | Malicious Python Script Behaving Like a Rubber Ducky |
2022-07-19/a> | Johannes Ullrich | Requests For beacon.http-get. Help Us Figure Out What They Are Looking For |
2022-06-24/a> | Xavier Mertens | Python (ab)using The Windows GUI |
2022-06-22/a> | Xavier Mertens | Malicious PowerShell Targeting Cryptocurrency Browser Extensions |
2022-06-19/a> | Didier Stevens | Video: Decoding Obfuscated BASE64 Statistically |
2022-06-18/a> | Didier Stevens | Decoding Obfuscated BASE64 Statistically |
2022-06-16/a> | Xavier Mertens | Houdini is Back Delivered Through a JavaScript Dropper |
2022-06-15/a> | Johannes Ullrich | Terraforming Honeypots. Installing DShield Sensors in the Cloud |
2022-06-03/a> | Xavier Mertens | Sandbox Evasion... With Just a Filename! |
2022-06-02/a> | Johannes Ullrich | Quick Answers in Incident Response: RECmd.exe |
2022-06-01/a> | Jan Kopriva | HTML phishing attachments - now with anti-analysis features |
2022-05-30/a> | Xavier Mertens | New Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme (CVE-2022-30190) |
2022-05-24/a> | Yee Ching Tok | ctx Python Library Updated with "Extra" Features |
2022-05-03/a> | Johannes Ullrich | Some Honeypot Updates |
2022-05-03/a> | Rob VandenBrink | Finding the Real "Last Patched" Day (Interim Version) |
2022-04-29/a> | Rob VandenBrink | Using Passive DNS sources for Reconnaissance and Enumeration |
2022-04-21/a> | Xavier Mertens | Multi-Cryptocurrency Clipboard Swapper |
2022-04-19/a> | Johannes Ullrich | Resetting Linux Passwords with U-Boot Bootloaders |
2022-04-03/a> | Didier Stevens | jo |
2022-04-02/a> | Didier Stevens | curl 7.82.0 Adds --json Option |
2022-03-31/a> | Johannes Ullrich | Spring Vulnerability Update - Exploitation Attempts CVE-2022-22965 |
2022-03-29/a> | Johannes Ullrich | More Fake/Typosquatting Twitter Accounts Asking for Ukraine Crytocurrency Donations |
2022-03-23/a> | Brad Duncan | Arkei Variants: From Vidar to Mars Stealer |
2022-03-13/a> | Didier Stevens | YARA 4.2.0 Released |
2022-03-09/a> | Xavier Mertens | Infostealer in a Batch File |
2022-03-04/a> | Johannes Ullrich | Scam E-Mail Impersonating Red Cross |
2022-02-22/a> | Xavier Mertens | A Good Old Equation Editor Vulnerability Delivering Malware |
2022-02-20/a> | Didier Stevens | Video: YARA's Console Module |
2022-02-10/a> | Johannes Ullrich | Zyxel Network Storage Devices Hunted By Mirai Variant |
2022-02-03/a> | Johannes Ullrich | Keeping Track of Your Attack Surface for Cheap |
2022-02-01/a> | Xavier Mertens | Automation is Nice But Don't Replace Your Knowledge |
2022-01-31/a> | Xavier Mertens | Be careful with RPMSG files |
2022-01-30/a> | Didier Stevens | YARA's Console Module |
2022-01-20/a> | Xavier Mertens | RedLine Stealer Delivered Through FTP |
2022-01-07/a> | Xavier Mertens | Custom Python RAT Builder |
2022-01-06/a> | Xavier Mertens | Malicious Python Script Targeting Chinese People |
2022-01-01/a> | Didier Stevens | Expect Regressions |
2021-12-28/a> | Russ McRee | LotL Classifier tests for shells, exfil, and miners |
2021-12-21/a> | Xavier Mertens | More Undetected PowerShell Dropper |
2021-12-18/a> | Guy Bruneau | VMware Security Update - https://www.vmware.com/security/advisories/VMSA-2021-0030.html |
2021-12-16/a> | Brad Duncan | How the "Contact Forms" campaign tricks people |
2021-12-14/a> | Johannes Ullrich | Log4j: Getting ready for the long haul (CVE-2021-44228) |
2021-12-10/a> | Xavier Mertens | Python Shellcode Injection From JSON Data |
2021-12-06/a> | Xavier Mertens | The Importance of Out-of-Band Networks |
2021-12-01/a> | Xavier Mertens | Info-Stealer Using webhook.site to Exfiltrate Data |
2021-11-20/a> | Guy Bruneau | Hikvision Security Cameras Potentially Exposed to Remote Code Execution |
2021-11-18/a> | Xavier Mertens | JavaScript Downloader Delivers Agent Tesla Trojan |
2021-11-14/a> | Didier Stevens | Video: Obfuscated Maldoc: Reversed BASE64 |
2021-11-10/a> | Xavier Mertens | Shadow IT Makes People More Vulnerable to Phishing |
2021-11-08/a> | Xavier Mertens | (Ab)Using Security Tools & Controls for the Bad |
2021-10-18/a> | Xavier Mertens | Malicious PowerShell Using Client Certificate Authentication |
2021-09-24/a> | Xavier Mertens | Keep an Eye on Your Users Mobile Devices (Simple Inventory) |
2021-09-22/a> | Didier Stevens | An XML-Obfuscated Office Document (CVE-2021-40444) |
2021-09-17/a> | Xavier Mertens | Malicious Calendar Subscriptions Are Back? |
2021-09-15/a> | Brad Duncan | Hancitor campaign abusing Microsoft's OneDrive |
2021-08-30/a> | Xavier Mertens | Cryptocurrency Clipboard Swapper Delivered With Love |
2021-08-29/a> | Guy Bruneau | Filter JSON Data by Value with Linux jq |
2021-08-19/a> | Johannes Ullrich | When Lightning Strikes. What works and doesn't work. |
2021-08-17/a> | Johannes Ullrich | Laravel (<=v8.4.2) exploit attempts for CVE-2021-3129 (debug mode: Remote code execution) |
2021-08-13/a> | Guy Bruneau | Scanning for Microsoft Exchange eDiscovery |
2021-07-31/a> | Guy Bruneau | Unsolicited DNS Queries |
2021-07-28/a> | Jan Kopriva | A sextortion e-mail from...IT support?! |
2021-07-20/a> | Bojan Zdrnja | Summer of SAM - incorrect permissions on Windows 10/11 hives |
2021-07-16/a> | Xavier Mertens | Multiple BaseXX Obfuscations |
2021-07-14/a> | Jan Kopriva | One way to fail at malspam - give recipients the wrong password for an encrypted attachment |
2021-07-08/a> | Xavier Mertens | Using Sudo with Python For More Security Controls |
2021-07-06/a> | Xavier Mertens | Python DLL Injection Check |
2021-07-04/a> | Didier Stevens | DIY CD/DVD Destruction - Follow Up |
2021-07-02/a> | Xavier Mertens | "inception.py"... Multiple Base64 Encodings |
2021-06-27/a> | Didier Stevens | DIY CD/DVD Destruction |
2021-06-24/a> | Xavier Mertens | Do you Like Cookies? Some are for sale! |
2021-06-21/a> | Rick Wanner | Mitre CWE - Common Weakness Enumeration |
2021-06-15/a> | Johannes Ullrich | Multi Perimeter Device Exploit Mirai Version Hunting For Sonicwall, DLink, Cisco and more |
2021-06-12/a> | Guy Bruneau | Fortinet Targeted for Unpatched SSL VPN Discovery Activity |
2021-06-11/a> | Xavier Mertens | Keeping an Eye on Dangerous Python Modules |
2021-06-11/a> | Xavier Mertens | Sonicwall SRA 4600 Targeted By an Old Vulnerability |
2021-06-07/a> | Johannes Ullrich | Amazon Sidewalk: Cutting Through the Hype |
2021-06-04/a> | Xavier Mertens | Russian Dolls VBS Obfuscation |
2021-05-31/a> | Rick Wanner | Quick and dirty Python: nmap |
2021-05-30/a> | Didier Stevens | Sysinternals: Procmon, Sysmon, TcpView and Process Explorer update |
2021-05-23/a> | Didier Stevens | Video: Making Sense Of Encrypted Cobalt Strike Traffic |
2021-05-12/a> | Jan Kopriva | Number of industrial control systems on the internet is lower then in 2020...but still far from zero |
2021-05-10/a> | Johannes Ullrich | Correctly Validating IP Addresses: Why encoding matters for input validation. |
2021-05-08/a> | Guy Bruneau | Who is Probing the Internet for Research Purposes? |
2021-05-04/a> | Rick Wanner | Quick and dirty Python: masscan |
2021-04-29/a> | Xavier Mertens | From Python to .Net |
2021-04-25/a> | Didier Stevens | Sysinternals: Procmon and Sysmon update |
2021-04-22/a> | Xavier Mertens | How Safe Are Your Docker Images? |
2021-04-19/a> | Jan Kopriva | Hunting phishing websites with favicon hashes |
2021-04-18/a> | Didier Stevens | Decoding Cobalt Strike Traffic |
2021-04-12/a> | Didier Stevens | Example of Cleartext Cobalt Strike Traffic (Thanks Brad) |
2021-04-09/a> | Xavier Mertens | No Python Interpreter? This Simple RAT Installs Its Own Copy |
2021-04-02/a> | Xavier Mertens | C2 Activity: Sandboxes or Real Victims? |
2021-03-31/a> | Xavier Mertens | Quick Analysis of a Modular InfoStealer |
2021-03-18/a> | Xavier Mertens | Simple Python Keylogger |
2021-03-10/a> | Rob VandenBrink | SharpRDP - PSExec without PSExec, PSRemoting without PowerShell |
2021-03-07/a> | Didier Stevens | PCAPs and Beacons |
2021-03-02/a> | Russ McRee | Adversary Simulation with Sim |
2021-02-28/a> | Didier Stevens | Maldocs: Protection Passwords |
2021-02-26/a> | Guy Bruneau | Pretending to be an Outlook Version Update |
2021-02-22/a> | Didier Stevens | Unprotecting Malicious Documents For Inspection |
2021-02-13/a> | Guy Bruneau | vSphere Replication updates address a command injection vulnerability (CVE-2021-21976) - https://www.vmware.com/security/advisories/VMSA-2021-0001.html |
2021-02-04/a> | Bojan Zdrnja | Abusing Google Chrome extension syncing for data exfiltration and C&C |
2021-02-01/a> | Rob VandenBrink | Taking a Shot at Reverse Shell Attacks, CNC Phone Home and Data Exfil from Servers |
2021-01-22/a> | Xavier Mertens | Another File Extension to Block in your MTA: .jnlp |
2021-01-19/a> | Russ McRee | Gordon for fast cyber reputation checks |
2021-01-18/a> | Didier Stevens | Doc & RTF Malicious Document |
2021-01-17/a> | Didier Stevens | New Release of Sysmon Adding Detection for Process Tampering |
2021-01-15/a> | Guy Bruneau | Obfuscated DNS Queries |
2021-01-04/a> | Jan Kopriva | From a small BAT file to Mass Logger infostealer |
2021-01-02/a> | Guy Bruneau | Protecting Home Office and Enterprise in 2021 |
2020-12-29/a> | Jan Kopriva | Want to know what's in a folder you don't have a permission to access? Try asking your AV solution... |
2020-12-22/a> | Xavier Mertens | Malware Victim Selection Through WiFi Identification |
2020-12-19/a> | Guy Bruneau | Secure Communication using TLS in Elasticsearch |
2020-12-17/a> | Daniel Wesemann | "Amazon" invoice that asks to call 1-866-335-0659 "to cancel" an order that you never made is (obviously) a #scam |
2020-12-13/a> | Didier Stevens | KringleCon 2020 |
2020-12-10/a> | Xavier Mertens | Python Backdoor Talking to a C2 Through Ngrok |
2020-12-04/a> | Guy Bruneau | Detecting Actors Activity with Threat Intel |
2020-11-30/a> | Didier Stevens | Decrypting PowerShell Payloads (video) |
2020-11-22/a> | Didier Stevens | Quick Tip: Extracting all VBA Code from a Maldoc - JSON Format |
2020-11-21/a> | Guy Bruneau | VMware privilege escalation vulnerabilities (CVE-2020-4004, CVE-2020-4005) - https://www.vmware.com/security/advisories/VMSA-2020-0026.html |
2020-11-20/a> | Xavier Mertens | Malicious Python Code and LittleSnitch Detection |
2020-11-19/a> | Xavier Mertens | PowerShell Dropper Delivering Formbook |
2020-11-13/a> | Xavier Mertens | Old Worm But New Obfuscation Technique |
2020-11-09/a> | Xavier Mertens | How Attackers Brush Up Their Malicious Scripts |
2020-11-07/a> | Guy Bruneau | Cryptojacking Targeting WebLogic TCP/7001 |
2020-11-05/a> | Xavier Mertens | Did You Spot "Invoke-Expression"? |
2020-10-24/a> | Guy Bruneau | An Alternative to Shodan, Censys with User-Agent CensysInspect/1.1 |
2020-10-20/a> | Xavier Mertens | Mirai-alike Python Scanner |
2020-10-14/a> | Xavier Mertens | Nicely Obfuscated Python RAT |
2020-09-30/a> | Johannes Ullrich | Scans for FPURL.xml: Reconnaissance or Not? |
2020-09-29/a> | Xavier Mertens | Managing Remote Access for Partners & Contractors |
2020-09-24/a> | Xavier Mertens | Party in Ibiza with PowerShell |
2020-09-20/a> | Guy Bruneau | Analysis of a Salesforce Phishing Emails |
2020-09-18/a> | Xavier Mertens | A Mix of Python & VBA in a Malicious Word Document |
2020-09-17/a> | Xavier Mertens | Suspicious Endpoint Containment with OSSEC |
2020-09-04/a> | Jan Kopriva | A blast from the past - XXEncoded VB6.0 Trojan |
2020-09-03/a> | Xavier Mertens | Sandbox Evasion Using NTP |
2020-09-02/a> | Xavier Mertens | Python and Risky Windows API Calls |
2020-08-28/a> | Xavier Mertens | Example of Malicious DLL Injected in PowerShell |
2020-08-19/a> | Xavier Mertens | Example of Word Document Delivering Qakbot |
2020-08-18/a> | Xavier Mertens | Using API's to Track Attackers |
2020-08-16/a> | Didier Stevens | Small Challenge: A Simple Word Maldoc - Part 3 |
2020-08-10/a> | Bojan Zdrnja | Scoping web application and web service penetration tests |
2020-08-04/a> | Johannes Ullrich | Internet Choke Points: Concentration of Authoritative Name Servers |
2020-07-30/a> | Johannes Ullrich | Python Developers: Prepare!!! |
2020-07-27/a> | Johannes Ullrich | In Memory of Donald Smith |
2020-07-24/a> | Xavier Mertens | Compromized Desktop Applications by Web Technologies |
2020-07-20/a> | Rick Wanner | Sextortion Update: The Final Final Chapter |
2020-07-11/a> | Guy Bruneau | VMware XPC Client validation privilege escalation vulnerability - https://www.vmware.com/security/advisories/VMSA-2020-0017.html |
2020-07-08/a> | Xavier Mertens | If You Want Something Done Right, You Have To Do It Yourself... Malware Too! |
2020-07-01/a> | Jim Clausing | Setting up the Dshield honeypot and tcp-honeypot.py |
2020-06-29/a> | Didier Stevens | Sysmon and Alternate Data Streams |
2020-06-28/a> | Guy Bruneau | tcp-honeypot.py Logstash Parser & Dashboard Update |
2020-06-25/a> | Johannes Ullrich | Tech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release. |
2020-06-20/a> | Tom Webb | Pi Zero HoneyPot |
2020-06-16/a> | Xavier Mertens | Sextortion to The Next Level |
2020-06-05/a> | Remco Verhoef | Not so FastCGI! |
2020-06-04/a> | Xavier Mertens | Anti-Debugging Technique based on Memory Protection |
2020-05-31/a> | Guy Bruneau | Windows 10 Built-in Packet Sniffer - PktMon |
2020-05-29/a> | Johannes Ullrich | The Impact of Researchers on Our Data |
2020-05-04/a> | Didier Stevens | Sysmon and File Deletion |
2020-05-01/a> | Jim Clausing | Attack traffic on TCP port 9673 |
2020-04-27/a> | Xavier Mertens | Powershell Payload Stored in a PSCredential Object |
2020-04-24/a> | Xavier Mertens | Malicious Excel With a Strong Obfuscation and Sandbox Evasion |
2020-04-03/a> | Xavier Mertens | Obfuscated with a Simple 0x0A |
2020-03-23/a> | Didier Stevens | Windows Zeroday Actively Exploited: Type 1 Font Parsing Remote Code Execution Vulnerability |
2020-03-15/a> | Guy Bruneau | VPN Access and Activity Monitoring |
2020-03-11/a> | Xavier Mertens | Agent Tesla Delivered via Fake Canon EOS Notification on Free OwnCloud Account |
2020-02-27/a> | Xavier Mertens | Offensive Tools Are For Blue Teams Too |
2020-02-22/a> | Xavier Mertens | Simple but Efficient VBScript Obfuscation |
2020-02-16/a> | Guy Bruneau | SOAR or not to SOAR? |
2020-02-14/a> | Xavier Mertens | Keep an Eye on Command-Line Browsers |
2020-02-08/a> | Russell Eubanks | After Action Review |
2020-02-07/a> | Xavier Mertens | Sandbox Detection Tricks & Nice Obfuscation in a Single VBScript |
2020-01-27/a> | Johannes Ullrich | Network Security Perspective on Coronavirus Preparedness |
2020-01-23/a> | Xavier Mertens | Complex Obfuscation VS Simple Trick |
2020-01-16/a> | Jan Kopriva | Picks of 2019 malware - the large, the small and the one full of null bytes |
2020-01-12/a> | Guy Bruneau | ELK Dashboard and Logstash parser for tcp-honeypot Logs |
2020-01-10/a> | Xavier Mertens | More Data Exfiltration |
2020-01-04/a> | Didier Stevens | KringleCon 2019 |
2019-12-23/a> | Didier Stevens | New oledump.py plugin: plugin_version_vba |
2019-11-29/a> | Russ McRee | ISC Snapshot: Search with SauronEye |
2019-11-22/a> | Xavier Mertens | Abusing Web Filters Misconfiguration for Reconnaissance |
2019-11-20/a> | Brad Duncan | Hancitor infection with Pony, Evil Pony, Ursnif, and Cobalt Strike |
2019-11-11/a> | Johannes Ullrich | Are We Going Back to TheMoon (and How is Liquor Involved)? |
2019-11-09/a> | Guy Bruneau | Fake Netflix Update Request by Text |
2019-11-03/a> | Didier Stevens | You Too? "Unusual Activity with Double Base64 Encoding" |
2019-10-29/a> | Xavier Mertens | Generating PCAP Files from YAML |
2019-10-24/a> | Johannes Ullrich | Your Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment? |
2019-10-19/a> | Russell Eubanks | What Assumptions Are You Making? |
2019-10-18/a> | Xavier Mertens | Quick Malicious VBS Analysis |
2019-10-16/a> | Xavier Mertens | Security Monitoring: At Network or Host Level? |
2019-09-27/a> | Xavier Mertens | New Scans for Polycom Autoconfiguration Files |
2019-09-22/a> | Didier Stevens | Video: Encrypted Sextortion PDFs |
2019-09-19/a> | Xavier Mertens | Agent Tesla Trojan Abusing Corporate Email Accounts |
2019-09-19/a> | Xavier Mertens | Blocklisting or Whitelisting in the Right Way |
2019-09-17/a> | Rob VandenBrink | Investigating Gaps in your Windows Event Logs |
2019-09-16/a> | Didier Stevens | Encrypted Sextortion PDFs |
2019-08-25/a> | Guy Bruneau | Are there any Advantages of Buying Cyber Security Insurance? |
2019-08-09/a> | Xavier Mertens | 100% JavaScript Phishing Page |
2019-08-05/a> | Rick Wanner | Sextortion: Follow the Money - The Final Chapter |
2019-07-28/a> | Didier Stevens | Video: Analyzing Compressed PowerShell Scripts |
2019-07-25/a> | Rob VandenBrink | When Users Attack! Users (and Admins) Thwarting Security Controls |
2019-07-18/a> | Rob VandenBrink | The Other Side of Critical Control 1: 802.1x Wired Network Access Controls |
2019-07-13/a> | Guy Bruneau | Guidance to Protect DNS Against Hijacking & Scanning for Version.BIND Still a Thing |
2019-07-11/a> | Xavier Mertens | Russian Dolls Malicious Script Delivering Ursnif |
2019-07-02/a> | Xavier Mertens | Malicious Script With Multiple Payloads |
2019-06-27/a> | Rob VandenBrink | Finding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell |
2019-06-20/a> | Xavier Mertens | Using a Travel Packing App for Infosec Purpose |
2019-06-19/a> | Johannes Ullrich | Critical Actively Exploited WebLogic Flaw Patched CVE-2019-2729 |
2019-06-16/a> | Didier Stevens | Sysmon Version 10: DNS Logging |
2019-06-10/a> | Xavier Mertens | Interesting JavaScript Obfuscation Example |
2019-06-09/a> | Didier Stevens | Tip: Sysmon Will Log DNS Queries |
2019-05-16/a> | Xavier Mertens | The Risk of Authenticated Vulnerability Scans |
2019-04-26/a> | Rob VandenBrink | Pillaging Passwords from Service Accounts |
2019-04-25/a> | Rob VandenBrink | Unpatched Vulnerability Alert - WebLogic Zero Day |
2019-04-13/a> | Johannes Ullrich | Configuring MTA-STS and TLS Reporting For Your Domain |
2019-04-05/a> | Russ McRee | Beagle: Graph transforms for DFIR data & logs |
2019-03-25/a> | Didier Stevens | "VelvetSweatshop" Maldocs: Shellcode Analysis |
2019-03-24/a> | Didier Stevens | Decoding QR Codes with Python |
2019-03-23/a> | Didier Stevens | "VelvetSweatshop" Maldocs |
2019-03-21/a> | Xavier Mertens | New Wave of Extortion Emails: Central Intelligence Agency Case |
2019-03-20/a> | Rob VandenBrink | Using AD to find hosts that aren't in AD - fun with the [IPAddress] construct! |
2019-03-06/a> | Xavier Mertens | Keep an Eye on Disposable Email Addresses |
2019-02-25/a> | Didier Stevens | Sextortion Email Variant: With QR Code |
2019-02-24/a> | Guy Bruneau | Packet Editor and Builder by Colasoft |
2019-02-06/a> | Brad Duncan | Hancitor malspam and infection traffic from Tuesday 2019-02-05 |
2019-02-05/a> | Rob VandenBrink | Mitigations against Mimikatz Style Attacks |
2019-02-01/a> | Rick Wanner | Sextortion: Follow the Money Part 3 - The cashout begins! |
2019-01-31/a> | Xavier Mertens | Tracking Unexpected DNS Changes |
2019-01-18/a> | John Bambenek | Sextortion Bitcoin on the Move |
2018-12-31/a> | Didier Stevens | Software Crashes: A New Year's Resolution |
2018-12-29/a> | Didier Stevens | Video: De-DOSfuscation Example |
2018-12-22/a> | Didier Stevens | KringleCon 2018 |
2018-12-19/a> | Xavier Mertens | Using OSSEC Active-Response as a DFIR Framework |
2018-12-15/a> | Didier Stevens | De-DOSfuscation Example |
2018-12-14/a> | Rick Wanner | Bombstortion?? Boomstortion?? |
2018-12-12/a> | Didier Stevens | Yet Another DOSfuscation Sample |
2018-11-27/a> | Xavier Mertens | More obfuscated shell scripts: Fake MacOS Flash update |
2018-11-27/a> | Rob VandenBrink | Data Exfiltration in Penetration Tests |
2018-11-26/a> | Russ McRee | ViperMonkey: VBA maldoc deobfuscation |
2018-11-26/a> | Xavier Mertens | Obfuscated bash script targeting QNap boxes |
2018-11-16/a> | Xavier Mertens | Basic Obfuscation With Permissive Languages |
2018-11-09/a> | Tom Webb | Playing with T-POT |
2018-11-06/a> | Xavier Mertens | Malicious Powershell Script Dissection |
2018-11-05/a> | Johannes Ullrich | Struts 2.3 Vulnerable to Two Year old File Upload Flaw |
2018-10-23/a> | Xavier Mertens | Diving into Malicious AutoIT Code |
2018-10-21/a> | Didier Stevens | MSG Files: Compressed RTF |
2018-10-17/a> | Russ McRee | RedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence |
2018-10-12/a> | Xavier Mertens | More Equation Editor Exploit Waves |
2018-10-10/a> | Xavier Mertens | New Campaign Using Old Equation Editor Vulnerability |
2018-10-01/a> | Didier Stevens | Decoding Custom Substitution Encodings with translate.py |
2018-09-30/a> | Didier Stevens | When DOSfuscation Helps... |
2018-09-28/a> | Xavier Mertens | More Excel DDE Code Injection |
2018-09-19/a> | Rob VandenBrink | Certificates Revisited - SSL VPN Certificates 2 Ways |
2018-09-05/a> | Rob VandenBrink | Where have all my Certificates gone? (And when do they expire?) |
2018-09-05/a> | Xavier Mertens | Malicious PowerShell Compiling C# Code on the Fly |
2018-09-04/a> | Rob VandenBrink | Let's Trade: You Read My Email, I'll Read Your Password! |
2018-08-30/a> | Xavier Mertens | Crypto Mining Is More Popular Than Ever! |
2018-08-13/a> | Didier Stevens | New Extortion Tricks: Now Including Your (Partial) Phone Number! |
2018-07-30/a> | Didier Stevens | Malicious Word documents using DOSfuscation |
2018-07-26/a> | Xavier Mertens | Windows Batch File Deobfuscation |
2018-07-24/a> | Tom Webb | Cell Phone Monitoring. Who is Watching the Watchers? |
2018-07-15/a> | Didier Stevens | Video: Retrieving and processing JSON data (BTC example) |
2018-07-14/a> | Didier Stevens | Retrieving and processing JSON data (BTC example) |
2018-07-12/a> | Johannes Ullrich | New Extortion Tricks: Now Including Your Password! |
2018-07-02/a> | Guy Bruneau | VMware ESXi, Workstation, and Fusion address multiple out-of-bounds read vulnerabilities https://www.vmware.com/security/advisories/VMSA-2018-0016.html |
2018-06-18/a> | Xavier Mertens | Malicious JavaScript Targeting Mobile Browsers |
2018-06-17/a> | Didier Stevens | Encrypted Office Documents |
2018-06-15/a> | Lorna Hutcheson | SMTP Strangeness - Possible C2 |
2018-06-05/a> | Xavier Mertens | Malicious Post-Exploitation Batch File |
2018-05-30/a> | Bojan Zdrnja | The end of the lock icon |
2018-05-28/a> | Kevin Liston | Do you hear Laurel or Yanny or is it On-Off Keying? |
2018-05-27/a> | Guy Bruneau | Capture and Analysis of User Agents |
2018-05-25/a> | Xavier Mertens | Antivirus Evasion? Easy as 1,2,3 |
2018-05-22/a> | Guy Bruneau | VMware updates enable Hypervisor-Assisted Guest Mitigations for Speculative Store Bypass issue - https://www.vmware.com/security/advisories/VMSA-2018-0012.html |
2018-05-20/a> | Didier Stevens | DASAN GPON home routers exploits in-the-wild |
2018-05-19/a> | Xavier Mertens | Malicious Powershell Targeting UK Bank Customers |
2018-05-16/a> | Mark Hofman | EFAIL, a weakness in openPGP and S\MIME |
2018-05-10/a> | Bojan Zdrnja | Exfiltrating data from (very) isolated environments |
2018-04-30/a> | Remco Verhoef | Another approach to webapplication fingerprinting |
2018-04-25/a> | Johannes Ullrich | Yet Another Drupal RCE Vulnerability |
2018-03-12/a> | Xavier Mertens | Payload delivery via SMB |
2017-12-27/a> | Guy Bruneau | What are your Security Challenges for 2018? |
2017-12-23/a> | Didier Stevens | Encrypted PDFs |
2017-12-14/a> | Russ McRee | Detection Lab: Visibility & Introspection for Defenders |
2017-12-14/a> | Russ McRee | Security Planner: Improve your online safety |
2017-12-13/a> | Xavier Mertens | Tracking Newly Registered Domains |
2017-12-05/a> | Tom Webb | IR using the Hive Project. |
2017-11-25/a> | Guy Bruneau | Exim Remote Code Exploit |
2017-11-23/a> | Xavier Mertens | Proactive Malicious Domain Search |
2017-11-13/a> | Guy Bruneau | jsonrpc Scanning for root account |
2017-11-03/a> | Xavier Mertens | Simple Analysis of an Obfuscated JAR File |
2017-10-30/a> | Johannes Ullrich | Critical Patch For Oracle's Identity Manager |
2017-10-27/a> | Renato Marinho | "Catch-All" Google Chrome Malicious Extension Steals All Posted Data |
2017-10-25/a> | Mark Hofman | DUHK attack, continuing a week of named issues |
2017-10-24/a> | Xavier Mertens | Stop relying on file extensions |
2017-10-12/a> | Xavier Mertens | Version control tools aren't only for Developers |
2017-10-05/a> | Johannes Ullrich | pcap2curl: Turning a pcap file into a set of cURL commands for "replay" |
2017-10-02/a> | Xavier Mertens | Investigating Security Incidents with Passive DNS |
2017-09-30/a> | Lorna Hutcheson | Who's Borrowing your Resources? |
2017-09-17/a> | Guy Bruneau | rockNSM as a Incident Response Package |
2017-09-16/a> | Guy Bruneau | VMware ESXi, vCenter Server, Fusion and Workstation updates resolve multiple security vulnerabilities - https://www.vmware.com/security/advisories/VMSA-2017-0015.html |
2017-09-09/a> | Didier Stevens | Malware analysis output sanitization |
2017-09-06/a> | Adrien de Beaupre | Modern Web Application Penetration Testing , Hash Length Extension Attacks |
2017-08-29/a> | Renato Marinho | Second Google Chrome Extension Banker Malware in Two Weeks |
2017-08-22/a> | Xavier Mertens | Defang all the things! |
2017-08-15/a> | Renato Marinho | (Banker(GoogleChromeExtension)).targeting("Brazil") |
2017-08-10/a> | Didier Stevens | Maldoc Analysis with ViperMonkey |
2017-08-03/a> | Johannes Ullrich | Using a Raspberry Pi honeypot to contribute data to DShield/ISC |
2017-08-01/a> | Rob VandenBrink | Rooting Out Hosts that Support Older Samba Versions |
2017-07-27/a> | Xavier Mertens | TinyPot, My Small Honeypot |
2017-07-24/a> | Russell Eubanks | Trends Over Time |
2017-07-08/a> | Xavier Mertens | A VBScript with Obfuscated Base64 Data |
2017-07-07/a> | Renato Marinho | DDoS Extortion E-mail: Yet Another Bluff? |
2017-06-22/a> | Xavier Mertens | Obfuscating without XOR |
2017-06-17/a> | Guy Bruneau | Mapping Use Cases to Logs. Which Logs are the Most Important to Collect? |
2017-06-10/a> | Russell Eubanks | An Occasional Look in the Rear View Mirror |
2017-05-28/a> | Guy Bruneau | CyberChef a Must Have Tool in your Tool bag! |
2017-05-16/a> | Russ McRee | WannaCry? Do your own data analysis. |
2017-05-06/a> | Xavier Mertens | The story of the CFO and CEO... |
2017-05-06/a> | Russell Eubanks | What Can You Learn On Your Own? |
2017-05-05/a> | Xavier Mertens | HTTP Headers... the Achilles' heel of many applications |
2017-04-28/a> | Xavier Mertens | Another Day, Another Obfuscation Technique |
2017-04-21/a> | Xavier Mertens | Analysis of a Maldoc with Multiple Layers of Obfuscation |
2017-04-20/a> | Xavier Mertens | DNS Query Length... Because Size Does Matter |
2017-04-19/a> | Xavier Mertens | Hunting for Malicious Excel Sheets |
2017-04-13/a> | Rob VandenBrink | Packet Captures Filtered by Process |
2017-03-30/a> | Xavier Mertens | Diverting built-in features for the bad |
2017-03-25/a> | Russell Eubanks | Distraction as a Service |
2017-03-24/a> | Xavier Mertens | Nicely Obfuscated JavaScript Sample |
2017-03-18/a> | Xavier Mertens | Example of Multiple Stages Dropper |
2017-03-15/a> | Xavier Mertens | Retro Hunting! |
2017-03-12/a> | Guy Bruneau | Honeypot Logs and Tracking a VBE Script |
2017-03-10/a> | Xavier Mertens | The Side Effect of GeoIP Filters |
2017-03-08/a> | Richard Porter | What is really being proxied? |
2017-03-04/a> | Xavier Mertens | How your pictures may affect your website reputation |
2017-02-28/a> | Xavier Mertens | Analysis of a Simple PHP Backdoor |
2017-02-28/a> | Johannes Ullrich | My Catch Of 4 Months In The Amazon IP Address Space |
2017-02-28/a> | Xavier Mertens | Amazon S3 Outage |
2017-02-21/a> | Jim Clausing | Quick and dirty generic listener |
2017-02-13/a> | Rob VandenBrink | Stuff I Learned Decrypting |
2017-02-12/a> | Xavier Mertens | Analysis of a Suspicious Piece of JavaScript |
2017-02-10/a> | Brad Duncan | Hancitor/Pony malspam |
2017-01-28/a> | Lorna Hutcheson | Packet Analysis - Where do you start? |
2017-01-13/a> | Xavier Mertens | Who's Attacking Me? |
2017-01-12/a> | Mark Baggett | System Resource Utilization Monitor |
2017-01-01/a> | Didier Stevens | py2exe Decompiling - Part 1 |
2016-12-31/a> | Xavier Mertens | Ongoing Scans Below the Radar |
2016-12-27/a> | Guy Bruneau | Using daemonlogger as a Software Tap |
2016-12-10/a> | Didier Stevens | Sleeping VBS Really Wants To Sleep |
2016-12-06/a> | Bojan Zdrnja | Attacking NoSQL applications |
2016-11-27/a> | Russ McRee | Scapy vs. CozyDuke |
2016-11-23/a> | Tom Webb | Mapping Attack Methodology to Controls |
2016-11-16/a> | Xavier Mertens | Example of Getting Analysts & Researchers Away |
2016-11-13/a> | Guy Bruneau | Bitcoin Miner File Upload via FTP |
2016-10-26/a> | Johannes Ullrich | New VMWare Security Advisory: VMSA-2016-0017 Information Disclosure in VMWare Fusion and VMWare Tools https://www.vmware.com/security/advisories/VMSA-2016-0017.html |
2016-10-25/a> | Xavier Mertens | Another Day, Another Spam... |
2016-10-08/a> | Russell Eubanks | Unauthorized Change Detected! |
2016-09-15/a> | Xavier Mertens | In Need of a OTP Manager Soon? |
2016-09-13/a> | Rob VandenBrink | If it's Free, YOU are the Product |
2016-09-04/a> | Russ McRee | Kali Linux 2016.2 Release: https://www.kali.org/news/kali-linux-20162-release/ |
2016-08-29/a> | Russ McRee | Recommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs |
2016-08-28/a> | Guy Bruneau | Spam with Obfuscated Javascript |
2016-08-24/a> | Tom Webb | Stay on Track During IR |
2016-08-21/a> | Rick Wanner | Cisco ASA SNMP Remote Code Execution Vulnerability |
2016-08-20/a> | Russell Eubanks | What are YOU doing to give back to the security community? |
2016-08-19/a> | Xavier Mertens | Data Classification For the Masses |
2016-07-27/a> | Xavier Mertens | Critical Xen PV guests vulnerabilities |
2016-07-26/a> | Johannes Ullrich | Command and Control Channels Using "AAAA" DNS Records |
2016-07-25/a> | Didier Stevens | Python Malware - Part 4 |
2016-07-16/a> | Didier Stevens | Python Malware - Part 3 |
2016-07-15/a> | Xavier Mertens | Name All the Things! |
2016-07-07/a> | Johannes Ullrich | Patchwork: Is it still "Advanced" if all you have to do is Copy/Paste? |
2016-06-22/a> | Bojan Zdrnja | Security through obscurity never works |
2016-06-03/a> | Tom Liston | MySQL is YourSQL |
2016-06-01/a> | Xavier Mertens | Docker Containers Logging |
2016-05-28/a> | Russell Eubanks | Applied Lessons Learned |
2016-05-18/a> | Russ McRee | Resources: Windows Auditing & Monitoring, Linux 2FA |
2016-05-15/a> | Didier Stevens | Python Malware - Part 1 |
2016-05-14/a> | Guy Bruneau | INetSim as a Basic Honeypot |
2016-04-28/a> | Rob VandenBrink | DNS and DHCP Recon using Powershell |
2016-04-27/a> | Tom Webb | Kippos Cousin Cowrie |
2016-04-02/a> | Russell Eubanks | Why Can't We Be Friends? |
2016-03-30/a> | Xavier Mertens | What to watch with your FIM? |
2016-03-23/a> | Bojan Zdrnja | Abusing Oracles |
2016-03-15/a> | Xavier Mertens | Dockerized DShield SSH Honeypot |
2016-03-13/a> | Xavier Mertens | SSH Honeypots (Ab)used as Proxy |
2016-03-13/a> | Guy Bruneau | A Look at the Mandiant M-Trends 2016 Report |
2016-02-23/a> | Xavier Mertens | VMware VMSA-2016-0002 |
2016-02-20/a> | Didier Stevens | Locky: JavaScript Deobfuscation |
2016-02-15/a> | Bojan Zdrnja | Exploiting (pretty) blind SQL injections |
2016-02-11/a> | Tom Webb | Tomcat IR with XOR.DDoS |
2016-02-07/a> | Xavier Mertens | More Malicious JavaScript Obfuscation |
2016-02-03/a> | Xavier Mertens | Automating Vulnerability Scans |
2016-01-31/a> | Guy Bruneau | Windows 10 and System Protection for DATA Default is OFF |
2016-01-29/a> | Xavier Mertens | Scripting Web Categorization |
2016-01-15/a> | Xavier Mertens | JavaScript Deobfuscation Tool |
2016-01-09/a> | Xavier Mertens | Virtual Bitlocker Containers |
2016-01-05/a> | Guy Bruneau | What are you Concerned the Most in 2016? |
2016-01-01/a> | Didier Stevens | Failure Is An Option |
2015-12-29/a> | Daniel Wesemann | New Years Resolutions |
2015-12-24/a> | Xavier Mertens | Unity Makes Strength |
2015-12-21/a> | Daniel Wesemann | Critical Security Controls: Getting to know the unknown |
2015-12-12/a> | Russell Eubanks | What Signs Are You Missing? |
2015-12-04/a> | Tom Webb | Automating Phishing Analysis using BRO |
2015-11-04/a> | Richard Porter | Application Aware and Critical Control 2 |
2015-10-17/a> | Russell Eubanks | CIS Critical Security Controls - Version 6.0 |
2015-10-12/a> | Guy Bruneau | Data Visualization,What is your Tool of Choice? |
2015-10-12/a> | Guy Bruneau | Critical Vulnerability in Multiple Cisco Products - Apache Struts 2 Command Execution http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2 |
2015-09-28/a> | Johannes Ullrich | "Transport of London" Malicious E-Mail |
2015-09-03/a> | Xavier Mertens | Querying the DShield API from RTIR |
2015-09-01/a> | Daniel Wesemann | Encryption of "data at rest" in servers |
2015-07-31/a> | Russ McRee | Tech tip follow-up: Using the data Invoked with R's system command |
2015-07-18/a> | Russell Eubanks | The Value a "Fresh Set Of Eyes" (FSOE) |
2015-06-02/a> | Alex Stanford | Guest Diary: Xavier Mertens - Playing with IP Reputation with Dshield & OSSEC |
2015-05-29/a> | Russell Eubanks | Trust But Verify |
2015-04-29/a> | Daniel Wesemann | UDP/3478 to Amazon 54.84.9.242 -- got packets? (solved) |
2015-04-28/a> | Daniel Wesemann | Scammy Nepal earthquake donation requests |
2015-04-19/a> | Didier Stevens | Handling Special PDF Compression Methods |
2015-04-14/a> | Johannes Ullrich | Odd POST Request To Web Honeypot |
2015-04-08/a> | Tom Webb | Is it a breach or not? |
2015-03-07/a> | Guy Bruneau | Should it be Mandatory to have an Independent Security Audit after a Breach? |
2015-02-22/a> | Russell Eubanks | Leave Things Better Than When You Found Them |
2015-02-17/a> | Rob VandenBrink | A Different Kind of Equation |
2015-02-11/a> | Johannes Ullrich | Did PCI Just Kill E-Commerce By Saying SSL is Not Sufficient For Payment Info ? (spoiler: TLS!=SSL) |
2015-02-10/a> | Mark Baggett | Detecting Mimikatz Use On Your Network |
2015-01-23/a> | Adrien de Beaupre | Infocon change to yellow for Adobe Flash issues |
2014-12-24/a> | Rick Wanner | Incident Response at Sony |
2014-12-04/a> | Mark Baggett | Automating Incident data collection with Python |
2014-12-01/a> | Guy Bruneau | Do you have a Data Breach Response Plan? |
2014-11-27/a> | Russ McRee | Syrian Electronic Army attack leads to malvertising |
2014-11-19/a> | Rob VandenBrink | "Big Data" Needs a Trip to the Security Chiropracter! |
2014-10-13/a> | Lorna Hutcheson | For or Against: Port Security for Network Access Control |
2014-10-01/a> | Russ McRee | Security Onion news: Updated ShellShock detection scripts for Bro |
2014-09-27/a> | Guy Bruneau | What has Bash and Heartbleed Taught Us? |
2014-09-26/a> | Richard Porter | Why We Have Moved to InfoCon:Yellow |
2014-09-19/a> | Guy Bruneau | CipherShed Fork from TrueCrypt Project, Support Windows, Mac OS and Linux - https://ciphershed.org |
2014-08-17/a> | Rick Wanner | Part 1: Is your home network unwittingly contributing to NTP DDOS attacks? |
2014-08-17/a> | Rick Wanner | Part 2: Is your home network unwittingly contributing to NTP DDOS attacks? |
2014-08-09/a> | Adrien de Beaupre | Complete application ownage via Multi-POST XSRF |
2014-07-31/a> | Chris Mohan | A Honeypot for home: Raspberry Pi |
2014-07-30/a> | Rick Wanner | Symantec Endpoint Protection Privilege Escalation Zero Day |
2014-07-28/a> | Guy Bruneau | Management and Control of Mobile Device Security |
2014-07-22/a> | Daniel Wesemann | App "telemetry" |
2014-07-14/a> | Johannes Ullrich | The Internet of Things: How do you "on-board" devices? |
2014-07-02/a> | Johannes Ullrich | Simple Javascript Extortion Scheme Advertised via Bing |
2014-06-30/a> | Johannes Ullrich | Should I setup a Honeypot? [SANSFIRE] |
2014-06-28/a> | Mark Hofman | No more Microsoft advisory email notifications? |
2014-06-24/a> | Kevin Shortt | NTP DDoS Counts Have Dropped |
2014-06-11/a> | Daniel Wesemann | Help your pilot fly! |
2014-05-22/a> | Johannes Ullrich | Discontinuing Support for ISC Alert Task Bar Icon |
2014-05-01/a> | Johannes Ullrich | Busybox Honeypot Fingerprinting and a new DVR scanner |
2014-04-26/a> | Guy Bruneau | Android Users - Beware of Bitcoin Mining Malware |
2014-04-21/a> | Daniel Wesemann | Allow us to leave! |
2014-04-14/a> | Kevin Shortt | INFOCon Green: Heartbleed - on the mend |
2014-04-11/a> | Guy Bruneau | Heartbleed Fix Available for Download for Cisco Products |
2014-04-04/a> | Rob VandenBrink | Dealing with Disaster - A Short Malware Incident Response |
2014-03-25/a> | Johannes Ullrich | A few updates on "The Moon" worm |
2014-03-13/a> | Daniel Wesemann | Identification and authentication are hard ... finding out intention is even harder |
2014-03-06/a> | Mark Baggett | Port 5000 traffic and snort signature |
2014-03-04/a> | Daniel Wesemann | Triple Handshake Cookie Cutter |
2014-02-26/a> | Russ McRee | Ongoing NTP Amplification Attacks |
2014-02-18/a> | Johannes Ullrich | More Details About "TheMoon" Linksys Worm |
2014-02-10/a> | Rob VandenBrink | A Tale of Two Admins (and no Change Control) |
2014-02-09/a> | Basil Alawi S.Taher | Mandiant Highlighter 2 |
2014-01-23/a> | Chris Mohan | Learning from the breaches that happens to others Part 2 |
2014-01-22/a> | Chris Mohan | Learning from the breaches that happens to others |
2014-01-17/a> | Russ McRee | Massive RFI scans likely a free web app vuln scanner rather than bots |
2014-01-11/a> | Guy Bruneau | tcpflow 1.4.4 and some of its most Interesting Features |
2014-01-01/a> | Russ McRee | Happy New Year from the Syrian Electronic Army - Skype’s Social Media Accounts Hacked |
2013-12-29/a> | Russ McRee | OpenSSL suffers apparent defacement |
2013-12-20/a> | Daniel Wesemann | authorized key lime pie |
2013-12-16/a> | Tom Webb | The case of Minerd |
2013-12-01/a> | Richard Porter | BPF, PCAP, Binary, hex, why they matter? |
2013-11-22/a> | Rick Wanner | Port 0 DDOS |
2013-11-10/a> | Rick Wanner | Microsoft and Facebook announce bug bounty |
2013-10-22/a> | Richard Porter | Greenbone and OpenVAS Scanner |
2013-10-21/a> | Johannes Ullrich | New tricks that may bring DNS spoofing back or: "Why you should enable DNSSEC even if it is a pain to do" |
2013-10-19/a> | Johannes Ullrich | Yet Another WHMCS SQL Injection Exploit |
2013-10-05/a> | Richard Porter | Adobe Breach Notification, Notifications? |
2013-10-04/a> | Johannes Ullrich | The Adobe Breach FAQ |
2013-10-01/a> | Adrien de Beaupre | CSAM! Send us your logs! |
2013-09-24/a> | Tom Webb | IDS, NSM, and Log Management with Security Onion 12.04.3 |
2013-09-18/a> | Rob VandenBrink | Cisco DCNM Update Released |
2013-09-09/a> | Johannes Ullrich | SSL is broken. So what? |
2013-09-02/a> | Guy Bruneau | Multiple Cisco Security Notice |
2013-08-21/a> | Rob VandenBrink | Fibre Channel Reconnaissance - Reloaded |
2013-08-19/a> | Johannes Ullrich | Running Snort on ESXi using the Distributed Switch |
2013-08-14/a> | Johannes Ullrich | Imaging LUKS Encrypted Drives |
2013-07-27/a> | Scott Fendley | Defending Against Web Server Denial of Service Attacks |
2013-07-25/a> | Johannes Ullrich | A Couple of SSH Brute Force Compromises |
2013-07-23/a> | Bojan Zdrnja | Sessions with(out) cookies |
2013-07-21/a> | Guy Bruneau | Why use Regular Expressions? |
2013-07-17/a> | Johannes Ullrich | Network Solutions Outage |
2013-07-16/a> | Johannes Ullrich | Why don't we see more examples of web app attacks via POST? |
2013-07-13/a> | Lenny Zeltser | Decoy Personas for Safeguarding Online Identity Using Deception |
2013-07-06/a> | Guy Bruneau | Is Metadata the Magic in Modern Network Security? |
2013-07-04/a> | Russ McRee | Celebrating 4th of July With a Malware PCAP Visualization |
2013-06-27/a> | Tony Carothers | Ruby Update for SSL Vulnerability |
2013-06-18/a> | Russ McRee | EMET 4.0 is now available for download |
2013-05-22/a> | Adrien de Beaupre | Privilege escalation, why should I care? |
2013-05-09/a> | John Bambenek | Adobe Releases 0-day Security Advisory for Coldfusion, Exploit Code Available. Advisory here: http://www.adobe.com/support/security/advisories/apsa13-03.html |
2013-05-01/a> | Daniel Wesemann | The cost of cleaning up |
2013-04-25/a> | Adam Swanger | Guest Diary: Dylan Johnson - A week in the life of some Perimeter Firewalls |
2013-04-17/a> | John Bambenek | UPDATEDx1: Boston-Related Malware Campaigns Have Begun - Now with Waco Plant Explosion Fun |
2013-04-16/a> | John Bambenek | Fake Boston Marathon Scams Update |
2013-04-15/a> | John Bambenek | Please send any spam (full headers), URLs or other suspicious content scamming off Boston Marathon explosions to handlers@sans.org |
2013-04-04/a> | Johannes Ullrich | Microsoft April Patch Tuesday Advance Notification |
2013-03-29/a> | Chris Mohan | Does your breach email notification look like a phish? |
2013-03-27/a> | Adam Swanger | IPv6 Focus Month: Guest Diary: Stephen Groat - IPv6 moving target defense |
2013-03-25/a> | Johannes Ullrich | IPv6 Focus Month: IPv6 over IPv4 Preference |
2013-03-23/a> | Guy Bruneau | Apple ID Two-step Verification Now Available in some Countries |
2013-03-19/a> | Johannes Ullrich | IPv6 Focus Month: The warm and fuzzy side of IPv6 |
2013-03-18/a> | Johannes Ullrich | IPv6 Focus Month: What is changing with DHCP |
2013-03-18/a> | Kevin Shortt | Cisco IOS Type 4 Password Issue: http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20130318-type4 |
2013-03-13/a> | Mark Baggett | Wipe the drive! Stealthy Malware Persistence Mechanism - Part 1 |
2013-03-11/a> | Richard Porter | IPv6 Focus Month: Traffic Testing, Firewalls, ACLs, pt 1 |
2013-03-09/a> | Guy Bruneau | IPv6 Focus Month: IPv6 Encapsulation - Protocol 41 |
2013-03-08/a> | Johannes Ullrich | IPv6 Focus Month: Filtering ICMPv6 at the Border |
2013-03-06/a> | Adam Swanger | IPv6 Focus Month: Guest Diary: Stephen Groat - Geolocation Using IPv6 Addresses |
2013-03-05/a> | Mark Hofman | IPv6 Focus Month: Device Defaults |
2013-03-04/a> | Johannes Ullrich | IPv6 Focus Month: Addresses |
2013-03-02/a> | Scott Fendley | Evernote Security Issue |
2013-02-25/a> | Johannes Ullrich | Punkspider enumerates web application vulnerabilities |
2013-02-17/a> | Guy Bruneau | HP ArcSight Connector Appliance and Logger Vulnerabilities |
2013-02-16/a> | Lorna Hutcheson | Fedora RedHat Vulnerabilty Released |
2013-02-14/a> | Adam Swanger | ISC Monthly Threat Update - February 2013 http://isc.sans.edu/podcastdetail.html?id=3121 |
2013-02-08/a> | Kevin Shortt | Is it Spam or Is it Malware? |
2013-02-04/a> | Adam Swanger | SAN Securing The Human Monthly Awareness Video - Advanced Persistent Threat (APT) http://www.securingthehuman.org/resources/ncsam |
2013-01-25/a> | Johannes Ullrich | Vulnerability Scans via Search Engines (Request for Logs) |
2013-01-10/a> | Rob VandenBrink | What Else runs Telnets? Or, Pentesters Love Video Conferencing Units Too! |
2013-01-10/a> | Adam Swanger | ISC Monthly Threat Update New Format |
2013-01-09/a> | Rob VandenBrink | SQL Injection Flaw in Ruby on Rails |
2013-01-09/a> | Johannes Ullrich | New Format for Monthly Threat Update |
2013-01-09/a> | Rob VandenBrink | Security Update - Cisco 7900 Phones - cisco-sa-20130109-uipphone privilege escallation issue - advisory at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone |
2013-01-05/a> | Guy Bruneau | Adobe ColdFusion Security Advisory |
2013-01-03/a> | Bojan Zdrnja | Memory acquisition traps |
2012-12-31/a> | Manuel Humberto Santander Pelaez | How to determine which NAC solutions fits best to your needs |
2012-12-27/a> | John Bambenek | It's 3pm 2 days after Christmas, do you know where your unmanaged SSH keys are? |
2012-12-18/a> | Dan Goldberg | Mitigating the impact of organizational change: a risk assessment |
2012-12-04/a> | Johannes Ullrich | Where do your backup tapes go to die? |
2012-12-03/a> | John Bambenek | John McAfee Exposes His Location in Photo About His Being on Run |
2012-11-26/a> | John Bambenek | Online Shopping for the Holidays? Tips, News and a Fair Warning |
2012-11-23/a> | Rob VandenBrink | What's in Your Change Control Form? |
2012-11-16/a> | Guy Bruneau | VMware security updates for vSphere API and ESX Service Console - http://www.vmware.com/security/advisories/VMSA-2012-0016.html |
2012-11-16/a> | Manuel Humberto Santander Pelaez | Information Security Incidents are now a concern for colombian government |
2012-11-08/a> | Daniel Wesemann | Get a 40% discount on your hotel room! |
2012-11-06/a> | Johannes Ullrich | What to watch out For on Election Day |
2012-10-30/a> | Mark Hofman | Cyber Security Awareness Month - Day 30 - DSD 35 mitigating controls |
2012-10-29/a> | Kevin Shortt | Cyber Security Awareness Month - Day 29 - Clear Desk: The Unacquainted Standard |
2012-10-26/a> | Russ McRee | Cyber Security Awareness Month - Day 26 - Attackers use trusted domain to propagate Citadel Zeus variant |
2012-10-25/a> | Richard Porter | Cyber Security Awareness Month - Day 25 - Pro Audio & Video Packets on the Wire |
2012-10-24/a> | Russ McRee | Cyber Security Awareness Month - Day 24 - A Standard for Information Security Incident Management - ISO 27035 |
2012-10-23/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 23: Character Encoding Standards - ASCII and Successors |
2012-10-21/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 22: Connectors |
2012-10-19/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 19: Standard log formats and CEE. |
2012-10-18/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide |
2012-10-17/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 17 - A Standard for Risk Management - ISO 27005 |
2012-10-16/a> | Richard Porter | CyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook. |
2012-10-16/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 16: W3C and HTML |
2012-10-14/a> | Pedro Bueno | Cyber Security Awareness Month - Day 14 - Poor Man's File Analysis System - Part 1 |
2012-10-13/a> | Guy Bruneau | New Poll - Cyber Security Awareness Month Activities 2012 - https://isc.sans.edu/poll.html |
2012-10-12/a> | Mark Hofman | Cyber Security Awareness Month - Day 12 PCI DSS |
2012-10-11/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 11 - Vendor Agnostic Standards (Center for Internet Security) |
2012-10-10/a> | Kevin Shortt | Cyber Security Awareness Month - Day 10 - Standard Sudo - Part Two |
2012-10-09/a> | Johannes Ullrich | Cyber Security Awreness Month - Day 9 - Request for Comment (RFC) |
2012-10-08/a> | Mark Hofman | Cyber Security Awareness Month - Day 8 ISO 27001 |
2012-10-07/a> | Tony Carothers | Cyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1 |
2012-10-06/a> | Manuel Humberto Santander Pelaez | Cyber Security Awareness Month - Day 6 - NERC: The standard that enforces security on power SCADA |
2012-10-05/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 5: Standards Body Soup, So many Flavors in the bowl. |
2012-10-05/a> | Richard Porter | Reports of a Distributed Injection Scan |
2012-10-04/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 4: Crypto Standards |
2012-10-03/a> | Kevin Shortt | Fake Support Calls Reported |
2012-10-03/a> | Kevin Shortt | Cyber Security Awareness Month - Day 3 - Standard Sudo - Part One |
2012-10-02/a> | Russ McRee | Cyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines |
2012-10-01/a> | Johannes Ullrich | Cyber Security Awareness Month |
2012-09-08/a> | Guy Bruneau | Webmin Input Validation Vulnerabilities |
2012-09-02/a> | Lorna Hutcheson | Demonstrating the value of your Intrusion Detection Program and Analysts |
2012-08-30/a> | Bojan Zdrnja | Analyzing outgoing network traffic (part 2) |
2012-08-23/a> | Bojan Zdrnja | Analyzing outgoing network traffic |
2012-08-16/a> | Johannes Ullrich | A Poor Man's DNS Anomaly Detection Script |
2012-07-31/a> | Daniel Wesemann | SQL injection, lilupophilupop-style |
2012-07-25/a> | Johannes Ullrich | Apple OS X 10.8 (Mountain Lion) released |
2012-07-18/a> | Rob VandenBrink | Vote NO to Weak Encryption! |
2012-07-14/a> | Tony Carothers | User Awareness and Education |
2012-07-05/a> | Adrien de Beaupre | Microsoft advanced notification for July 2012 patch Tuesday |
2012-07-02/a> | Dan Goldberg | Storms of June 29th 2012 in Mid Atlantic region of the USA |
2012-06-25/a> | Rick Wanner | Targeted Malware for Industrial Espionage? |
2012-06-20/a> | Raul Siles | CVE-2012-0217 (from MS12-042) applies to other environments too |
2012-06-14/a> | Johannes Ullrich | Spot the Phish: Verizon Wireless |
2012-06-12/a> | Swa Frantzen | Adobe June 2012 Black Tuesday patches |
2012-05-22/a> | Johannes Ullrich | nmap 6 released |
2012-05-07/a> | Guy Bruneau | iOS 5.1.1 Software Update for iPod, iPhone, iPad |
2012-04-26/a> | Richard Porter | Define Irony: A medical device with a Virus? |
2012-04-23/a> | Russ McRee | Emergency Operations Centers & Security Incident Management: A Correlation |
2012-04-21/a> | Guy Bruneau | WordPress Release Security Update |
2012-03-16/a> | Swa Frantzen | INFOCON Yellow - Microsoft RDP - MS12-020 |
2012-03-16/a> | Russ McRee | MS12-020 RDP vulnerabilities: Patch, Mitigate, Detect |
2012-03-11/a> | Johannes Ullrich | An Analysis of Jester's QR Code Attack. (Guest Diary) |
2012-03-03/a> | Jim Clausing | New automated sandbox for Android malware |
2012-02-23/a> | donald smith | DNS-Changer "clean DNS" extension requested |
2012-02-22/a> | Johannes Ullrich | How to test OS X Mountain Lion's Gatekeeper in Lion |
2012-01-27/a> | Mark Hofman | CISCO Ironport C & M Series telnet vulnerability |
2012-01-22/a> | Johannes Ullrich | Javascript DDoS Tool Analysis |
2012-01-13/a> | Guy Bruneau | Sysinternals Updates - http://blogs.technet.com/b/sysinternals/archive/2012/01/13/updates-autoruns-v11-21-coreinfo-v3-03-portmon-v-3-03-process-explorer-v15-12-mark-s-blog-and-mark-at-rsa-2012.aspx |
2012-01-03/a> | Bojan Zdrnja | The tale of obfuscated JavaScript continues |
2011-12-13/a> | Johannes Ullrich | December 2011 Adobe Black Tuesday |
2011-12-08/a> | Adrien de Beaupre | Microsoft Security Bulletin Advance Notification for December 2011 |
2011-12-07/a> | Lenny Zeltser | V8 as an Alternative to SpiderMonkey for JavaScript Deobfuscation |
2011-12-01/a> | Mark Hofman | SQL Injection Attack happening ATM |
2011-11-03/a> | Richard Porter | An Apple, Inc. Sandbox to play in. |
2011-11-01/a> | Russ McRee | Honeynet Project: Android Reverse Engineering (A.R.E.) Virtual Machine released |
2011-11-01/a> | Russ McRee | Secure languages & frameworks |
2011-10-29/a> | Richard Porter | The Sub Critical Control? Evidence Collection |
2011-10-28/a> | Russ McRee | Critical Control 19: Data Recovery Capability |
2011-10-28/a> | Daniel Wesemann | Critical Control 20: Security Skills Assessment and Training to fill Gaps |
2011-10-27/a> | Mark Baggett | Critical Control 18: Incident Response Capabilities |
2011-10-26/a> | Rick Wanner | Critical Control 17:Penetration Tests and Red Team Exercises |
2011-10-26/a> | Rob VandenBrink | The Theoretical "SSL Renegotiation" Issue gets a Whole Lot More Real ! |
2011-10-17/a> | Rob VandenBrink | Critical Control 11: Account Monitoring and Control |
2011-10-13/a> | Guy Bruneau | Critical Control 10: Continuous Vulnerability Assessment and Remediation |
2011-10-12/a> | Kevin Shortt | Critical Control 8 - Controlled Use of Administrative Privileges |
2011-10-11/a> | Swa Frantzen | Critical Control 7 - Application Software Security |
2011-10-10/a> | Jim Clausing | Critical Control 6 - Maintenance, Monitoring, and Analysis of Security Audit Logs |
2011-10-07/a> | Mark Hofman | Critical Control 5 - Boundary Defence |
2011-10-04/a> | Rob VandenBrink | Critical Control 2 - Inventory of Authorized and Unauthorized Software |
2011-10-04/a> | Johannes Ullrich | Critical Control 3 - Secure Configurations for Hardware and Software on Laptops, Workstations and Servers |
2011-10-03/a> | Mark Hofman | Critical Control 1 - Inventory of Authorized and Unauthorized Devices |
2011-10-03/a> | Mark Baggett | What are the 20 Critical Controls? |
2011-10-03/a> | Tom Liston | Security 101 : Security Basics in 140 Characters Or Less |
2011-10-02/a> | Mark Hofman | Cyber Security Awareness Month Day 1/2 - Schedule |
2011-10-02/a> | Mark Hofman | Cyber Security Awareness Month Day 1/2 - Introduction to the controls |
2011-10-01/a> | Mark Hofman | Hot on the heels fo FF, Thunderbird v 7.0.1 and SeaMonkey v 2.4.1 have been updated. |
2011-09-28/a> | Richard Porter | All Along the ARP Tower! |
2011-09-21/a> | Mark Hofman | October 2011 Cyber Security Awareness Month |
2011-09-05/a> | Bojan Zdrnja | Bitcoin – crypto currency of future or heaven for criminals? |
2011-08-26/a> | Johannes Ullrich | SANS Virginia Beach Conference Canceled. Details: http://www.sans.org/virginia-beach-2011/ |
2011-08-26/a> | Johannes Ullrich | Some Hurricane Technology Tips |
2011-08-17/a> | Rob VandenBrink | Putting all of Your Eggs in One Basket - or How NOT to do Layoffs |
2011-08-16/a> | Johannes Ullrich | What are the most dangerous web applications and how to secure them? |
2011-08-14/a> | Guy Bruneau | FireCAT 2.0 Released |
2011-08-13/a> | Rick Wanner | MoonSols Dumpit released...for free! |
2011-08-11/a> | Guy Bruneau | BlackBerry Enterprise Server Critical Update |
2011-07-30/a> | Deborah Hale | Data Encryption Ban? Really? |
2011-07-29/a> | Richard Porter | Apple Lion talking on TCP 5223 |
2011-07-28/a> | Johannes Ullrich | Announcing: The "404 Project" |
2011-07-27/a> | Johannes Ullrich | Internet Storm Center iPhone App now available. Feedback/Feature Requests welcome. Search App Store for "ISC Reader" |
2011-07-25/a> | Chris Mohan | Monday morning incident handler practice |
2011-07-21/a> | Mark Hofman | Lion Released |
2011-07-21/a> | Johannes Ullrich | Lion: What is new in Security |
2011-07-19/a> | Richard Porter | SMS Phishing at the SANSFire 2011 Handler Dinner |
2011-07-11/a> | John Bambenek | Another Defense Contractor Hacked in AntiSec Hacktivism Spree |
2011-07-09/a> | Chris Mohan | Safer Windows Incident Response |
2011-07-05/a> | Raul Siles | Helping Developers Understand Security - Spot the Vuln |
2011-07-03/a> | Deborah Hale | Business Continuation in the Face of Disaster |
2011-06-22/a> | Guy Bruneau | How Good is your Employee Termination Policy? |
2011-06-21/a> | Chris Mohan | StartSSL, a web authentication authority, suspend services after a security breach |
2011-06-17/a> | Richard Porter | When do you stop owning Technology? |
2011-06-12/a> | Mark Hofman | Cloud thoughts |
2011-06-09/a> | Richard Porter | One Browser to Rule them All? |
2011-06-06/a> | Johannes Ullrich | The Havij SQL Injection Tool |
2011-06-04/a> | Rick Wanner | Do you have a personal disaster recovery plan? |
2011-05-18/a> | Bojan Zdrnja | Android, HTTP and authentication tokens |
2011-04-29/a> | Guy Bruneau | Firefox, Thunderbird and SeaMonkey Security Updates |
2011-04-28/a> | Chris Mohan | DSL Reports advise 9,000 accounts were compromised |
2011-04-26/a> | John Bambenek | Is the Insider Threat Really Over? |
2011-04-25/a> | Rob VandenBrink | Sony PlayStation Network Outage - Day 5 |
2011-04-22/a> | Manuel Humberto Santander Pelaez | iPhoneMap: iPhoneTracker port to Linux |
2011-04-22/a> | Manuel Humberto Santander Pelaez | In-house developed applications: The constant headache for the information security officer |
2011-04-20/a> | Daniel Wesemann | Data Breach Investigations Report published by Verizon |
2011-04-20/a> | Johannes Ullrich | iPhone GPS Data Storage |
2011-04-19/a> | Bojan Zdrnja | SQL injection: why can’t we learn? |
2011-04-05/a> | Mark Hofman | Sony DDOS |
2011-04-04/a> | Mark Hofman | When your service provider has a breach |
2011-04-03/a> | Richard Porter | Extreme Disclosure? Not yet but a great trend! |
2011-04-01/a> | John Bambenek | LizaMoon Mass SQL-Injection Attack Infected at least 500k Websites |
2011-03-25/a> | Kevin Liston | APT Tabletop Exercise |
2011-03-11/a> | Guy Bruneau | Snort IDS Sensor with Sguil Framework ISO |
2011-03-09/a> | Chris Mohan | Possible Issue with Forefront Update KB2508823 |
2011-03-07/a> | Lorna Hutcheson | Call for Packets - Unassigned TCP Options |
2011-03-04/a> | Mark Hofman | A new version of Seamonkey is available, includes security fixes. More details here http://www.seamonkey-project.org/news#2011-03-02 |
2011-02-21/a> | Adrien de Beaupre | What’s New, it's Python 3.2 |
2011-02-14/a> | Lorna Hutcheson | Network Visualization |
2011-02-09/a> | Mark Hofman | Adobe Patches (shockwave, Flash, Reader & Coldfusion) |
2011-02-07/a> | Richard Porter | Crime is still Crime! Pt 2 |
2011-02-05/a> | Guy Bruneau | OpenSSH Legacy Certificate Information Disclosure Vulnerability |
2011-01-12/a> | Richard Porter | How Many Loyalty Cards do you Carry? |
2011-01-12/a> | Richard Porter | Yet Another Data Broker? AOL Lifestream. |
2011-01-03/a> | Johannes Ullrich | What Will Matter in 2011 |
2010-12-26/a> | Manuel Humberto Santander Pelaez | ISC infocon monitor app for OS X |
2010-12-25/a> | Manuel Humberto Santander Pelaez | An interesting vulnerability playground to learn application vulnerabilities |
2010-12-12/a> | Raul Siles | New trend regarding web application vulnerabilities? |
2010-12-02/a> | Kevin Johnson | SQL Injection: Wordpress 3.0.2 released |
2010-11-29/a> | Stephen Hall | iPhone phishing - What you see, isn't what you get |
2010-11-24/a> | Bojan Zdrnja | Privilege escalation 0-day in almost all Windows versions |
2010-11-17/a> | Guy Bruneau | Conficker B++ Activated on Nov 15 |
2010-11-17/a> | Guy Bruneau | Cisco Unified Videoconferencing Affected by Multiple Vulnerabilities |
2010-11-05/a> | Adrien de Beaupre | Bot honeypot |
2010-11-02/a> | Johannes Ullrich | Limited Malicious Search Engine Poisoning for Election |
2010-10-31/a> | Marcus Sachs | Cyber Security Awareness Month - Day 31 - Tying it all together |
2010-10-30/a> | Guy Bruneau | Cyber Security Awareness Month - Day 30 - Role of the network team |
2010-10-29/a> | Manuel Humberto Santander Pelaez | Cyber Security Awareness Month - Day 29- Role of the office geek |
2010-10-28/a> | Rick Wanner | Cyber Security Awareness Month - Day 27 - Social Media use in the office |
2010-10-28/a> | Tony Carothers | Cyber Security Awareness Month - Day 28 - Role of the employee |
2010-10-26/a> | Pedro Bueno | Cyber Security Awareness Month - Day 26 - Sharing Office Files |
2010-10-25/a> | Kevin Shortt | Cyber Security Awareness Month - Day 25 - Using Home Computers for Work |
2010-10-24/a> | Swa Frantzen | Cyber Security Awarenes Month - Day 24 - Using work computers at home |
2010-10-23/a> | Mark Hofman | Cyber Security Awareness Month - Day 23 - The Importance of compliance |
2010-10-22/a> | Daniel Wesemann | Cyber Security Awareness Month - Day 22 - Security of removable media |
2010-10-22/a> | Manuel Humberto Santander Pelaez | Intypedia project |
2010-10-21/a> | Chris Carboni | Cyber Security Awareness Month - Day 21 - Impossible Requests from the Boss |
2010-10-20/a> | Jim Clausing | Cyber Security Awareness Month - Day 20 - Securing Mobile Devices |
2010-10-19/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - Remote User VPN Tunnels - to Split or not to Split? |
2010-10-19/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - VPN Architectures – SSL or IPSec? |
2010-10-19/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - Remote User VPN Access – Are things getting too easy, or too hard? |
2010-10-19/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - VPN and Remote Access Tools |
2010-10-19/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - Remote Access Tools |
2010-10-18/a> | Manuel Humberto Santander Pelaez | Cyber Security Awareness Month - Day 18 - What you should tell your boss when there's a crisis |
2010-10-17/a> | Stephen Hall | Cyber Security Awareness Month - Day 17 - What a boss should and should not have access to |
2010-10-15/a> | Marcus Sachs | Cyber Security Awareness Month - Day 15 - What Teachers Need to Know About Their Students |
2010-10-15/a> | Guy Bruneau | Cyber Security Awareness Month - Day 16 - Securing a donated computer |
2010-10-14/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 14 - Securing a public computer |
2010-10-13/a> | Deborah Hale | Cyber Security Awareness Month - Day 13 - Online Bullying |
2010-10-12/a> | Scott Fendley | Cyber Security Awareness Month - Day 12 - Protecting and Managing Your Digital Identity On Social Media Sites |
2010-10-11/a> | Rick Wanner | Cyber Security Awareness Month - Day 11 - Safe Browsing for Teens |
2010-10-10/a> | Kevin Liston | Cyber Security Awareness Month - Day 10 - Safe browsing for pre-teens |
2010-10-09/a> | Kevin Shortt | Cyber Security Awareness Month - Day 9 - Disposal of an Old Computer |
2010-10-08/a> | Rick Wanner | Cyber Security Awareness Month - Day 8 - Patch Management and System Updates |
2010-10-06/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 7 - Remote Access and Monitoring Tools |
2010-10-06/a> | Marcus Sachs | Cyber Security Awareness Month - Day 6 - Computer Monitoring Tools |
2010-10-05/a> | Rick Wanner | Cyber Security Awareness Month - Day 5 - Sites you should stay away from |
2010-10-04/a> | Mark Hofman | Online Voting |
2010-10-04/a> | Daniel Wesemann | Cyber Security Awareness Month - Day 4 - Managing EMail |
2010-10-03/a> | Adrien de Beaupre | Cyber Security Awareness Month - Day 3 - Recognizing phishing and online scams |
2010-10-02/a> | Mark Hofman | Cyber Security Awareness Month - Day 2 - Securing the Family Network |
2010-10-01/a> | Marcus Sachs | Cyber Security Awareness Month - 2010 |
2010-10-01/a> | Marcus Sachs | Cyber Security Awareness Month - Day 1 - Securing the Family PC |
2010-09-26/a> | Daniel Wesemann | Egosurfing, the corporate way |
2010-09-25/a> | Rick Wanner | Guest Diary: Andrew Hunt - Visualizing the Hosting Patterns of Modern Cybercriminals |
2010-09-21/a> | Johannes Ullrich | Implementing two Factor Authentication on the Cheap |
2010-09-04/a> | Kevin Liston | Investigating Malicious Website Reports |
2010-08-23/a> | Manuel Humberto Santander Pelaez | Firefox plugins to perform penetration testing activities |
2010-08-22/a> | Rick Wanner | Failure of controls...Spanair crash caused by a Trojan |
2010-08-19/a> | Rob VandenBrink | Change is Good. Change is Bad. Change is Life. |
2010-08-16/a> | Raul Siles | Blind Elephant: A New Web Application Fingerprinting Tool |
2010-08-15/a> | Manuel Humberto Santander Pelaez | Obfuscated SQL Injection attacks |
2010-08-15/a> | Manuel Humberto Santander Pelaez | Python to test web application security |
2010-08-08/a> | Marcus Sachs | Thinking about Cyber Security Awareness Month in October |
2010-08-06/a> | Rob VandenBrink | FOXIT PDF Reader update to resolve iPhone/iPad Jailbreak issue ==> http://www.foxitsoftware.com/announcements/2010861227.html |
2010-08-05/a> | Manuel Humberto Santander Pelaez | Adobe Acrobat Font Parsing Integer Overflow Vulnerability |
2010-08-05/a> | Rob VandenBrink | Access Controls for Network Infrastructure |
2010-08-03/a> | Johannes Ullrich | When Lightning Strikes |
2010-08-01/a> | Manuel Humberto Santander Pelaez | Evation because IPS fails to validate TCP checksums? |
2010-07-29/a> | Rob VandenBrink | The 2010 Verizon Data Breach Report is Out |
2010-07-24/a> | Manuel Humberto Santander Pelaez | Transmiting logon information unsecured in the network |
2010-07-20/a> | Manuel Humberto Santander Pelaez | Lowering infocon back to green |
2010-07-18/a> | Manuel Humberto Santander Pelaez | SAGAN: An open-source event correlation system - Part 1: Installation |
2010-07-13/a> | Jim Clausing | VMware Studio Security Update |
2010-06-29/a> | Johannes Ullrich | How to be a better spy: Cyber security lessons from the recent russian spy arrests |
2010-06-23/a> | Johannes Ullrich | IPv6 Support in iOS 4 |
2010-06-15/a> | Manuel Humberto Santander Pelaez | TCP evasions for IDS/IPS |
2010-06-15/a> | Manuel Humberto Santander Pelaez | iPhone 4 Order Security Breach Exposes Private Information |
2010-06-14/a> | Manuel Humberto Santander Pelaez | Python on a microcontroller? |
2010-06-14/a> | Manuel Humberto Santander Pelaez | Rogue facebook application acting like a worm |
2010-06-14/a> | Manuel Humberto Santander Pelaez | Another way to get protection for application-level attacks |
2010-06-09/a> | Deborah Hale | Mass Infection of IIS/ASP Sites |
2010-06-07/a> | Manuel Humberto Santander Pelaez | Software Restriction Policy to keep malware away |
2010-06-06/a> | Manuel Humberto Santander Pelaez | Nice OS X exploit tutorial |
2010-06-04/a> | Rick Wanner | New Honeynet Project Forensic Challenge |
2010-06-02/a> | Mark Hofman | OpenSSL version 1.0.0a released. This fixes a number of security issues. Don't forget a number of commercial appliances will be using this, so look for vendor updates soon. |
2010-06-02/a> | Rob VandenBrink | New Mac malware - OSX/Onionspy |
2010-05-22/a> | Rick Wanner | SANS 2010 Digital Forensics Summit - APT Based Forensic Challenge |
2010-05-15/a> | Deborah Hale | Phony Phone Scam |
2010-05-12/a> | Rob VandenBrink | Adobe Shockwave Update |
2010-04-22/a> | John Bambenek | Data Redaction: You're Doing it Wrong |
2010-04-21/a> | Guy Bruneau | Google Chrome Security Update v4.1.249.1059 Released: http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html |
2010-04-20/a> | Raul Siles | Are You Ready for a Transportation Collapse...? |
2010-04-18/a> | Guy Bruneau | Some NetSol hosted sites breached |
2010-04-13/a> | Adrien de Beaupre | Web App Testing Tools |
2010-04-12/a> | Adrien de Beaupre | Get yer bogons out! |
2010-04-08/a> | Bojan Zdrnja | JavaScript obfuscation in PDF: Sky is the limit |
2010-04-06/a> | Daniel Wesemann | Application Logs |
2010-04-04/a> | Mari Nichols | Financial Management of Cyber Risk |
2010-04-02/a> | Guy Bruneau | Firefox 3.6.3 fix for CVE-2010-1121 http://www.mozilla.org/security/announce/2010/mfsa2010-25.html |
2010-04-02/a> | Guy Bruneau | Security Advisory for ESX Service Console |
2010-03-30/a> | Marcus Sachs | Zigbee Analysis Tools |
2010-03-28/a> | Rick Wanner | Honeynet Project: 2010 Forensic Challenge #3 |
2010-03-27/a> | Guy Bruneau | HP-UX Running NFS/ONCplus, Inadvertently Enabled NFS |
2010-03-25/a> | Kevin Liston | Responding to "Copyright Lawsuit filed against you" |
2010-03-21/a> | Scott Fendley | Skipfish - Web Application Security Tool |
2010-03-21/a> | Chris Carboni | Responding To The Unexpected |
2010-03-10/a> | Rob VandenBrink | Microsoft Security Advisory 981374 - Remote Code Execution Vulnerability for IE6 and IE7 |
2010-03-10/a> | Rob VandenBrink | Microsoft re-release of KB973811 - attacks on Extended Protection for Authentication |
2010-03-08/a> | Raul Siles | Samurai WTF 0.8 |
2010-03-07/a> | Mari Nichols | DHS issues Cybersecurity challenge |
2010-03-06/a> | Tony Carothers | Integration and the Security of New Technologies |
2010-03-05/a> | Kyle Haugsness | Javascript obfuscators used in the wild |
2010-03-03/a> | Johannes Ullrich | Reports about large number of fake Amazon order confirmations |
2010-02-22/a> | Rob VandenBrink | New Risks in Penetration Testing |
2010-02-21/a> | Patrick Nolan | Looking for "more useful" malware information? Help develop the format. |
2010-02-20/a> | Mari Nichols | Is "Green IT" Defeating Security? |
2010-02-17/a> | Rob VandenBrink | Defining Clouds - " A Cloud by any Other Name Would be a Lot Less Confusing" |
2010-02-17/a> | Rob VandenBrink | Multiple Security Updates for ESX 3.x and ESXi 3.x |
2010-02-15/a> | Johannes Ullrich | Various Olympics Related Dangerous Google Searches |
2010-02-06/a> | Guy Bruneau | LANDesk Management Gateway Vulnerability |
2010-02-03/a> | Rob VandenBrink | APPLE-SA-2010-02-02-1 iPhone OS 3.1.3 and iPhone OS 3.1.3 for iPod touch |
2010-02-02/a> | Guy Bruneau | Adobe ColdFusion Information Disclosure |
2010-01-29/a> | Adrien de Beaupre | Neo-legacy applications |
2010-01-27/a> | Raul Siles | European Union Security Challenge (Campus Party 2010) |
2010-01-24/a> | Pedro Bueno | Outdated client applications |
2010-01-22/a> | Mari Nichols | Pass-down for a Successful Incident Response |
2010-01-17/a> | Mark Hofman | Why not Yellow? |
2010-01-08/a> | Rob VandenBrink | Microsoft OfficeOnline, Searching for Trust and Malware |
2009-12-21/a> | Marcus Sachs | iPhone Botnet Analysis |
2009-12-19/a> | Deborah Hale | Educationing Our Communities |
2009-12-16/a> | Rob VandenBrink | Seamonkey Update to 2.0.1, find the release notes here ==> http://www.seamonkey-project.org/releases/seamonkey2.0.1 |
2009-12-07/a> | Rob VandenBrink | Layer 2 Network Protections – reloaded! |
2009-12-02/a> | Rob VandenBrink | SPAM and Malware taking advantage of H1N1 concerns |
2009-11-29/a> | Patrick Nolan | A Cloudy Weekend |
2009-11-25/a> | Jim Clausing | Updates to my GREM Gold scripts and a new script |
2009-11-24/a> | John Bambenek | BIND Security Advisory (DNSSEC only) |
2009-11-13/a> | Adrien de Beaupre | TLS & SSLv3 renegotiation vulnerability explained |
2009-11-13/a> | Adrien de Beaupre | Conficker patch via email? |
2009-11-11/a> | Rob VandenBrink | Layer 2 Network Protections against Man in the Middle Attacks |
2009-11-09/a> | Chris Carboni | 80's Flashback on Jailbroken iPhones |
2009-11-08/a> | Bojan Zdrnja | iPhone worm in the wild |
2009-11-02/a> | Rob VandenBrink | Microsoft releases v1.02 of Enhanced Mitigation Evaluation Toolkit (EMET) |
2009-10-30/a> | Rob VandenBrink | New version of NIST 800-41, Firewalls and Firewall Policy Guidelines |
2009-10-29/a> | Kyle Haugsness | Cyber Security Awareness Month - Day 29 - dns port 53 |
2009-10-28/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 28 - ntp (123/udp) |
2009-10-27/a> | Rob VandenBrink | New VMware Desktop Products Released (Workstation, Fusion, ACE) |
2009-10-26/a> | Johannes Ullrich | Web honeypot Update |
2009-10-25/a> | Lorna Hutcheson | Cyber Security Awareness Month - Day 25 - Port 80 and 443 |
2009-10-22/a> | Adrien de Beaupre | Cyber Security Awareness Month - Day 22 port 502 TCP - Modbus |
2009-10-20/a> | Raul Siles | WASC 2008 Statistics |
2009-10-19/a> | Daniel Wesemann | Cyber Security Awareness Month - Day 19 - ICMP |
2009-10-18/a> | Mari Nichols | Computer Security Awareness Month - Day 18 - Telnet an oldie but a goodie |
2009-10-17/a> | Rick Wanner | Unusual traffic from Loopback to Unused ARIN address |
2009-10-16/a> | Adrien de Beaupre | Cyber Security Awareness Month - Day 16 - Port 1521 - Oracle TNS Listener |
2009-10-15/a> | Deborah Hale | Yet another round of Viral Spam |
2009-10-11/a> | Mark Hofman | Cyber Security Awareness Month - Day 12 Ports 161/162 Simple Network Management Protocol (SNMP) |
2009-10-09/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 9 - Port 3389/tcp (RDP) |
2009-10-09/a> | Rob VandenBrink | AT&T Cell Phone Phish |
2009-10-06/a> | Adrien de Beaupre | Cyber Security Awareness Month - Day 6 ports 67&68 udp - bootp and dhcp |
2009-10-05/a> | Adrien de Beaupre | Cyber Security Awareness Month - Day 5 port 31337 |
2009-10-04/a> | Guy Bruneau | Samba Security Information Disclosure and DoS |
2009-10-02/a> | Stephen Hall | Cyber Security Awareness Month - Day 2 - Port 0 |
2009-10-02/a> | Stephen Hall | VMware Fusion updates to fixes a couple of bugs |
2009-10-02/a> | Stephen Hall | Verizon New York area issues |
2009-09-26/a> | Kyle Haugsness | Conficker detection hints |
2009-09-25/a> | Deborah Hale | Conficker Continues to Impact Networks |
2009-09-23/a> | Marcus Sachs | Addendum to SRI's Conficker C Analysis Published |
2009-09-19/a> | Rick Wanner | Sysinternals Tools Updates |
2009-09-18/a> | Jason Lam | Results from Webhoneypot project |
2009-09-16/a> | Raul Siles | Review the security controls of your Web Applications... all them! |
2009-09-12/a> | Jim Clausing | Apple Updates |
2009-09-07/a> | Lorna Hutcheson | Encrypting Data |
2009-09-04/a> | Adrien de Beaupre | SeaMonkey Security Update |
2009-08-29/a> | Guy Bruneau | Immunet Protect - Cloud and Community Malware Protection |
2009-08-28/a> | Adrien de Beaupre | WPA with TKIP done |
2009-08-13/a> | Jim Clausing | Tools for extracting files from pcaps |
2009-08-08/a> | Guy Bruneau | XML Libraries Data Parsing Vulnerabilities |
2009-08-01/a> | Deborah Hale | Website Warnings |
2009-07-31/a> | Deborah Hale | Don't forget to tell your SysAdmin Thanks |
2009-07-31/a> | Deborah Hale | The iPhone patch is out |
2009-07-30/a> | Deborah Hale | iPhone Hijack |
2009-07-28/a> | Adrien de Beaupre | YYAMCCBA |
2009-07-27/a> | Raul Siles | New Hacker Challenge: Prison Break - Breaking, Entering & Decoding |
2009-07-23/a> | John Bambenek | Missouri Passes Breach Notification Law: Gap Still Exists for Banking Account Information |
2009-07-18/a> | Patrick Nolan | Chrome update contains Security fixes |
2009-07-16/a> | Bojan Zdrnja | OWC exploits used in SQL injection attacks |
2009-07-13/a> | Adrien de Beaupre | * Infocon raised to yellow for Excel Web Components ActiveX vulnerability |
2009-07-10/a> | Guy Bruneau | WordPress Fixes Multiple vulnerabilities |
2009-07-07/a> | Marcus Sachs | * INFOCON Status - staying green |
2009-07-05/a> | Bojan Zdrnja | More on ColdFusion hacks |
2009-07-03/a> | Adrien de Beaupre | FCKEditor advisory |
2009-07-02/a> | Bojan Zdrnja | Cold Fusion web sites getting compromised |
2009-06-30/a> | Chris Carboni | Obfuscated Code |
2009-06-30/a> | Chris Carboni | De-Obfuscation Submissions |
2009-06-27/a> | Tony Carothers | New NIAP Strategy on the Horizon |
2009-06-21/a> | Bojan Zdrnja | Apache HTTP DoS tool mitigation |
2009-06-16/a> | John Bambenek | Iran Internet Blackout: Using Twitter for Operational Intelligence |
2009-06-11/a> | Rick Wanner | MIR-ROR Motile Incident Response - Respond Objectively Remediate |
2009-06-11/a> | Rick Wanner | WHO Declares Flu A(H1N1) a Pandemic |
2009-06-11/a> | Jason Lam | Dshield Web Honeypot going beta |
2009-05-29/a> | Lorna Hutcheson | VMWare Patches Released |
2009-05-26/a> | Jason Lam | A new Web application security blog |
2009-05-25/a> | Jim Clausing | More tools for (US) Memorial Day |
2009-05-20/a> | Tom Liston | Web Toolz |
2009-05-19/a> | Bojan Zdrnja | Advanced blind SQL injection (with Oracle examples) |
2009-05-15/a> | Daniel Wesemann | Warranty void if seal shredded? |
2009-05-09/a> | Patrick Nolan | Shared SQL Injection Lessons Learned blog item |
2009-05-01/a> | Adrien de Beaupre | Incident Management |
2009-04-24/a> | John Bambenek | Data Leak Prevention: Proactive Security Requirements of Breach Notification Laws |
2009-04-21/a> | Bojan Zdrnja | Web application vulnerabilities |
2009-04-20/a> | Jason Lam | Digital Content on TV |
2009-04-16/a> | Adrien de Beaupre | Incident Response vs. Incident Handling |
2009-04-16/a> | Adrien de Beaupre | Some conficker lessons learned |
2009-04-10/a> | Stephen Hall | Firefox 3 updates now in Seamonkey |
2009-04-09/a> | Johannes Ullrich | Conficker update with payload |
2009-04-09/a> | Jim Clausing | Conficker Working Group site down |
2009-04-07/a> | Bojan Zdrnja | Advanced JavaScript obfuscation (or why signature scanning is a failure) |
2009-04-05/a> | Marcus Sachs | Open Source Conficker-C Scanner/Detector Released |
2009-04-02/a> | Handlers | A view from the CWG Trenches |
2009-03-30/a> | Daniel Wesemann | Locate Conficker infected hosts with a network scan! |
2009-03-29/a> | Chris Carboni | April 1st - What Will Really Happen? |
2009-03-26/a> | Mark Hofman | Webhoneypot fun |
2009-03-26/a> | Mark Hofman | Sanitising media |
2009-03-20/a> | Stephen Hall | Making the most of your runbooks |
2009-03-10/a> | Swa Frantzen | conspiracy fodder: pifts.exe |
2009-03-08/a> | Marcus Sachs | Behind the Estonia Cyber Attacks |
2009-03-02/a> | Swa Frantzen | Obama's leaked chopper blueprints: anything we can learn? |
2009-02-25/a> | Andre Ludwig | Preview/Iphone/Linux pdf issues |
2009-02-25/a> | Swa Frantzen | Targeted link diversion attempts |
2009-02-17/a> | Jason Lam | DShield Web Honeypot - Alpha Preview Release |
2009-02-13/a> | Andre Ludwig | Third party information on conficker |
2009-02-12/a> | Mark Hofman | Australian Bushfires |
2009-02-11/a> | Robert Danford | ProFTPd SQL Authentication Vulnerability exploit activity |
2009-02-10/a> | Bojan Zdrnja | More tricks from Conficker and VM detection |
2009-02-09/a> | Bojan Zdrnja | Some tricks from Conficker's bag |
2009-01-25/a> | Rick Wanner | Twam?? Twammers? |
2009-01-20/a> | Adrien de Beaupre | Obamamania |
2009-01-16/a> | G. N. White | Conficker.B/Downadup.B/Kido: F-Secure publishes details pertaining to their counting methodology of compromised machines |
2009-01-15/a> | Bojan Zdrnja | Conficker's autorun and social engineering |
2009-01-12/a> | William Salusky | Downadup / Conficker - MS08-067 exploit and Windows domain account lockout |
2009-01-12/a> | William Salusky | Web Application Firewalls (WAF) - Have you deployed WAF technology? |
2009-01-07/a> | William Salusky | BIND 9.x security patch - resolves potentially new DNS poisoning vector |
2008-12-12/a> | Johannes Ullrich | MSIE 0-day Spreading Via SQL Injection |
2008-12-09/a> | Swa Frantzen | Contacting us might be hard today |
2008-12-02/a> | Deborah Hale | Sonicwall License Manager Failure |
2008-12-01/a> | Jason Lam | Call for volunteers - Web Honeypot Project |
2008-12-01/a> | Jason Lam | Input filtering and escaping in SQL injection mitigation |
2008-11-25/a> | Andre Ludwig | The beginnings of a collaborative approach to IDS |
2008-11-20/a> | Jason Lam | Large quantity SQL Injection mitigation |
2008-11-17/a> | Jim Clausing | A new cheat sheet and a contest |
2008-11-16/a> | Maarten Van Horenbeeck | Detection of Trojan control channels |
2008-11-02/a> | Mari Nichols | Day 33 - Working with Management to Improve Processes |
2008-10-17/a> | Rick Wanner | Day 18 - Containing Other Incidents |
2008-10-15/a> | Rick Wanner | Day 15 - Containing the Damage From a Lost or Stolen Laptop |
2008-10-12/a> | Mari Nichols | Day 12 Containment: Gathering Evidence That Can be Used in Court |
2008-09-29/a> | Daniel Wesemann | ASPROX mutant |
2008-09-22/a> | Maarten Van Horenbeeck | Data exfiltration and the use of anonymity providers |
2008-09-22/a> | Jim Clausing | Lessons learned from the Palin (and other) account hijacks |
2008-09-21/a> | Mari Nichols | You still have time! |
2008-09-20/a> | Rick Wanner | New (to me) nmap Features |
2008-09-11/a> | David Goldsmith | CookieMonster is coming to Pown (err, Town) |
2008-09-10/a> | Adrien de Beaupre | Apple updates iPod Touch + Bonjour for Windows |
2008-09-09/a> | Swa Frantzen | Evil side economy: $1 for breaking 1000 CAPTCHAs |
2008-09-07/a> | Daniel Wesemann | Staying current, but not too current |
2008-09-03/a> | Daniel Wesemann | Static analysis of Shellcode - Part 2 |
2008-09-03/a> | donald smith | New bgp hijack isn't very new. |
2008-09-01/a> | John Bambenek | The Number of Machines Controlled by Botnets Has Jumped 4x in Last 3 Months |
2008-08-23/a> | Mark Hofman | SQL injections - an update |
2008-08-12/a> | Johannes Ullrich | Upcoming Infocon Test and new Color |
2008-08-10/a> | Stephen Hall | From lolly pops to afterglow |
2008-08-08/a> | Mark Hofman | More SQL Injections - very active right now |
2008-08-03/a> | Deborah Hale | Securing A Network - Lessons Learned |
2008-07-24/a> | Bojan Zdrnja | What's brewing in Danmec's pot? |
2008-07-17/a> | Mari Nichols | Adobe Reader 9 Released |
2008-07-14/a> | Daniel Wesemann | Obfuscated JavaScript Redux |
2008-07-11/a> | Jim Clausing | Handling the load |
2008-06-30/a> | Marcus Sachs | More SQL Injection with Fast Flux hosting |
2008-06-25/a> | Deborah Hale | Report of Coreflood.dr Infection |
2008-06-24/a> | Jason Lam | SQL Injection mitigation in ASP |
2008-06-24/a> | Jason Lam | Microsoft SQL Injection Prevention Strategy |
2008-06-23/a> | donald smith | Preventing SQL injection |
2008-06-13/a> | Johannes Ullrich | SQL Injection: More of the same |
2008-06-13/a> | Johannes Ullrich | Floods: More of the same (2) |
2008-06-07/a> | Jim Clausing | Followup to 'How do you monitor your website?' |
2008-05-26/a> | Marcus Sachs | Predictable Response |
2008-05-20/a> | Raul Siles | List of malicious domains inserted through SQL injection |
2008-05-17/a> | Jim Clausing | Disaster donation scams continue |
2008-04-24/a> | donald smith | Hundreds of thousands of SQL injections |
2008-04-16/a> | Bojan Zdrnja | The 10.000 web sites infection mystery solved |
2008-04-07/a> | John Bambenek | HP USB Keys Shipped with Malware for your Proliant Server |
2008-04-07/a> | John Bambenek | Network Solutions Technical Difficulties? Enom too |
2008-04-06/a> | Daniel Wesemann | Advanced obfuscated JavaScript analysis |
2008-04-03/a> | Bojan Zdrnja | Mixed (VBScript and JavaScript) obfuscation |
2008-03-30/a> | Mark Hofman | Mail Anyone? |
2008-03-14/a> | Kevin Liston | 2117966.net-- mass iframe injection |
2008-01-09/a> | Bojan Zdrnja | Mass exploits with SQL Injection |
2007-02-24/a> | Jason Lam | Prepared Statements and SQL injections |
2006-10-02/a> | Jim Clausing | Back to green, but the exploits are still running wild |
2006-09-30/a> | Swa Frantzen | Yellow: WebViewFolderIcon setslice exploit spreading |
PORT |
2025-02-26/a> | Jesse La Grew | [Guest Diary] Malware Source Servers: The Threat of Attackers Using Ephemeral Ports as Service Ports to Upload Data |
2025-01-23/a> | Johannes Ullrich | XSS Attempts via E-Mail |
2024-06-17/a> | Xavier Mertens | New NetSupport Campaign Delivered Through MSIX Packages |
2024-04-25/a> | Jesse La Grew | Does it matter if iptables isn't running on my honeypot? |
2023-08-18/a> | Xavier Mertens | From a Zalando Phishing to a RAT |
2022-10-31/a> | Rob VandenBrink | NMAP without NMAP - Port Testing and Scanning with PowerShell |
2022-10-21/a> | Brad Duncan | sczriptzzbn inject pushes malware for NetSupport RAT |
2022-10-19/a> | Xavier Mertens | Are Internet Scanning Services Good or Bad for You? |
2022-01-02/a> | Guy Bruneau | Exchange Server - Email Trapped in Transport Queues |
2021-10-14/a> | Xavier Mertens | Port-Forwarding with Windows for the Win |
2021-06-03/a> | Jim Clausing | Strange goings on with port 37 |
2021-02-25/a> | Jim Clausing | So where did those Satori attacks come from? |
2021-02-16/a> | Jim Clausing | More weirdness on TCP port 26 |
2020-10-24/a> | Guy Bruneau | An Alternative to Shodan, Censys with User-Agent CensysInspect/1.1 |
2020-02-05/a> | Brad Duncan | Fake browser update pages are "still a thing" |
2019-11-19/a> | Johannes Ullrich | Cheap Chinese JAWS of DVR Exploitability on Port 60001 |
2019-08-01/a> | Johannes Ullrich | What is Listening On Port 9527/TCP? |
2019-07-26/a> | Kevin Shortt | DVRIP Port 34567 - Uptick |
2019-03-09/a> | Guy Bruneau | A Comparison Study of SSH Port Activity - TCP 22 & 2222 |
2018-12-16/a> | Guy Bruneau | Random Port Scan for Open RDP Backdoor |
2018-01-09/a> | Jim Clausing | What is going on with port 3333? |
2017-09-22/a> | Russell Eubanks | What is the State of Your Union? |
2017-09-05/a> | Johannes Ullrich | The Mirai Botnet: A Look Back and Ahead At What's Next |
2017-08-18/a> | Guy Bruneau | tshark 2.4 New Feature - Command Line Export Objects |
2017-06-16/a> | Lorna Hutcheson | What is going on with Port 83? |
2017-04-22/a> | Jim Clausing | WTF tcp port 81 |
2017-01-28/a> | Guy Bruneau | Request for Packets and Logs - TCP 5358 |
2017-01-10/a> | Johannes Ullrich | Port 37777 "MapTable" Requests |
2016-05-26/a> | Xavier Mertens | Keeping an Eye on Tor Traffic |
2016-04-25/a> | Guy Bruneau | Highlights from the 2016 HPE Annual Cyber Threat Report |
2016-02-02/a> | Johannes Ullrich | Targeted IPv6 Scans Using pool.ntp.org . |
2015-09-28/a> | Johannes Ullrich | "Transport of London" Malicious E-Mail |
2015-06-27/a> | Guy Bruneau | Is Windows XP still around in your Network a year after Support Ended? |
2015-04-08/a> | Tom Webb | Is it a breach or not? |
2014-10-13/a> | Lorna Hutcheson | For or Against: Port Security for Network Access Control |
2014-09-15/a> | Johannes Ullrich | Google DNS Server IP Address Spoofed for SNMP reflective Attacks |
2014-07-05/a> | Guy Bruneau | Java Support ends for Windows XP |
2014-06-11/a> | Daniel Wesemann | Help your pilot fly! |
2014-05-23/a> | Richard Porter | Highlights from Cisco Live 2014 - The Internet of Everything |
2014-03-26/a> | Johannes Ullrich | Let's Finally "Nail" This Port 5000 Traffic - Synology owners needed. |
2014-03-13/a> | Daniel Wesemann | Identification and authentication are hard ... finding out intention is even harder |
2014-03-06/a> | Mark Baggett | Port 5000 traffic and snort signature |
2014-01-22/a> | Chris Mohan | Learning from the breaches that happens to others |
2014-01-11/a> | Guy Bruneau | tcpflow 1.4.4 and some of its most Interesting Features |
2014-01-02/a> | Johannes Ullrich | Scans Increase for New Linksys Backdoor (32764/TCP) |
2013-11-25/a> | Johannes Ullrich | More Bad Port 0 Traffic |
2013-11-22/a> | Rick Wanner | Port 0 DDOS |
2013-10-30/a> | Russ McRee | SIR v15: Five good reasons to leave Windows XP behind |
2013-05-19/a> | Kevin Shortt | Port 51616 - Got Packets? |
2013-03-03/a> | Richard Porter | Uptick in MSSQL Activity |
2013-01-08/a> | Richard Porter | Yahoo Web Interface Report: Compose and Send |
2012-12-06/a> | Daniel Wesemann | Fake tech support calls - revisited |
2012-10-03/a> | Kevin Shortt | Fake Support Calls Reported |
2012-01-27/a> | Mark Hofman | CISCO Ironport C & M Series telnet vulnerability |
2012-01-13/a> | Guy Bruneau | Sysinternals Updates - http://blogs.technet.com/b/sysinternals/archive/2012/01/13/updates-autoruns-v11-21-coreinfo-v3-03-portmon-v-3-03-process-explorer-v15-12-mark-s-blog-and-mark-at-rsa-2012.aspx |
2011-11-11/a> | Rick Wanner | APPLE-SA-2011-11-10-2 Time Capsule and AirPort Base Station (802.11n) Firmware 7.6 update |
2011-10-25/a> | Chris Mohan | Recurring reporting made easy? |
2011-08-25/a> | Kevin Shortt | Increased Traffic on Port 3389 |
2011-06-29/a> | Johannes Ullrich | Random SSL Tips and Tricks |
2011-06-21/a> | Chris Mohan | Australian government security audit report shows tough love to agencies |
2011-05-23/a> | Mark Hofman | Microsoft Support Scam (again) |
2011-04-20/a> | Daniel Wesemann | Data Breach Investigations Report published by Verizon |
2011-01-25/a> | Chris Mohan | Reviewing our preconceptions |
2011-01-24/a> | Rob VandenBrink | Where have all the COM Ports Gone? - How enumerating COM ports led to me finding a “misplaced” Microsoft tool |
2011-01-15/a> | Jim Clausing | What's up with port 8881? |
2011-01-08/a> | Guy Bruneau | PandaLabs 2010 Annual Report |
2010-11-24/a> | Jim Clausing | Help with odd port scans |
2010-08-16/a> | Raul Siles | The Seven Deadly Sins of Security Vulnerability Reporting |
2010-07-29/a> | Rob VandenBrink | The 2010 Verizon Data Breach Report is Out |
2010-07-06/a> | Rob VandenBrink | Bogus Support Organizations use Live Operators to Install Malware |
2010-06-15/a> | Manuel Humberto Santander Pelaez | Microsoft Windows Help and Support Center vulnerability (CVE 2010-1885) exploit in the wild |
2010-04-20/a> | Raul Siles | Are You Ready for a Transportation Collapse...? |
2010-03-01/a> | Mark Hofman | Microsoft will drop support for Vista (without any Service Packs) on April 13 and support for XP SP2 ends July 13. (i.e. no more security updates). If you are still running these, it it time to update. |
2010-02-03/a> | Rob VandenBrink | Support for Legacy Browsers |
2010-01-09/a> | G. N. White | What's Up With All The Port Scanning Using TCP/6000 As A Source Port? |
2009-10-28/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 28 - ntp (123/udp) |
2009-10-25/a> | Lorna Hutcheson | Cyber Security Awareness Month - Day 25 - Port 80 and 443 |
2009-10-21/a> | Pedro Bueno | Cyber Security Awareness Month - Day 21 - Port 135 |
2009-10-17/a> | Rick Wanner | Cyber Security Awareness Month - Day 17 - Port 22/SSH |
2009-10-15/a> | Deborah Hale | Cyber Security Awareness Month - Day 15 - Ports 995, 465, and 993 - Secure Email |
2009-10-11/a> | Mark Hofman | Cyber Security Awareness Month - Day 12 Ports 161/162 Simple Network Management Protocol (SNMP) |
2009-10-08/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 8 - Port 25 - SMTP |
2009-05-02/a> | Rick Wanner | Significant increase in port 2967 traffic |
2009-04-15/a> | Marcus Sachs | 2009 Data Breach Investigation Report |
2009-01-21/a> | Raul Siles | Traffic increase for port UDP/8247 |
2008-12-16/a> | donald smith | Cisco's Annual Security report has been released. |
2008-08-02/a> | Maarten Van Horenbeeck | A little of that human touch |
2008-07-02/a> | Jim Clausing | The scoop on the spike in UDP port 7 traffic |
2008-05-26/a> | Marcus Sachs | Port 1533 on the Rise |
2008-04-27/a> | Marcus Sachs | What's With Port 20329? |
2008-04-10/a> | Deborah Hale | DSLReports Being Attacked Again |
2008-04-08/a> | Swa Frantzen | Symantec's Global Internet Security Threat Report |
2006-11-29/a> | Toby Kohlenberg | New Vulnerability Announcement and patches from Apple |
2006-09-21/a> | Johannes Ullrich | Apple updates Airport Drivers |
5000 |
2016-02-13/a> | Guy Bruneau | VMware VMSA-2015-0007.3 has been Re-released |
2014-03-26/a> | Johannes Ullrich | Let's Finally "Nail" This Port 5000 Traffic - Synology owners needed. |
2014-03-06/a> | Mark Baggett | Port 5000 traffic and snort signature |
SCANS |
2024-08-22/a> | Johannes Ullrich | OpenAI Scans for Honeypots. Artificially Malicious? Action Abuse? |
2022-03-20/a> | Didier Stevens | MGLNDD_* Scans |
2022-01-16/a> | Guy Bruneau | 10 Most Popular Targeted Ports in the Past 3 Weeks |
2018-07-02/a> | Guy Bruneau | Hello Peppa! - PHP Scans |
2018-05-06/a> | Guy Bruneau | Scans Attempting to use PowerShell to Download PHP Script |
2016-12-31/a> | Xavier Mertens | Ongoing Scans Below the Radar |
2015-11-04/a> | Johannes Ullrich | Internet Wide Scanners Wanted |
2014-03-06/a> | Mark Baggett | Port 5000 traffic and snort signature |
2013-02-03/a> | Lorna Hutcheson | Is it Really an Attack? |