Date Author Title

MAG STRIPE

2013-12-19Rob VandenBrinkTarget US - Credit Card Data Breach

MAG

2022-02-05/a>Didier StevensPower over Ethernet and Thermal Imaging
2021-12-16/a>Brad DuncanHow the "Contact Forms" campaign tricks people
2021-11-04/a>Tom WebbXmount for Disk Images
2021-10-21/a>Brad Duncan"Stolen Images Evidence" campaign pushes Sliver-based malware
2021-04-22/a>Xavier MertensHow Safe Are Your Docker Images?
2017-10-24/a>Xavier MertensStop relying on file extensions
2017-01-24/a>Xavier MertensMalicious SVG Files in the Wild
2016-12-11/a>Russ McReeSteganography in Action: Image Steganography & StegExpose
2013-12-19/a>Rob VandenBrinkTarget US - Credit Card Data Breach
2013-11-05/a>Daniel WesemannTIFF images in MS-Office documents used in targeted attacks
2013-08-14/a>Johannes UllrichImaging LUKS Encrypted Drives
2011-08-03/a>Johannes UllrichMalicious Images: What's a QR Code
2011-04-23/a>Manuel Humberto Santander PelaezImage search can lead to malware download
2009-07-11/a>Marcus SachsImageshack

STRIPE

2013-12-19/a>Rob VandenBrinkTarget US - Credit Card Data Breach