Date Author Title

TARGETED ATTACKS SOCIAL ENGINEERING

2009-01-18Maarten Van HorenbeeckTargeted social engineering

TARGETED

2010-12-23/a>Mark HofmanWhite house greeting cards
2009-06-04/a>Raul SilesTargeted e-mail attacks asking to verify wire transfer details
2009-02-25/a>Swa FrantzenTargeted link diversion attempts
2009-01-18/a>Maarten Van HorenbeeckTargeted social engineering
2008-09-22/a>Maarten Van HorenbeeckData exfiltration and the use of anonymity providers
2008-07-09/a>Johannes UllrichUnpatched Word Vulnerability
2008-05-26/a>Marcus SachsPredictable Response
2008-04-24/a>Maarten Van HorenbeeckTargeted attacks using malicious PDF files
2008-03-27/a>Maarten Van HorenbeeckGuarding the guardians: a story of PGP key ring theft

ATTACKS

2024-01-08/a>Jesse La GrewWhat is that User Agent?
2022-08-10/a>Johannes UllrichAnd Here They Come Again: DNS Reflection Attacks
2021-02-01/a>Rob VandenBrinkTaking a Shot at Reverse Shell Attacks, CNC Phone Home and Data Exfil from Servers
2019-08-25/a>Guy BruneauAre there any Advantages of Buying Cyber Security Insurance?
2016-11-02/a>Rob VandenBrinkWhat Does a Pentest Look Like?
2016-06-03/a>Tom ListonMySQL is YourSQL
2015-02-19/a>Daniel WesemannDNS-based DDoS
2014-02-26/a>Russ McReeOngoing NTP Amplification Attacks
2014-02-17/a>Chris MohanNTP reflection attacks continue
2013-08-19/a>Guy Bruneau Business Risks and Cyber Attacks
2013-07-27/a>Scott FendleyDefending Against Web Server Denial of Service Attacks
2011-12-28/a>Daniel WesemannHash collisions vulnerability in web servers
2010-08-16/a>Raul SilesDDOS: State of the Art
2010-08-13/a>Tom ListonThe Strange Case of Doctor Jekyll and Mr. ED
2010-01-29/a>Johannes UllrichAnalyzing isc.sans.org weblogs, part 2, RFI attacks
2009-02-25/a>Swa FrantzenTargeted link diversion attempts
2009-01-18/a>Maarten Van HorenbeeckTargeted social engineering
2008-12-03/a>Andre LudwigNew ISC Poll! Has your organization suffered a DDoS (Distributed Denial of Service) attack in the last year?

SOCIAL

2022-11-29/a>Johannes UllrichIdentifying Groups of "Bot" Accounts on LinkedIn
2022-03-02/a>Johannes UllrichThe More Often Something is Repeated, the More True It Becomes: Dealing with Social Media
2017-07-16/a>Renato MarinhoSMS Phishing induces victims to photograph its own token card
2015-11-21/a>Didier StevensMaldoc Social Engineering Trick
2014-08-20/a>Kevin ShorttSocial Engineering Alive and Well
2014-01-24/a>Chris MohanPhishing via Social Media
2013-07-13/a>Lenny ZeltserDecoy Personas for Safeguarding Online Identity Using Deception
2013-07-08/a>Richard PorterWhy do we Click?
2013-02-25/a>Johannes UllrichMass-Customized Malware Lures: Don't trust your cat!
2012-04-06/a>Johannes UllrichSocial Share Privacy
2011-05-25/a>Lenny ZeltserMonitoring Social Media for Security References to Your Organization
2011-05-10/a>Swa FrantzenChanging MO in scamming our users ?
2010-12-29/a>Daniel WesemannBeware of strange web sites bearing gifts ...
2010-11-22/a>Lenny ZeltserBrand Impersonations On-Line: Brandjacking and Social Networks
2010-09-16/a>Johannes UllrichFacebook "Like Pages"
2010-07-07/a>Kevin ShorttFacebook, Facebook, What Do YOU See?
2010-06-14/a>Manuel Humberto Santander PelaezNew way of social engineering on IRC
2010-06-10/a>Deborah HaleTop 5 Social Networking Media Risks
2010-05-02/a>Mari NicholsZbot Social Engineering
2010-04-29/a>Bojan ZdrnjaWho needs exploits when you have social engineering?
2010-04-13/a>Johannes UllrichMore Legal Threat Malware E-Mail
2009-06-01/a>G. N. WhiteYet another "Digital Certificate" malware campaign
2009-04-24/a>Pedro BuenoDid you check your conference goodies?
2009-01-18/a>Maarten Van HorenbeeckTargeted social engineering

ENGINEERING

2017-07-16/a>Renato MarinhoSMS Phishing induces victims to photograph its own token card
2015-11-21/a>Didier StevensMaldoc Social Engineering Trick
2014-08-20/a>Kevin ShorttSocial Engineering Alive and Well
2013-07-08/a>Richard PorterWhy do we Click?
2012-09-14/a>Lenny ZeltserAnalyzing Malicious RTF Files Using OfficeMalScanner's RTFScan
2012-06-04/a>Lenny ZeltserDecoding Common XOR Obfuscation in Malicious Code
2011-05-10/a>Swa FrantzenChanging MO in scamming our users ?
2010-12-29/a>Daniel WesemannBeware of strange web sites bearing gifts ...
2010-11-18/a>Chris CarboniStopping the ZeroAccess Rootkit
2010-06-14/a>Manuel Humberto Santander PelaezNew way of social engineering on IRC
2010-05-02/a>Mari NicholsZbot Social Engineering
2010-04-29/a>Bojan ZdrnjaWho needs exploits when you have social engineering?
2010-04-13/a>Johannes UllrichMore Legal Threat Malware E-Mail
2009-06-01/a>G. N. WhiteYet another "Digital Certificate" malware campaign
2009-04-24/a>Pedro BuenoDid you check your conference goodies?
2009-01-18/a>Maarten Van HorenbeeckTargeted social engineering