VERIZON DATA BREACH REPORT |
2011-04-20 | Daniel Wesemann | Data Breach Investigations Report published by Verizon |
2010-07-29 | Rob VandenBrink | The 2010 Verizon Data Breach Report is Out |
VERIZON |
2012-06-14/a> | Johannes Ullrich | Spot the Phish: Verizon Wireless |
2011-04-20/a> | Daniel Wesemann | Data Breach Investigations Report published by Verizon |
2010-07-29/a> | Rob VandenBrink | The 2010 Verizon Data Breach Report is Out |
2009-10-02/a> | Stephen Hall | Verizon New York area issues |
DATA |
2025-04-02/a> | Guy Bruneau | Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive [Guest Diary] |
2025-03-20/a> | Johannes Ullrich | Some new Data Feeds, and a little "incident". |
2025-02-17/a> | Russ McRee | ModelScan - Protection Against Model Serialization Attacks |
2024-08-23/a> | Jesse La Grew | Pandas Errors: What encoding are my logs in? |
2024-08-16/a> | Jesse La Grew | [Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools |
2023-08-25/a> | Xavier Mertens | Python Malware Using Postgresql for C2 Communications |
2023-07-23/a> | Guy Bruneau | Install & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs |
2023-05-24/a> | Jesse La Grew | More Data Enrichment for Cowrie Logs |
2023-05-09/a> | Russ McRee | Exploratory Data Analysis with CISSM Cyber Attacks Database - Part 2 |
2022-06-10/a> | Russ McRee | EPSScall: An Exploit Prediction Scoring System App |
2021-12-28/a> | Russ McRee | LotL Classifier tests for shells, exfil, and miners |
2021-10-20/a> | Xavier Mertens | Thanks to COVID-19, New Types of Documents are Lost in The Wild |
2021-08-29/a> | Guy Bruneau | Filter JSON Data by Value with Linux jq |
2021-07-04/a> | Didier Stevens | DIY CD/DVD Destruction - Follow Up |
2021-06-27/a> | Didier Stevens | DIY CD/DVD Destruction |
2021-02-01/a> | Rob VandenBrink | Taking a Shot at Reverse Shell Attacks, CNC Phone Home and Data Exfil from Servers |
2021-01-29/a> | Xavier Mertens | Sensitive Data Shared with Cloud Services |
2020-07-04/a> | Russ McRee | Happy FouRth of July from the Internet Storm Center |
2020-03-14/a> | Didier Stevens | Phishing PDF With Incremental Updates. |
2020-02-28/a> | Xavier Mertens | Show me Your Clipboard Data! |
2019-05-19/a> | Guy Bruneau | Is Metadata Only Approach, Good Enough for Network Traffic Analysis? |
2018-07-04/a> | Didier Stevens | XPS Metadata |
2018-06-16/a> | Russ McRee | Anomaly Detection & Threat Hunting with Anomalize |
2017-12-16/a> | Xavier Mertens | Microsoft Office VBA Macro Obfuscation via Metadata |
2017-08-07/a> | Xavier Mertens | Increase of phpMyAdmin scans |
2017-05-28/a> | Guy Bruneau | CyberChef a Must Have Tool in your Tool bag! |
2017-02-01/a> | Xavier Mertens | Quick Analysis of Data Left Available by Attackers |
2017-01-06/a> | John Bambenek | Great Misadventures of Security Vendors: Absurd Sandboxing Edition |
2016-09-22/a> | Rick Wanner | YAHDD! (Yet another HUGE data Breach!) |
2016-08-31/a> | Deborah Hale | Dropbox Breach |
2016-08-19/a> | Xavier Mertens | Data Classification For the Masses |
2016-07-03/a> | Guy Bruneau | Is Data Privacy part of your Company's Culture? |
2016-06-20/a> | Xavier Mertens | Using Your Password Manager to Monitor Data Leaks |
2016-02-22/a> | Xavier Mertens | Reducing False Positives with Open Data Sources |
2016-01-30/a> | Xavier Mertens | All CVE Details at Your Fingertips |
2015-09-01/a> | Daniel Wesemann | Encryption of "data at rest" in servers |
2015-07-31/a> | Russ McRee | Tech tip: Invoke a system command in R |
2015-07-31/a> | Russ McRee | Tech tip follow-up: Using the data Invoked with R's system command |
2015-05-23/a> | Guy Bruneau | Business Value in "Big Data" |
2015-03-21/a> | Russell Eubanks | Have you seen my personal information? It has been lost. Again. |
2014-12-01/a> | Guy Bruneau | Do you have a Data Breach Response Plan? |
2014-02-04/a> | Johannes Ullrich | Odd ICMP Echo Request Payload |
2013-10-16/a> | Adrien de Beaupre | Access denied and blockliss |
2013-07-06/a> | Guy Bruneau | Is Metadata the Magic in Modern Network Security? |
2012-12-03/a> | John Bambenek | John McAfee Exposes His Location in Photo About His Being on Run |
2012-11-30/a> | Daniel Wesemann | Snipping Leaks |
2012-11-22/a> | Kevin Liston | Greek National Arrested on Suspicion of Theft of 9M Records on Fellow Greeks |
2012-01-16/a> | Kevin Shortt | Zappos Breached |
2011-04-20/a> | Daniel Wesemann | Data Breach Investigations Report published by Verizon |
2011-01-12/a> | Richard Porter | Yet Another Data Broker? AOL Lifestream. |
2011-01-12/a> | Richard Porter | How Many Loyalty Cards do you Carry? |
2010-09-26/a> | Daniel Wesemann | Egosurfing, the corporate way |
2010-07-29/a> | Rob VandenBrink | The 2010 Verizon Data Breach Report is Out |
2010-04-27/a> | Rob VandenBrink | Layer 2 Security - L2TPv3 for Disaster Recovery Sites |
2010-04-22/a> | John Bambenek | Data Redaction: You're Doing it Wrong |
2010-02-10/a> | Marcus Sachs | Datacenters and Directory Traversals |
2009-10-19/a> | Daniel Wesemann | Backed up, lately ? |
2009-09-07/a> | Lorna Hutcheson | Encrypting Data |
2009-07-28/a> | Adrien de Beaupre | YYAMCCBA |
2009-04-24/a> | John Bambenek | Data Leak Prevention: Proactive Security Requirements of Breach Notification Laws |
2009-04-15/a> | Marcus Sachs | 2009 Data Breach Investigation Report |
2009-03-02/a> | Swa Frantzen | Obama's leaked chopper blueprints: anything we can learn? |
2009-01-30/a> | Mark Hofman | We all "Love" USB drives |
2008-12-17/a> | donald smith | Team CYMRU's Malware Hash Registry |
2008-08-25/a> | John Bambenek | Thoughts on the Best Western Compromise |
BREACH |
2023-09-02/a> | Jesse La Grew | What is the origin of passwords submitted to honeypots? |
2016-09-22/a> | Rick Wanner | YAHDD! (Yet another HUGE data Breach!) |
2016-08-31/a> | Deborah Hale | Dropbox Breach |
2015-04-08/a> | Tom Webb | Is it a breach or not? |
2015-03-21/a> | Russell Eubanks | Have you seen my personal information? It has been lost. Again. |
2014-12-01/a> | Guy Bruneau | Do you have a Data Breach Response Plan? |
2014-08-23/a> | Guy Bruneau | NSS Labs Cyber Resilience Report |
2014-06-13/a> | Richard Porter | A welcomed response, PF Chang's |
2013-12-21/a> | Daniel Wesemann | Adobe phishing underway |
2013-10-05/a> | Richard Porter | Adobe Breach Notification, Notifications? |
2013-10-04/a> | Johannes Ullrich | The Adobe Breach FAQ |
2013-07-22/a> | Johannes Ullrich | Apple Developer Site Breach |
2013-07-21/a> | Guy Bruneau | Ubuntu Forums Security Breach |
2013-02-22/a> | Johannes Ullrich | Zendesk breach affects Tumblr/Pinterest/Twitter |
2013-01-04/a> | Daniel Wesemann | Blue for Reset? |
2012-11-22/a> | Kevin Liston | Greek National Arrested on Suspicion of Theft of 9M Records on Fellow Greeks |
2012-07-16/a> | Jim Clausing | An analysis of the Yahoo! passwords |
2012-06-06/a> | Jim Clausing | Potential leak of 6.5+ million LinkedIn password hashes |
2012-01-16/a> | Kevin Shortt | Zappos Breached |
2011-09-15/a> | Swa Frantzen | DigiNotar looses their accreditation for qualified certificates |
2011-09-07/a> | Lenny Zeltser | GlobalSign Temporarily Stops Issuing Certificates to Investigate a Potential Breach |
2011-09-06/a> | Swa Frantzen | DigiNotar audit - intermediate report available |
2011-09-01/a> | Swa Frantzen | DigiNotar breach - the story so far |
2011-06-21/a> | Chris Mohan | StartSSL, a web authentication authority, suspend services after a security breach |
2011-05-30/a> | Johannes Ullrich | Lockheed Martin and RSA Tokens |
2011-05-25/a> | Lenny Zeltser | Monitoring Social Media for Security References to Your Organization |
2011-04-28/a> | Chris Mohan | DSL Reports advise 9,000 accounts were compromised |
2011-04-20/a> | Daniel Wesemann | Data Breach Investigations Report published by Verizon |
2011-04-04/a> | Mark Hofman | When your service provider has a breach |
2011-03-25/a> | Rob VandenBrink | The Recent RSA Breach - Imagining the Worst Case, And Why it Isn't Time to Panic (Yet) |
2010-12-28/a> | John Bambenek | Mozilla Notifies of Relatively Minor Security Breach |
2010-07-29/a> | Rob VandenBrink | The 2010 Verizon Data Breach Report is Out |
2010-06-10/a> | Deborah Hale | iPad Owners Exposed |
2010-04-13/a> | Johannes Ullrich | Apache.org Bugtracker Breach |
2009-07-28/a> | Adrien de Beaupre | YYAMCCBA |
2009-07-23/a> | John Bambenek | Missouri Passes Breach Notification Law: Gap Still Exists for Banking Account Information |
2009-06-06/a> | Patrick Nolan | ARRA/HIPAA Breach Reporting Dates Approaching |
2009-05-09/a> | Patrick Nolan | Unusable, Unreadable, or Indecipherable? No Breach reporting required |
2009-05-05/a> | Bojan Zdrnja | Health database breached |
2009-04-24/a> | John Bambenek | Data Leak Prevention: Proactive Security Requirements of Breach Notification Laws |
2009-04-15/a> | Marcus Sachs | 2009 Data Breach Investigation Report |
2009-02-08/a> | Mari Nichols | Are we becoming desensitized to data breaches? |
2009-01-30/a> | Mark Hofman | We all "Love" USB drives |
REPORT |
2025-01-23/a> | Johannes Ullrich | XSS Attempts via E-Mail |
2017-09-22/a> | Russell Eubanks | What is the State of Your Union? |
2016-04-25/a> | Guy Bruneau | Highlights from the 2016 HPE Annual Cyber Threat Report |
2015-04-08/a> | Tom Webb | Is it a breach or not? |
2014-05-23/a> | Richard Porter | Highlights from Cisco Live 2014 - The Internet of Everything |
2014-01-22/a> | Chris Mohan | Learning from the breaches that happens to others |
2014-01-11/a> | Guy Bruneau | tcpflow 1.4.4 and some of its most Interesting Features |
2013-10-30/a> | Russ McRee | SIR v15: Five good reasons to leave Windows XP behind |
2013-01-08/a> | Richard Porter | Yahoo Web Interface Report: Compose and Send |
2011-10-25/a> | Chris Mohan | Recurring reporting made easy? |
2011-06-21/a> | Chris Mohan | Australian government security audit report shows tough love to agencies |
2011-04-20/a> | Daniel Wesemann | Data Breach Investigations Report published by Verizon |
2011-01-25/a> | Chris Mohan | Reviewing our preconceptions |
2011-01-08/a> | Guy Bruneau | PandaLabs 2010 Annual Report |
2010-08-16/a> | Raul Siles | The Seven Deadly Sins of Security Vulnerability Reporting |
2010-07-29/a> | Rob VandenBrink | The 2010 Verizon Data Breach Report is Out |
2009-04-15/a> | Marcus Sachs | 2009 Data Breach Investigation Report |
2008-12-16/a> | donald smith | Cisco's Annual Security report has been released. |
2008-08-02/a> | Maarten Van Horenbeeck | A little of that human touch |
2008-04-10/a> | Deborah Hale | DSLReports Being Attacked Again |
2008-04-08/a> | Swa Frantzen | Symantec's Global Internet Security Threat Report |