Date Author Title

SEARCH ENGINE POISONING

2010-02-15Johannes UllrichVarious Olympics Related Dangerous Google Searches

SEARCH

2024-03-10/a>Guy BruneauWhat happens when you accidentally leak your AWS API keys? [Guest Diary]
2024-02-03/a>Guy BruneauDShield Sensor Log Collection with Elasticsearch
2023-07-23/a>Guy BruneauInstall & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-04-27/a>Johannes UllrichSANS.edu Research Journal: Volume 3
2023-03-16/a>Xavier MertensSimple Shellcode Dissection
2023-01-21/a>Guy BruneauDShield Sensor JSON Log to Elasticsearch
2021-09-11/a>Guy BruneauShipping to Elasticsearch Microsoft DNS Logs
2021-09-09/a>Johannes UllrichUpdates to Our Datafeeds/API
2021-05-08/a>Guy BruneauWho is Probing the Internet for Research Purposes?
2021-02-13/a>Guy BruneauUsing Logstash to Parse IPtables Firewall Logs
2020-12-19/a>Guy BruneauSecure Communication using TLS in Elasticsearch
2020-05-29/a>Johannes UllrichThe Impact of Researchers on Our Data
2019-11-29/a>Russ McReeISC Snapshot: Search with SauronEye
2018-11-30/a>Remco VerhoefCoinMiners searching for hosts
2018-11-14/a>Brad DuncanDay in the life of a researcher: Finding a wave of Trickbot malspam
2017-05-18/a>Xavier MertensMy Little CVE Bot
2015-11-22/a>Guy BruneauOpenDNS Research Used to Predict Threat
2015-11-04/a>Johannes UllrichInternet Wide Scanners Wanted
2015-08-16/a>Guy BruneauAre you a "Hunter"?
2015-07-21/a>Didier StevensSearching Through the VirusTotal Database
2010-02-15/a>Johannes UllrichVarious Olympics Related Dangerous Google Searches
2010-01-08/a>Rob VandenBrinkMicrosoft OfficeOnline, Searching for Trust and Malware

ENGINE

2024-12-05/a>Jesse La Grew[Guest Diary] Business Email Compromise
2019-11-23/a>Guy BruneauLocal Malware Analysis with Malice
2017-08-18/a>Renato MarinhoEngineBox Malware Supports 10+ Brazilian Banks
2017-07-16/a>Renato MarinhoSMS Phishing induces victims to photograph its own token card
2015-11-21/a>Didier StevensMaldoc Social Engineering Trick
2014-08-20/a>Kevin ShorttSocial Engineering Alive and Well
2013-07-08/a>Richard PorterWhy do we Click?
2012-09-14/a>Lenny ZeltserAnalyzing Malicious RTF Files Using OfficeMalScanner's RTFScan
2012-06-04/a>Lenny ZeltserDecoding Common XOR Obfuscation in Malicious Code
2011-05-10/a>Swa FrantzenChanging MO in scamming our users ?
2010-12-29/a>Daniel WesemannBeware of strange web sites bearing gifts ...
2010-11-18/a>Chris CarboniStopping the ZeroAccess Rootkit
2010-06-14/a>Manuel Humberto Santander PelaezNew way of social engineering on IRC
2010-05-02/a>Mari NicholsZbot Social Engineering
2010-04-29/a>Bojan ZdrnjaWho needs exploits when you have social engineering?
2010-04-13/a>Johannes UllrichMore Legal Threat Malware E-Mail
2010-02-15/a>Johannes UllrichVarious Olympics Related Dangerous Google Searches
2009-06-01/a>G. N. WhiteYet another "Digital Certificate" malware campaign
2009-04-24/a>Pedro BuenoDid you check your conference goodies?
2009-01-18/a>Maarten Van HorenbeeckTargeted social engineering

POISONING

2013-10-21/a>Johannes UllrichNew tricks that may bring DNS spoofing back or: "Why you should enable DNSSEC even if it is a pain to do"
2010-02-15/a>Johannes UllrichVarious Olympics Related Dangerous Google Searches
2009-11-24/a>John BambenekBIND Security Advisory (DNSSEC only)
2009-01-07/a>William SaluskyBIND 9.x security patch - resolves potentially new DNS poisoning vector