Date Author Title

FAKE SITE

2021-08-04Yee Ching TokPivoting and Hunting for Shenanigans from a Reported Phishing Domain

FAKE

2024-01-24/a>Johannes UllrichHow Bad User Interfaces Make Security Tools Harmful
2022-03-02/a>Johannes UllrichThe More Often Something is Repeated, the More True It Becomes: Dealing with Social Media
2022-01-03/a>Xavier MertensMcAfee Phishing Campaign with a Nice Fake Scan
2021-08-04/a>Yee Ching TokPivoting and Hunting for Shenanigans from a Reported Phishing Domain
2020-04-18/a>Guy BruneauMaldoc Falsely Represented as DOCX Invoice Redirecting to Fake Apple Store
2020-02-05/a>Brad DuncanFake browser update pages are "still a thing"
2019-04-07/a>Guy BruneauFake Office 365 Payment Information Update
2019-04-02/a>Johannes UllrichFake AV is Back: LaCie Network Drives Used to Spread Malware
2019-03-21/a>Xavier MertensNew Wave of Extortion Emails: Central Intelligence Agency Case
2017-07-07/a>Renato MarinhoDDoS Extortion E-mail: Yet Another Bluff?
2016-05-12/a>Xavier MertensAnother Day, Another Wave of Phishing Emails
2015-09-28/a>Johannes Ullrich"Transport of London" Malicious E-Mail
2014-02-21/a>Johannes UllrichUPS Malware Spam Using Fake SPF Headers
2013-04-29/a>Adam SwangerReport Fake Tech Support Calls submission form reminder
2013-04-16/a>John BambenekFake Boston Marathon Scams Update
2013-01-03/a>Manuel Humberto Santander PelaezNew year and new CA compromised
2012-12-06/a>Daniel WesemannFake tech support calls - revisited
2012-10-03/a>Kevin ShorttFake Support Calls Reported
2012-06-19/a>Daniel Wesemann Vulnerabilityqueerprocessbrittleness
2011-07-25/a>Bojan ZdrnjaWhen the FakeAV coder(s) fail
2011-07-21/a>Daniel WesemannDown the FakeAV rabbit hole
2011-05-19/a>Daniel WesemannFake AV Bingo
2011-05-04/a>Bojan ZdrnjaMore on Google image poisoning
2011-01-18/a>Daniel WesemannYet another rogue anti-virus
2010-11-11/a>Daniel WesemannFake AV scams via Skype Chat
2010-02-27/a>Johannes UllrichSearch Engine Poisoning: Chile Earthquake
2010-02-15/a>Johannes UllrichVarious Olympics Related Dangerous Google Searches
2010-02-08/a>Adrien de BeaupreWhen is a 0day not a 0day? Fake OpenSSh exploit, again.
2010-01-08/a>Rob VandenBrinkMicrosoft OfficeOnline, Searching for Trust and Malware
2009-09-17/a>Bojan ZdrnjaWhy is Rogue/Fake AV so successful?
2009-09-04/a>Adrien de BeaupreFake anti-virus
2009-02-06/a>Adrien de BeaupreFake stimulus payments
2008-09-15/a>donald smithFake antivirus 2009 and search engine results

SITE

2023-12-11/a>Rob VandenBrinkWhat is sitemap.xml, and Why a Pentester Should Care
2021-08-04/a>Yee Ching TokPivoting and Hunting for Shenanigans from a Reported Phishing Domain
2021-06-24/a>Xavier MertensDo you Like Cookies? Some are for sale!
2018-11-17/a>Xavier MertensQuickly Investigating Websites with Lookyloo
2017-07-19/a>Xavier MertensBots Searching for Keys & Config Files
2017-04-07/a>Xavier MertensTracking Website Defacers with HTTP Referers
2017-01-14/a>Xavier MertensBackup Files Are Good but Can Be Evil
2016-01-29/a>Xavier MertensScripting Web Categorization
2014-08-09/a>Adrien de BeaupreComplete application ownage via Multi-POST XSRF
2014-06-11/a>Daniel WesemannGimme your keys!
2013-02-22/a>Johannes UllrichWhen web sites go bad: bible . org compromise
2013-02-11/a>John BambenekIs This Chinese Registrar Really Trying to XSS Me?
2013-02-04/a>Russ McReeAn expose of a recent SANS GIAC XSS vulnerability
2013-01-25/a>Johannes UllrichVulnerability Scans via Search Engines (Request for Logs)
2011-08-24/a>Rob VandenBrinkCitrix Access Gateway Cross Site Scripting vulnerability and fix ==> http://support.citrix.com/article/CTX129971
2010-08-13/a>Tom ListonThe Strange Case of Doctor Jekyll and Mr. ED
2010-04-26/a>Raul SilesVulnerable Sites Database
2009-08-18/a>Deborah HaleDomain tcpdump.org unavailable
2009-08-18/a>Deborah HaleWebsite compromises - what's happening?
2009-05-27/a>donald smithHost file black lists
2009-05-05/a>Bojan ZdrnjaEvery dot matters
2008-08-02/a>Maarten Van HorenbeeckIssues affecting sites using Sitemeter [resolved]
2008-06-07/a>Jim ClausingFollowup to 'How do you monitor your website?'
2008-04-24/a>donald smithHundreds of thousands of SQL injections