Threat Level: green Handler on Duty: Rob VandenBrink

SANS ISC Diaries by Keyword


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
DateAuthorTitle

WINDOWS 8

2014-04-04Rob VandenBrinkWindows 8.1 Released
2012-05-06Jim ClausingTool updates and Win 8

WINDOWS

2014-08-15/a>Tom WebbAppLocker Event Logs with OSSEC 2.8
2014-07-05/a>Guy BruneauJava Support ends for Windows XP
2014-04-06/a>Basil Alawi S.Taher"Power Worm" PowerShell based Malware
2014-04-04/a>Rob VandenBrinkWindows 8.1 Released
2014-03-24/a>Johannes UllrichNew Microsoft Advisory: Unpatched Word Flaw used in Targeted Attacks
2014-03-04/a>Daniel WesemannXPired!
2014-01-10/a>Basil Alawi S.TaherWindows Autorun-3
2014-01-04/a>Tom WebbMonitoring Windows Networks Using Syslog (Part One)
2013-10-30/a>Russ McReeSIR v15: Five good reasons to leave Windows XP behind
2013-03-19/a>Johannes UllrichWindows 7 SP1 and Windows Server 2008 R2 SP1 Being "pushed" today
2013-02-28/a>Daniel WesemannParsing Windows Eventlogs in Powershell
2012-10-24/a>Rob VandenBrinkTime to run Windows Update - - Microsoft Updates KB2755801 for Windows RT / IE10 / Flash Player - http://technet.microsoft.com/en-us/security/advisory/2755801
2012-07-19/a>Mark BaggettDiagnosing Malware with Resource Monitor
2012-06-25/a>Guy BruneauIssues with Windows Update Agent
2012-05-08/a>Bojan ZdrnjaWindows Firewall Bypass Vulnerability and NetBIOS NS
2012-05-06/a>Jim ClausingTool updates and Win 8
2012-04-10/a>Swa FrantzenWindows Vista RIP
2011-12-21/a>Johannes UllrichNew Vulnerability in Windows 7 64 bit
2011-07-09/a>Chris MohanSafer Windows Incident Response
2011-06-30/a>Rob VandenBrinkUpdate for RSA Authentication Manager
2011-06-01/a>Johannes UllrichEnabling Privacy Enhanced Addresses for IPv6
2011-03-27/a>Guy BruneauStrange Shockwave File with Surprising Attachments
2011-03-15/a>Lenny ZeltserLimiting Exploit Capabilities by Using Windows Integrity Levels
2011-02-24/a>Johannes UllrichWindows 7 / 2008 R2 Service Pack 1 Problems
2011-02-23/a>Johannes UllrichWindows 7 Service Pack 1 out
2011-02-16/a>Jason LamWindows 0-day SMB mrxsmb.dll vulnerability
2011-02-10/a>Chris MohanBefriending Windows Security Log Events
2011-01-24/a>Rob VandenBrinkWhere have all the COM Ports Gone? - How enumerating COM ports led to me finding a “misplaced” Microsoft tool
2011-01-04/a>Johannes UllrichMicrosoft Advisory: Vulnerability in Graphics Rendering Engine
2010-11-24/a>Bojan ZdrnjaPrivilege escalation 0-day in almost all Windows versions
2010-08-02/a>Manuel Humberto Santander PelaezSecuring Windows Internet Kiosk
2010-06-15/a>Manuel Humberto Santander PelaezMicrosoft Windows Help and Support Center vulnerability (CVE 2010-1885) exploit in the wild
2010-02-11/a>Deborah HaleThe Mysterious Blue Screen
2009-11-14/a>Adrien de BeaupreMicrosoft advisory for Windows 7 / Windows Server 2008 R2 Remote SMB DoS Exploit released
2009-11-12/a>Rob VandenBrinkWindows 7 / Windows Server 2008 Remote SMB Exploit
2009-10-24/a>Marcus SachsWindows 7 - How is it doing?
2009-09-08/a>Guy BruneauVista/2008/Windows 7 SMB2 BSOD 0Day
2009-08-26/a>Johannes UllrichWSUS 3.0 SP2 released
2009-07-16/a>Guy BruneauChanges in Windows Security Center
2009-07-02/a>Daniel WesemannTime to update updating on PCs for 3rd party apps
2009-04-16/a>Adrien de BeaupreStrange Windows Event Log entry
2009-01-31/a>Swa FrantzenWindows 7 - not so secure ?
2008-08-15/a>Jim ClausingOMFW 2008 reflections
2008-06-12/a>Bojan ZdrnjaSafari on Windows - not looking good
2008-05-17/a>Lorna HutchesonXP SP3 Issues
2008-05-06/a>John BambenekWindows XP Service Pack 3 Released
2008-05-01/a>Adrien de BeaupreWindows XP SteadyState
2008-04-29/a>Bojan ZdrnjaWindows Service Pack blocker tool
2008-04-16/a>William StearnsWindows XP Service Pack 3 - unofficial schedule: Apr 21-28
2007-01-03/a>Toby KohlenbergVLC Media Player udp URL handler Format String Vulnerability

8

2014-05-26/a>Tony CarothersNIST 800 Series Publications - New and Improved
2014-04-04/a>Rob VandenBrinkWindows 8.1 Released
2014-02-27/a>Richard PorterDDoS and BCP 38
2013-11-09/a>Guy BruneauIE Zero-Day Vulnerability Exploiting msvcrt.dll
2013-10-01/a>John Bambenek*Metaspoit Releases Module to Exploit Unpatched IE Vuln CVE-2013-3893
2013-09-20/a>Russ McReeThreat Level Yellow: Protection recommendations regarding Internet Explorer exploits in the wild
2013-09-18/a>Rob VandenBrinkCisco DCNM Update Released
2013-09-17/a>John BambenekMicrosoft Releases Out-of-Band Advisory for all Versions of Internet Explorer
2013-06-01/a>Guy BruneauExploit Sample for Win32/CVE-2012-0158
2013-05-20/a>Guy BruneauSafe - Tools, Tactics and Techniques
2013-05-04/a>Kevin ShorttThe Zero-Day Pendulum Swings
2013-04-21/a>John BambenekA Chargen-based DDoS? Chargen is still a thing?
2013-02-19/a>Johannes UllrichAPT1, Unit 61398 and are state sponsored attacks real
2012-09-21/a>Guy BruneauIE Cumulative Updates MS12-063 - KB2744842
2012-09-21/a>Guy BruneauUpdate for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 (2755801)
2012-09-17/a>Rob VandenBrinkIE Zero Day is "For Real"
2012-07-25/a>Johannes UllrichApple OS X 10.8 (Mountain Lion) released
2012-06-18/a>Guy BruneauCVE-2012-1875 exploit is now available
2012-05-16/a>Johannes UllrichGot Packets? Odd duplicate DNS replies from 10.x IP Addresses
2012-05-16/a>Johannes UllrichReserved IP Address Space Reminder
2012-05-06/a>Jim ClausingTool updates and Win 8
2012-01-12/a>Rob VandenBrinkPHP 5.39 was release on the 10th, amongst other things, it addresses CVE-2011-4885 (prevents attacks based on hash collisions) and CVE-2011-4566 (integer overflow when parsing invalid exif header)
2011-10-06/a>Rob VandenBrinkApache HTTP Server mod_proxy reverse proxy issue
2011-08-29/a>Kevin ShorttInternet Worm in the Wild
2011-08-25/a>Kevin ShorttIncreased Traffic on Port 3389
2011-08-03/a>Johannes UllrichPort 3389 / terminal services scans
2011-06-30/a>Rob VandenBrinkUpdate for RSA Authentication Manager
2011-04-28/a>Guy BruneauVMware ESXi 4.1 Security and Firmware Updates
2011-01-15/a>Jim ClausingWhat's up with port 8881?
2010-11-16/a>Guy Bruneau OpenSSL TLS Extension Parsing Race Condition
2010-09-13/a>Manuel Humberto Santander PelaezAdobe SING table parsing exploit (CVE-2010-2883) in the wild
2010-09-08/a>John BambenekAdobe Acrobat/Reader 0-day in Wild, Adobe Issues Advisory
2010-07-29/a>Rob VandenBrinkSnort 2.8.6.1 and Snort 2.9 Beta Released
2010-07-26/a>Guy BruneauSophosLabs Released Free Tool to Validate Microsoft Shortcut
2010-07-20/a>Manuel Humberto Santander PelaezLNK vulnerability now with Metasploit module implementing the WebDAV method
2010-06-15/a>Manuel Humberto Santander PelaezMicrosoft Windows Help and Support Center vulnerability (CVE 2010-1885) exploit in the wild
2010-03-10/a>Rob VandenBrinkMicrosoft re-release of KB973811 - attacks on Extended Protection for Authentication
2010-01-12/a>Adrien de BeauprePoC for CVE-2009-0689 MacOS X 10.5/10.6 vulnerability
2009-11-14/a>Adrien de BeaupreMicrosoft advisory for Windows 7 / Windows Server 2008 R2 Remote SMB DoS Exploit released
2009-11-12/a>Rob VandenBrinkWindows 7 / Windows Server 2008 Remote SMB Exploit
2009-10-30/a>Rob VandenBrinkNew version of NIST 800-41, Firewalls and Firewall Policy Guidelines
2009-10-25/a>Lorna HutchesonCyber Security Awareness Month - Day 25 - Port 80 and 443
2009-10-09/a>Rob VandenBrinkCyber Security Awareness Month - Day 9 - Port 3389/tcp (RDP)
2009-10-06/a>Adrien de BeaupreCyber Security Awareness Month - Day 6 ports 67&68 udp - bootp and dhcp
2009-08-28/a>Adrien de BeaupreWPA with TKIP done
2009-03-28/a>Rick WannerNew Beta release of Nmap
2009-03-27/a>David GoldsmithFirefox 3.0.8 Released
2009-03-24/a>G. N. WhiteCanSecWest Pwn2Own: Would IE8 have been exploitable had the event waited one more day?
2009-03-19/a>Mark HofmanBrace yourselves - IE8 reported to be released
2009-03-19/a>Mark HofmanBrowsers Tumble at CanSecWest
2009-02-13/a>Andre LudwigThird party information on conficker
2009-01-12/a>William SaluskyDownadup / Conficker - MS08-067 exploit and Windows domain account lockout
2008-11-04/a>Marcus SachsCyber Security Awareness Month 2008 - Summary and Links
2008-11-03/a>Joel EslerDay 34 -- Feeding The Lessons Learned Back to the Preparation Phase
2008-11-02/a>Mari NicholsDay 33 - Working with Management to Improve Processes
2008-11-01/a>Koon Yaw TanDay 32 - What Should I Make Public?
2008-10-31/a>Rick WannerDay 31 - Legal Awareness
2008-10-30/a>Kevin ListonDay 30 - Applying Patches and Updates
2008-10-29/a>Deborah HaleDay 29 - Should I Switch Software Vendors?
2008-10-28/a>Jason LamDay 28 - Avoiding Finger Pointing and the Blame Game
2008-10-27/a>Johannes UllrichDay 27 - Validation via Vulnerability Scanning
2008-10-25/a>Koon Yaw TanDay 25 - Finding and Removing Hidden Files and Directories
2008-10-25/a>Rick WannerDay 26 - Restoring Systems from Backup
2008-10-24/a>Stephen HallDay 24 - Cleaning Email Servers and Clients
2008-10-22/a>Johannes UllrichDay 22 - Wiping Disks and Media
2008-10-22/a>Chris CarboniDay 23 - Turning off Unused Services
2008-10-21/a>Johannes UllrichDay 21 - Removing Bots, Keyloggers, and Spyware
2008-10-20/a>Raul SilesDay 20 - Eradicating a Rootkit
2008-10-19/a>Lorna HutchesonDay 19 - Eradication: Forensic Analysis Tools - What Happened?
2008-10-17/a>Patrick NolanDay 17 - Containing a DNS Hijacking
2008-10-17/a>Rick WannerDay 18 - Containing Other Incidents
2008-10-16/a>Mark HofmanDay 16 - Containing a Malware Outbreak
2008-10-15/a>Rick WannerDay 15 - Containing the Damage From a Lost or Stolen Laptop
2008-10-14/a>Swa FrantzenDay 14 - Containment: a Personal IdentityTheft Incident
2008-10-13/a>Adrien de BeaupreDay 13 - Containment: Containing on Production Systems Such as a Web Server
2008-10-12/a>Mari NicholsDay 12 Containment: Gathering Evidence That Can be Used in Court
2008-10-11/a>Stephen HallDay 11 - Identification: Other Methods of Identifying an Incident
2008-10-10/a>Marcus SachsDay 10 - Identification: Using Your Help Desk to Identify Security Incidents
2008-10-09/a>Marcus SachsDay 9 - Identification: Log and Audit Analysis
2008-10-08/a>Johannes UllrichDay 8 - Global Incident Awareness
2008-10-07/a>Kyle HaugsnessDay 7 - Identification: Host-based Intrusion Detection Systems
2008-10-06/a>Jim ClausingDay 6 - Network-based Intrusion Detection Systems
2008-10-05/a>Stephen HallDay 5 - Identification: Events versus Incidents
2008-10-04/a>Marcus SachsDay 4 - Preparation: What Goes Into a Response Kit
2008-10-03/a>Jason LamDay 3 - Preparation: Building Checklists
2008-10-02/a>Marcus SachsDay 2 - Preparation: Building a Response Team
2008-10-01/a>Marcus SachsDay 1 - Preparation: Policies, Management Support, and User Awareness
2008-09-30/a>Marcus SachsCyber Security Awareness Month - Daily Topics
2008-08-22/a>Patrick NolanMS08-051 V2.0 Patch issued August 20, 2008
2008-08-15/a>Jim ClausingAnother MS update that may have escaped notice
2008-04-10/a>Deborah HaleSymantec Threatcon Level 2
2006-09-19/a>Swa FrantzenYet another MSIE 0-day: VML