Threat Level: green Handler on Duty: Tom Webb

SANS ISC Diaries by Keyword


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
DateAuthorTitle

TARGETED ATTACK

2010-12-23Mark HofmanWhite house greeting cards
2009-06-04Raul SilesTargeted e-mail attacks asking to verify wire transfer details
2009-02-25Swa FrantzenTargeted link diversion attempts
2009-01-18Maarten Van HorenbeeckTargeted social engineering
2008-07-09Johannes UllrichUnpatched Word Vulnerability
2008-05-26Marcus SachsPredictable Response
2008-03-27Maarten Van HorenbeeckGuarding the guardians: a story of PGP key ring theft

TARGETED

2010-12-23/a>Mark HofmanWhite house greeting cards
2009-06-04/a>Raul SilesTargeted e-mail attacks asking to verify wire transfer details
2009-02-25/a>Swa FrantzenTargeted link diversion attempts
2009-01-18/a>Maarten Van HorenbeeckTargeted social engineering
2008-09-22/a>Maarten Van HorenbeeckData exfiltration and the use of anonymity providers
2008-07-09/a>Johannes UllrichUnpatched Word Vulnerability
2008-05-26/a>Marcus SachsPredictable Response
2008-04-24/a>Maarten Van HorenbeeckTargeted attacks using malicious PDF files
2008-03-27/a>Maarten Van HorenbeeckGuarding the guardians: a story of PGP key ring theft

ATTACK

2015-03-18/a>Daniel WesemannPass the hash!
2015-02-19/a>Daniel WesemannDNS-based DDoS
2014-02-26/a>Russ McReeOngoing NTP Amplification Attacks
2014-02-17/a>Chris MohanNTP reflection attacks continue
2013-12-02/a>Richard PorterReports of higher than normal SSH Attacks
2013-08-19/a>Guy Bruneau Business Risks and Cyber Attacks
2013-07-27/a>Scott FendleyDefending Against Web Server Denial of Service Attacks
2013-07-13/a>Lenny ZeltserDecoy Personas for Safeguarding Online Identity Using Deception
2012-10-05/a>Richard PorterReports of a Distributed Injection Scan
2011-12-28/a>Daniel WesemannHash collisions vulnerability in web servers
2011-12-01/a>Mark HofmanSQL Injection Attack happening ATM
2011-09-28/a>Richard PorterAll Along the ARP Tower!
2011-01-23/a>Richard PorterCrime is still Crime!
2010-12-23/a>Mark HofmanWhite house greeting cards
2010-08-16/a>Raul SilesDDOS: State of the Art
2010-08-15/a>Manuel Humberto Santander PelaezObfuscated SQL Injection attacks
2010-08-13/a>Tom ListonThe Strange Case of Doctor Jekyll and Mr. ED
2010-03-15/a>Adrien de BeaupreSpamassassin Milter Plugin Remote Root Attack
2010-01-29/a>Johannes UllrichAnalyzing isc.sans.org weblogs, part 2, RFI attacks
2009-11-11/a>Rob VandenBrinkLayer 2 Network Protections against Man in the Middle Attacks
2009-08-28/a>Adrien de BeaupreWPA with TKIP done
2009-06-04/a>Raul SilesTargeted e-mail attacks asking to verify wire transfer details
2009-04-20/a>Jason LamDigital Content on TV
2009-04-02/a>Bojan ZdrnjaJavaScript insertion and log deletion attack tools
2009-03-20/a>donald smithStealthier then a MBR rootkit, more powerful then ring 0 control, it’s the soon to be developed SMM root kit.
2009-02-25/a>Swa FrantzenTargeted link diversion attempts
2009-01-30/a>Mark HofmanRequest for info - Scan and webmail
2009-01-18/a>Maarten Van HorenbeeckTargeted social engineering
2008-12-03/a>Andre LudwigNew ISC Poll! Has your organization suffered a DDoS (Distributed Denial of Service) attack in the last year?
2008-07-09/a>Johannes UllrichUnpatched Word Vulnerability
2008-05-26/a>Marcus SachsPredictable Response
2008-03-27/a>Maarten Van HorenbeeckGuarding the guardians: a story of PGP key ring theft