Date Author Title
2023-01-31Jesse La GrewDShield Honeypot Setup with pfSense
2022-05-29Didier StevensExtracting The Overlay Of A PE File
2022-05-28Didier StevensHuge Signed PE File: Keeping The Signature
2022-05-26Didier StevensHuge Signed PE File
2022-03-29Johannes UllrichMore Fake/Typosquatting Twitter Accounts Asking for Ukraine Crytocurrency Donations
2022-03-04Johannes UllrichScam E-Mail Impersonating Red Cross
2020-11-06Johannes UllrichRediscovering Limitations of Stateful Firewalls: "NAT Slipstreaming" ? Implications, Detections and Mitigations
2020-06-19Remco VerhoefSigma rules! The generic signature format for SIEM systems.
2016-03-07Xavier MertensAnother Malicious Document, Another Way to Deliver Malicious Code
2016-02-28Guy BruneauRFC 6598 - Carrier Grade NAT
2015-04-28Daniel WesemannScammy Nepal earthquake donation requests
2014-11-24Richard PorterSomeone is using this? PoS: Compressor
2013-05-16Daniel WesemannExtracting signatures from Apple .apps
2012-05-16Johannes UllrichReserved IP Address Space Reminder
2011-08-17Rob VandenBrinkPutting all of Your Eggs in One Basket - or How NOT to do Layoffs
2011-06-22Guy BruneauHow Good is your Employee Termination Policy?
2010-04-21Guy BruneauMcAfee DAT 5958 Update Issues
2009-12-02Rob VandenBrinkSPAM and Malware taking advantage of H1N1 concerns
2009-02-12Mark HofmanAustralian Bushfires
2008-06-13Johannes UllrichFloods: More of the same (2)
2008-05-26Marcus SachsPredictable Response
2008-05-17Jim ClausingDisaster donation scams continue