Threat Level: green Handler on Duty: Johannes Ullrich

SANS ISC Diaries by Keyword


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
DateAuthorTitle

FLASHBACK G

2012-02-24Guy BruneauFlashback Trojan in the Wild

FLASHBACK

2012-04-14/a>Rick WannerFlashback Trojan Removal Tool Released
2012-04-12/a>Guy BruneauApple Java Updates for Mac OS X
2012-03-05/a>Johannes UllrichFlashback Malware now with Twitter C&C
2012-02-24/a>Guy BruneauFlashback Trojan in the Wild

G

2014-12-06/a>Rick WannerGoogle App Engine Java Security Sandbox bypasses
2014-11-27/a>Russ McReeSyrian Electronic Army attack leads to malvertising
2014-11-19/a>Rob VandenBrink"Big Data" Needs a Trip to the Security Chiropracter!
2014-11-04/a>Daniel WesemannWhois someone else?
2014-09-27/a>Guy BruneauWhat has Bash and Heartbleed Taught Us?
2014-09-26/a>Richard PorterWhy We Have Moved to InfoCon:Yellow
2014-09-22/a>Johannes UllrichFake LogMeIn Certificate Update with Bad AV Detection Rate
2014-09-19/a>Guy BruneauWeb Scan looking for /info/whitelist.pac
2014-09-19/a>Guy BruneauPHP Fixes Several Bugs in Version 5.4 and 5.5
2014-09-16/a>Daniel Wesemannhttps://yourfakebank.support -- TLD confusion starts!
2014-09-15/a>Johannes UllrichGoogle DNS Server IP Address Spoofed for SNMP reflective Attacks
2014-09-12/a>Chris MohanAre credential dumps worth reviewing?
2014-09-03/a>Johannes UllrichF5 BigIP Unauthenticated rsync Vulnerability
2014-08-27/a>Rob VandenBrinkOne More Day of Trolling in POS Memory
2014-08-22/a>Richard PorterOCLHashCat 1.30 Released
2014-08-20/a>Kevin ShorttSocial Engineering Alive and Well
2014-08-15/a>Tom WebbAppLocker Event Logs with OSSEC 2.8
2014-08-09/a>Adrien de BeaupreComplete application ownage via Multi-POST XSRF
2014-08-05/a>Johannes UllrichSynolocker: Why OFFLINE Backups are important
2014-08-05/a>Johannes UllrichLegal Threat Spam: Sometimes it Gets Personal
2014-08-04/a>Russ McReeThreats & Indicators: A Security Intelligence Lifecycle
2014-07-30/a>Rick WannerSymantec Endpoint Protection Privilege Escalation Zero Day
2014-07-23/a>Johannes UllrichNew Feature: "Live" SSH Brute Force Logs and New Kippo Client
2014-07-18/a>Russ McReeGameover Zeus reported as "returned from the dead"
2014-07-15/a>Daniel WesemannOracle July 2014 CPU (patch bundle)
2014-07-14/a>Johannes UllrichThe Internet of Things: How do you "on-board" devices?
2014-07-14/a>Daniel WesemannE-ZPass phishing scam
2014-07-11/a>Rob VandenBrinkEgress Filtering? What - do we have a bird problem?
2014-07-09/a>Daniel WesemannWho owns your typo?
2014-07-09/a>Daniel WesemannWho inherits your IP address?
2014-07-08/a>Johannes UllrichHardcoded Netgear Prosafe Switch Password
2014-07-02/a>Johannes UllrichJuly Ouch! Security Awareness Newsletter Released. E-mail Do's and Don'ts http://www.securingthehuman.org/resources/newsletters/ouch/2014#july2014
2014-06-13/a>Richard PorterA welcomed response, PF Chang's
2014-06-04/a>Richard Porterp0f, Got Packets?
2014-06-02/a>John BambenekGameover Zeus and Cryptolocker Takedowns
2014-06-02/a>Rick WannerUsing nmap to scan for DDOS reflectors
2014-05-30/a>Johannes UllrichFake Australian Electric Bill Leads to Cryptolocker
2014-05-23/a>Richard PorterHighlights from Cisco Live 2014 - The Internet of Everything
2014-05-22/a>Rob VandenBrinkAnother Site Breached - Time to Change your Passwords! (If you can that is)
2014-05-18/a>Russ McReesed and awk will always rock
2014-05-07/a>Johannes UllrichDe-Clouding your Life: Things that should not go into the cloud.
2014-05-01/a>Johannes UllrichBusybox Honeypot Fingerprinting and a new DVR scanner
2014-04-27/a>Tony CarothersThe Dreaded "D" Word of IT
2014-04-26/a>Guy BruneauAndroid Users - Beware of Bitcoin Mining Malware
2014-04-21/a>Daniel WesemannFinding the bleeders
2014-04-12/a>Guy BruneauInterested in a Heartbleed Challenge?
2014-04-08/a>Guy BruneauOpenSSL CVE-2014-0160 Fixed
2014-04-05/a>Jim ClausingThose strange e-mails with URLs in them can lead to Android malware
2014-04-04/a>Rob VandenBrinkDealing with Disaster - A Short Malware Incident Response
2014-04-01/a>Johannes Ullrichcmd.so Synology Scanner Also Found on Routers
2014-03-31/a>Johannes UllrichMore Device Malware: This is why your DVR attacked my Synology Disk Station (and now with Bitcoin Miner!)
2014-03-28/a>Johannes UllrichWar of the Bots: When DVRs attack NASs
2014-03-27/a>Alex StanfordApple Credential Phishing via appleidconfirm.net
2014-03-26/a>Johannes UllrichLet's Finally "Nail" This Port 5000 Traffic - Synology owners needed.
2014-03-17/a>Johannes UllrichScans for FCKEditor File Manager
2014-03-13/a>Daniel WesemannWeb server logs containing RS=^ ?
2014-03-12/a>Johannes UllrichWordpress "Pingback" DDoS Attacks
2014-03-04/a>Daniel WesemannTriple Handshake Cookie Cutter
2014-03-02/a>Stephen HallSunday Reading
2014-02-28/a>Daniel WesemannOversharing
2014-02-19/a>Russ McReeThreat modeling in the name of security
2014-02-18/a>Johannes UllrichMore Details About "TheMoon" Linksys Worm
2014-02-15/a>Rob VandenBrinkMore on HNAP - What is it, How to Use it, How to Find it
2014-02-14/a>Chris MohanScanning activity for /siemens/bootstrapping/JnlpBrowser/Development/
2014-02-13/a>Johannes UllrichLinksys Worm ("TheMoon") Captured
2014-02-12/a>Johannes UllrichSuspected Mass Exploit Against Linksys E1000 / E1200 Routers
2014-02-10/a>Rob VandenBrinkA Tale of Two Admins (and no Change Control)
2014-02-09/a>Basil Alawi S.TaherMandiant Highlighter 2
2014-02-04/a>Johannes UllrichOdd ICMP Echo Request Payload
2014-01-30/a>Johannes UllrichNew gTLDs appearing in the root zone
2014-01-27/a>Basil Alawi S.TaherLog Parsing with Mandiant Highlighter (1)
2014-01-24/a>Johannes UllrichHow to send mass e-mail the right way
2014-01-24/a>Chris MohanPhishing via Social Media
2014-01-23/a>Chris MohanLearning from the breaches that happens to others Part 2
2014-01-17/a>Russ McReeMassive RFI scans likely a free web app vuln scanner rather than bots
2014-01-14/a>Chris MohanSpamming and scanning botnets - is there something I can do to block them from my site?
2014-01-11/a>Guy Bruneautcpflow 1.4.4 and some of its most Interesting Features
2014-01-04/a>Tom WebbMonitoring Windows Networks Using Syslog (Part One)
2014-01-02/a>John BambenekOpenSSL.org Defaced by Attackers Gaining Access to Hypervisor
2014-01-01/a>Russ McReeSix degrees of celebration: Juniper, ANT, Shodan, Maltego, Cisco, and Tails
2013-12-28/a>Russ McReeWeekend Reading List 27 DEC
2013-12-28/a>Bojan ZdrnjaDRG online challenge(s)
2013-12-23/a>Rob VandenBrinkHow-To's for the Holidays - Java Whitelisting using AD Group Policy
2013-12-21/a>Daniel WesemannAdobe phishing underway
2013-12-19/a>Rob VandenBrinkPassive Scanning Two Ways - How-Tos for the Holidays
2013-12-19/a>Rob VandenBrinkTarget US - Credit Card Data Breach
2013-12-11/a>Johannes UllrichFacebook Phishing and Malware via Tumblr Redirects
2013-12-09/a>Rob VandenBrinkScanning without Scanning
2013-12-07/a>Guy BruneauSuspected Active Rovnix Botnet Controller
2013-12-03/a>Rob VandenBrinkEven in the Quietest Moments ...
2013-11-29/a>Russ McReeMS Exchange update, includes failed backup fix: http://support.microsoft.com/kb/2892464
2013-11-27/a>Rob VandenBrinkATM Traffic + TCPDump + Video = Good or Evil?
2013-11-22/a>Rick WannerPort 0 DDOS
2013-11-22/a>Rick WannerTales of Password Reuse
2013-11-16/a>Guy BruneauSagan as a Log Normalizer
2013-11-15/a>Johannes UllrichThe Security Impact of HTTP Caching Headers
2013-11-11/a>Johannes UllrichWhat Happened to the SANS Ads?
2013-11-05/a>Daniel WesemannTIFF images in MS-Office documents used in targeted attacks
2013-11-04/a>Manuel Humberto Santander PelaezWhen attackers use your DNS to check for the sites you are visiting
2013-11-01/a>Russ McReeSecunia's PSI Country Report - Q3 2013
2013-10-30/a>Russ McReeSIR v15: Five good reasons to leave Windows XP behind
2013-10-25/a>Rob VandenBrinkKaspersky flags TCPIP.SYS as Malware
2013-10-25/a>Johannes UllrichPHP.net compromise aftermath: Why Code Signing Beats Hashes
2013-10-24/a>Johannes UllrichFalse Positive: php.net Malware Alert
2013-10-22/a>Richard PorterGreenbone and OpenVAS Scanner
2013-10-21/a>Johannes UllrichNew tricks that may bring DNS spoofing back or: "Why you should enable DNSSEC even if it is a pain to do"
2013-10-18/a>Rob VandenBrinkCSAM - Why am I seeing DNS Requests to IANA.ORG in my Firewall Logs?
2013-10-17/a>Adrien de BeaupreInternet wide DNS scanning
2013-10-10/a>Johannes Ullrichgoogle.com.my DNS hijack
2013-10-10/a>Mark HofmanCSAM Some more unusual scans
2013-10-04/a>Pedro BuenoCSAM: WebHosting BruteForce logs
2013-10-02/a>John BambenekObamacare related domain registration spike, Government shutdown domain registration beginning
2013-09-24/a>Tom WebbIDS, NSM, and Log Management with Security Onion 12.04.3
2013-09-11/a>Alex StanfordGetting Started with Rsyslog Filters
2013-09-05/a>Rob VandenBrinkBuilding Your Own GPU Enabled Private Cloud
2013-09-02/a>Guy BruneauSnort IDS Sensor with Sguil New ISO Released
2013-08-26/a>Alex StanfordStop, Drop and File Carve
2013-08-22/a>Russ McReeRead of the Week: A Fuzzy Future in Malware Research
2013-08-21/a>Alex StanfordPsst. Your Browser Knows All Your Secrets.
2013-08-19/a>Rob VandenBrinkZMAP 1.02 released
2013-08-15/a>Johannes UllrichMicrosoft Pulls MS013-061 due to problems with Exchange Server 2013 http://blogs.technet.com/b/exchange/archive/2013/08/14/exchange-2013-security-update-ms13-061-status-update.aspx
2013-08-14/a>Johannes Ullrich.GOV zones may not resolve due to DNSSEC problems.
2013-08-14/a>Johannes UllrichImaging LUKS Encrypted Drives
2013-08-09/a>Kevin ShorttCopy Machines - Changing Scanned Content
2013-08-05/a>Chris MohanDMARC: another step forward in the fight against phishing?
2013-07-31/a>Johannes UllrichPOP3 Server Brute Forcing Attempts Using Polycom Credentials
2013-07-29/a>Adrien de BeaupreBGP multiple banking addresses hijacked
2013-07-28/a>Guy BruneauWireshark 1.8.9 and 1.10.1 Security Update
2013-07-21/a>Guy BruneauWhy use Regular Expressions?
2013-07-20/a>Manuel Humberto Santander PelaezDo you have rogue Internet gateways in your network? Check it with nmap
2013-07-19/a>Stephen HallCyber Intelligence Tsunami
2013-07-18/a>Chris MohanBlog Spam - annoying junk or a source of intelligence?
2013-07-16/a>Johannes UllrichWhy don't we see more examples of web app attacks via POST?
2013-07-13/a>Lenny ZeltserDecoy Personas for Safeguarding Online Identity Using Deception
2013-07-10/a>Johannes Ullrich.NL Registrar Compromisse
2013-07-08/a>Richard PorterWhy do we Click?
2013-07-06/a>Guy BruneauIs Metadata the Magic in Modern Network Security?
2013-07-01/a>Manuel Humberto Santander PelaezUsing nmap scripts to enhance vulnerability asessment results
2013-06-29/a>Johannes UllrichInstagram "Fruit" Spam
2013-06-22/a>Guy BruneauFacebook Reports a Potential Leak of User Data
2013-06-21/a>Guy BruneauSysinternals Updates for Autoruns, Strings & ZoomIt http://blogs.technet.com/b/sysinternals/archive/2013/06/20/updates-autoruns-v11-61-strings-v2-52-zoomit-v4-5.aspx
2013-06-18/a>Russ McReeEMET 4.0 is now available for download
2013-06-10/a>Johannes UllrichWhen Google isn't Google
2013-05-23/a>Adrien de BeaupreMoVP II
2013-05-22/a>Adrien de BeauprePrivilege escalation, why should I care?
2013-05-21/a>Adrien de BeaupreMoore, Oklahoma tornado charitable organization scams, malware, and phishing
2013-05-20/a>Guy BruneauSysinternals Updates for Accesschk, Procdump, RAMMap and Strings http://blogs.technet.com/b/sysinternals/archive/2013/05/17/updates-accesschk-v5-11-procdump-v6-0-rammap-v1-22-strings-v2-51.aspx
2013-05-19/a>Kevin ShorttPort 51616 - Got Packets?
2013-05-17/a>Johannes UllrichSSL: Another reason not to ignore IPv6
2013-05-16/a>Daniel WesemannExtracting signatures from Apple .apps
2013-05-08/a>Chris MohanSyria drops from Internet 7th May 2013
2013-05-07/a>Jim ClausingIs there an epidemic of typo squatting?
2013-05-07/a>Jim ClausingNGINX updates address buffer overflow (CVE-2013-2028) see http://nginx.org/en/CHANGES-1.4
2013-05-04/a>Kevin ShorttThe Zero-Day Pendulum Swings
2013-04-25/a>Adam SwangerGuest Diary: Dylan Johnson - A week in the life of some Perimeter Firewalls
2013-04-23/a>Russ McReeMicrosoft's Security Intelligence Report (SIRv14) released
2013-04-21/a>John BambenekA Chargen-based DDoS? Chargen is still a thing?
2013-04-17/a>Richard PorterApple iTunes Services Outage
2013-04-16/a>John BambenekFake Boston Marathon Scams Update
2013-04-15/a>John BambenekPlease send any spam (full headers), URLs or other suspicious content scamming off Boston Marathon explosions to handlers@sans.org
2013-04-10/a>Manuel Humberto Santander PelaezMassive Google scam sent by email to Colombian domains
2013-04-04/a>Johannes UllrichPostgresql Patches Critical Vulnerability
2013-03-29/a>Chris MohanFake Link removal requests
2013-03-27/a>Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - IPv6 moving target defense
2013-03-19/a>Johannes UllrichIPv6 Focus Month: The warm and fuzzy side of IPv6
2013-03-18/a>Kevin ShorttSpamhaus DDOS
2013-03-07/a>Guy BruneauApple Blocking Java Web plug-in
2013-03-06/a>Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - Geolocation Using IPv6 Addresses
2013-03-02/a>Scott FendleyApple Blocks Older Insecure Versions of Flash Player
2013-02-28/a>Daniel WesemannParsing Windows Eventlogs in Powershell
2013-02-27/a>Adam SwangerGuest Diary: Dylan Johnson - There's value in them there logs!
2013-02-25/a>Johannes UllrichPunkspider enumerates web application vulnerabilities
2013-02-25/a>Rob VandenBrinkSilent Traitors - Embedded Devices in your Datacenter
2013-02-22/a>Chris MohanPHP 5.4.12 and PHP 5.3.22 released http://www.php.net/ChangeLog-5.php
2013-02-17/a>Guy BruneauHP ArcSight Connector Appliance and Logger Vulnerabilities
2013-02-11/a>John BambenekIs This Chinese Registrar Really Trying to XSS Me?
2013-02-06/a>Johannes UllrichHTTP Range Header and Partial Downloads
2013-02-06/a>Johannes UllrichAre you losing system logging information (and don't know it)?
2013-02-04/a>Russ McReeAn expose of a recent SANS GIAC XSS vulnerability
2013-02-04/a>Adam SwangerSAN Securing The Human Monthly Awareness Video - Advanced Persistent Threat (APT) http://www.securingthehuman.org/resources/ncsam
2013-01-30/a>Richard PorterGetting Involved with the Local Community
2013-01-25/a>Johannes UllrichVulnerability Scans via Search Engines (Request for Logs)
2013-01-15/a>Rob VandenBrinkWhen Disabling IE6 (or Java, or whatever) is not an Option...
2013-01-10/a>Rob VandenBrinkWhat Else runs Telnets? Or, Pentesters Love Video Conferencing Units Too!
2013-01-09/a>Rob VandenBrinkHotmail seeing some temporary access issues
2013-01-02/a>Chris MohanStarting the New Year on the right foot
2012-12-27/a>John BambenekIt's 3pm 2 days after Christmas, do you know where your unmanaged SSH keys are?
2012-12-20/a>Daniel WesemannWhite House strategy on security information sharing and safeguarding
2012-12-18/a>Dan GoldbergMitigating the impact of organizational change: a risk assessment
2012-12-13/a>Johannes UllrichWhat if Tomorrow Was the Day?
2012-12-06/a>Daniel WesemannFake tech support calls - revisited
2012-12-06/a>Daniel WesemannRich Quick Make Money!
2012-12-03/a>John BambenekJohn McAfee Exposes His Location in Photo About His Being on Run
2012-12-02/a>Guy BruneauCollecting Logs from Security Devices at Home
2012-11-30/a>Daniel WesemannNmap 6.25 released - lots of new goodies, see http://nmap.org/changelog.html
2012-11-29/a>Kevin ShorttNew Apple Security Update: APPLE-SA-2012-11-29-1 Apple TV 5.1.1
2012-11-28/a>Mark HofmanNew version of wireshark is available (1.8.4), some security fixes included.
2012-11-28/a>Mark HofmanMcAfee releases extraDAT for W32/Autorun.worm.aaeb-h
2012-11-27/a>Chris MohanCan users' phish emails be a security admin's catch of the day?
2012-11-26/a>John BambenekOnline Shopping for the Holidays? Tips, News and a Fair Warning
2012-11-23/a>Rob VandenBrinkWhat's in Your Change Control Form?
2012-11-20/a>John BambenekBehind the Random NTP Bizarreness of Incorrect Year Being Set
2012-11-20/a>John BambenekFirefox v 17.0 just released, more here: http://www.mozilla.org/en-US/firefox/17.0/releasenotes/
2012-11-19/a>John BambenekMoneyGram fined $100 million for aiding wire fraud - http://krebsonsecurity.com/2012/11/moneygram-fined-100-million-for-wire-fraud/
2012-11-19/a>John BambenekNew Poll: Top 5 Unresolved Security Problems of 2012
2012-11-17/a>Manuel Humberto Santander PelaezNew Sysinternal Updates: AdExplorer v1.44, Contig v1.7, Coreinfo v3.2, Procdump v5.1. See http://blogs.technet.com/b/sysinternals/archive/2012/11/16/updates-adexplorer-v1-44-contig-v1-7-coreinfo-v3-2-procdump-v5-1.aspx?Redirected=true
2012-11-13/a>Jim ClausingMicrosoft November 2012 Black Tuesday Update - Overview
2012-11-12/a>John BambenekRequest for info: Robocall Phishing Against Local/Regional Banks
2012-11-09/a>Mark BaggettRemote Diagnostics with PSR
2012-11-09/a>Mark BaggettFresh batch of Microsoft patches next week
2012-11-08/a>Daniel WesemannGet a 40% discount on your hotel room!
2012-11-07/a>Mark BaggettMultiple 0-Days Reported!
2012-11-07/a>Mark BaggettCisco TACACS+ Authentication Bypass
2012-11-07/a>Mark BaggettHelp eliminate unquoted path vulnerabilities
2012-11-05/a>Johannes UllrichReminder: Ongoing SMTP Brute Forcing Attacks
2012-11-05/a>Johannes UllrichPossible Fake-AV Ads from Doubleclick Servers
2012-11-04/a>Lorna HutchesonWhat's important on your network?
2012-10-31/a>Johannes UllrichCyber Security Awareness Month - Day 31 - Business Continuity and Disaster Recovery
2012-10-30/a>Johannes UllrichHurricane Sandy Update
2012-10-30/a>Richard PorterSplunk 5.0 SP-CAAAHB4 http://www.splunk.com/view/SP-CAAAHB4
2012-10-30/a>Mark HofmanCyber Security Awareness Month - Day 30 - DSD 35 mitigating controls
2012-10-28/a>Tony CarothersFirefox 16.02 Released
2012-10-26/a>Adam SwangerSecuring the Human Special Webcast - October 30, 2012
2012-10-26/a>Russ McReeCyber Security Awareness Month - Day 26 - Attackers use trusted domain to propagate Citadel Zeus variant
2012-10-25/a>Richard PorterCyber Security Awareness Month - Day 25 - Pro Audio & Video Packets on the Wire
2012-10-24/a>Russ McReeOngoing Windstream outage in the midwest - https://twitter.com/search?q=windstream
2012-10-23/a>Rob VandenBrinkCyber Security Awareness Month - Day 23: Character Encoding Standards - ASCII and Successors
2012-10-21/a>Johannes UllrichCyber Security Awareness Month - Day 22: Connectors
2012-10-21/a>Lorna HutchesonPotential Phish for Regular Webmail Accounts
2012-10-19/a>Johannes UllrichCyber Security Awareness Month - Day 19: Standard log formats and CEE.
2012-10-18/a>Rob VandenBrinkCyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide
2012-10-17/a>Mark HofmanOracle Critical Patch Update October
2012-10-17/a>Mark HofmanNew Acrobat release (including reader) available. Version 11. Some security improvements more here -->http://blogs.adobe.com/adobereader/
2012-10-16/a>Richard PorterCyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook.
2012-10-16/a>Johannes UllrichCyber Security Awareness Month - Day 16: W3C and HTML
2012-10-14/a>Pedro BuenoCyber Security Awareness Month - Day 14 - Poor Man's File Analysis System - Part 1
2012-10-09/a>Johannes UllrichMicrosoft October 2012 Black Tuesday Update - Overview
2012-10-07/a>Tony CarothersCyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1
2012-10-05/a>Johannes UllrichCyber Security Awareness Month - Day 5: Standards Body Soup, So many Flavors in the bowl.
2012-10-05/a>Richard PorterVMWare Security Advisory: VMSA-2012-0014 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html
2012-10-05/a>Richard PorterReports of a Distributed Injection Scan
2012-10-04/a>Mark HofmanAnd the SHA-3 title goes to .....Keccak
2012-10-04/a>Johannes UllrichCyber Security Awareness Month - Day 4: Crypto Standards
2012-10-03/a>Kevin ShorttFake Support Calls Reported
2012-10-02/a>Russ McReeCyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines
2012-10-01/a>Johannes UllrichCyber Security Awareness Month
2012-09-28/a>Joel EslerAdobe certification revocation for October 4th
2012-09-26/a>Johannes UllrichSome Android phones can be reset to factory default by clicking on links
2012-09-26/a>Johannes UllrichMore Java Woes
2012-09-21/a>Johannes UllrichiOS 6 Security Roundup
2012-09-21/a>Guy BruneauStoring your Collection of Malware Samples with Malwarehouse
2012-09-20/a>Russ McReeFinancial sector advisory: attacks and threats against financial institutions
2012-09-19/a>Russ McReeScript kiddie scavenging with Shellbot.S
2012-09-17/a>Rob VandenBrinkWhat's on your iPad?
2012-09-14/a>Lenny ZeltserAnalyzing Malicious RTF Files Using OfficeMalScanner's RTFScan
2012-09-14/a>Lenny ZeltserScam Report - Fake Voice Mail Email Notification Redirects to Malicious Site
2012-09-13/a>Mark BaggettTCP Fuzzing with Scapy
2012-09-13/a>Mark BaggettMicrosoft disrupts traffic associated with the Nitol botnet
2012-09-13/a>Mark BaggettMore SSL trouble
2012-09-10/a>Johannes UllrichGodaddy DDoS Attack
2012-09-10/a>donald smithBlue Toad publishing co compromise lead to UDID release. http://redtape.nbcnews.com/_news/2012/09/10/13781440-exclusive-the-real-source-of-apple-device-ids-leaked-by-anonymous-last-week?lite
2012-09-10/a>Johannes UllrichMicrosoft Patch Tuesday Pre-Release
2012-09-09/a>Guy BruneauPhishing/Spam Pretending to be from BBB
2012-09-06/a>Johannes UllrichSSL Requests sent to port 80 (request for help/input)
2012-09-04/a>Johannes UllrichAnother round of "Spot the Exploit E-Mail"
2012-09-02/a>Lorna HutchesonDemonstrating the value of your Intrusion Detection Program and Analysts
2012-09-01/a>Russ McReeBlackhole targeting Java vulnerability via fake Microsoft Services Agreement email phish
2012-08-31/a>Russ McReeNot so fast: Java 7 Update 7 critical vulnerability discovered in less than 24 hours
2012-08-30/a>Bojan ZdrnjaAnalyzing outgoing network traffic (part 2)
2012-08-30/a>Johannes UllrichEditorial: The Slumlord Approach to Network Security http://isc.sans.edu/j/editorial
2012-08-29/a>Johannes Ullrich"Data" URLs used for in-URL phishing
2012-08-27/a>Johannes UllrichThe Good, Bad and Ugly about Assigning IPv6 Addresses
2012-08-27/a>Johannes UllrichMalware Spam harvesting Facebook Information
2012-08-26/a>Lorna HutchesonWho ya gonna contact?
2012-08-23/a>Bojan ZdrnjaAnalyzing outgoing network traffic
2012-08-22/a>Adrien de BeaupreApple Remote Desktop update fixes no encryption issue
2012-08-22/a>Adrien de BeauprePhishing/spam via SMS
2012-08-21/a>Adrien de BeaupreYYABCAFU - Yes Yet Another Bleeping Critical Adobe Flash Update
2012-08-21/a>Adrien de BeaupreRuggedCom fails key management 101 on Rugged Operating System (ROS)
2012-08-20/a>Manuel Humberto Santander PelaezDo we need test procedures in our companies before implementing Antivirus signatures?
2012-08-19/a>Manuel Humberto Santander PelaezAuthentication Issues between entities during protocol message exchange in SCADA Systems
2012-08-17/a>Guy BruneauSuspicious eFax Spear Phishing Messages
2012-08-14/a>Rick WannerMicrosoft August 2012 Black Tuesday Update - Overview
2012-08-12/a>Tony CarothersLayers of the Defense-in-Depth Onion
2012-08-12/a>Tony CarothersOracle Security Alert for CVE-2012-3132
2012-08-09/a>Mark HofmanZeus/Citadel variant causing issues in the Netherlands
2012-08-09/a>Mark HofmanSQL Injection Lilupophilupop style, Part 2
2012-08-07/a>Adrien de BeaupreWho protects small business?
2012-08-05/a>Daniel WesemannPhishing for Payroll with unpatched Java
2012-08-04/a>Kevin ListonVendors: More Patch-Release Options Please
2012-08-01/a>Johannes UllrichGoogle Chrome 21 and getUserMedia API
2012-07-27/a>Daniel WesemannCuckoo 0.4 is out - cool new features for malware analysis http://www.cuckoosandbox.org/
2012-07-25/a>Johannes UllrichMicrosoft Exchange/Sharepoint and others: Oracle Outside In Vulnerability
2012-07-24/a>Richard PorterWireshark 1.8.1 Released http://www.wireshark.org/
2012-07-24/a>Richard PorterReport of spike in DNS Queries gd21.net
2012-07-21/a>Rick WannerTippingPoint DNS Version Request increase
2012-07-20/a>Mark BaggettSyria Internet connection cut?
2012-07-19/a>Mark BaggettDiagnosing Malware with Resource Monitor
2012-07-19/a>Mark BaggettA Heap of Overflows?
2012-07-16/a>Richard PorterSysinternals Update @ http://blogs.technet.com/b/sysinternals/archive/2012/07/16/updates-handle-v3-5-process-explorer-v15-22-process-monitor-v3-03-rammap-v1-21-zoomit-v4-3.aspx
2012-07-16/a>Jim ClausingAn analysis of the Yahoo! passwords
2012-07-13/a>Richard PorterYesterday (not as on the ball as Rob) at SANSFire
2012-07-13/a>Russ McRee2 for 1: SANSFIRE & MSRA presentations
2012-07-13/a>Russ McReeYahoo service SQL injection vuln leads to account exposure
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Recording Server - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Manager - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman
2012-07-11/a>Rick WannerExcellent Security Education Resources
2012-07-09/a>Johannes UllrichThe FBI will turn off the Internet on Monday (or not)
2012-07-09/a>Manuel Humberto Santander PelaezInternet Storm Center panel tonight at SANSFIRE 2012!
2012-07-05/a>Adrien de BeaupreNew OS X trojan backdoor MaControl variant reported
2012-07-02/a>Joel EslerA rough guide to keeping your website up
2012-07-02/a>Joel EslerLinux & Java leap second bug
2012-06-29/a>Jim ClausingUpdated SysInternals tools - Autoruns, Process Explorer, Process Monitor, PSKill -- http://blogs.technet.com/b/sysinternals/archive/2012/06/28/updates-autoruns-v11-32-process-explorer-v15-21-process-monitor-v3-02-pskill-v1-15-rammap-v1-2.aspx
2012-06-28/a>Chris MohanMassive spike in BGP traffic - Possible BGP poisoning?
2012-06-27/a>Daniel WesemannWhat's up with port 79 ?
2012-06-25/a>Rick WannerTargeted Malware for Industrial Espionage?
2012-06-25/a>Guy BruneauIssues with Windows Update Agent
2012-06-22/a>Kevin ListonUpdated Poll: Which Patch Delivery Schedule Works the Best for You?
2012-06-21/a>Russ McReeAnalysis of drive-by attack sample set
2012-06-21/a>Russ McReeWireshark 1.8.0 released 21 JUN 2012 http://www.wireshark.org/download.html
2012-06-20/a>Raul SilesCVE-2012-0217 (from MS12-042) applies to other environments too
2012-06-19/a>Daniel Wesemann Vulnerabilityqueerprocessbrittleness
2012-06-15/a>Johannes UllrichAuthenticating E-Mail
2012-06-14/a>Johannes UllrichSpot the Phish: Verizon Wireless
2012-06-10/a>Scott FendleyPreying on Users After Major Security Incidents
2012-06-04/a>Lenny ZeltserDecoding Common XOR Obfuscation in Malicious Code
2012-06-04/a>Rob VandenBrinkvSphere 5.0 Hardening Guide Officially Released
2012-05-30/a>Rob VandenBrinkToo Big to Fail / Too Big to Learn?
2012-05-30/a>Rob VandenBrinkIt's Phishing Season! In fact, it's ALWAYS Phishing Season!
2012-05-25/a>Guy BruneauApple PGP Product Security key update - https://www.apple.com/support/security/pgp/
2012-05-25/a>Guy BruneauGoogle Publish Transparency Report
2012-05-23/a>Mark BaggettProblems with MS12-035 affecting XP, SBS and Windows 2003?
2012-05-16/a>Johannes UllrichNew Version of Google Chrome released (19.0.1084.46)
2012-05-14/a>Chris MohanLaptops at Security Conferences
2012-05-06/a>Jim ClausingTool updates and Win 8
2012-05-02/a>Bojan ZdrnjaMonitoring VMWare logs
2012-04-30/a>Rob VandenBrinkFCC posts Enquiry Documents on Google Wardriving
2012-04-23/a>Russ McReeEmergency Operations Centers & Security Incident Management: A Correlation
2012-04-21/a>Guy BruneauWordPress Release Security Update
2012-04-16/a>Mark BaggettChallenge: What can you do with Funky Directory Names (Part 2)
2012-04-11/a>Mark BaggettChallenge: What can you do with funky directory names?
2012-04-08/a>Chris MohanBlog Log: More noise or a rich source of intelligence?
2012-04-06/a>Johannes UllrichSocial Share Privacy
2012-04-05/a>Johannes UllrichEvil hides everywhere: Web Application Exploits in Headers
2012-04-02/a>Johannes UllrichSHA 1-2-3
2012-03-27/a>Guy BruneauWireshark 1.6.6 and 1.4.2 Released
2012-03-27/a>Guy BruneauOpera 11.62 for Windows patch several bugs and vulnerabilities - http://www.opera.com/docs/changelogs/windows/1162/
2012-03-16/a>Swa FrantzenINFOCON Yellow - Microsoft RDP - MS12-020
2012-02-29/a>Johannes UllrichCOX Network Outage
2012-02-24/a>Guy BruneauFlashback Trojan in the Wild
2012-02-23/a>donald smithDNS-Changer "clean DNS" extension requested
2012-02-20/a>Johannes UllrichThe Ultimate OS X Hardening Guide Collection
2012-02-20/a>Pedro BuenoSimple Malware Research Tools
2012-02-20/a>Rick WannerDNSChanger resolver shutdown deadline is March 8th
2012-01-31/a>Russ McReeOSINT tactics: parsing from FOCA for Maltego
2012-01-24/a>Bojan ZdrnjaIs it time to get rid of NetBIOS?
2012-01-22/a>Lorna HutchesonMailbag - "Attacks"
2012-01-13/a>Guy BruneauNew Generic Top-Level Domains (gTLDs) out for Sale
2012-01-12/a>Rob VandenBrinkStuff I Learned Scripting - Fun with STDERR
2011-12-25/a>Deborah HaleMerry Christmas, Happy Holidays
2011-12-12/a>Daniel WesemannYou won 100$ or a free iPad!
2011-11-28/a>Tom ListonA Puzzlement...
2011-11-19/a>Kevin ListonMonitoring your Log Monitoring Process
2011-11-16/a>Adrien de BeaupreGET BACK TO ME ASAP
2011-11-11/a>Rick WannerWhat's up with fbi.gov DNS?
2011-11-10/a>Rob VandenBrinkStuff I Learned Scripting - - Parsing XML in a One-Liner
2011-11-09/a>Russ McReeOperation Ghost Click: FBI bags crime ring responsible for $14 million in losses
2011-11-07/a>Rob VandenBrinkJuniper BGP issues causing locallized Internet Problems
2011-10-28/a>Russ McReeCritical Control 19: Data Recovery Capability
2011-10-26/a>Rick WannerCritical Control 17:Penetration Tests and Red Team Exercises
2011-10-26/a>Rob VandenBrinkThe Theoretical "SSL Renegotiation" Issue gets a Whole Lot More Real !
2011-10-25/a>Chris MohanRecurring reporting made easy?
2011-10-21/a>Johannes UllrichNew Flash Click Jacking Exploit
2011-10-17/a>Rob VandenBrinkCritical Control 11: Account Monitoring and Control
2011-10-10/a>Tom ListonWhat's In A Name?
2011-09-29/a>Daniel WesemannThe SSD dilemma
2011-09-27/a>donald smithNew feature in JUNOS to drop or ignore path attributes.
2011-09-20/a>Swa FrantzenDiginotar declared bankrupt
2011-09-19/a>Guy BruneauMS Security Advisory Update - Fraudulent DigiNotar Certificates
2011-09-18/a>Guy BruneauGoogle Chrome Security Updates
2011-09-15/a>Swa FrantzenDigiNotar looses their accreditation for qualified certificates
2011-09-13/a>Swa FrantzenGlobalSign back in operation
2011-09-13/a>Swa FrantzenMore DigiNotar intermediate certificates blacklisted at Microsoft
2011-09-09/a>Johannes UllrichLarge power outage in Southern California may last until Friday. http://www.sdge.com
2011-09-07/a>Lenny ZeltserAnalyzing Mobile Device Malware - Honeynet Forensic Challenge 9 and Some Tools
2011-09-07/a>Lenny ZeltserGlobalSign Temporarily Stops Issuing Certificates to Investigate a Potential Breach
2011-09-06/a>Johannes UllrichMicrosoft Releases Diginotar Related Patch and Advisory
2011-09-06/a>Swa FrantzenDigiNotar audit - intermediate report available
2011-09-01/a>Swa FrantzenDigiNotar breach - the story so far
2011-08-31/a>Johannes UllrichFirefox/Thunderbird 6.0.1 released to blacklist bad DigiNotar SSL certificates
2011-08-31/a>Johannes UllrichPhishing e-mail to custom e-mail addresses
2011-08-31/a>Johannes UllrichKernel.org Compromise
2011-08-26/a>Daniel WesemannUser Agent 007
2011-08-24/a>Rob VandenBrinkGoogle Chrome 13.0.782.215 Released, several security updates ==> http://googlechromereleases.blogspot.com/2011/08/stable-channel-update_22.html
2011-08-24/a>Rob VandenBrinkCitrix Access Gateway Cross Site Scripting vulnerability and fix ==> http://support.citrix.com/article/CTX129971
2011-08-17/a>Rob VandenBrinkPutting all of Your Eggs in One Basket - or How NOT to do Layoffs
2011-08-16/a>Scott FendleyPhishing Scam Victim Response
2011-08-15/a>Rob VandenBrink8 Years since the Eastern Seaboard Blackout - Has it Been that Long?
2011-08-08/a>Rob VandenBrinkPing is Bad (Sometimes)
2011-08-05/a>donald smithNew Mac Trojan: BASH/QHost.WB
2011-08-03/a>Johannes UllrichMalicious Images: What's a QR Code
2011-07-21/a>Mark HofmanLion Released
2011-07-17/a>Mark HofmanSSH Brute Force
2011-07-13/a>Guy BruneauNew Sguil HTTPRY Agent
2011-07-09/a>Tony CarothersCopyright Alert System - What say you?
2011-07-09/a>Johannes UllrichUpdated PGP key for blocklist added to https://isc.sans.edu/PGPKEYS.txt
2011-07-07/a>Rob VandenBrink"There's a Patch for that" (or maybe not)
2011-07-06/a>Rob VandenBrink"Too Important to Patch" - Wait? What?
2011-07-03/a>Deborah HaleBusiness Continuation in the Face of Disaster
2011-06-28/a>Johannes UllrichUpdate: Google Chrome 12.0.742.112 released http://googlechromereleases.blogspot.com/2011/06/stable-channel-update_28.html
2011-06-26/a>Rick WannerNagios script for ISC threat level http://www.aj-services.com/?p=275
2011-06-22/a>Guy BruneauHow Good is your Employee Termination Policy?
2011-06-21/a>Chris MohanAustralian government security audit report shows tough love to agencies
2011-06-20/a>Chris MohanLog files - are you reviewing yours?
2011-06-19/a>Guy BruneauSega Pass Compromised - 1.29 Million Customers Data Leaked
2011-06-17/a>Richard PorterWhen do you stop owning Technology?
2011-06-13/a>Bojan ZdrnjaHarry Potter and the Rogue anti-virus: Part 1
2011-06-12/a>Mark HofmanCloud thoughts
2011-06-08/a>Johannes UllrichSpam from compromised Hotmail accounts
2011-06-06/a>Manuel Humberto Santander PelaezPhishing: Same goal, same techniques and people still falling for such scams
2011-05-25/a>Lenny ZeltserMonitoring Social Media for Security References to Your Organization
2011-05-19/a>Daniel WesemannFake AV Bingo
2011-05-17/a>Johannes UllrichA Couple Days of Logs: Looking for the Russian Business Network
2011-05-11/a>Swa FrantzenTime to disable WebGL ?
2011-05-10/a>Swa FrantzenChanging MO in scamming our users ?
2011-05-06/a>Richard PorterUpdated Exploit Index for Microsoft
2011-04-28/a>Chris MohanGathering and use of location information fears - or is it all a bit too late
2011-04-26/a>John BambenekIs the Insider Threat Really Over?
2011-04-25/a>Rob VandenBrinkSony PlayStation Network Outage - Day 5
2011-04-23/a>Manuel Humberto Santander PelaezImage search can lead to malware download
2011-04-22/a>Manuel Humberto Santander PelaeziPhoneMap: iPhoneTracker port to Linux
2011-04-21/a>Guy BruneauSilverlight Update Available
2011-04-20/a>Johannes UllrichiPhone GPS Data Storage
2011-04-11/a>Johannes UllrichGMail User Using 2FA Warned of Access From China
2011-04-07/a>Chris MohanBeing a good internet neighbour
2011-04-03/a>Richard PorterExtreme Disclosure? Not yet but a great trend!
2011-03-29/a>Daniel WesemannMaking sense of RSA ACE server audit logs
2011-03-22/a>Chris MohanRead only USB stick trick
2011-03-14/a>Bojan ZdrnjaTsunami in Japan and self modifying RogueAV code
2011-03-11/a>Guy BruneauSnort IDS Sensor with Sguil Framework ISO
2011-03-09/a>Kevin ShorttAVG Anti-Virus 2011 False Positives - Luhe.Exploit.PDF.B
2011-03-07/a>Bojan ZdrnjaOracle padding attacks (Codegate crypto 400 writeup)
2011-03-03/a>Manuel Humberto Santander PelaezRogue apps inside Android Marketplace
2011-02-28/a>Deborah HalePossible Botnet Scanning
2011-02-22/a>Bojan ZdrnjaHBGary hack: lessons learned
2011-02-11/a>Kevin Johnson Two-Factor Auth: Can we just Google the response?
2011-02-09/a>Mark HofmanAdobe Patches (shockwave, Flash, Reader & Coldfusion)
2011-02-08/a>Johannes UllrichTippingpoint Releases Details on Unpatched Bugs
2011-02-07/a>Richard PorterCrime is still Crime! Pt 2
2011-02-02/a>Johannes UllrichHaving Phish on Friday
2011-01-30/a>Richard PorterThe Modern Dark Ages?
2011-01-29/a>Mark HofmanSourceforge attack
2011-01-25/a>Chris MohanReviewing our preconceptions
2011-01-24/a>Rob VandenBrinkWhere have all the COM Ports Gone? - How enumerating COM ports led to me finding a “misplaced” Microsoft tool
2011-01-13/a>Rob VandenBrinkIs Infosec seeing "Death by a Thousand Budget Cuts"?
2011-01-13/a>Rob VandenBrinkGoogle Chrome 8.0.552.237 and Chrome OS 8.0.552.334 released ==> http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html and http://www.kb.cert.org/vuls/id/258423
2011-01-12/a>Richard PorterHas Big Brother gone Global?
2011-01-12/a>Richard PorterYet Another Data Broker? AOL Lifestream.
2011-01-10/a>Manuel Humberto Santander PelaezVirusTotal VTzilla firefox/chrome plugin
2010-12-30/a>Rick WannerObvious Lessons from the Skype outage
2010-12-29/a>Daniel WesemannBeware of strange web sites bearing gifts ...
2010-12-24/a>Daniel WesemannA question of class
2010-12-23/a>Mark HofmanSkoudis' Annual Xmas Hacking Challenge - The Nightmare Before Charlie Brown's Christmas
2010-12-23/a>Mark HofmanWhite house greeting cards
2010-12-22/a>John BambenekIIS 7.5 0-Day DoS (processing FTP requests)
2010-12-15/a>Manuel Humberto Santander PelaezHP StorageWorks P2000 G3 MSA hardcoded user
2010-12-13/a>Deborah HaleGawker Media Breach of Security
2010-12-10/a>Mark HofmanMicrosoft patches
2010-12-03/a>Mark HofmanAVG Update Bricking windows 7 64 bit
2010-11-29/a>Stephen HalliPhone phishing - What you see, isn't what you get
2010-11-26/a>Mark HofmanUsing password cracking as metric/indicator for the organisation's security posture
2010-11-24/a>Bojan ZdrnjaPrivilege escalation 0-day in almost all Windows versions
2010-11-22/a>Lenny ZeltserBrand Impersonations On-Line: Brandjacking and Social Networks
2010-11-19/a>Jason LamExchanging and sharing of assessment results
2010-11-18/a>Chris CarboniStopping the ZeroAccess Rootkit
2010-11-17/a>Guy BruneauReference on Open Source Digital Forensics
2010-11-17/a>Guy BruneauCisco Unified Videoconferencing Affected by Multiple Vulnerabilities
2010-11-12/a>Guy BruneauHoneynet Forensic Challenge - Analyzing Malicious Portable Destructive Files
2010-11-11/a>Johannes UllrichOS X 10.6.5 released with security patches. Careful: issues with PGP WDE! (see PGP support forums)
2010-11-02/a>Johannes UllrichLimited Malicious Search Engine Poisoning for Election
2010-10-26/a>Pedro BuenoBe (even more) careful with public hotspots. Firesheep released yesterday. Brilliant and scary.
2010-10-22/a>Manuel Humberto Santander PelaezIntypedia project
2010-10-20/a>Jim ClausingTools updates - Oct 2010
2010-10-11/a>Adrien de BeaupreOT: Happy Thanksgiving Day Canada
2010-10-04/a>Mark HofmanOnline Voting
2010-10-03/a>Adrien de BeaupreCanada's Cyber Security Strategy released today
2010-09-28/a>Daniel WesemannSupporting the economy (in Russia and Ukraine)
2010-09-16/a>Johannes UllrichFacebook "Like Pages"
2010-09-14/a>Adrien de BeaupreBlackEnergy DDoS
2010-09-07/a>Bojan ZdrnjaSSH password authentication insight and analysis by DRG
2010-08-27/a>Mark HofmanFTP Brute Password guessing attacks
2010-08-23/a>Manuel Humberto Santander PelaezFirefox plugins to perform penetration testing activities
2010-08-23/a>Bojan ZdrnjaDLL hijacking vulnerabilities
2010-08-19/a>Rob VandenBrinkChange is Good. Change is Bad. Change is Life.
2010-08-17/a>Bojan ZdrnjaDo you like Bing? So do the RogueAV guys!
2010-08-16/a>Raul SilesBlind Elephant: A New Web Application Fingerprinting Tool
2010-08-13/a>Guy BruneauShadowserver Binary Whitelisting Service
2010-08-10/a>Daniel WesemannSSH - new brute force tool?
2010-08-07/a>Stephen HallCountdown to Tuesday...
2010-08-04/a>Tom ListonIncident Reporting - Liston's "How-To" Guide
2010-08-03/a>Johannes UllrichWhen Lightning Strikes
2010-07-29/a>Rob VandenBrinkSnort 2.8.6.1 and Snort 2.9 Beta Released
2010-07-24/a>Manuel Humberto Santander PelaezGnuPG gpgsm bug
2010-07-24/a>Manuel Humberto Santander PelaezTransmiting logon information unsecured in the network
2010-07-20/a>Manuel Humberto Santander PelaezLowering infocon back to green
2010-07-18/a>Manuel Humberto Santander PelaezSAGAN: An open-source event correlation system - Part 1: Installation
2010-07-18/a>Manuel Humberto Santander PelaezNew metasploit GUI written in Java
2010-07-13/a>Jim ClausingForensic challenge results
2010-07-13/a>Jim ClausingVMware Studio Security Update
2010-07-07/a>Kevin ShorttFacebook, Facebook, What Do YOU See?
2010-07-04/a>Manuel Humberto Santander PelaezInteresting analysis of the PHP SplObjectStorage Vulnerability
2010-07-01/a>Bojan ZdrnjaDown the RogueAV and Blackhat SEO rabbit hole (part 2)
2010-06-29/a>donald smithInteresting idea to help prevent RogueAV from using SEO without being noticed:)
2010-06-28/a>Bojan ZdrnjaDown the RogueAV and Blackhat SEO rabbit hole
2010-06-27/a>Manuel Humberto Santander PelaezStudy of clickjacking vulerabilities on popular sites
2010-06-21/a>Adrien de BeaupreGoDaddy Scam/Phish/Spam
2010-06-16/a>Kevin ShorttMaltego 3
2010-06-15/a>Manuel Humberto Santander PelaeziPhone 4 Order Security Breach Exposes Private Information
2010-06-14/a>Manuel Humberto Santander PelaezNew way of social engineering on IRC
2010-06-14/a>Manuel Humberto Santander PelaezAnother way to get protection for application-level attacks
2010-06-14/a>Manuel Humberto Santander PelaezRogue facebook application acting like a worm
2010-06-11/a>Mark Hofmanollydbg your favourite debugger version 2.0 is released If you downloaded on 2 or 3 June you'll need the fixed version from June 4. 32 bit only at this stage. 64 bit is planned for 2.01
2010-06-10/a>Deborah HaleTop 5 Social Networking Media Risks
2010-06-06/a>Manuel Humberto Santander PelaezNice OS X exploit tutorial
2010-06-04/a>Rick WannerNew Honeynet Project Forensic Challenge
2010-06-02/a>Bojan ZdrnjaClickjacking attacks on Facebook's Like plugin
2010-05-25/a>donald smithFace book “joke” leads to firing.
2010-05-22/a>Rick WannerSANS 2010 Digital Forensics Summit - APT Based Forensic Challenge
2010-05-21/a>Rick Wanner2010 Digital Forensics and Incident Response Summit
2010-05-19/a>Jason LamEFF paper about browser tracking
2010-05-15/a>Deborah HaleGoogle Acknowledges Grabbing Personal Data
2010-05-07/a>Rob VandenBrinkSecurity Awareness – Many Audiences, Many Messages (Part 2)
2010-05-06/a>Rick WannerLearn about web app hacking and defense
2010-05-04/a>Rick WannerSIFT review in the ISSA Toolsmith
2010-05-02/a>Mari NicholsZbot Social Engineering
2010-04-29/a>Bojan ZdrnjaWho needs exploits when you have social engineering?
2010-04-21/a>Guy BruneauMcAfee DAT 5958 Update Issues
2010-04-21/a>Guy BruneauGoogle Chrome Security Update v4.1.249.1059 Released: http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html
2010-04-20/a>Raul SilesAre You Ready for a Transportation Collapse...?
2010-04-19/a>Daniel WesemannLinked into scams?
2010-04-14/a>Mark HofmanAnd let the patching games continue
2010-04-13/a>Adrien de BeaupreWeb App Testing Tools
2010-04-13/a>Johannes UllrichMore Legal Threat Malware E-Mail
2010-04-12/a>Adrien de BeaupreGet yer bogons out!
2010-04-10/a>Andre LudwigNew bug/exploit for javaws
2010-04-09/a>Mark HofmanOutage Update - isc.sans.org
2010-04-07/a>Johannes Ullrichour primary datacenter is currently experiencing a network outage
2010-04-06/a>Daniel WesemannApplication Logs
2010-04-04/a>Mari NicholsFinancial Management of Cyber Risk
2010-03-30/a>Marcus SachsZigbee Analysis Tools
2010-03-28/a>Rick WannerHoneynet Project: 2010 Forensic Challenge #3
2010-03-27/a>Guy BruneauCreate a Summary of IP Addresses from PCAP Files using Unix Tools
2010-03-24/a>Kyle HaugsnessWikipedia outage
2010-03-18/a>Bojan ZdrnjaDangers of copy&paste
2010-03-15/a>Adrien de BeaupreSpamassassin Milter Plugin Remote Root Attack
2010-03-10/a>Rob VandenBrinkWhat's My Firewall Telling Me? (Part 4)
2010-03-06/a>Tony CarothersIntegration and the Security of New Technologies
2010-03-05/a>Kyle HaugsnessWhat is your firewall log telling you - responses
2010-02-26/a>Rick WannerNew version of FireBug Firefox plug-in - http://getfirebug.com/
2010-02-23/a>Mark HofmanWhat is your firewall telling you and what is TCP249?
2010-02-22/a>Rob VandenBrinkNew Risks in Penetration Testing
2010-02-20/a>Mari NicholsIs "Green IT" Defeating Security?
2010-02-17/a>Rob VandenBrinkDefining Clouds - " A Cloud by any Other Name Would be a Lot Less Confusing"
2010-02-17/a>Rob VandenBrinkCisco Security Agent Security Updates: cisco-sa-20100217-csa
2010-02-15/a>Johannes UllrichVarious Olympics Related Dangerous Google Searches
2010-02-13/a>Lorna HutchesonNetwork Traffic Analysis in Reverse
2010-02-10/a>Johannes UllrichTwitpic, EXIF and GPS: I Know Where You Did it Last Summer
2010-02-06/a>Guy BruneauOracle WebLogic Server Security Alert
2010-02-03/a>Rob VandenBrinkSupport for Legacy Browsers
2010-02-02/a>Johannes UllrichTwitter Mass Password Reset due to Phishing
2010-02-01/a>Rob VandenBrinkNMAP 5.21 - Is UDP Protocol Specific Scanning Important? Why Should I Care?
2010-01-29/a>Johannes UllrichAnalyzing isc.sans.org weblogs, part 2, RFI attacks
2010-01-27/a>Raul SilesEuropean Union Security Challenge (Campus Party 2010)
2010-01-26/a>Rob VandenBrinkVMware vSphere Hardening Guide Draft posted for public review
2010-01-20/a>Johannes UllrichWeathering the Storm Part 1: An analysis of our SANS ISC weblogs http://appsecstreetfighter.com
2010-01-19/a>Jim ClausingForensic challenges
2010-01-14/a>Bojan ZdrnjaDRG (Dragon Research Group) Distro available for general release
2010-01-14/a>Bojan ZdrnjaRogue AV exploiting Haiti earthquake
2010-01-09/a>G. N. WhiteWhat's Up With All The Port Scanning Using TCP/6000 As A Source Port?
2010-01-06/a>Guy BruneauSecure USB Flaw Exposed
2009-12-30/a>Guy BruneauReady to use IDS Sensor with Sguil
2009-12-28/a>Johannes Ullrich8 Basic Rules to Implement Secure File Uploads http://jbu.me/48 (inspired by IIS ; bug)
2009-12-17/a>Daniel Wesemannoverlay.xul is back
2009-12-16/a>Rob VandenBrinkBeware the Attack of the Christmas Greeting Cards !
2009-12-09/a>Swa FrantzenOSSEC 2.3 released
2009-12-04/a>Daniel WesemannThe economics of security advice (MSFT research paper)
2009-11-29/a>Patrick Nolan A Cloudy Weekend
2009-11-24/a>John BambenekBIND Security Advisory (DNSSEC only)
2009-11-24/a>Johannes UllrichThe ISC and DShield websites will be unavailable on Wednesday Nov 25th from 8-8:30 am EST.
2009-11-13/a>Adrien de BeaupreTLS & SSLv3 renegotiation vulnerability explained
2009-11-13/a>Adrien de BeaupreFlash Origin Policy Attack
2009-11-09/a>Chris Carboni80's Flashback on Jailbroken iPhones
2009-11-08/a>Kevin ListonEven More Thoughts on Legacy Systems
2009-11-05/a>Swa FrantzenLegacy systems
2009-11-02/a>Rob VandenBrinkMicrosoft releases v1.02 of Enhanced Mitigation Evaluation Toolkit (EMET)
2009-10-26/a>Johannes UllrichWeb honeypot Update
2009-10-26/a>Johannes UllrichToday: ISC Login bugfix day. If you have issues logging in using OpenID, please email a copy of your OpenID URL to jullrich\at\sans.edu
2009-10-23/a>donald smithCyber Security Awareness Month - Day 23 port 179 TCP - Border Gateway Protocol
2009-10-19/a>Daniel WesemannScam Email
2009-10-17/a>Rick WannerMozilla disables Microsoft plug-ins?
2009-10-17/a>Rick WannerUnusual traffic from Loopback to Unused ARIN address
2009-10-16/a>Adrien de BeaupreDisable MS09-054 patch, or Firefox Plugin?
2009-10-15/a>Deborah HaleYet another round of Viral Spam
2009-10-13/a>Daniel WesemannAdobe Reader and Acrobat - Black Tuesday continues
2009-10-08/a>Johannes UllrichFirefox Plugin Collections
2009-10-02/a>Stephen HallNew SysInternal fun for the weekend
2009-09-27/a>Stephen HallUse Emerging Threats signatures? READ THIS!
2009-09-25/a>Deborah HaleMalware delivered over Google and Yahoo Ad's?
2009-09-17/a>Bojan ZdrnjaWhy is Rogue/Fake AV so successful?
2009-09-01/a>Guy BruneauGmail Down
2009-08-31/a>Pedro BuenoMicrosoft IIS 5/6 FTP 0Day released
2009-08-28/a>Adrien de Beaupreapache.org compromised
2009-08-26/a>Johannes UllrichCisco over-the-air-provisioning skyjacking exploit
2009-08-19/a>Daniel WesemannChecking your protection
2009-08-18/a>Deborah HaleDomain tcpdump.org unavailable
2009-08-18/a>Deborah HaleWebsite compromises - what's happening?
2009-08-13/a>Jim ClausingNew and updated cheat sheets
2009-08-03/a>Mark HofmanSwitch hardening on your network
2009-07-31/a>Deborah HaleGoogle Safe Browsing
2009-07-27/a>Raul SilesNew Hacker Challenge: Prison Break - Breaking, Entering & Decoding
2009-07-17/a>John BambenekCross-Platform, Cross-Browser DoS Vulnerability
2009-07-13/a>Adrien de BeaupreSecurity Update available for Wyse Device Manager
2009-07-11/a>Marcus SachsImageshack
2009-07-02/a>Daniel WesemannTime to update updating on PCs for 3rd party apps
2009-07-02/a>Daniel WesemannUnpatched Bloatware on new PCs
2009-06-26/a>Mark HofmanPHPMYADMIN scans
2009-06-24/a>Kyle HaugsnessTCP scanning increase for 4899
2009-06-21/a>Bojan ZdrnjaApache HTTP DoS tool mitigation
2009-06-16/a>John BambenekIran Internet Blackout: Using Twitter for Operational Intelligence
2009-06-16/a>John BambenekURL Shortening Service Cligs Hacked
2009-06-12/a>Adrien de BeaupreGoogle updates for Chrome
2009-06-12/a>Adrien de BeaupreGreen Dam
2009-06-11/a>Rick WannerMIR-ROR Motile Incident Response - Respond Objectively Remediate
2009-06-11/a>Rick WannerWHO Declares Flu A(H1N1) a Pandemic
2009-06-09/a>Swa FrantzenAdobe June Black Tuesday upgrades
2009-06-04/a>Raul SilesTargeted e-mail attacks asking to verify wire transfer details
2009-06-01/a>G. N. WhiteYet another "Digital Certificate" malware campaign
2009-05-28/a>Jim ClausingStego in TCP retransmissions
2009-05-24/a>Raul SilesFacebook phising using Belgium (.be) domains
2009-05-22/a>Mark HofmanPatching and Adobe
2009-05-22/a>Mark HofmanPatching and Apple - Java issue
2009-05-21/a>Adrien de BeaupreGumblar analysis and writeup
2009-05-19/a>Rick WannerNew Version of Mandiant Highlighter
2009-05-18/a>Rick WannerCisco SAFE Security Reference Guide Updated
2009-05-18/a>Rick WannerJSRedir-R/Gumblar badness
2009-05-12/a>Swa FrantzenApple patches and updates
2009-05-04/a>Tom ListonFacebook phishing malware
2009-05-01/a>Adrien de BeaupreIncident Management
2009-04-26/a>Johannes UllrichOdd DNS Resolution for Google via OpenDNS
2009-04-24/a>Pedro BuenoDid you check your conference goodies?
2009-04-21/a>Bojan ZdrnjaWeb application vulnerabilities
2009-04-20/a>Jason LamDigital Content on TV
2009-04-16/a>Adrien de BeaupreIncident Response vs. Incident Handling
2009-04-16/a>Adrien de BeaupreStrange Windows Event Log entry
2009-04-10/a>Stephen HallHosted javascript leading to .cn PDF malware
2009-04-09/a>Johannes UllrichConficker update with payload
2009-04-03/a>Johannes UllrichCyber Security Act of 2009
2009-04-02/a>Handlers A view from the CWG Trenches
2009-03-27/a>Mark HofmanThere is some SMiShing going on in the EU
2009-03-26/a>Mark HofmanWebhoneypot fun
2009-03-20/a>donald smithStealthier then a MBR rootkit, more powerful then ring 0 control, it’s the soon to be developed SMM root kit.
2009-03-11/a>Bojan ZdrnjaMassive ARP spoofing attacks on web sites
2009-03-10/a>Swa FrantzenBrowser plug-ins, transparent proxies and same origin policies
2009-03-01/a>Jim ClausingCool combination of tools
2009-02-25/a>Swa FrantzenTargeted link diversion attempts
2009-02-24/a>G. N. WhiteGmail Access Issues Early This AM
2009-02-20/a>Mark HofmanPhishing with a small twist
2009-02-05/a>Rick WannerMandiant Memoryze review, Hilighter, other Mandiant tools!
2009-02-01/a>Chris CarboniScanning for Trixbox vulnerabilities
2009-01-31/a>Swa FrantzenDNS DDoS - let's use a long term solution
2009-01-31/a>John BambenekGoogle Search Engine's Malware Detection Broken
2009-01-20/a>Adrien de BeaupreObamamania
2009-01-18/a>Maarten Van HorenbeeckTargeted social engineering
2009-01-12/a>William SaluskyWeb Application Firewalls (WAF) - Have you deployed WAF technology?
2009-01-11/a>Deborah HaleThe Frustration of Phishing Attacks
2009-01-09/a>Johannes UllrichSANS Log Management Survey
2009-01-07/a>William SaluskyBIND 9.x security patch - resolves potentially new DNS poisoning vector
2009-01-04/a>Rick WannerTwitter/Facebook Phishing Attempt
2008-12-28/a>Raul SilesLevel3 Outage?
2008-12-28/a>Raul SilesAT&T Wireless Outage
2008-12-12/a>Swa FrantzenBrowser Security Handbook
2008-12-02/a>Deborah HaleSonicwall License Manager Failure
2008-11-25/a>Andre LudwigOS X Dns Changers part three
2008-11-25/a>Andre LudwigTmobile G1 handsets having DNS problems?
2008-11-25/a>Andre LudwigThe beginnings of a collaborative approach to IDS
2008-11-12/a>John BambenekThoughts on Security Intelligence (McColo Corp alleged spam/malware host knocked offline)
2008-11-11/a>Swa FrantzenPhishing for Google adwords
2008-11-05/a>donald smithIf you missed President Elect Obamas speech have some malware instead
2008-11-02/a>Adrien de BeaupreDaylight saving time
2008-10-31/a>Rick WannerSprint-Cogent Peering Issue
2008-10-31/a>Rick WannerDay 31 - Legal Awareness
2008-10-30/a>Kevin ListonMaking Intelligence Actionable: Part 2
2008-10-29/a>Deborah HaleDay 29 - Should I Switch Software Vendors?
2008-10-29/a>Deborah HaleEnom Phishing - Caution Enom Registrars
2008-10-20/a>Raul SilesGoogle Webmaster Tools warning about hackable sites
2008-10-20/a>Johannes UllrichFraudulent ATM Reactivation Phone Calls.
2008-10-17/a>Patrick NolanDay 17 - Containing a DNS Hijacking
2008-10-10/a>Marcus SachsFake Microsoft Update Email
2008-10-08/a>Johannes UllrichDomaincontrol (GoDaddy) Nameservers DNS Poisoning
2008-10-07/a>Kyle HaugsnessCogent peering problems
2008-09-22/a>Maarten Van HorenbeeckData exfiltration and the use of anonymity providers
2008-09-20/a>Rick WannerNew (to me) nmap Features
2008-09-18/a>Bojan ZdrnjaMonitoring HTTP User-Agent fields
2008-09-16/a>donald smithDon't open that invoice.zip file its not from UPS
2008-09-03/a>donald smithNew bgp hijack isn't very new.
2008-08-19/a>Johannes UllrichA morning stroll through my web logs
2008-08-15/a>Jim ClausingOMFW 2008 reflections
2008-08-14/a>Mari NicholsSBC Outage?
2008-08-09/a>Deborah HaleCleveland Outage
2008-08-05/a>Daniel WesemannWatching those DNS logs
2008-08-02/a>Maarten Van HorenbeeckA little of that human touch
2008-07-29/a>Kyle HaugsnessGoogle SSL cert expired for POP/IMAP users
2008-07-18/a>Adrien de BeaupreExit process?
2008-07-11/a>Jim ClausingAnd you thought the DNS issue was an old one...
2008-07-09/a>Johannes UllrichUnpatched Word Vulnerability
2008-07-08/a>Swa FrantzenSecurity implications in HVAC equipment
2008-07-08/a>Johannes UllrichMulitple Vendors DNS Spoofing Vulnerability
2008-07-07/a>Pedro BuenoBad url classification
2008-06-24/a>Jason LamSQL Injection mitigation in ASP
2008-06-23/a>donald smithPreventing SQL injection
2008-06-18/a>Chris CarboniCisco Security Advisory
2008-06-17/a>Kyle HaugsnessWhy go high-tech?
2008-06-10/a>Swa FrantzenRansomware keybreaking
2008-06-09/a>Scott FendleySo Where Are Those OpenSSH Key-based Attacks?
2008-06-02/a>Jim ClausingEmergingthreats.net and ThePlanet
2008-06-01/a>Mark HofmanFree Yahoo email account! Sign me up, Ok well maybe not.
2008-06-01/a>Swa FrantzenThe Planet outage - what can we all learn from it?
2008-05-26/a>Marcus SachsPredictable Response
2008-05-22/a>Chris CarboniFrom the mailbag
2008-05-19/a>Maarten Van HorenbeeckText message and telephone aid scams
2008-05-19/a>Maarten Van HorenbeeckRoute filtering and its impact on the DNS fabric
2008-05-15/a>Bojan ZdrnjaDebian and Ubuntu users: fix your keys/certificates NOW
2008-05-15/a>Bojan ZdrnjaINFOCon yellow: update your Debian generated keys/certs ASAP
2008-04-24/a>Maarten Van HorenbeeckTargeted attacks using malicious PDF files
2008-04-23/a>Mari NicholsWhat's New, Old and Morphing?
2008-04-16/a>William StearnsPasser, a aassive machine and service sniffer
2008-04-14/a>John BambenekA Federal Subpoena or Just Some More Spam & Malware?
2008-04-11/a>John BambenekADSL Router / Cable Modem / Home Wireless AP Hardening in 5 Steps
2008-04-10/a>Deborah HaleSymantec Threatcon Level 2
2008-04-08/a>Swa FrantzenSymantec's Global Internet Security Threat Report
2008-04-07/a>John BambenekNetwork Solutions Technical Difficulties? Enom too
2008-04-06/a>Tony CarothersHappenings in the Northeast US
2008-04-04/a>Daniel WesemannTax day scams
2008-03-30/a>Mark HofmanMail Anyone?
2008-03-27/a>Maarten Van HorenbeeckGuarding the guardians: a story of PGP key ring theft
2008-03-25/a>Raul SilesNew Security Challenge - It Happened One Friday
2008-03-23/a>Johannes UllrichFinding hidden gems (easter eggs) in your logs (packet challenge!)
2008-03-12/a>Joel EslerDon't use G-Archiver
2008-03-12/a>Joel EslerAdobe security updates
2007-01-03/a>Toby KohlenbergVLC Media Player udp URL handler Format String Vulnerability
2006-12-12/a>Swa FrantzenOffline Microsoft Patching
2006-10-05/a>John BambenekThere are no more Passive Exploits
2006-10-02/a>Jim ClausingReader's tip of the day: ratios vs. raw counts
2006-09-19/a>Swa FrantzenYet another MSIE 0-day: VML
2006-09-18/a>Jim ClausingLog analysis follow up
2006-09-12/a>Swa FrantzenAdobe Flash player upgrade time
2006-09-09/a>Jim ClausingLog Analysis tips?
2006-09-09/a>Jim ClausingNew feature at isc.sans.org
2006-09-09/a>Jim ClausingA few preliminary log analysis thoughts
2006-08-31/a>Swa FrantzenMailbag grab