Date Author Title

BUG IN TRANSPORT QUEUE

2022-01-02Guy BruneauExchange Server - Email Trapped in Transport Queues

BUG

2022-08-23/a>Xavier MertensWho's Looking at Your security.txt File?
2022-01-02/a>Guy BruneauExchange Server - Email Trapped in Transport Queues
2021-09-29/a>Yee Ching TokKeeping Track of Time: Network Time Protocol and a GPSD Bug
2021-08-20/a>Xavier MertensWaiting for the C2 to Show Up
2021-07-06/a>Xavier MertensPython DLL Injection Check
2021-05-21/a>Xavier MertensLocking Kernel32.dll As Anti-Debugging Technique
2021-01-30/a>Guy BruneauWireshark 3.2.11 is now available which contains Bug Fixes - https://www.wireshark.org
2020-09-24/a>Xavier MertensParty in Ibiza with PowerShell
2020-06-11/a>Xavier MertensAnti-Debugging JavaScript Techniques
2020-06-04/a>Xavier MertensAnti-Debugging Technique based on Memory Protection
2017-02-25/a>Guy BruneauUnpatched Microsoft Edge and IE Bug
2016-02-27/a>Guy BruneauWireshark Fixes Several Bugs and Vulnerabilities
2015-02-12/a>Johannes UllrichDid You Remove That Debug Code? Netatmo Weather Station Sending WPA Passphrase in the Clear
2014-09-19/a>Guy BruneauPHP Fixes Several Bugs in Version 5.4 and 5.5
2014-04-08/a>Guy BruneauOpenSSL CVE-2014-0160 Fixed
2013-07-28/a>Guy BruneauWireshark 1.8.9 and 1.10.1 Security Update
2013-06-22/a>Guy BruneauFacebook Reports a Potential Leak of User Data
2012-03-27/a>Guy BruneauWireshark 1.6.6 and 1.4.2 Released
2012-03-27/a>Guy BruneauOpera 11.62 for Windows patch several bugs and vulnerabilities - http://www.opera.com/docs/changelogs/windows/1162/
2010-12-22/a>John BambenekIIS 7.5 0-Day DoS (processing FTP requests)
2010-04-10/a>Andre LudwigNew bug/exploit for javaws
2010-02-26/a>Rick WannerNew version of FireBug Firefox plug-in - http://getfirebug.com/
2009-12-28/a>Johannes Ullrich8 Basic Rules to Implement Secure File Uploads http://jbu.me/48 (inspired by IIS ; bug)
2009-10-26/a>Johannes UllrichToday: ISC Login bugfix day. If you have issues logging in using OpenID, please email a copy of your OpenID URL to jullrich\at\sans.edu
2009-08-31/a>Pedro BuenoMicrosoft IIS 5/6 FTP 0Day released
2009-07-17/a>John BambenekCross-Platform, Cross-Browser DoS Vulnerability
2008-07-11/a>Jim ClausingAnd you thought the DNS issue was an old one...

IN

2024-04-22/a>Jan KoprivaIt appears that the number of industrial devices accessible from the internet has risen by 30 thousand over the past three years
2024-04-17/a>Xavier MertensMalicious PDF File Used As Delivery Mechanism
2024-04-11/a>Yee Ching TokEvolution of Artificial Intelligence Systems and Ensuring Trustworthiness
2024-04-07/a>Guy BruneauA Use Case for Adding Threat Hunting to Your Security Operations Team. Detecting Adversaries Abusing Legitimate Tools in A Customer Environment. [Guest Diary]
2024-03-19/a>Johannes UllrichAttacker Hunting Firewalls
2024-03-17/a>Guy BruneauGamified Learning: Using Capture the Flag Challenges to Supplement Cybersecurity Training [Guest Diary]
2024-03-14/a>Jan KoprivaIncrease in the number of phishing messages pointing to IPFS and to R2 buckets
2024-03-06/a>Bojan ZdrnjaScanning and abusing the QUIC protocol
2024-02-21/a>Jan KoprivaPhishing pages hosted on archive.org
2024-02-20/a>Xavier MertensPython InfoStealer With Dynamic Sandbox Detection
2024-02-15/a>Jesse La Grew[Guest Diary] Learning by doing: Iterative adventures in troubleshooting
2024-01-31/a>Johannes UllrichThe Fun and Dangers of Top Level Domains (TLDs)
2024-01-25/a>Xavier MertensFacebook AdsManager Targeted by a Python Infostealer
2024-01-24/a>Johannes UllrichHow Bad User Interfaces Make Security Tools Harmful
2024-01-06/a>Xavier MertensAre you sure of your password?
2024-01-02/a>Johannes UllrichFingerprinting SSH Identification Strings
2023-12-31/a>Tom WebbPi-Hole Pi4 Docker Deployment
2023-12-22/a>Xavier MertensShall We Play a Game?
2023-12-06/a>Guy BruneauRevealing the Hidden Risks of QR Codes [Guest Diary]
2023-11-30/a>John BambenekProphetic Post by Intern on CVE-2023-1389 Foreshadows Mirai Botnet Expansion Today
2023-11-22/a>Guy BruneauCVE-2023-1389: A New Means to Expand Botnets
2023-11-17/a>Jan KoprivaPhishing page with trivial anti-analysis features
2023-11-15/a>Xavier MertensRedline Dropped Through MSIX Package
2023-11-09/a>Xavier MertensVisual Examples of Code Injection
2023-11-08/a>Xavier MertensExample of Phishing Campaign Project File
2023-10-29/a>Guy BruneauSpam or Phishing? Looking for Credentials & Passwords
2023-10-28/a>Xavier MertensSize Matters for Many Security Controls
2023-10-16/a>Jan KoprivaAre typos still relevant as an indicator of phishing?
2023-10-15/a>Guy BruneauDomain Name Used as Password Captured by DShield Sensor
2023-10-03/a>Tom WebbAre Local LLMs Useful in Incident Response?
2023-09-29/a>Xavier MertensAre You Still Storing Passwords In Plain Text Files?
2023-09-26/a>Jan KoprivaA new spin on the ZeroFont phishing technique
2023-09-23/a>Guy BruneauScanning for Laravel - a PHP Framework for Web Artisants
2023-09-03/a>Didier StevensAnalysis of a Defective Phishing PDF
2023-08-31/a>Jan KoprivaThe low, low cost of (committing) cybercrime
2023-08-31/a>Guy BruneauPotential Weaponizing of Honeypot Logs [Guest Diary]
2023-08-21/a>Xavier MertensQuick Malware Triage With Inotify Tools
2023-08-20/a>Guy BruneauSystemBC Malware Activity
2023-08-18/a>Xavier MertensFrom a Zalando Phishing to a RAT
2023-08-17/a>Jesse La GrewCommand Line Parsing - Are These Really Unique Strings?
2023-08-11/a>Xavier MertensShow me All Your Windows!
2023-07-24/a>Rob VandenBrinkJQ: Another Tool We Thought We Knew
2023-07-18/a>Johannes UllrichExploit Attempts for "Stagil navigation for Jira Menus & Themes" CVE-2023-26255 and CVE-2023-26256
2023-07-13/a>Jesse La GrewDShield Honeypot Maintenance and Data Retention
2023-07-01/a>Russ McReeSandfly Security
2023-06-29/a>Brad DuncanGuLoader- or DBatLoader/ModiLoader-style infection for Remcos RAT
2023-06-21/a>Yee Ching TokAnalyzing a YouTube Sponsorship Phishing Mail and Malware Targeting Content Creators
2023-06-19/a>Xavier MertensMalware Delivered Through .inf File
2023-06-16/a>Xavier MertensAnother RAT Delivered Through VBS
2023-05-30/a>Johannes UllrichYour Business Data and Machine Learning at Risk: Attacks Against Apache NiFi
2023-05-28/a>Guy BruneauWe Can no Longer Ignore the Cost of Cybersecurity
2023-05-26/a>Xavier MertensUsing DFIR Techniques To Recover From Infrastructure Outages
2023-05-24/a>Tom WebbIR Case/Alert Management
2023-05-20/a>Xavier MertensPhishing Kit Collecting Victim's IP Address
2023-05-19/a>Xavier MertensWhen the Phisher Messes Up With Encoding
2023-05-15/a>Jan KoprivaOngoing Facebook phishing campaign without a sender and (almost) without links
2023-05-04/a>Xavier MertensInfostealer Embedded in a Word Document
2023-05-01/a>Jan Kopriva"Passive" analysis of a phishing attachment
2023-04-26/a>Yee Ching TokStrolling through Cyberspace and Hunting for Phishing Sites
2023-04-17/a>Jan KoprivaThe strange case of Great honeypot of China
2023-04-08/a>Xavier MertensMicrosoft Netlogon: Potential Upcoming Impacts of CVE-2022-38023
2023-04-03/a>Johannes UllrichTax Season Risks
2023-03-31/a>Guy BruneauUsing Linux grep and Windows findstr to Manipulate Files
2023-03-31/a>Jan KoprivaUse of X-Frame-Options and CSP frame-ancestors security headers on 1 million most popular domains
2023-03-25/a>Guy BruneauMicrosoft Released an Update for Windows Snipping Tool Vulnerability
2023-03-22/a>Didier StevensWindows 11 Snipping Tool Privacy Bug: Inspecting PNG Files
2023-03-20/a>Xavier MertensFrom Phishing Kit To Telegram... or Not!
2023-03-15/a>Jan KoprivaIPFS phishing and the need for correctly set HTTP security headers
2023-03-12/a>Guy BruneauAsynRAT Trojan - Bill Payment (Pago de la factura)
2023-03-11/a>Xavier MertensOverview of a Mirai Payload Generator
2023-03-01/a>Xavier MertensPython Infostealer Targeting Gamers
2023-02-27/a>Xavier MertensPhishing Again and Again
2023-02-21/a>Xavier MertensPhishing Page Branded with Your Corporate Website
2023-02-19/a>Didier Stevens"Unsupported 16-bit Application" or HTML?
2023-02-18/a>Guy BruneauSpear Phishing Handlers for Username/Password
2023-02-16/a>Jan KoprivaHTML phishing attachment with browser-in-the-browser technique
2023-02-13/a>Johannes UllrichVenmo Phishing Abusing LinkedIn "slink"
2023-02-10/a>Xavier MertensObfuscated Deactivation of Script Block Logging
2023-02-09/a>Xavier MertensA Backdoor with Smart Screenshot Capability
2023-02-04/a>Guy BruneauAssemblyline as a Malware Analysis Sandbox
2023-01-28/a>Didier StevensSysinternals Updates: RDCMan v2.92, Sysmon v14.14, and ZoomIt v6.12
2023-01-26/a>Tom WebbLive Linux IR with UAC
2023-01-23/a>Xavier MertensWho's Resolving This Domain?
2023-01-21/a>Guy BruneauDShield Sensor JSON Log to Elasticsearch
2023-01-15/a>Johannes UllrichElon Musk Themed Crypto Scams Flooding YouTube Today
2023-01-08/a>Guy BruneauDShield Sensor JSON Log Analysis
2023-01-02/a>Xavier MertensNetworkMiner 2.8 Released
2022-12-21/a>Guy BruneauDShield Sensor Setup in Azure
2022-12-20/a>Xavier MertensLinux File System Monitoring & Actions
2022-12-19/a>Xavier MertensHunting for Mastodon Servers
2022-12-18/a>Guy BruneauInfostealer Malware with Double Extension
2022-12-04/a>Didier StevensFinger.exe LOLBin
2022-12-03/a>Guy BruneauLinux LOLBins Applications Available in Windows
2022-12-02/a>Brad Duncanobama224 distribution Qakbot tries .vhd (virtual hard disk) images
2022-11-29/a>Johannes UllrichIdentifying Groups of "Bot" Accounts on LinkedIn
2022-11-28/a>Johannes UllrichUkraine Themed Twitter Spam Pushing iOS Scareware
2022-11-24/a>Xavier MertensAttackers Keep Phishing Victims Under Stress
2022-11-19/a>Guy BruneauMcAfee Fake Antivirus Phishing Campaign is Back!
2022-11-10/a>Xavier MertensDo you collect "Observables" or "IOCs"?
2022-11-05/a>Guy BruneauWindows Malware with VHD Extension
2022-11-02/a>Rob VandenBrinkBreakpoints in Burp
2022-10-30/a>Didier StevensSysinternals Updates: Process Explorer v17.0, Handle v5.0, Process Monitor v3.92 and Sysmon v14.11
2022-10-27/a>Tom WebbSupersizing your DUO and 365 Integration
2022-10-19/a>Xavier MertensAre Internet Scanning Services Good or Bad for You?
2022-10-15/a>Guy BruneauMalware - Covid Vaccination Supplier Declaration
2022-10-07/a>Xavier MertensPowershell Backdoor with DGA Capability
2022-10-07/a>Xavier MertensCritical Fortinet Vulnerability Ahead
2022-10-04/a>Johannes UllrichCredential Harvesting with Telegram API
2022-09-21/a>Xavier MertensPhishing Campaigns Use Free Online Resources
2022-09-19/a>Russ McReeChainsaw: Hunt, search, and extract event log records
2022-09-15/a>Xavier MertensMalicious Word Document with a Frameset
2022-09-14/a>Xavier MertensEasy Process Injection within Python
2022-09-10/a>Guy BruneauPhishing Word Documents with Suspicious URL
2022-08-28/a>Didier StevensSysinternals Updates: Sysmon v14.0 and ZoomIt v6.01
2022-08-26/a>Xavier MertensPaypal Phishing/Coinbase in One Image
2022-08-26/a>Guy BruneauHTTP/2 Packet Analysis with Wireshark
2022-08-13/a>Guy BruneauPhishing HTML Attachment as Voicemail Audio Transcription
2022-08-11/a>Xavier MertensInfoStealer Script Based on Curl and NSudo
2022-08-02/a>Johannes UllrichA Little DDoS in the Morning - Followup
2022-08-02/a>Johannes UllrichIncrease in Chinese "Hacktivism" Attacks
2022-08-01/a>Johannes UllrichA Little DDoS In the Morning
2022-07-28/a>Johannes UllrichExfiltrating Data With Bookmarks
2022-07-25/a>Xavier MertensPowerShell Script with Fileless Capability
2022-07-23/a>Guy BruneauAnalysis of SSH Honeypot Data with PowerBI
2022-07-22/a>Yee Ching TokAn Analysis of a Discerning Phishing Website
2022-07-20/a>Xavier MertensMalicious Python Script Behaving Like a Rubber Ducky
2022-07-20/a>Johannes UllrichApple Patches Everything Day
2022-07-13/a>Xavier MertensUsing Referers to Detect Phishing Attacks
2022-07-09/a>Didier Stevens7-Zip Editing & MoW
2022-06-26/a>Didier StevensMy Paste Command
2022-06-24/a>Xavier MertensPython (ab)using The Windows GUI
2022-06-23/a>Xavier MertensFLOSS 2.0 Has Been Released
2022-06-21/a>Johannes UllrichExperimental New Domain / Domain Age API
2022-06-19/a>Didier StevensVideo: Decoding Obfuscated BASE64 Statistically
2022-06-18/a>Didier StevensDecoding Obfuscated BASE64 Statistically
2022-06-16/a>Xavier MertensHoudini is Back Delivered Through a JavaScript Dropper
2022-06-12/a>Didier StevensQuickie: Follina, RTF & Explorer Preview Pane
2022-06-09/a>Brad DuncanTA570 Qakbot (Qbot) tries CVE-2022-30190 (Follina) exploit (ms-msdt)
2022-06-02/a>Johannes UllrichQuick Answers in Incident Response: RECmd.exe
2022-06-01/a>Jan KoprivaHTML phishing attachments - now with anti-analysis features
2022-05-31/a>Xavier MertensFirst Exploitation of Follina Seen in the Wild
2022-05-18/a>Jan KoprivaDo you want 30 BTC? Nothing is easier (or cheaper) in this phishing campaign...
2022-05-14/a>Didier StevensQuick Analysis Of Phishing MSG
2022-05-07/a>Guy BruneauPhishing PDF Received in my ISC Mailbox
2022-04-28/a>Johannes UllrichA Day of SMB: What does our SMB/RPC Honeypot see? CVE-2022-26809
2022-04-24/a>Didier StevensAnalyzing a Phishing Word Document
2022-04-23/a>Guy BruneauAre Roku Streaming Devices Safe from Exploitation?
2022-04-14/a>Johannes UllrichAn Update on CVE-2022-26809 - MSRPC Vulnerabliity - PATCH NOW
2022-04-13/a>Jan KoprivaHow is Ukrainian internet holding up during the Russian invasion?
2022-04-11/a>Johannes UllrichSpring: It isn't just about Spring4Shell. Spring Cloud Function Vulnerabilities are being probed too.
2022-04-10/a>Didier StevensVideo: Method For String Extraction Filtering
2022-04-09/a>Didier StevensMethod For String Extraction Filtering
2022-04-07/a>Johannes UllrichWhat is BIMI and how is it supposed to help with Phishing.
2022-04-06/a>Brad DuncanWindows MetaStealer Malware
2022-04-05/a>Johannes UllrichWebLogic Crypto Miner Malware Disabling Alibaba Cloud Monitoring Tools
2022-04-04/a>Johannes UllrichEmptying the Phishtank: Are WordPress sites the Mosquitoes of the Internet?
2022-03-31/a>Johannes UllrichSpring Vulnerability Update - Exploitation Attempts CVE-2022-22965
2022-03-30/a>Johannes UllrichPossible new Java Spring Framework Vulnerability (Updated: not a Spring problem)
2022-03-30/a>Johannes UllrichJava Springtime Confusion: What Vulnerability are We Talking About
2022-03-29/a>Johannes UllrichMore Fake/Typosquatting Twitter Accounts Asking for Ukraine Crytocurrency Donations
2022-03-26/a>Guy BruneauIs buying Cyber Insurance a Must Now?
2022-03-25/a>Xavier MertensXLSB Files: Because Binary is Stealthier Than XML
2022-03-24/a>Xavier MertensMalware Delivered Through Free Sharing Tool
2022-03-23/a>Brad DuncanArkei Variants: From Vidar to Mars Stealer
2022-03-22/a>Johannes UllrichStatement by President Biden: What you need to do (or not do)
2022-03-15/a>Xavier MertensClean Binaries with Suspicious Behaviour
2022-03-09/a>Xavier MertensInfostealer in a Batch File
2022-03-07/a>Johannes UllrichNo Bitcoin - No Problem: Follow Up to Last Weeks Donation Scam
2022-03-04/a>Johannes UllrichScam E-Mail Impersonating Red Cross
2022-03-02/a>Johannes UllrichThe More Often Something is Repeated, the More True It Becomes: Dealing with Social Media
2022-02-25/a>Didier StevensWindows, Fixed IPv4 Addresses and APIPA
2022-02-24/a>Xavier MertensUkraine & Russia Situation From a Domain Names Perspective
2022-02-13/a>Guy BruneauDHL Spear Phishing to Capture Username/Password
2022-02-11/a>Xavier MertensCinaRAT Delivered Through HTML ID Attributes
2022-02-10/a>Johannes UllrichZyxel Network Storage Devices Hunted By Mirai Variant
2022-02-05/a>Didier StevensPower over Ethernet and Thermal Imaging
2022-02-02/a>Johannes UllrichFinding elFinder: Who is looking for your files?
2022-01-31/a>Xavier MertensBe careful with RPMSG files
2022-01-29/a>Guy BruneauSIEM In this Decade, Are They Better than the Last?
2022-01-28/a>Xavier MertensMalicious ISO Embedded in an HTML Page
2022-01-21/a>Xavier MertensObscure Wininet.dll Feature?
2022-01-20/a>Xavier MertensRedLine Stealer Delivered Through FTP
2022-01-18/a>Jan KoprivaPhishing e-mail with...an advertisement?
2022-01-05/a>Xavier MertensCode Reuse In the Malware Landscape
2022-01-04/a>Xavier MertensA Simple Batch File That Blocks People
2022-01-03/a>Xavier MertensMcAfee Phishing Campaign with a Nice Fake Scan
2022-01-02/a>Guy BruneauExchange Server - Email Trapped in Transport Queues
2021-12-28/a>Russ McReeLotL Classifier tests for shells, exfil, and miners
2021-12-23/a>Xavier MertensNicely Crafted indeed.com Login Page
2021-12-21/a>Xavier MertensMore Undetected PowerShell Dropper
2021-12-20/a>Jan KoprivaPowerPoint attachments, Agent Tesla and code reuse in malware
2021-12-14/a>Johannes UllrichLog4j: Getting ready for the long haul (CVE-2021-44228)
2021-12-10/a>Xavier MertensPython Shellcode Injection From JSON Data
2021-12-09/a>Yee Ching TokPhishing Direct Messages via Discord
2021-12-06/a>Xavier MertensThe Importance of Out-of-Band Networks
2021-12-04/a>Guy BruneauA Review of Year 2021
2021-12-01/a>Xavier MertensInfo-Stealer Using webhook.site to Exfiltrate Data
2021-11-25/a>Didier StevensYARA's Private Strings
2021-11-24/a>Jan KoprivaPhishing page hiding itself using dynamically adjusted IP-based allow list
2021-11-21/a>Didier StevensBackdooring PAM
2021-11-20/a>Guy BruneauHikvision Security Cameras Potentially Exposed to Remote Code Execution
2021-11-19/a>Xavier MertensDownloader Disguised as Excel Add-In (XLL)
2021-11-10/a>Xavier MertensShadow IT Makes People More Vulnerable to Phishing
2021-10-31/a>Didier StevensSysinternals: Autoruns and Sysmon updates
2021-10-30/a>Guy BruneauRemote Desktop Protocol (RDP) Discovery
2021-10-26/a>Yee Ching TokHunting for Phishing Sites Masquerading as Outlook Web Access
2021-10-14/a>Xavier MertensPort-Forwarding with Windows for the Win
2021-10-13/a>Johannes UllrichPlease fix your E-Mail Brute forcing tool!
2021-10-09/a>Guy BruneauScanning for Previous Oracle WebLogic Vulnerabilities
2021-10-07/a>Johannes UllrichWho Is Hunting For Your IPTV Set-Top Box?
2021-09-25/a>Didier StevensStrings Analysis: VBA & Excel4 Maldoc
2021-09-25/a>Didier StevensVideo: Strings Analysis: VBA & Excel4 Maldoc
2021-09-24/a>Xavier MertensKeep an Eye on Your Users Mobile Devices (Simple Inventory)
2021-09-20/a>Johannes Ullrich#OMIGOD Exploits Captured in the Wild. Researchers responsible for half of scans for related ports.
2021-09-16/a>Jan KoprivaPhishing 101: why depend on one suspicious message subject when you can use many?
2021-09-09/a>Johannes UllrichUpdates to Our Datafeeds/API
2021-09-07/a>Johannes UllrichWhy I Gave Up on IPv6. And no, it is not because of security issues.
2021-09-02/a>Xavier MertensAttackers Will Always Abuse Major Events in our Lifes
2021-08-24/a>Johannes UllrichAttackers Hunting For Twilio Credentials
2021-08-21/a>Didier StevensNew Versions Of Sysinternals Tools
2021-08-19/a>Johannes UllrichWhen Lightning Strikes. What works and doesn't work.
2021-08-13/a>Guy BruneauScanning for Microsoft Exchange eDiscovery
2021-08-04/a>Yee Ching TokPivoting and Hunting for Shenanigans from a Reported Phishing Domain
2021-08-03/a>Johannes UllrichIs this the Weirdest Phishing (SMishing?) Attempt Ever?
2021-08-01/a>Didier Stevensprocdump Version 10.1
2021-07-31/a>Guy BruneauUnsolicited DNS Queries
2021-07-28/a>Jan KoprivaA sextortion e-mail from...IT support?!
2021-07-24/a>Bojan ZdrnjaActive Directory Certificate Services (ADCS - PKI) domain admin vulnerability
2021-07-21/a>Johannes Ullrich"Summer of SAM": Microsoft Releases Guidance for CVE-2021-36934
2021-07-19/a>Rick WannerNew Windows Print Spooler Vulnerability - CVE-2021-34481
2021-07-16/a>Xavier MertensMultiple BaseXX Obfuscations
2021-07-14/a>Jan KoprivaOne way to fail at malspam - give recipients the wrong password for an encrypted attachment
2021-07-13/a>Johannes UllrichUSPS Phishing Using Telegram to Collect Data
2021-07-10/a>Guy BruneauScanning for Microsoft Secure Socket Tunneling Protocol
2021-07-08/a>Xavier MertensUsing Sudo with Python For More Security Controls
2021-07-06/a>Xavier MertensPython DLL Injection Check
2021-07-03/a>Didier StevensFinding Strings With oledump.py
2021-07-02/a>Xavier Mertens"inception.py"... Multiple Base64 Encodings
2021-06-30/a>Johannes UllrichCVE-2021-1675: Incomplete Patch and Leaked RCE Exploit
2021-06-28/a>Didier StevensCFBF Files Strings Analysis
2021-06-26/a>Guy BruneauCVE-2019-9670: Zimbra Collaboration Suite XXE vulnerability
2021-06-22/a>Jan KoprivaPhishing asking recipients not to report abuse
2021-06-18/a>Daniel WesemannNetwork Forensics on Azure VMs (Part #2)
2021-06-18/a>Daniel WesemannOpen redirects ... and why Phishers love them
2021-06-15/a>Johannes UllrichMulti Perimeter Device Exploit Mirai Version Hunting For Sonicwall, DLink, Cisco and more
2021-06-12/a>Guy BruneauFortinet Targeted for Unpatched SSL VPN Discovery Activity
2021-05-30/a>Didier StevensSysinternals: Procmon, Sysmon, TcpView and Process Explorer update
2021-05-29/a>Guy BruneauSpear-phishing Email Targeting Outlook Mail Clients
2021-05-27/a>Jan KoprivaAll your Base are...nearly equal when it comes to AV evasion, but 64-bit executables are not
2021-05-22/a>Xavier Mertens"Serverless" Phishing Campaign
2021-05-21/a>Xavier MertensLocking Kernel32.dll As Anti-Debugging Technique
2021-05-14/a>Xavier Mertens"Open" Access to Industrial Systems Interface is Also Far From Zero
2021-05-12/a>Jan KoprivaNumber of industrial control systems on the internet is lower then in 2020...but still far from zero
2021-05-10/a>Johannes UllrichCorrectly Validating IP Addresses: Why encoding matters for input validation.
2021-05-08/a>Guy BruneauWho is Probing the Internet for Research Purposes?
2021-05-07/a>Daniel WesemannExposed Azure Storage Containers
2021-05-06/a>Xavier MertensAlternative Ways To Perform Basic Tasks
2021-05-02/a>Didier StevensPuTTY And FileZilla Use The Same Fingerprint Registry Keys
2021-04-30/a>Remco VerhoefQiling: A true instrumentable binary emulation framework
2021-04-29/a>Xavier MertensFrom Python to .Net
2021-04-24/a>Guy BruneauBase64 Hashes Used in Web Scanning
2021-04-23/a>Xavier MertensMalicious PowerPoint Add-On: "Small Is Beautiful"
2021-04-22/a>Xavier MertensHow Safe Are Your Docker Images?
2021-04-19/a>Jan KoprivaHunting phishing websites with favicon hashes
2021-04-09/a>Xavier MertensNo Python Interpreter? This Simple RAT Installs Its Own Copy
2021-04-06/a>Jan KoprivaMalspam with Lokibot vs. Outlook and RFCs
2021-03-31/a>Xavier MertensQuick Analysis of a Modular InfoStealer
2021-03-19/a>Xavier MertensPastebin.com Used As a Simple C2 Channel
2021-03-17/a>Xavier MertensDefenders, Know Your Operating System Like Attackers Do!
2021-03-12/a>Guy BruneauMicrosoft DHCP Logs Shipped to ELK
2021-03-11/a>Johannes UllrichPiktochart - Phishing with Infographics
2021-03-06/a>Xavier MertensSpotting the Red Team on VirusTotal!
2021-03-04/a>Xavier MertensFrom VBS, PowerShell, C Sharp, Process Hollowing to RAT
2021-02-26/a>Guy BruneauPretending to be an Outlook Version Update
2021-02-25/a>Daniel WesemannForensicating Azure VMs
2021-02-17/a>Xavier MertensThe new "LinkedInSecureMessage" ?
2021-02-13/a>Guy BruneauvSphere Replication updates address a command injection vulnerability (CVE-2021-21976) - https://www.vmware.com/security/advisories/VMSA-2021-0001.html
2021-02-13/a>Guy BruneauUsing Logstash to Parse IPtables Firewall Logs
2021-02-10/a>Brad DuncanPhishing message to the ISC handlers email distro
2021-01-30/a>Guy BruneauPacketSifter as Network Parsing and Telemetry Tool
2021-01-19/a>Russ McReeGordon for fast cyber reputation checks
2021-01-17/a>Didier StevensNew Release of Sysmon Adding Detection for Process Tampering
2021-01-15/a>Guy BruneauObfuscated DNS Queries
2021-01-10/a>Didier StevensMaldoc Analysis With CyberChef
2021-01-09/a>Didier StevensMaldoc Strings Analysis
2021-01-02/a>Guy BruneauProtecting Home Office and Enterprise in 2021
2021-01-01/a>Didier StevensStrings 2021
2020-12-29/a>Jan KoprivaWant to know what's in a folder you don't have a permission to access? Try asking your AV solution...
2020-12-26/a>Didier Stevensbase64dump.py Supported Encodings
2020-12-14/a>Johannes UllrichSolarWinds Breach Used to Infiltrate Customer Networks (Solarigate)
2020-12-13/a>Didier StevensKringleCon 2020
2020-12-08/a>Johannes UllrichDecember 2020 Microsoft Patch Tuesday: Exchange, Sharepoint, Dynamics and DNS Spoofing
2020-12-06/a>Didier Stevensoledump's Indicators (video)
2020-12-05/a>Guy BruneauIs IP 91.199.118.137 testing Access to aahwwx.52host.xyz?
2020-12-04/a>Guy BruneauDetecting Actors Activity with Threat Intel
2020-11-19/a>Xavier MertensPowerShell Dropper Delivering Formbook
2020-11-07/a>Guy BruneauCryptojacking Targeting WebLogic TCP/7001
2020-11-05/a>Xavier MertensDid You Spot "Invoke-Expression"?
2020-10-25/a>Didier StevensVideo: Pascal Strings
2020-10-24/a>Guy BruneauAn Alternative to Shodan, Censys with User-Agent CensysInspect/1.1
2020-10-22/a>Jan KoprivaBazarLoader phishing lures: plan a Halloween party, get a bonus and be fired in the same afternoon
2020-10-11/a>Didier StevensAnalyzing MSG Files With plugin_msg_summary
2020-10-09/a>Jan KoprivaPhishing kits as far as the eye can see
2020-10-03/a>Guy BruneauScanning for SOHO Routers
2020-10-02/a>Xavier MertensAnalysis of a Phishing Kit
2020-09-30/a>Johannes UllrichScans for FPURL.xml: Reconnaissance or Not?
2020-09-24/a>Xavier MertensParty in Ibiza with PowerShell
2020-09-21/a>Jan KoprivaSlightly broken overlay phishing
2020-09-20/a>Guy BruneauAnalysis of a Salesforce Phishing Emails
2020-09-17/a>Xavier MertensSuspicious Endpoint Containment with OSSEC
2020-09-02/a>Xavier MertensPython and Risky Windows API Calls
2020-09-01/a>Johannes UllrichExposed Windows Domain Controllers Used in CLDAP DDoS Attacks
2020-08-30/a>Johannes UllrichCenturyLink Outage Causing Internet Wide Problems
2020-08-28/a>Xavier MertensExample of Malicious DLL Injected in PowerShell
2020-08-25/a>Xavier MertensKeep An Eye on LOLBins
2020-08-24/a>Xavier MertensTracking A Malware Campaign Through VT
2020-08-22/a>Guy BruneauRemote Desktop (TCP/3389) and Telnet (TCP/23), What might they have in Common?
2020-08-20/a>Rob VandenBrinkOffice 365 Mail Forwarding Rules (and other Mail Rules too)
2020-08-10/a>Bojan ZdrnjaScoping web application and web service penetration tests
2020-08-08/a>Guy BruneauScanning Activity Include Netcat Listener
2020-08-03/a>Johannes UllrichA Word of Caution: Helping Out People Being Stalked Online
2020-07-30/a>Johannes UllrichPython Developers: Prepare!!!
2020-07-28/a>Johannes UllrichAll I want this Tuesday: More Data
2020-07-27/a>Johannes UllrichIn Memory of Donald Smith
2020-07-26/a>Didier StevensCracking Maldoc VBA Project Passwords
2020-07-20/a>Rick WannerSextortion Update: The Final Final Chapter
2020-07-19/a>Guy BruneauScanning Activity for ZeroShell Unauthenticated Access
2020-07-12/a>Didier StevensMaldoc: VBA Purging Example
2020-07-11/a>Guy BruneauScanning Home Internet Facing Devices to Exploit
2020-07-08/a>Xavier MertensIf You Want Something Done Right, You Have To Do It Yourself... Malware Too!
2020-07-04/a>Russ McReeHappy FouRth of July from the Internet Storm Center
2020-06-29/a>Didier StevensSysmon and Alternate Data Streams
2020-06-25/a>Johannes UllrichTech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release.
2020-06-24/a>Jan KoprivaUsing Shell Links as zero-touch downloaders and to initiate network connections
2020-06-18/a>Jan KoprivaBroken phishing accidentally exploiting Outlook zero-day
2020-06-16/a>Xavier MertensSextortion to The Next Level
2020-06-15/a>Rick WannerHTML based Phishing Run
2020-06-13/a>Guy BruneauMirai Botnet Activity
2020-06-11/a>Xavier MertensAnti-Debugging JavaScript Techniques
2020-06-08/a>Didier StevensTranslating BASE64 Obfuscated Scripts
2020-06-04/a>Xavier MertensAnti-Debugging Technique based on Memory Protection
2020-06-01/a>Jim ClausingStackstrings, type 2
2020-05-27/a>Jan KoprivaFrankenstein's phishing using Google Cloud Storage
2020-05-23/a>Xavier MertensAgentTesla Delivered via a Malicious PowerPoint Add-In
2020-05-22/a>Didier StevensSome Strings to Remember
2020-05-21/a>Xavier MertensMalware Triage with FLOSS: API Calls Based Behavior
2020-05-16/a>Guy BruneauScanning for Outlook Web Access (OWA) & Microsoft Exchange Control Panel (ECP)
2020-05-14/a>Rob VandenBrinkPatch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe
2020-05-04/a>Didier StevensSysmon and File Deletion
2020-05-02/a>Guy BruneauPhishing PDF with Unusual Hostname
2020-04-29/a>Johannes UllrichPrivacy Preserving Protocols to Trace Covid19 Exposure
2020-04-28/a>Jan KoprivaAgent Tesla delivered by the same phishing campaign for over a year
2020-04-27/a>Xavier MertensPowershell Payload Stored in a PSCredential Object
2020-04-18/a>Guy BruneauMaldoc Falsely Represented as DOCX Invoice Redirecting to Fake Apple Store
2020-04-16/a>Johannes UllrichUsing AppLocker to Prevent Living off the Land Attacks
2020-04-13/a>Jan KoprivaLook at the same phishing campaign 3 months apart
2020-04-07/a>Johannes UllrichIncrease in RDP Scanning
2020-04-03/a>Xavier MertensObfuscated with a Simple 0x0A
2020-03-30/a>Jan KoprivaCrashing explorer.exe with(out) a click
2020-03-28/a>Didier StevensCovid19 Domain Classifier
2020-03-27/a>Johannes UllrichHelp us classify Covid19 related domains https://isc.sans.edu/covidclassifier.html (login required)
2020-03-23/a>Didier StevensWindows Zeroday Actively Exploited: Type 1 Font Parsing Remote Code Execution Vulnerability
2020-03-21/a>Guy BruneauHoneypot - Scanning and Targeting Devices & Services
2020-03-16/a>Jan KoprivaDesktop.ini as a post-exploitation tool
2020-03-15/a>Guy BruneauVPN Access and Activity Monitoring
2020-03-14/a>Didier StevensPhishing PDF With Incremental Updates.
2020-03-13/a>Rob VandenBrinkNot all Ethernet NICs are Created Equal - Trying to Capture Invalid Ethernet Frames
2020-03-05/a>Xavier MertensWill You Put Your Password in a Survey?
2020-02-29/a>Guy BruneauHazelcast IMDG Discover Scan
2020-02-18/a>Jan KoprivaDiscovering contents of folders in Windows without permissions
2020-02-17/a>Didier Stevenscurl and SSPI
2020-02-16/a>Guy BruneauSOAR or not to SOAR?
2020-02-15/a>Didier Stevensbsdtar on Windows 10
2020-02-10/a>Jan KoprivaCurrent PayPal phishing campaign or "give me all your personal information"
2020-02-03/a>Jan KoprivaAnalysis of a triple-encrypted AZORult downloader
2020-02-02/a>Didier StevensVideo: Stego & Cryptominers
2020-01-27/a>Johannes UllrichNetwork Security Perspective on Coronavirus Preparedness
2020-01-25/a>Guy BruneauIs Threat Hunting the new Fad?
2020-01-24/a>Xavier MertensWhy Phishing Remains So Popular?
2020-01-21/a>Russ McReeDeepBlueCLI: Powershell Threat Hunting
2020-01-16/a>Jan KoprivaPicks of 2019 malware - the large, the small and the one full of null bytes
2020-01-09/a>Kevin ShorttWindows 7 - End of Life
2020-01-04/a>Didier StevensKringleCon 2019
2019-12-26/a>Xavier MertensBypassing UAC to Install a Cryptominer
2019-12-22/a>Didier StevensExtracting VBA Macros From .DWG Files
2019-12-16/a>Didier StevensMalicious .DWG Files?
2019-12-13/a>Jan KoprivaInternet banking sites and their use of TLS... and SSLv3... and SSLv2?!
2019-12-06/a>Jan KoprivaPhishing with a self-contained credentials-stealing webpage
2019-12-05/a>Jan KoprivaE-mail from Agent Tesla
2019-12-04/a>Jan KoprivaAnalysis of a strangely poetic malware
2019-11-27/a>Brad DuncanFinding an Agent Tesla malware sample
2019-11-26/a>Jan KoprivaLessons learned from playing a willing phish
2019-11-25/a>Xavier MertensMy Little DoH Setup
2019-11-23/a>Guy BruneauLocal Malware Analysis with Malice
2019-11-11/a>Johannes UllrichAre We Going Back to TheMoon (and How is Liquor Involved)?
2019-11-03/a>Didier StevensYou Too? "Unusual Activity with Double Base64 Encoding"
2019-10-31/a>Jan KoprivaEML attachments in O365 - a recipe for phishing
2019-10-30/a>Xavier MertensKeep an Eye on Remote Access to Mailboxes
2019-10-27/a>Guy BruneauUnusual Activity with Double Base64 Encoding
2019-10-24/a>Johannes UllrichYour Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment?
2019-10-20/a>Guy BruneauScanning Activity for NVMS-9000 Digital Video Recorder
2019-10-17/a>Jan KoprivaPhishing e-mail spoofing SPF-enabled domain
2019-10-16/a>Xavier MertensSecurity Monitoring: At Network or Host Level?
2019-10-10/a>Rob VandenBrinkMining Live Networks for OUI Data Oddness
2019-10-09/a>Brad DuncanWhat data does Vidar malware steal from an infected host?
2019-09-27/a>Xavier MertensNew Scans for Polycom Autoconfiguration Files
2019-09-19/a>Xavier MertensBlocklisting or Whitelisting in the Right Way
2019-09-07/a>Guy BruneauUnidentified Scanning Activity
2019-08-25/a>Guy BruneauAre there any Advantages of Buying Cyber Security Insurance?
2019-08-15/a>Didier StevensAnalysis of a Spearphishing Maldoc
2019-08-09/a>Xavier Mertens100% JavaScript Phishing Page
2019-08-08/a>Johannes Ullrich[Guest Diary] The good, the bad and the non-functional, or "how not to do an attack campaign"
2019-07-25/a>Rob VandenBrinkWhen Users Attack! Users (and Admins) Thwarting Security Controls
2019-07-17/a>Xavier MertensAnalyzis of DNS TXT Records
2019-07-13/a>Guy BruneauGuidance to Protect DNS Against Hijacking & Scanning for Version.BIND Still a Thing
2019-07-08/a>Didier StevensMachine Code? No!
2019-07-07/a>Rick WannerOpSec and OSInt
2019-07-04/a>Didier StevensMachine Code?
2019-07-02/a>Xavier MertensMalicious Script With Multiple Payloads
2019-06-27/a>Rob VandenBrinkFinding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell
2019-06-20/a>Xavier MertensUsing a Travel Packing App for Infosec Purpose
2019-06-18/a>Johannes UllrichWhat You Need To Know About TCP "SACK Panic"
2019-06-14/a>Jim ClausingA few Ghidra tips for IDA users, part 4 - function call graphs
2019-06-06/a>Xavier MertensKeep an Eye on Your WMI Logs
2019-05-22/a>Johannes UllrichAn Update on the Microsoft Windows RDP "Bluekeep" Vulnerability (CVE-2019-0708) [now with pcaps]
2019-05-20/a>Tom WebbCVE-2019-0604 Attack
2019-05-13/a>Xavier MertensFrom Phishing To Ransomware?
2019-05-06/a>Didier StevensText and Text
2019-05-03/a>Jim ClausingA few Ghidra tips for IDA users, part 3 - conversion, labels, and comments
2019-04-24/a>Rob VandenBrinkWhere have all the Domain Admins gone? Rooting out Unwanted Domain Administrators
2019-04-17/a>Jim ClausingA few Ghidra tips for IDA users, part 2 - strings and parameters
2019-04-17/a>Xavier MertensMalware Sample Delivered Through UDF Image
2019-04-08/a>Jim ClausingA few Ghidra tips for IDA users, part 1 - the decompiler/unreachable code
2019-04-03/a>Jim ClausingA few Ghidra tips for IDA users, part 0 - automatic comments for API call parameters
2019-04-02/a>Johannes UllrichFake AV is Back: LaCie Network Drives Used to Spread Malware
2019-03-27/a>Xavier MertensRunning your Own Passive DNS Service
2019-03-21/a>Xavier MertensNew Wave of Extortion Emails: Central Intelligence Agency Case
2019-03-05/a>Rob VandenBrinkPowershell, Active Directory and the Windows Host Firewall
2019-02-28/a>Tom WebbPhishing impersonations
2019-02-07/a>Xavier Mertens Phishing Kit with JavaScript Keylogger
2019-02-03/a>Didier StevensVideo: Analyzing a Simple HTML Phishing Attachment
2019-02-01/a>Rick WannerSextortion: Follow the Money Part 3 - The cashout begins!
2019-01-31/a>Xavier MertensTracking Unexpected DNS Changes
2019-01-30/a>Russ McReeCR19-010: The United States vs. Huawei
2019-01-29/a>Johannes UllrichA Not So Well Done Phish (Why Attackers need to Implement IPv6 Now! ;-) )
2019-01-24/a>Brad DuncanMalspam with Word docs uses macro to run Powershell script and steal system data
2019-01-18/a>John BambenekSextortion Bitcoin on the Move
2019-01-14/a>Rob VandenBrinkStill Running Windows 7? Time to think about that upgrade project!
2019-01-10/a>Brad DuncanHeartbreaking Emails: "Love You" Malspam
2019-01-02/a>Lorna HutchesonGift Card Scams on the rise
2019-01-02/a>Xavier MertensMalicious Script Leaking Data via FTP
2018-12-27/a>Didier StevensMatryoshka Phish
2018-12-26/a>Didier StevensBitcoin "Blocklists"
2018-12-23/a>Guy BruneauScanning Activity, end Goal is to add Hosts to Mirai Botnet
2018-12-22/a>Didier StevensKringleCon 2018
2018-12-21/a>Lorna HutchesonPhishing Attempts That Bypass 2FA
2018-12-19/a>Xavier MertensRestricting PowerShell Capabilities with NetSh
2018-12-19/a>Xavier MertensMicrosoft OOB Patch for Internet Explorer: Scripting Engine Memory Corruption Vulnerability
2018-12-16/a>Guy BruneauRandom Port Scan for Open RDP Backdoor
2018-12-13/a>Xavier MertensPhishing Attack Through Non-Delivery Notification
2018-12-09/a>Didier StevensQuickie: String Analysis is Still Useful
2018-11-30/a>Remco VerhoefCoinMiners searching for hosts
2018-11-22/a>Xavier MertensDivided Payload in Multiple Pasties
2018-11-20/a>Xavier MertensQuerying DShield from Cortex
2018-11-18/a>Guy BruneauMultipurpose PCAP Analysis Tool
2018-11-17/a>Xavier MertensQuickly Investigating Websites with Lookyloo
2018-11-15/a>Brad DuncanEmotet infection with IcedID banking Trojan
2018-11-14/a>Brad DuncanDay in the life of a researcher: Finding a wave of Trickbot malspam
2018-11-12/a>Rick WannerUsing the Neutrino ip-blocklist API to test general badness of an IP
2018-11-11/a>Pasquale StirparoCommunity contribution: joining forces or multiply solutions?
2018-10-26/a>Xavier MertensDissecting Malicious Office Documents with Linux
2018-10-17/a>Russ McReeRedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence
2018-09-28/a>Xavier MertensMore Excel DDE Code Injection
2018-09-20/a>Xavier MertensHunting for Suspicious Processes with OSSEC
2018-09-13/a>Xavier MertensMalware Delivered Through MHT Files
2018-09-07/a>Xavier MertensCrypto Mining in a Windows Headless Browser
2018-09-05/a>Rob VandenBrinkWhere have all my Certificates gone? (And when do they expire?)
2018-09-05/a>Xavier MertensMalicious PowerShell Compiling C# Code on the Fly
2018-08-30/a>Xavier MertensCrypto Mining Is More Popular Than Ever!
2018-08-29/a>Xavier Mertens3D Printers in The Wild, What Can Go Wrong?
2018-08-26/a>Didier StevensIdentifying numeric obfuscation
2018-08-23/a>Xavier MertensSimple Phishing Through formcrafts.com
2018-08-12/a>Didier StevensA URL shortener handy for phishers
2018-08-10/a>Remco VerhoefHunting SSL/TLS clients using JA3
2018-08-06/a>Didier StevensNumeric obfuscation: another example
2018-08-05/a>Didier StevensVideo: Maldoc analysis with standard Linux tools
2018-08-04/a>Didier StevensDealing with numeric obfuscation in malicious scripts
2018-07-30/a>Xavier MertensExploiting the Power of Curl
2018-07-29/a>Guy BruneauUsing RITA for Threat Analysis
2018-07-21/a>Didier StevensBTC pickpockets are back
2018-07-17/a>Xavier MertensSearching for Geographically Improbable Login Attempts
2018-07-15/a>Didier StevensVideo: Retrieving and processing JSON data (BTC example)
2018-07-15/a>Didier StevensExtracting BTC addresses from emails
2018-07-14/a>Didier StevensRetrieving and processing JSON data (BTC example)
2018-07-13/a>Xavier MertensCryptominer Delivered Though Compromized JavaScript File
2018-07-03/a>Didier StevensProgress indication for scripts on Windows
2018-07-02/a>Guy BruneauHello Peppa! - PHP Scans
2018-07-01/a>Didier StevensVideo: Analyzing XPS Files
2018-06-30/a>Didier StevensXPS samples
2018-06-26/a>Didier StevensAnalyzing XPS files
2018-06-22/a>Lorna HutchesonXPS Attachment Used for Phishing
2018-06-21/a>Xavier MertensAre Your Hunting Rules Still Working?
2018-06-19/a>Xavier MertensPowerShell: ScriptBlock Logging... Or Not?
2018-06-13/a>Xavier MertensA Bunch of Compromized Wordpress Sites
2018-06-07/a>Remco VerhoefAutomated twitter loot collection
2018-06-05/a>Xavier MertensMalicious Post-Exploitation Batch File
2018-05-24/a>Xavier Mertens"Blocked" Does Not Mean "Forget It"
2018-05-22/a>Xavier MertensMalware Distributed via .slk Files
2018-05-09/a>Xavier MertensNice Phishing Sample Delivering Trickbot
2018-05-07/a>Xavier MertensAdding Persistence Via Scheduled Tasks
2018-05-03/a>Renato MarinhoWebLogic Exploited in the Wild (Again)
2018-05-02/a>Russ McReeWindows Commands Reference - An InfoSec Must Have
2018-03-12/a>Xavier MertensPayload delivery via SMB
2018-03-05/a>Xavier MertensMalicious Bash Script with Multiple Features
2018-03-04/a>Xavier MertensThe Crypto Miners Fight For CPU Cycles
2018-03-02/a>Xavier MertensCommon Patterns Used in Phishing Campaigns Files
2018-02-25/a>Guy BruneauBlackhole Advertising Sites with Pi-hole
2018-02-01/a>Xavier MertensAdaptive Phishing Kit
2018-01-31/a>Tom WebbTax Phishing Time
2018-01-25/a>Xavier MertensRansomware as a Service
2018-01-20/a>Didier StevensAn RTF phish
2018-01-13/a>Rick WannerFlaw in Intel's Active Management Technology (AMT)
2018-01-11/a>Xavier MertensMining or Nothing!
2018-01-07/a>Guy BruneauSSH Scans by Clients Types
2018-01-03/a>John BambenekPhishing to Rural America Leads to Six-figure Wire Fraud Losses
2018-01-02/a>Didier StevensPDF documents & URLs: video
2018-01-01/a>Didier StevensWhat is new?
2017-12-27/a>Guy BruneauWhat are your Security Challenges for 2018?
2017-12-19/a>Xavier MertensExample of 'MouseOver' Link in a Powerpoint File
2017-12-14/a>Russ McReeSecurity Planner: Improve your online safety
2017-12-13/a>Xavier MertensTracking Newly Registered Domains
2017-12-05/a>Tom WebbIR using the Hive Project.
2017-12-02/a>Xavier MertensUsing Bad Material for the Good
2017-12-01/a>Xavier MertensPhishing Kit (Ab)Using Cloud Services
2017-11-29/a>Xavier MertensFileless Malicious PowerShell Sample
2017-11-25/a>Guy BruneauBenefits associated with the use of Open Source Software
2017-11-23/a>Xavier MertensProactive Malicious Domain Search
2017-11-17/a>Xavier MertensTop-100 Malicious IP STIX Feed
2017-11-16/a>Xavier MertensSuspicious Domains Tracking Dashboard
2017-11-15/a>Xavier MertensIf you want something done right, do it yourself!
2017-11-13/a>Guy Bruneaujsonrpc Scanning for root account
2017-11-13/a>Guy BruneauVBE Embeded Script (info.zip)
2017-11-11/a>Xavier MertensKeep An Eye on your Root Certificates
2017-11-10/a>Bojan ZdrnjaBattling e-mail phishing
2017-11-05/a>Didier StevensExtracting the text from PDF documents
2017-11-04/a>Didier StevensPDF documents & URLs
2017-11-01/a>Rob VandenBrinkSecuring SSH Services - Go Blue Team!!
2017-10-18/a>Renato MarinhoBaselining Servers to Detect Outliers
2017-10-06/a>Johannes UllrichWhat's in a cable? The dangers of unauthorized cables
2017-10-02/a>Xavier MertensInvestigating Security Incidents with Passive DNS
2017-09-30/a>Lorna HutchesonWho's Borrowing your Resources?
2017-09-25/a>Renato MarinhoXPCTRA Malware Steals Banking and Digital Wallet User's Credentials
2017-09-22/a>Russell EubanksWhat is the State of Your Union?
2017-09-18/a>Xavier MertensGetting some intelligence from malspam
2017-09-18/a>Johannes UllrichSANS Securingthehuman posted a follow up to their Equifax breach webcast: https://securingthehuman.sans.org/blog/2017/09/15/equifax-webcast-follow-up
2017-09-17/a>Guy BruneaurockNSM as a Incident Response Package
2017-09-13/a>Rob VandenBrinkSysinternals Update: Sysmon v6.10, Process Monitor v3.40, Autoruns v13.80, AccessChk v6.11 - https://blogs.technet.microsoft.com/sysinternals/2017/09/12/sysinternals-update-sysmon-v6-1-process-monitor-v3-4-autoruns-v13-8-accesschk-v6-11/
2017-09-11/a>Russ McReeWindows Auditing with WINspect
2017-09-06/a>Adrien de BeaupreModern Web Application Penetration Testing , Hash Length Extension Attacks
2017-09-02/a>Xavier MertensAutoIT based malware back in the wild
2017-08-24/a>Bojan ZdrnjaFree Bitcoins? Why not?
2017-08-18/a>Renato MarinhoEngineBox Malware Supports 10+ Brazilian Banks
2017-08-16/a>Xavier MertensAnalysis of a Paypal phishing kit
2017-08-15/a>Brad DuncanMalspam pushing Trickbot banking Trojan
2017-08-13/a>Didier StevensThe Good Phishing Email
2017-08-07/a>Xavier MertensIncrease of phpMyAdmin scans
2017-07-30/a>Guy BruneauText Banking Scams
2017-07-24/a>Russell EubanksTrends Over Time
2017-07-16/a>Renato MarinhoSMS Phishing induces victims to photograph its own token card
2017-07-12/a>Xavier MertensBackup Scripts, the FIM of the Poor
2017-07-09/a>Russ McReeAdversary hunting with SOF-ELK
2017-07-05/a>Didier StevensSelecting domains with random names
2017-06-27/a>Brad DuncanA Tale of Two Phishies
2017-06-17/a>Guy BruneauMapping Use Cases to Logs. Which Logs are the Most Important to Collect?
2017-06-15/a>Bojan ZdrnjaUberscammers
2017-06-14/a>Xavier MertensSystemd Could Fallback to Google DNS?
2017-06-08/a>Tom WebbSummer STEM for Kids
2017-06-02/a>Xavier MertensPhishing Campaigns Follow Trends
2017-06-01/a>Xavier MertensSharing Private Data with Webcast Invitations
2017-05-31/a>Pasquale StirparoAnalysis of Competing Hypotheses, WCry and Lazarus (ACH part 2)
2017-05-28/a>Pasquale StirparoAnalysis of Competing Hypotheses (ACH part 1)
2017-05-28/a>Guy BruneauCyberChef a Must Have Tool in your Tool bag!
2017-05-20/a>Xavier MertensTyposquatting: Awareness and Hunting
2017-05-13/a>Guy BruneauHas anyone Tested WannaCry Killswitch? - https://blog.didierstevens.com/2017/05/13/quickpost-wcry-killswitch-check-is-not-proxy-aware/
2017-05-06/a>Xavier MertensThe story of the CFO and CEO...
2017-05-05/a>Xavier MertensHTTP Headers... the Achilles' heel of many applications
2017-05-03/a>Bojan ZdrnjaOAUTH phishing against Google Docs ? beware!
2017-04-22/a>Jim ClausingWTF tcp port 81
2017-04-20/a>Xavier MertensDNS Query Length... Because Size Does Matter
2017-04-18/a>Johannes UllrichYet Another Apple Phish and Some DNS Lessons Learned From It
2017-04-16/a>Johannes UllrichTool to Detect Active Phishing Attacks Using Unicode Look-Alike Domains
2017-03-28/a>Xavier MertensLogical & Physical Security Correlation
2017-03-24/a>Xavier MertensNicely Obfuscated JavaScript Sample
2017-03-15/a>Xavier MertensRetro Hunting!
2017-03-06/a>Renato MarinhoA very convincing Typosquatting + Social Engineering campaign is targeting Santander corporate customers in Brazil
2017-02-12/a>Xavier MertensAnalysis of a Suspicious Piece of JavaScript
2017-02-05/a>Xavier MertensMany Malware Samples Found on Pastebin
2017-02-02/a>Rick WannerMultiple vulnerabilities discovered in popular printer models
2017-02-01/a>Xavier MertensQuick Analysis of Data Left Available by Attackers
2017-01-18/a>Rob VandenBrinkMaking Windows 10 a bit less "Creepy" - Common Privacy Settings
2017-01-12/a>Mark BaggettSome tools updates
2017-01-12/a>Mark BaggettSystem Resource Utilization Monitor
2017-01-11/a>Johannes UllrichJanuary 2017 Edition of Ouch! Security Awareness Newsletter Released: https://securingthehuman.sans.org/ouch
2017-01-10/a>Johannes UllrichRealtors Be Aware: You Are a Target
2017-01-10/a>Johannes UllrichPort 37777 "MapTable" Requests
2017-01-06/a>John BambenekGreat Misadventures of Security Vendors: Absurd Sandboxing Edition
2017-01-04/a>John BambenekMixed Messages : Novel Phishing Attempts Trying to Steal Your E-mail Password Goes Wrong
2016-11-23/a>Tom WebbMapping Attack Methodology to Controls
2016-11-22/a>Didier StevensUpdate:ZIP With Comment
2016-11-18/a>Didier StevensVBA Shellcode and Windows 10
2016-11-16/a>Xavier MertensExample of Getting Analysts & Researchers Away
2016-11-13/a>Guy BruneauBitcoin Miner File Upload via FTP
2016-11-11/a>Rick WannerBenevolent malware? reincarna/Linux.Wifatch
2016-11-02/a>Rob VandenBrinkWhat Does a Pentest Look Like?
2016-10-25/a>Xavier MertensAnother Day, Another Spam...
2016-10-10/a>Didier StevensRadare2: rahash2
2016-10-08/a>Russell EubanksUnauthorized Change Detected!
2016-10-02/a>Guy BruneauIs there an Infosec Cybersecurity Talent Shortage?
2016-09-25/a>Pasquale StirparoDefining Threat Intelligence Requirements
2016-09-04/a>Russ McReeKali Linux 2016.2 Release: https://www.kali.org/news/kali-linux-20162-release/
2016-09-01/a>Xavier MertensMaxmind.com (Ab)used As Anti-Analysis Technique
2016-08-29/a>Russ McReeRecommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
2016-08-24/a>Tom WebbStay on Track During IR
2016-08-23/a>Xavier MertensVoice Message Notifications Deliver Ransomware
2016-08-02/a>Tom WebbWindows 10 Anniversary Update Available
2016-07-31/a>Pasquale StirparoSharing (intel) is caring... or not?
2016-07-27/a>Xavier MertensAnalyze of a Linux botnet client source code
2016-07-21/a>Didier StevensPractice ntds.dit File
2016-07-15/a>Xavier MertensName All the Things!
2016-07-12/a>Xavier MertensHunting for Malicious Files with MISP + OSSEC
2016-07-03/a>Guy BruneauIs Data Privacy part of your Company's Culture?
2016-06-29/a>Xavier MertensPhishing Campaign with Blurred Images
2016-06-12/a>Guy BruneauDNS Sinkhole ISO Version 2.0
2016-06-03/a>Tom ListonMySQL is YourSQL
2016-06-01/a>Xavier MertensDocker Containers Logging
2016-05-29/a>Guy BruneauAnalysis of a Distributed Denial of Service (DDoS)
2016-05-22/a>Pasquale StirparoThe strange case of WinZip MRU Registry key
2016-05-21/a>Didier StevensPython Malware - Part 2
2016-05-18/a>Russ McReeResources: Windows Auditing & Monitoring, Linux 2FA
2016-05-14/a>Guy BruneauINetSim as a Basic Honeypot
2016-05-12/a>Xavier MertensAnother Day, Another Wave of Phishing Emails
2016-05-08/a>Jim ClausingGuest Diary: Linux Capabilities - A friend and foe
2016-05-05/a>Xavier MertensMicrosoft BITS Used to Download Payloads
2016-05-02/a>Rick WannerLean Threat Intelligence
2016-04-29/a>Rob VandenBrinkSysinternals Updated today - Updates to Sysmon, Procdump and Sigcheck. https://blogs.technet.microsoft.com/sysinternals/2016/04/28/update-sysmon-v4-procdump-v8-sigcheck-v2-51/
2016-04-15/a>Xavier MertensWindows Command Line Persistence?
2016-04-02/a>Russell EubanksWhy Can't We Be Friends?
2016-03-30/a>Xavier MertensWhat to watch with your FIM?
2016-03-28/a>Xavier MertensImproving Bash Forensics Capabilities
2016-03-21/a>Xavier MertensIP Addresses Triage
2016-02-24/a>Xavier MertensAnalyzis of a Malicious .lnk File with an Embedded Payload
2016-02-18/a>Xavier MertensHunting for Executable Code in Windows Environments
2016-02-15/a>Bojan ZdrnjaExploiting (pretty) blind SQL injections
2016-02-07/a>Xavier MertensMore Malicious JavaScript Obfuscation
2016-02-02/a>Johannes UllrichTargeted IPv6 Scans Using pool.ntp.org .
2016-01-31/a>Guy BruneauWindows 10 and System Protection for DATA Default is OFF
2016-01-23/a>Didier StevensSigcheck and VirusTotal for Offline Machine
2016-01-20/a>Xavier Mertens/tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters!
2016-01-13/a>Alex StanfordYou Have Got a New Audio Message - Guest Diary by Pasquale Stirparo
2016-01-09/a>Xavier MertensVirtual Bitlocker Containers
2015-12-24/a>Xavier MertensUnity Makes Strength
2015-12-12/a>Russell EubanksWhat Signs Are You Missing?
2015-12-10/a>Rob VandenBrinkUninstalling Problem Applications using Powershell
2015-12-10/a>Rob VandenBrinkNew Burp Feature - ClickBandit
2015-12-09/a>Xavier MertensEnforcing USB Storage Policy with PowerShell
2015-12-04/a>Tom WebbAutomating Phishing Analysis using BRO
2015-11-21/a>Didier StevensMaldoc Social Engineering Trick
2015-11-09/a>John BambenekICYMI: Widespread Unserialize Vulnerability in Java
2015-10-20/a>Bojan ZdrnjaWhen encoding saves the day
2015-10-12/a>Guy BruneauData Visualization,What is your Tool of Choice?
2015-09-29/a>Pedro BuenoTricks for DLL analysis
2015-09-23/a>Daniel WesemannMaking our users unlearn what we taught them
2015-09-21/a>Xavier MertensDetecting XCodeGhost Activity
2015-09-03/a>Xavier MertensQuerying the DShield API from RTIR
2015-08-19/a>Bojan ZdrnjaOutsourcing critical infrastructure (such as DNS)
2015-08-18/a>Russ McReeMicrosoft Security Bulletin MS15-093 - Critical OOB - Internet Explorer RCE
2015-08-16/a>Guy BruneauAre you a "Hunter"?
2015-08-12/a>Rob VandenBrinkWindows Service Accounts - Why They're Evil and Why Pentesters Love them!
2015-08-06/a>Didier StevensSigcheck and virustotal-search
2015-07-23/a>Mark HofmanSome more 0-days from ZDI
2015-07-21/a>Didier StevensSearching Through the VirusTotal Database
2015-07-17/a>Didier StevensProcess Explorer and VirusTotal
2015-07-17/a>Didier StevensAutoruns and VirusTotal
2015-07-17/a>Didier StevensSigcheck and VirusTotal
2015-07-03/a>Didier StevensAnalyzing Quarantine Files
2015-06-29/a>Rob VandenBrinkThe Powershell Diaries 2 - Software Inventory
2015-06-27/a>Guy BruneauIs Windows XP still around in your Network a year after Support Ended?
2015-06-22/a>Johannes UllrichSMTP Brute Forcing
2015-06-01/a>Tom WebbSubmit Dshield ASA Logs
2015-05-30/a>Russell EubanksWeekend Learning - Spoofer Project
2015-05-27/a>Tom WebbSYSINTERNALS Update(AccessChk v6.0, Autoruns v13.4, Process Monitor v3.2, VMMap v3.2)
2015-05-14/a>Daniel WesemannOh Bloat!
2015-04-27/a>Richard PorterWhen Prevention Fails, Incident Response Begins
2015-04-17/a>Didier StevensMemory Forensics Of Network Devices
2015-04-10/a>Didier StevensThe Kill Chain: Now With Pastebin
2015-04-03/a>Didier StevensSSH Fingerprints Are Important
2015-03-26/a>Daniel WesemannPin-up on your Smartphone!
2015-03-07/a>Guy BruneauShould it be Mandatory to have an Independent Security Audit after a Breach?
2015-02-19/a>Daniel WesemannDNS-based DDoS
2015-02-06/a>Johannes UllrichAnthem, TurboTax and How Things "Fit Together" Sometimes
2015-02-04/a>Alex StanfordExploit Kit Evolution - Neutrino
2015-01-31/a>Guy BruneauBeware of Phishing and Spam Super Bowl Fans!
2015-01-29/a>Bojan ZdrnjaBlindly confirming XXE
2015-01-23/a>Adrien de BeaupreInfocon change to yellow for Adobe Flash issues
2014-12-24/a>Rick WannerIncident Response at Sony
2014-12-23/a>John BambenekHow I learned to stop worrying and love malware DGAs....
2014-11-27/a>Russ McReeSyrian Electronic Army attack leads to malvertising
2014-11-25/a>Adrien de BeaupreLess is, umm, less?
2014-09-27/a>Guy BruneauWhat has Bash and Heartbleed Taught Us?
2014-09-26/a>Richard PorterWhy We Have Moved to InfoCon:Yellow
2014-09-22/a>Johannes UllrichFake LogMeIn Certificate Update with Bad AV Detection Rate
2014-09-19/a>Guy BruneauWeb Scan looking for /info/whitelist.pac
2014-09-16/a>Daniel Wesemannhttps://yourfakebank.support -- TLD confusion starts!
2014-09-12/a>Chris MohanAre credential dumps worth reviewing?
2014-09-07/a>Johannes UllrichOdd Persistent Password Bruteforcing
2014-08-27/a>Rob VandenBrinkOne More Day of Trolling in POS Memory
2014-08-20/a>Kevin ShorttSocial Engineering Alive and Well
2014-08-16/a>Lenny ZeltserWeb Server Attack Investigation - Installing a Bot and Reverse Shell via a PHP Vulnerability
2014-08-15/a>Tom WebbAppLocker Event Logs with OSSEC 2.8
2014-08-12/a>Adrien de BeaupreSysinternals updates Sysmon v1.0; Updates: Autoruns v12.01, Coreinfo v3.3, Procexp v16.03 http://blogs.technet.com/b/sysinternals/
2014-08-10/a>Basil Alawi S.TaherIncident Response with Triage-ir
2014-08-09/a>Adrien de BeaupreComplete application ownage via Multi-POST XSRF
2014-08-04/a>Russ McReeThreats & Indicators: A Security Intelligence Lifecycle
2014-07-30/a>Rick WannerSymantec Endpoint Protection Privilege Escalation Zero Day
2014-07-26/a>Chris Mohan"Internet scanning project" scans
2014-07-23/a>Johannes UllrichNew Feature: "Live" SSH Brute Force Logs and New Kippo Client
2014-07-15/a>Daniel WesemannOracle July 2014 CPU (patch bundle)
2014-07-14/a>Daniel WesemannE-ZPass phishing scam
2014-07-14/a>Johannes UllrichThe Internet of Things: How do you "on-board" devices?
2014-07-09/a>Daniel WesemannWho owns your typo?
2014-07-07/a>Johannes UllrichMulti Platform *Coin Miner Attacking Routers on Port 32764
2014-07-06/a>Richard PorterPhysical Access, Point of Sale, Vegas
2014-07-05/a>Guy BruneauJava Support ends for Windows XP
2014-07-02/a>Johannes UllrichJuly Ouch! Security Awareness Newsletter Released. E-mail Do's and Don'ts http://www.securingthehuman.org/resources/newsletters/ouch/2014#july2014
2014-06-23/a>Russ McReeMicrosoft Interflow announced today at 26th FIRST conference
2014-06-12/a>Guy BruneauBIND Security Update for CVE-2014-3859
2014-06-12/a>Daniel WesemannMade any new friends lately?
2014-05-23/a>Richard PorterHighlights from Cisco Live 2014 - The Internet of Everything
2014-05-22/a>Johannes UllrichDiscontinuing Support for ISC Alert Task Bar Icon
2014-05-01/a>Johannes UllrichBusybox Honeypot Fingerprinting and a new DVR scanner
2014-04-26/a>Guy BruneauAndroid Users - Beware of Bitcoin Mining Malware
2014-04-26/a>Guy BruneauNew Project by Linux Foundation - Core Infrastructure Initiative
2014-04-14/a>Kevin ShorttINFOCon Green: Heartbleed - on the mend
2014-04-11/a>Guy BruneauHeartbleed Fix Available for Download for Cisco Products
2014-04-06/a>Basil Alawi S.Taher"Power Worm" PowerShell based Malware
2014-04-05/a>Jim ClausingThose strange e-mails with URLs in them can lead to Android malware
2014-04-04/a>Rob VandenBrinkDealing with Disaster - A Short Malware Incident Response
2014-04-04/a>Rob VandenBrinkWindows 8.1 Released
2014-04-01/a>Johannes Ullrichcmd.so Synology Scanner Also Found on Routers
2014-03-27/a>Alex StanfordApple Credential Phishing via appleidconfirm.net
2014-03-25/a>Johannes UllrichA few updates on "The Moon" worm
2014-03-24/a>Johannes UllrichNew Microsoft Advisory: Unpatched Word Flaw used in Targeted Attacks
2014-03-22/a>Guy BruneauHow the Compromise of a User Account Lead to a Spam Incident
2014-03-12/a>Johannes UllrichWordpress "Pingback" DDoS Attacks
2014-03-10/a>Basil Alawi S.TaherSysinternals Process Explorer v16.02, Process Monitor v3.1, PSExec v2.1 and Sigcheck v2.03 update
2014-03-07/a>Tom WebbLinux Memory Dump with Rekall
2014-03-04/a>Daniel WesemannXPired!
2014-03-02/a>Stephen HallSunday Reading
2014-02-28/a>Daniel WesemannOversharing
2014-02-19/a>Russ McReeThreat modeling in the name of security
2014-02-18/a>Johannes UllrichMore Details About "TheMoon" Linksys Worm
2014-02-15/a>Rob VandenBrinkMore on HNAP - What is it, How to Use it, How to Find it
2014-02-13/a>Johannes UllrichLinksys Worm ("TheMoon") Captured
2014-02-12/a>Johannes UllrichSuspected Mass Exploit Against Linksys E1000 / E1200 Routers
2014-02-10/a>Rob VandenBrinkIsn't it About Time to Get Moving on Chip and PIN?
2014-02-07/a>Rob VandenBrinkHello Virustotal? It's Microsoft Calling.
2014-02-04/a>Johannes UllrichOdd ICMP Echo Request Payload
2014-01-30/a>Johannes UllrichNew gTLDs appearing in the root zone
2014-01-24/a>Johannes UllrichHow to send mass e-mail the right way
2014-01-24/a>Chris MohanPhishing via Social Media
2014-01-23/a>Chris MohanLearning from the breaches that happens to others Part 2
2014-01-22/a>Chris MohanLearning from the breaches that happens to others
2014-01-11/a>Guy Bruneautcpflow 1.4.4 and some of its most Interesting Features
2014-01-10/a>Basil Alawi S.TaherWindows Autorun-3
2014-01-10/a>Basil Alawi S.TaherCisco Small Business Devices backdoor fix
2014-01-04/a>Tom WebbMonitoring Windows Networks Using Syslog (Part One)
2014-01-02/a>John BambenekOpenSSL.org Defaced by Attackers Gaining Access to Hypervisor
2014-01-02/a>Johannes UllrichScans Increase for New Linksys Backdoor (32764/TCP)
2013-12-24/a>Daniel WesemannUnfriendly crontab additions
2013-12-21/a>Daniel WesemannAdobe phishing underway
2013-12-21/a>Guy BruneauStrange DNS Queries - Request for Packets
2013-12-19/a>Rob VandenBrinkPassive Scanning Two Ways - How-Tos for the Holidays
2013-12-19/a>Rob VandenBrinkTarget US - Credit Card Data Breach
2013-12-16/a>Tom WebbThe case of Minerd
2013-12-11/a>Johannes UllrichFacebook Phishing and Malware via Tumblr Redirects
2013-12-09/a>Rob VandenBrinkScanning without Scanning
2013-12-07/a>Guy BruneauSuspected Active Rovnix Botnet Controller
2013-12-02/a>Richard PorterReports of higher than normal SSH Attacks
2013-12-01/a>Richard PorterBPF, PCAP, Binary, hex, why they matter?
2013-11-30/a>Russ McReeA review of Tubes, A Journey to the Center of the Internet
2013-11-27/a>Rob VandenBrinkATM Traffic + TCPDump + Video = Good or Evil?
2013-11-19/a>Johannes UllrichvBulletin.com Compromise - Possible 0-day
2013-11-18/a>Johannes UllrichAm I Sending Traffic to a "Sinkhole"?
2013-11-15/a>Johannes UllrichThe Security Impact of HTTP Caching Headers
2013-11-11/a>Johannes UllrichWhat Happened to the SANS Ads?
2013-11-04/a>Manuel Humberto Santander PelaezWhen attackers use your DNS to check for the sites you are visiting
2013-11-01/a>Russ McReeSecunia's PSI Country Report - Q3 2013
2013-10-30/a>Russ McReeSIR v15: Five good reasons to leave Windows XP behind
2013-10-25/a>Johannes UllrichPHP.net compromise aftermath: Why Code Signing Beats Hashes
2013-10-25/a>Rob VandenBrinkKaspersky flags TCPIP.SYS as Malware
2013-10-22/a>Richard PorterGreenbone and OpenVAS Scanner
2013-10-21/a>Johannes UllrichNew tricks that may bring DNS spoofing back or: "Why you should enable DNSSEC even if it is a pain to do"
2013-10-19/a>Johannes UllrichYet Another WHMCS SQL Injection Exploit
2013-10-17/a>Adrien de BeaupreInternet wide DNS scanning
2013-10-04/a>Pedro BuenoCSAM: WebHosting BruteForce logs
2013-10-01/a>John Bambenek*Metaspoit Releases Module to Exploit Unpatched IE Vuln CVE-2013-3893
2013-09-20/a>Russ McReeThreat Level Yellow: Protection recommendations regarding Internet Explorer exploits in the wild
2013-09-17/a>John BambenekMicrosoft Releases Out-of-Band Advisory for all Versions of Internet Explorer
2013-09-09/a>Johannes UllrichSSL is broken. So what?
2013-09-05/a>Rob VandenBrinkBuilding Your Own GPU Enabled Private Cloud
2013-09-02/a>Guy BruneauSnort IDS Sensor with Sguil New ISO Released
2013-08-26/a>Alex StanfordStop, Drop and File Carve
2013-08-22/a>Russ McReeRead of the Week: A Fuzzy Future in Malware Research
2013-08-19/a>Johannes UllrichRunning Snort on ESXi using the Distributed Switch
2013-08-19/a>Rob VandenBrinkZMAP 1.02 released
2013-08-14/a>Johannes UllrichImaging LUKS Encrypted Drives
2013-08-13/a>Swa FrantzenMicrosoft security advisories: RDP and MD5 deprecation in Microsoft root certificates
2013-08-09/a>Kevin ShorttCopy Machines - Changing Scanned Content
2013-08-05/a>Chris MohanDMARC: another step forward in the fight against phishing?
2013-07-31/a>Johannes UllrichPOP3 Server Brute Forcing Attempts Using Polycom Credentials
2013-07-26/a>Scott FendleyISC BIND DoS
2013-07-20/a>Manuel Humberto Santander PelaezDo you have rogue Internet gateways in your network? Check it with nmap
2013-07-19/a>Stephen HallCyber Intelligence Tsunami
2013-07-18/a>Chris MohanBlog Spam - annoying junk or a source of intelligence?
2013-07-16/a>Johannes UllrichWhy don't we see more examples of web app attacks via POST?
2013-07-13/a>Lenny ZeltserDecoy Personas for Safeguarding Online Identity Using Deception
2013-07-08/a>Richard PorterWhy do we Click?
2013-07-06/a>Guy BruneauIs Metadata the Magic in Modern Network Security?
2013-07-01/a>Manuel Humberto Santander PelaezUsing nmap scripts to enhance vulnerability asessment results
2013-06-29/a>Johannes UllrichInstagram "Fruit" Spam
2013-06-21/a>Guy BruneauSysinternals Updates for Autoruns, Strings & ZoomIt http://blogs.technet.com/b/sysinternals/archive/2013/06/20/updates-autoruns-v11-61-strings-v2-52-zoomit-v4-5.aspx
2013-06-20/a>Johannes UllrichLinkedin DNS Hijack
2013-06-19/a>Kevin ListonWinLink Check-In
2013-06-05/a>Richard PorterWindows Sysinternals Updated http://technet.microsoft.com/en-us/sysinternals/default.aspx
2013-06-05/a>Richard PorterBIND 9 Update fixing CVE-2013-3919
2013-05-23/a>Adrien de BeaupreMoVP II
2013-05-21/a>Adrien de BeaupreMoore, Oklahoma tornado charitable organization scams, malware, and phishing
2013-05-20/a>Guy BruneauSysinternals Updates for Accesschk, Procdump, RAMMap and Strings http://blogs.technet.com/b/sysinternals/archive/2013/05/17/updates-accesschk-v5-11-procdump-v6-0-rammap-v1-22-strings-v2-51.aspx
2013-05-14/a>Swa FrantzenCVE-2013-2094: Linux privilege escalation
2013-05-09/a>Johannes UllrichMicrosoft released a Fix-it for the Internet Explorer 8 Vulnerability http://support.microsoft.com/kb/2847140
2013-05-08/a>Chris MohanSyria drops from Internet 7th May 2013
2013-05-07/a>Jim ClausingIs there an epidemic of typo squatting?
2013-05-07/a>Jim ClausingNGINX updates address buffer overflow (CVE-2013-2028) see http://nginx.org/en/CHANGES-1.4
2013-05-04/a>Kevin ShorttThe Zero-Day Pendulum Swings
2013-05-01/a>Daniel WesemannThe cost of cleaning up
2013-04-23/a>Russ McReeMicrosoft's Security Intelligence Report (SIRv14) released
2013-04-16/a>John BambenekFake Boston Marathon Scams Update
2013-04-15/a>Rob VandenBrinkOops - You Mean That Deleted Server was a Certificate Authority?
2013-04-15/a>John BambenekPlease send any spam (full headers), URLs or other suspicious content scamming off Boston Marathon explosions to handlers@sans.org
2013-03-29/a>Chris MohanFake Link removal requests
2013-03-27/a>Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - IPv6 moving target defense
2013-03-19/a>Johannes UllrichWindows 7 SP1 and Windows Server 2008 R2 SP1 Being "pushed" today
2013-03-19/a>Johannes UllrichIPv6 Focus Month: The warm and fuzzy side of IPv6
2013-03-07/a>Guy BruneauApple Blocking Java Web plug-in
2013-03-06/a>Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - Geolocation Using IPv6 Addresses
2013-03-05/a>Mark HofmanIPv6 Focus Month: Device Defaults
2013-03-02/a>Scott FendleyEvernote Security Issue
2013-03-02/a>Scott FendleyApple Blocks Older Insecure Versions of Flash Player
2013-02-28/a>Daniel WesemannParsing Windows Eventlogs in Powershell
2013-02-22/a>Johannes UllrichZendesk breach affects Tumblr/Pinterest/Twitter
2013-02-19/a>Johannes UllrichAPT1, Unit 61398 and are state sponsored attacks real
2013-02-17/a>Guy BruneauHP ArcSight Connector Appliance and Logger Vulnerabilities
2013-02-11/a>John BambenekIs This Chinese Registrar Really Trying to XSS Me?
2013-02-06/a>Adam SwangerSysinternals in particular Process Explorer update https://blogs.technet.com/b/sysinternals/?Redirected=true
2013-02-06/a>Johannes UllrichAre you losing system logging information (and don't know it)?
2013-02-06/a>Johannes UllrichIntel Network Card (82574L) Packet of Death
2013-02-04/a>Adam SwangerSAN Securing The Human Monthly Awareness Video - Advanced Persistent Threat (APT) http://www.securingthehuman.org/resources/ncsam
2013-02-04/a>Russ McReeAn expose of a recent SANS GIAC XSS vulnerability
2013-01-30/a>Richard PorterGetting Involved with the Local Community
2013-01-25/a>Johannes UllrichVulnerability Scans via Search Engines (Request for Logs)
2013-01-15/a>Rob VandenBrinkWhen Disabling IE6 (or Java, or whatever) is not an Option...
2013-01-13/a>Stephen HallSysinternals Updates
2013-01-10/a>Rob VandenBrinkWhat Else runs Telnets? Or, Pentesters Love Video Conferencing Units Too!
2013-01-09/a>Rob VandenBrinkSQL Injection Flaw in Ruby on Rails
2013-01-05/a>Guy BruneauD-link Wireless-G Router Year Issue (Y2K-plus-13)
2013-01-02/a>Russ McReeEMET 3.5: The Value of Looking Through an Attacker's Eyes
2013-01-01/a>Johannes UllrichFixIt Available for Internet Explorer Vulnerability
2012-12-20/a>Daniel WesemannWhite House strategy on security information sharing and safeguarding
2012-12-13/a>Johannes UllrichWhat if Tomorrow Was the Day?
2012-12-06/a>Daniel WesemannFake tech support calls - revisited
2012-12-06/a>Daniel WesemannRich Quick Make Money!
2012-12-03/a>John BambenekJohn McAfee Exposes His Location in Photo About His Being on Run
2012-12-02/a>Guy BruneauCollecting Logs from Security Devices at Home
2012-11-30/a>Daniel WesemannNmap 6.25 released - lots of new goodies, see http://nmap.org/changelog.html
2012-11-29/a>Kevin ShorttNew Apple Security Update: APPLE-SA-2012-11-29-1 Apple TV 5.1.1
2012-11-28/a>Mark HofmanMcAfee releases extraDAT for W32/Autorun.worm.aaeb-h
2012-11-28/a>Mark HofmanNew version of wireshark is available (1.8.4), some security fixes included.
2012-11-27/a>Chris MohanCan users' phish emails be a security admin's catch of the day?
2012-11-26/a>John BambenekOnline Shopping for the Holidays? Tips, News and a Fair Warning
2012-11-20/a>John BambenekBehind the Random NTP Bizarreness of Incorrect Year Being Set
2012-11-20/a>John BambenekFirefox v 17.0 just released, more here: http://www.mozilla.org/en-US/firefox/17.0/releasenotes/
2012-11-19/a>John BambenekMoneyGram fined $100 million for aiding wire fraud - http://krebsonsecurity.com/2012/11/moneygram-fined-100-million-for-wire-fraud/
2012-11-19/a>John BambenekNew Poll: Top 5 Unresolved Security Problems of 2012
2012-11-17/a>Manuel Humberto Santander PelaezNew Sysinternal Updates: AdExplorer v1.44, Contig v1.7, Coreinfo v3.2, Procdump v5.1. See http://blogs.technet.com/b/sysinternals/archive/2012/11/16/updates-adexplorer-v1-44-contig-v1-7-coreinfo-v3-2-procdump-v5-1.aspx?Redirected=true
2012-11-16/a>Manuel Humberto Santander PelaezInformation Security Incidents are now a concern for colombian government
2012-11-13/a>Jim ClausingMicrosoft November 2012 Black Tuesday Update - Overview
2012-11-12/a>John BambenekRequest for info: Robocall Phishing Against Local/Regional Banks
2012-11-09/a>Mark BaggettRemote Diagnostics with PSR
2012-11-09/a>Mark BaggettFresh batch of Microsoft patches next week
2012-11-08/a>Daniel WesemannGet a 40% discount on your hotel room!
2012-11-07/a>Mark BaggettHelp eliminate unquoted path vulnerabilities
2012-11-07/a>Mark BaggettMultiple 0-Days Reported!
2012-11-07/a>Mark BaggettCisco TACACS+ Authentication Bypass
2012-11-05/a>Johannes UllrichReminder: Ongoing SMTP Brute Forcing Attacks
2012-11-05/a>Johannes UllrichPossible Fake-AV Ads from Doubleclick Servers
2012-11-04/a>Lorna HutchesonWhat's important on your network?
2012-10-31/a>Johannes UllrichCyber Security Awareness Month - Day 31 - Business Continuity and Disaster Recovery
2012-10-30/a>Johannes UllrichHurricane Sandy Update
2012-10-30/a>Richard PorterSplunk 5.0 SP-CAAAHB4 http://www.splunk.com/view/SP-CAAAHB4
2012-10-30/a>Mark HofmanCyber Security Awareness Month - Day 30 - DSD 35 mitigating controls
2012-10-28/a>Tony CarothersFirefox 16.02 Released
2012-10-26/a>Adam SwangerSecuring the Human Special Webcast - October 30, 2012
2012-10-26/a>Russ McReeCyber Security Awareness Month - Day 26 - Attackers use trusted domain to propagate Citadel Zeus variant
2012-10-25/a>Richard PorterCyber Security Awareness Month - Day 25 - Pro Audio & Video Packets on the Wire
2012-10-24/a>Russ McReeOngoing Windstream outage in the midwest - https://twitter.com/search?q=windstream
2012-10-24/a>Rob VandenBrinkTime to run Windows Update - - Microsoft Updates KB2755801 for Windows RT / IE10 / Flash Player - http://technet.microsoft.com/en-us/security/advisory/2755801
2012-10-23/a>Rob VandenBrinkCyber Security Awareness Month - Day 23: Character Encoding Standards - ASCII and Successors
2012-10-21/a>Johannes UllrichCyber Security Awareness Month - Day 22: Connectors
2012-10-21/a>Lorna HutchesonPotential Phish for Regular Webmail Accounts
2012-10-19/a>Johannes UllrichCyber Security Awareness Month - Day 19: Standard log formats and CEE.
2012-10-18/a>Rob VandenBrinkCyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide
2012-10-17/a>Mark HofmanOracle Critical Patch Update October
2012-10-17/a>Mark HofmanNew Acrobat release (including reader) available. Version 11. Some security improvements more here -->http://blogs.adobe.com/adobereader/
2012-10-16/a>Richard PorterCyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook.
2012-10-16/a>Johannes UllrichCyber Security Awareness Month - Day 16: W3C and HTML
2012-10-14/a>Pedro BuenoCyber Security Awareness Month - Day 14 - Poor Man's File Analysis System - Part 1
2012-10-11/a>Rob VandenBrinkCyber Security Awareness Month - Day 11 - Vendor Agnostic Standards (Center for Internet Security)
2012-10-09/a>Johannes UllrichMicrosoft October 2012 Black Tuesday Update - Overview
2012-10-07/a>Tony CarothersCyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1
2012-10-05/a>Johannes UllrichCyber Security Awareness Month - Day 5: Standards Body Soup, So many Flavors in the bowl.
2012-10-05/a>Richard PorterReports of a Distributed Injection Scan
2012-10-05/a>Richard PorterVMWare Security Advisory: VMSA-2012-0014 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html
2012-10-04/a>Mark HofmanAnd the SHA-3 title goes to .....Keccak
2012-10-04/a>Johannes UllrichCyber Security Awareness Month - Day 4: Crypto Standards
2012-10-03/a>Kevin ShorttFake Support Calls Reported
2012-10-02/a>Russ McReeCyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines
2012-10-01/a>Johannes UllrichCyber Security Awareness Month
2012-09-28/a>Joel EslerAdobe certification revocation for October 4th
2012-09-26/a>Johannes UllrichSome Android phones can be reset to factory default by clicking on links
2012-09-26/a>Johannes UllrichMore Java Woes
2012-09-21/a>Johannes UllrichiOS 6 Security Roundup
2012-09-20/a>Russ McReeFlash Player update but no announcement, check your version http://www.adobe.com/software/flash/about/
2012-09-20/a>Russ McReeApple and Cisco Security Advisories 19 SEP 2012
2012-09-20/a>Russ McReeFinancial sector advisory: attacks and threats against financial institutions
2012-09-19/a>Russ McReeScript kiddie scavenging with Shellbot.S
2012-09-17/a>Rob VandenBrinkWhat's on your iPad?
2012-09-14/a>Lenny ZeltserScam Report - Fake Voice Mail Email Notification Redirects to Malicious Site
2012-09-14/a>Lenny ZeltserAnalyzing Malicious RTF Files Using OfficeMalScanner's RTFScan
2012-09-13/a>Mark BaggettTCP Fuzzing with Scapy
2012-09-13/a>Mark BaggettMicrosoft disrupts traffic associated with the Nitol botnet
2012-09-13/a>Mark BaggettMore SSL trouble
2012-09-11/a>Adam SwangerMicrosoft September 2012 Black Tuesday Update - Overview
2012-09-10/a>Johannes UllrichMicrosoft Patch Tuesday Pre-Release
2012-09-10/a>Johannes UllrichGodaddy DDoS Attack
2012-09-10/a>donald smithBlue Toad publishing co compromise lead to UDID release. http://redtape.nbcnews.com/_news/2012/09/10/13781440-exclusive-the-real-source-of-apple-device-ids-leaked-by-anonymous-last-week?lite
2012-09-09/a>Guy BruneauPhishing/Spam Pretending to be from BBB
2012-09-08/a>Guy BruneauWebmin Input Validation Vulnerabilities
2012-09-06/a>Johannes UllrichSSL Requests sent to port 80 (request for help/input)
2012-09-04/a>Johannes UllrichAnother round of "Spot the Exploit E-Mail"
2012-09-02/a>Lorna HutchesonDemonstrating the value of your Intrusion Detection Program and Analysts
2012-09-01/a>Russ McReeBlackhole targeting Java vulnerability via fake Microsoft Services Agreement email phish
2012-08-31/a>Russ McReeNot so fast: Java 7 Update 7 critical vulnerability discovered in less than 24 hours
2012-08-30/a>Johannes UllrichEditorial: The Slumlord Approach to Network Security http://isc.sans.edu/j/editorial
2012-08-30/a>Bojan ZdrnjaAnalyzing outgoing network traffic (part 2)
2012-08-29/a>Johannes Ullrich"Data" URLs used for in-URL phishing
2012-08-27/a>Johannes UllrichThe Good, Bad and Ugly about Assigning IPv6 Addresses
2012-08-27/a>Johannes UllrichMalware Spam harvesting Facebook Information
2012-08-26/a>Lorna HutchesonWho ya gonna contact?
2012-08-23/a>Bojan ZdrnjaAnalyzing outgoing network traffic
2012-08-22/a>Adrien de BeaupreApple Remote Desktop update fixes no encryption issue
2012-08-22/a>Adrien de BeauprePhishing/spam via SMS
2012-08-21/a>Adrien de BeaupreYYABCAFU - Yes Yet Another Bleeping Critical Adobe Flash Update
2012-08-21/a>Adrien de BeaupreRuggedCom fails key management 101 on Rugged Operating System (ROS)
2012-08-20/a>Manuel Humberto Santander PelaezDo we need test procedures in our companies before implementing Antivirus signatures?
2012-08-19/a>Manuel Humberto Santander PelaezAuthentication Issues between entities during protocol message exchange in SCADA Systems
2012-08-17/a>Guy BruneauSuspicious eFax Spear Phishing Messages
2012-08-14/a>Rick WannerMicrosoft August 2012 Black Tuesday Update - Overview
2012-08-12/a>Tony CarothersLayers of the Defense-in-Depth Onion
2012-08-12/a>Tony CarothersOracle Security Alert for CVE-2012-3132
2012-08-09/a>Mark HofmanZeus/Citadel variant causing issues in the Netherlands
2012-08-09/a>Mark HofmanSQL Injection Lilupophilupop style, Part 2
2012-08-07/a>Adrien de BeaupreWho protects small business?
2012-08-05/a>Daniel WesemannPhishing for Payroll with unpatched Java
2012-08-04/a>Kevin ListonVendors: More Patch-Release Options Please
2012-07-31/a>Daniel WesemannSQL injection, lilupophilupop-style
2012-07-30/a>Guy BruneauBIND 9 Security Updates
2012-07-27/a>Daniel WesemannCuckoo 0.4 is out - cool new features for malware analysis http://www.cuckoosandbox.org/
2012-07-25/a>Johannes UllrichApple OS X 10.8 (Mountain Lion) released
2012-07-25/a>Johannes UllrichMicrosoft Exchange/Sharepoint and others: Oracle Outside In Vulnerability
2012-07-24/a>Richard PorterWireshark 1.8.1 Released http://www.wireshark.org/
2012-07-24/a>Richard PorterReport of spike in DNS Queries gd21.net
2012-07-21/a>Rick WannerTippingPoint DNS Version Request increase
2012-07-20/a>Mark BaggettSyria Internet connection cut?
2012-07-19/a>Mark BaggettDiagnosing Malware with Resource Monitor
2012-07-19/a>Mark BaggettA Heap of Overflows?
2012-07-16/a>Richard PorterSysinternals Update @ http://blogs.technet.com/b/sysinternals/archive/2012/07/16/updates-handle-v3-5-process-explorer-v15-22-process-monitor-v3-03-rammap-v1-21-zoomit-v4-3.aspx
2012-07-16/a>Jim ClausingAn analysis of the Yahoo! passwords
2012-07-13/a>Richard PorterYesterday (not as on the ball as Rob) at SANSFire
2012-07-13/a>Russ McRee2 for 1: SANSFIRE & MSRA presentations
2012-07-13/a>Russ McReeYahoo service SQL injection vuln leads to account exposure
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Recording Server - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Manager - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman
2012-07-10/a>Rob VandenBrinkToday at SANSFIRE (09 July 2012) - ISC Panel Discussion on the State of the Internet
2012-07-09/a>Johannes UllrichThe FBI will turn off the Internet on Monday (or not)
2012-07-09/a>Manuel Humberto Santander PelaezInternet Storm Center panel tonight at SANSFIRE 2012!
2012-07-05/a>Adrien de BeaupreNew OS X trojan backdoor MaControl variant reported
2012-07-05/a>Adrien de BeaupreMicrosoft advanced notification for July 2012 patch Tuesday
2012-07-02/a>Dan GoldbergStorms of June 29th 2012 in Mid Atlantic region of the USA
2012-07-02/a>Joel EslerLinux & Java leap second bug
2012-07-02/a>Joel EslerA rough guide to keeping your website up
2012-06-29/a>Jim ClausingUpdated SysInternals tools - Autoruns, Process Explorer, Process Monitor, PSKill -- http://blogs.technet.com/b/sysinternals/archive/2012/06/28/updates-autoruns-v11-32-process-explorer-v15-21-process-monitor-v3-02-pskill-v1-15-rammap-v1-2.aspx
2012-06-28/a>Chris MohanMassive spike in BGP traffic - Possible BGP poisoning?
2012-06-27/a>Daniel WesemannWhat's up with port 79 ?
2012-06-25/a>Rick WannerTargeted Malware for Industrial Espionage?
2012-06-25/a>Guy BruneauIssues with Windows Update Agent
2012-06-22/a>Kevin ListonInvestigator's Tool-kit: Timeline
2012-06-21/a>Raul SilesPrint Bomb? (Take 2)
2012-06-21/a>Russ McReeAnalysis of drive-by attack sample set
2012-06-21/a>Russ McReeWireshark 1.8.0 released 21 JUN 2012 http://www.wireshark.org/download.html
2012-06-19/a>Daniel Wesemann Vulnerabilityqueerprocessbrittleness
2012-06-14/a>Johannes UllrichSpot the Phish: Verizon Wireless
2012-06-10/a>Scott FendleyPreying on Users After Major Security Incidents
2012-06-06/a>Jim ClausingBIND 9 Update - DoS or information disclosure vulnerability
2012-06-06/a>Jim ClausingPotential leak of 6.5+ million LinkedIn password hashes
2012-06-04/a>Rob VandenBrinkvSphere 5.0 Hardening Guide Officially Released
2012-06-04/a>Lenny ZeltserDecoding Common XOR Obfuscation in Malicious Code
2012-05-30/a>Rob VandenBrinkIt's Phishing Season! In fact, it's ALWAYS Phishing Season!
2012-05-23/a>Mark BaggettProblems with MS12-035 affecting XP, SBS and Windows 2003?
2012-05-14/a>Chris MohanLaptops at Security Conferences
2012-05-08/a>Bojan ZdrnjaWindows Firewall Bypass Vulnerability and NetBIOS NS
2012-05-06/a>Jim ClausingTool updates and Win 8
2012-04-30/a>Rob VandenBrinkFCC posts Enquiry Documents on Google Wardriving
2012-04-23/a>Russ McReeEmergency Operations Centers & Security Incident Management: A Correlation
2012-04-18/a>Kevin ShorttSysinternals Updates - 2012 Apr 17
2012-04-10/a>Swa FrantzenWindows Vista RIP
2012-04-06/a>Johannes UllrichSocial Share Privacy
2012-03-16/a>Swa FrantzenINFOCON Yellow - Microsoft RDP - MS12-020
2012-03-13/a>Lenny ZeltserPlease transfer this email to your CEO or appropriate person, thanks
2012-02-20/a>Johannes UllrichThe Ultimate OS X Hardening Guide Collection
2012-02-20/a>Pedro BuenoSimple Malware Research Tools
2012-01-31/a>Russ McReeOSINT tactics: parsing from FOCA for Maltego
2012-01-24/a>Bojan ZdrnjaIs it time to get rid of NetBIOS?
2012-01-21/a>Guy BruneauDNS Sinkhole Scripts Fixes/Update
2012-01-19/a>Chris MohanWHOIS contacts are your friends
2012-01-13/a>Guy BruneauSysinternals Updates - http://blogs.technet.com/b/sysinternals/archive/2012/01/13/updates-autoruns-v11-21-coreinfo-v3-03-portmon-v-3-03-process-explorer-v15-12-mark-s-blog-and-mark-at-rsa-2012.aspx
2012-01-12/a>Rob VandenBrinkStuff I Learned Scripting - Fun with STDERR
2011-12-25/a>Deborah HaleMerry Christmas, Happy Holidays
2011-12-23/a>Daniel WesemannPrinter Pranks
2011-12-21/a>Johannes UllrichNew Vulnerability in Windows 7 64 bit
2011-12-12/a>Daniel WesemannYou won 100$ or a free iPad!
2011-12-08/a>Adrien de BeaupreMicrosoft Security Bulletin Advance Notification for December 2011
2011-12-06/a>Kevin ShorttCain & Abel v4.9.43 Released - http://www.oxid.it/
2011-12-05/a>Stephen HallISC describe DNS crash bug analysis
2011-12-01/a>Mark HofmanSQL Injection Attack happening ATM
2011-11-29/a>John BambenekHacking HP Printers for Fun and Profit
2011-11-28/a>Tom ListonA Puzzlement...
2011-11-24/a>Russ McReeQuick Tip: Pastebin Monitoring & Recon
2011-11-23/a>Johannes UllrichSCADA hacks published on Pastebin
2011-11-16/a>Jason LamPotential 0-day on Bind 9
2011-11-11/a>Rick WannerYay! More Sysinternals updates! http://technet.microsoft.com/en-us/sysinternals
2011-11-10/a>Rob VandenBrinkStuff I Learned Scripting - - Parsing XML in a One-Liner
2011-10-29/a>Richard PorterThe Sub Critical Control? Evidence Collection
2011-10-28/a>Russ McReeCritical Control 19: Data Recovery Capability
2011-10-27/a>Mark BaggettCritical Control 18: Incident Response Capabilities
2011-10-26/a>Rick WannerCritical Control 17:Penetration Tests and Red Team Exercises
2011-10-25/a>Chris MohanRecurring reporting made easy?
2011-10-21/a>Johannes UllrichNew Flash Click Jacking Exploit
2011-10-17/a>Rob VandenBrinkCritical Control 11: Account Monitoring and Control
2011-10-15/a>Guy BruneauDNS Sinkhole Parser Script Update
2011-10-10/a>Tom ListonWhat's In A Name?
2011-10-02/a>Mark HofmanCyber Security Awareness Month Day 1/2 - Schedule
2011-10-02/a>Mark HofmanCyber Security Awareness Month Day 1/2 - Introduction to the controls
2011-09-29/a>Daniel WesemannThe SSD dilemma
2011-09-20/a>Swa FrantzenDiginotar declared bankrupt
2011-09-19/a>Guy BruneauMS Security Advisory Update - Fraudulent DigiNotar Certificates
2011-09-15/a>Swa FrantzenDigiNotar looses their accreditation for qualified certificates
2011-09-13/a>Swa FrantzenGlobalSign back in operation
2011-09-13/a>Swa FrantzenMore DigiNotar intermediate certificates blocklisted at Microsoft
2011-09-09/a>Guy BruneauIPv6 and DNS Sinkhole
2011-09-07/a>Lenny ZeltserGlobalSign Temporarily Stops Issuing Certificates to Investigate a Potential Breach
2011-09-06/a>Swa FrantzenDigiNotar audit - intermediate report available
2011-09-06/a>Johannes UllrichMicrosoft Releases Diginotar Related Patch and Advisory
2011-09-05/a>Bojan ZdrnjaBitcoin – crypto currency of future or heaven for criminals?
2011-09-01/a>Swa FrantzenDigiNotar breach - the story so far
2011-08-31/a>Johannes UllrichFirefox/Thunderbird 6.0.1 released to blocklist bad DigiNotar SSL certificates
2011-08-31/a>Johannes UllrichPhishing e-mail to custom e-mail addresses
2011-08-31/a>Johannes UllrichKernel.org Compromise
2011-08-26/a>Daniel WesemannUser Agent 007
2011-08-25/a>Kevin ShorttIncreased Traffic on Port 3389
2011-08-24/a>Rob VandenBrinkCitrix Access Gateway Cross Site Scripting vulnerability and fix ==> http://support.citrix.com/article/CTX129971
2011-08-17/a>Rob VandenBrinkPutting all of Your Eggs in One Basket - or How NOT to do Layoffs
2011-08-17/a>Rob VandenBrinkSysinternal updates for ProcDump v4.0, Process Monitor v2.96, Process Explorer v15.02 ==> http://blogs.technet.com/b/sysinternals/
2011-08-16/a>Scott FendleyPhishing Scam Victim Response
2011-08-15/a>Rob VandenBrink8 Years since the Eastern Seaboard Blackout - Has it Been that Long?
2011-08-08/a>Rob VandenBrinkPing is Bad (Sometimes)
2011-08-05/a>Johannes UllrichMicrosoft Patch Tuesday Advance Notification: 13 Bulletins coming http://www.microsoft.com/technet/security/Bulletin/MS11-aug.mspx
2011-07-31/a>Daniel WesemannAnatomy of a Unix breach
2011-07-25/a>Chris MohanMonday morning incident handler practice
2011-07-17/a>Mark HofmanSSH Brute Force
2011-07-09/a>Chris MohanSafer Windows Incident Response
2011-07-07/a>Rob VandenBrink"There's a Patch for that" (or maybe not)
2011-07-06/a>Rob VandenBrink"Too Important to Patch" - Wait? What?
2011-07-05/a>Raul SilesTwo DoS remotely exploitable vulnerabilities affect BIND 9: http://www.isc.org/advisories/bind Updgrade to 9.8.0-P4.
2011-07-03/a>Deborah HaleBusiness Continuation in the Face of Disaster
2011-06-30/a>Rob VandenBrinkUpdate for RSA Authentication Manager
2011-06-28/a>Johannes UllrichDNSSEC Tips
2011-06-22/a>Guy BruneauHow Good is your Employee Termination Policy?
2011-06-17/a>Richard PorterWhen do you stop owning Technology?
2011-06-12/a>Mark HofmanCloud thoughts
2011-06-09/a>Richard PorterOne Browser to Rule them All?
2011-06-08/a>Johannes UllrichSpam from compromised Hotmail accounts
2011-06-06/a>Manuel Humberto Santander PelaezPhishing: Same goal, same techniques and people still falling for such scams
2011-06-06/a>Johannes UllrichThe Havij SQL Injection Tool
2011-06-03/a>Guy BruneauSonyPictures Site Compromised
2011-06-01/a>Johannes UllrichEnabling Privacy Enhanced Addresses for IPv6
2011-05-30/a>Johannes UllrichLockheed Martin and RSA Tokens
2011-05-25/a>Lenny ZeltserMonitoring Social Media for Security References to Your Organization
2011-05-20/a>Guy BruneauSysinternals Updates, Analyzing Stuxnet Infection with Sysinternals Tools Part 3
2011-05-10/a>Swa FrantzenChanging MO in scamming our users ?
2011-05-09/a>Johannes UllrichPatch for BIND 9.8.0 DoS Vulnerability
2011-05-06/a>Richard PorterUpdated Exploit Index for Microsoft
2011-05-04/a>Richard PorterMicrosoft Sysinterals Update
2011-05-03/a>Johannes UllrichUpdate on Osama Bin Laden themed Malware
2011-05-02/a>Johannes UllrichBin Laden Death Related Malware
2011-05-01/a>Deborah HaleDroid MarketPlace Has a New App
2011-04-26/a>John BambenekIs the Insider Threat Really Over?
2011-04-25/a>Rob VandenBrinkSony PlayStation Network Outage - Day 5
2011-04-19/a>Bojan ZdrnjaSQL injection: why can’t we learn?
2011-04-14/a>Adrien de BeaupreSysinternals updates, a new blog post, and webcast
2011-04-11/a>Johannes UllrichGMail User Using 2FA Warned of Access From China
2011-04-07/a>Chris MohanBeing a good internet neighbour
2011-04-01/a>John BambenekLizaMoon Mass SQL-Injection Attack Infected at least 500k Websites
2011-03-27/a>Guy BruneauStrange Shockwave File with Surprising Attachments
2011-03-25/a>Kevin ListonAPT Tabletop Exercise
2011-03-22/a>Chris MohanRead only USB stick trick
2011-03-15/a>Lenny ZeltserLimiting Exploit Capabilities by Using Windows Integrity Levels
2011-03-07/a>Bojan ZdrnjaOracle padding attacks (Codegate crypto 400 writeup)
2011-02-28/a>Deborah HalePossible Botnet Scanning
2011-02-25/a>Johannes UllrichThunderbolt Security Speculations
2011-02-24/a>Johannes UllrichWindows 7 / 2008 R2 Service Pack 1 Problems
2011-02-23/a>Johannes UllrichWindows 7 Service Pack 1 out
2011-02-23/a>Manuel Humberto Santander PelaezBind DOS vulnerability (CVE-2011-0414)
2011-02-21/a>Adrien de BeaupreWinamp forums compromised
2011-02-16/a>Jason LamWindows 0-day SMB mrxsmb.dll vulnerability
2011-02-10/a>Chris MohanBefriending Windows Security Log Events
2011-02-09/a>Mark HofmanAdobe Patches (shockwave, Flash, Reader & Coldfusion)
2011-02-08/a>Johannes UllrichTippingpoint Releases Details on Unpatched Bugs
2011-02-07/a>Richard PorterCrime is still Crime! Pt 2
2011-02-05/a>Guy BruneauOpenSSH Legacy Certificate Information Disclosure Vulnerability
2011-02-02/a>Johannes UllrichHaving Phish on Friday
2011-01-30/a>Richard PorterThe Modern Dark Ages?
2011-01-27/a>Robert DanfordMicrosoft Security Advisory for MHTML via Internet Explorer (MS2501696/CVE-2011-0096)
2011-01-25/a>Chris MohanReviewing our preconceptions
2011-01-24/a>Rob VandenBrinkWhere have all the COM Ports Gone? - How enumerating COM ports led to me finding a “misplaced” Microsoft tool
2011-01-23/a>Richard PorterCrime is still Crime!
2011-01-12/a>Richard PorterHow Many Loyalty Cards do you Carry?
2011-01-12/a>Richard PorterYet Another Data Broker? AOL Lifestream.
2011-01-10/a>Manuel Humberto Santander PelaezVirusTotal VTzilla firefox/chrome plugin
2011-01-05/a>Johannes UllrichCurrently Unpatched Windows / Internet Explorer Vulnerabilities
2011-01-04/a>Johannes UllrichMicrosoft Advisory: Vulnerability in Graphics Rendering Engine
2010-12-29/a>Daniel WesemannBeware of strange web sites bearing gifts ...
2010-12-26/a>Manuel Humberto Santander PelaezISC infocon monitor app for OS X
2010-12-23/a>Mark HofmanSkoudis' Annual Xmas Hacking Challenge - The Nightmare Before Charlie Brown's Christmas
2010-12-21/a>Rob VandenBrinkNetwork Reliability, Part 2 - HSRP Attacks and Defenses
2010-12-19/a>Raul SilesIntel's new processors have a remote kill switch (Anti-Theft 3.0)
2010-12-10/a>Mark HofmanMicrosoft patches
2010-12-05/a>Jim ClausingUpdates to a couple of Sysinternals tools
2010-12-02/a>Kevin JohnsonRobert Hansen and our happiness
2010-12-02/a>Kevin JohnsonSQL Injection: Wordpress 3.0.2 released
2010-11-29/a>Stephen HalliPhone phishing - What you see, isn't what you get
2010-11-26/a>Mark HofmanUsing password cracking as metric/indicator for the organisation's security posture
2010-11-24/a>Bojan ZdrnjaPrivilege escalation 0-day in almost all Windows versions
2010-11-22/a>Lenny ZeltserBrand Impersonations On-Line: Brandjacking and Social Networks
2010-11-19/a>Jason LamExchanging and sharing of assessment results
2010-11-18/a>Chris CarboniStopping the ZeroAccess Rootkit
2010-11-17/a>Guy BruneauCisco Unified Videoconferencing Affected by Multiple Vulnerabilities
2010-11-15/a>Stephen HallMinibis hits beta with Version 2.1
2010-11-01/a>Manuel Humberto Santander PelaezCheckpoint UTM-1 edge VPN boxes worldwide did an unscheduled reboot
2010-10-26/a>Pedro BuenoBe (even more) careful with public hotspots. Firesheep released yesterday. Brilliant and scary.
2010-10-22/a>Manuel Humberto Santander PelaezIntypedia project
2010-10-18/a>Manuel Humberto Santander PelaezCyber Security Awareness Month - Day 18 - What you should tell your boss when there's a crisis
2010-10-11/a>Adrien de BeaupreOT: Happy Thanksgiving Day Canada
2010-10-04/a>Mark HofmanOnline Voting
2010-09-25/a>Rick WannerGuest Diary: Andrew Hunt - Visualizing the Hosting Patterns of Modern Cybercriminals
2010-09-17/a>Robert DanfordCirca 2007 Linux Kernel Vulnerability Resurfaces (Was CVE-2007-4573, Now CVE-2010-3301)
2010-09-16/a>Johannes UllrichFacebook "Like Pages"
2010-09-04/a>Kevin ListonInvestigating Malicious Website Reports
2010-08-27/a>Mark HofmanFTP Brute Password guessing attacks
2010-08-23/a>Manuel Humberto Santander PelaezFirefox plugins to perform penetration testing activities
2010-08-23/a>Bojan ZdrnjaDLL hijacking vulnerabilities
2010-08-16/a>Raul SilesBlind Elephant: A New Web Application Fingerprinting Tool
2010-08-15/a>Manuel Humberto Santander PelaezObfuscated SQL Injection attacks
2010-08-13/a>Guy BruneauShadowserver Binary Whitelisting Service
2010-08-10/a>Daniel WesemannSSH - new brute force tool?
2010-08-07/a>Stephen HallCountdown to Tuesday...
2010-08-05/a>Rob VandenBrinkAccess Controls for Network Infrastructure
2010-08-04/a>Tom ListonIncident Reporting - Liston's "How-To" Guide
2010-08-03/a>Johannes UllrichWhen Lightning Strikes
2010-08-02/a>Manuel Humberto Santander PelaezSecuring Windows Internet Kiosk
2010-07-29/a>Rob VandenBrinkNoScript 2.0 released
2010-07-26/a>Guy BruneauSophosLabs Released Free Tool to Validate Microsoft Shortcut
2010-07-24/a>Manuel Humberto Santander PelaezTransmiting logon information unsecured in the network
2010-07-23/a>Mark HofmanvBulletin vB 3.8.6 vulnerability
2010-07-23/a>Mark HofmanSome of our favourite sysinternals tools have been updated. TCPview, Autoruns, ProcDump and Disk2vhd have changed. More here http://blogs.technet.com/b/sysinternals/archive/2010/07/22/updates-tcpview-v3-0-autoruns-v10-02-procdump-v1-81-disk2vhd-v1-61.aspx
2010-07-20/a>Manuel Humberto Santander PelaezLowering infocon back to green
2010-07-07/a>Kevin ShorttFacebook, Facebook, What Do YOU See?
2010-07-04/a>Manuel Humberto Santander PelaezNew Winpcap Version
2010-06-27/a>Manuel Humberto Santander PelaezStudy of clickjacking vulerabilities on popular sites
2010-06-19/a>Guy BruneauDNS Sinkhole ISO Available for Download
2010-06-18/a>Tom ListonIMPORTANT INFORMATION: Distributed SSH Brute Force Attacks
2010-06-17/a>Deborah HaleDigital Copy Machines - Security Risk?
2010-06-17/a>Deborah HaleInternet Fraud Alert Kicks Off Today
2010-06-15/a>Manuel Humberto Santander PelaezMicrosoft Windows Help and Support Center vulnerability (CVE 2010-1885) exploit in the wild
2010-06-15/a>Manuel Humberto Santander PelaeziPhone 4 Order Security Breach Exposes Private Information
2010-06-14/a>Manuel Humberto Santander PelaezNew way of social engineering on IRC
2010-06-10/a>Deborah HaleTop 5 Social Networking Media Risks
2010-06-09/a>Deborah HaleMass Infection of IIS/ASP Sites
2010-06-07/a>Manuel Humberto Santander PelaezSoftware Restriction Policy to keep malware away
2010-06-06/a>Manuel Humberto Santander PelaezNice OS X exploit tutorial
2010-06-04/a>Johannes UllrichChanges to Internet Storm Center Host Name
2010-06-02/a>Bojan ZdrnjaClickjacking attacks on Facebook's Like plugin
2010-05-25/a>donald smithFace book “joke” leads to firing.
2010-05-19/a>Jason LamEFF paper about browser tracking
2010-05-07/a>Johannes UllrichStock market "wipe out" may be due to computer error
2010-05-04/a>Rick WannerSIFT review in the ISSA Toolsmith
2010-05-02/a>Mari NicholsZbot Social Engineering
2010-04-30/a>Johannes UllrichSharepoint XSS Vulnerability
2010-04-30/a>Kevin ListonCVE-2010-0817 SharePoint XSS Scorecard
2010-04-29/a>Bojan ZdrnjaWho needs exploits when you have social engineering?
2010-04-21/a>Guy BruneauGoogle Chrome Security Update v4.1.249.1059 Released: http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html
2010-04-20/a>Raul SilesAre You Ready for a Transportation Collapse...?
2010-04-19/a>Daniel WesemannLinked into scams?
2010-04-14/a>Mark HofmanAnd let the patching games continue
2010-04-13/a>Adrien de BeaupreWeb App Testing Tools
2010-04-13/a>Johannes UllrichMore Legal Threat Malware E-Mail
2010-04-02/a>Guy BruneauOracle Java SE and Java for Business Critical Patch Update Advisory
2010-03-27/a>Guy BruneauHP-UX Running NFS/ONCplus, Inadvertently Enabled NFS
2010-03-27/a>Guy BruneauCreate a Summary of IP Addresses from PCAP Files using Unix Tools
2010-03-21/a>Chris CarboniResponding To The Unexpected
2010-03-18/a>Bojan ZdrnjaDangers of copy&paste
2010-03-15/a>Adrien de BeaupreSpamassassin Milter Plugin Remote Root Attack
2010-03-06/a>Tony CarothersIntegration and the Security of New Technologies
2010-02-22/a>Rob VandenBrinkNew Risks in Penetration Testing
2010-02-17/a>Rob VandenBrinkMultiple Security Updates for ESX 3.x and ESXi 3.x
2010-02-15/a>Johannes UllrichVarious Olympics Related Dangerous Google Searches
2010-02-12/a>G. N. WhiteTime to update those IP Bogon Filters (again)
2010-02-11/a>Deborah HaleThe Mysterious Blue Screen
2010-02-06/a>Guy BruneauLANDesk Management Gateway Vulnerability
2010-02-03/a>Johannes UllrichInformation Disclosure Vulnerability in Internet Explorer
2010-02-02/a>Johannes UllrichTwitter Mass Password Reset due to Phishing
2010-02-01/a>Rob VandenBrinkNMAP 5.21 - Is UDP Protocol Specific Scanning Important? Why Should I Care?
2010-01-27/a>Raul SilesCommand Line Kung Fu
2010-01-26/a>Rob VandenBrinkVMware vSphere Hardening Guide Draft posted for public review
2010-01-22/a>Mari NicholsPass-down for a Successful Incident Response
2010-01-17/a>Mark HofmanWhy not Yellow?
2010-01-14/a>Bojan Zdrnja0-day vulnerability in Internet Explorer 6, 7 and 8
2010-01-10/a>Guy BruneauEasy DNS BIND Sinkhole Setup
2010-01-09/a>G. N. WhiteWhat's Up With All The Port Scanning Using TCP/6000 As A Source Port?
2010-01-08/a>Rob VandenBrinkMicrosoft OfficeOnline, Searching for Trust and Malware
2009-12-17/a>Daniel Wesemannoverlay.xul is back
2009-12-16/a>Rob VandenBrinkBeware the Attack of the Christmas Greeting Cards !
2009-12-15/a>Johannes UllrichImportant BIND name server updates - DNSSEC
2009-12-04/a>Daniel WesemannThe economics of security advice (MSFT research paper)
2009-12-02/a>Rob VandenBrinkSPAM and Malware taking advantage of H1N1 concerns
2009-11-29/a>Patrick Nolan A Cloudy Weekend
2009-11-25/a>Jim ClausingTool updates
2009-11-24/a>Rick WannerMicrosoft Security Advisory 977981 - IE 6 and IE 7
2009-11-24/a>John BambenekBIND Security Advisory (DNSSEC only)
2009-11-14/a>Adrien de BeaupreMicrosoft advisory for Windows 7 / Windows Server 2008 R2 Remote SMB DoS Exploit released
2009-11-13/a>Adrien de BeaupreFlash Origin Policy Attack
2009-11-12/a>Rob VandenBrinkWindows 7 / Windows Server 2008 Remote SMB Exploit
2009-11-11/a>Rob VandenBrinkLayer 2 Network Protections against Man in the Middle Attacks
2009-11-09/a>Chris Carboni80's Flashback on Jailbroken iPhones
2009-11-05/a>Swa FrantzenInsider threat: The snapnames case
2009-10-26/a>Johannes UllrichToday: ISC Login bugfix day. If you have issues logging in using OpenID, please email a copy of your OpenID URL to jullrich\at\sans.edu
2009-10-24/a>Marcus SachsWindows 7 - How is it doing?
2009-10-22/a>Adrien de BeaupreSysinternals updates: Disk2vhd v1.1, ZoomIt v4.1, Coreinfo v2.0, VMMap v2.4
2009-10-19/a>Daniel WesemannScam Email
2009-10-17/a>Rick WannerMozilla disables Microsoft plug-ins?
2009-10-16/a>Adrien de BeaupreDisable MS09-054 patch, or Firefox Plugin?
2009-10-13/a>Daniel WesemannAdobe Reader and Acrobat - Black Tuesday continues
2009-10-08/a>Johannes UllrichFirefox Plugin Collections
2009-10-04/a>Guy BruneauSamba Security Information Disclosure and DoS
2009-10-02/a>Stephen HallNew SysInternal fun for the weekend
2009-09-27/a>Stephen HallUse Emerging Threats signatures? READ THIS!
2009-09-20/a>Mari NicholsInsider Threat and Security Awareness
2009-09-19/a>Rick WannerSysinternals Tools Updates
2009-09-08/a>Guy BruneauVista/2008/Windows 7 SMB2 BSOD 0Day
2009-09-05/a>Mark HofmanCritical Infrastructure and dependencies
2009-08-26/a>Johannes UllrichWSUS 3.0 SP2 released
2009-08-26/a>Johannes UllrichCisco over-the-air-provisioning skyjacking exploit
2009-08-19/a>Daniel WesemannChecking your protection
2009-08-18/a>Deborah HaleWebsite compromises - what's happening?
2009-08-18/a>Deborah HaleSysinternals Procdump Updated
2009-08-13/a>Jim ClausingNew and updated cheat sheets
2009-08-03/a>Mark HofmanSwitch hardening on your network
2009-08-01/a>Deborah HaleWebsite Warnings
2009-07-31/a>Deborah HaleDon't forget to tell your SysAdmin Thanks
2009-07-31/a>Deborah HaleGoogle Safe Browsing
2009-07-29/a>Bojan ZdrnjaBIND 9 DoS attacks in the wild
2009-07-27/a>Raul SilesFilemon and Regmon are dead, long life to Procmon!
2009-07-27/a>Raul SilesNew Hacker Challenge: Prison Break - Breaking, Entering & Decoding
2009-07-18/a>Patrick NolanChrome update contains Security fixes
2009-07-17/a>Bojan ZdrnjaA new fascinating Linux kernel vulnerability
2009-07-16/a>Guy BruneauChanges in Windows Security Center
2009-07-16/a>Bojan ZdrnjaOWC exploits used in SQL injection attacks
2009-07-13/a>Adrien de Beaupre* Infocon raised to yellow for Excel Web Components ActiveX vulnerability
2009-07-12/a>Mari NicholsCA Apologizes for False Positive
2009-07-10/a>Guy BruneauWordPress Fixes Multiple vulnerabilities
2009-07-07/a>Marcus Sachs* INFOCON Status - staying green
2009-07-03/a>Adrien de BeaupreHappy 4th of July!
2009-07-02/a>Daniel WesemannTime to update updating on PCs for 3rd party apps
2009-07-02/a>Daniel WesemannUnpatched Bloatware on new PCs
2009-06-26/a>Mark HofmanPHPMYADMIN scans
2009-06-24/a>Kyle HaugsnessExploit tools are publicly available for phpMyAdmin
2009-06-24/a>Kyle HaugsnessTCP scanning increase for 4899
2009-06-21/a>Scott FendleyphpMyAdmin Scans
2009-06-20/a>Scott FendleySituational Awareness: Spam Crisis and China
2009-06-16/a>John BambenekIran Internet Blackout: Using Twitter for Operational Intelligence
2009-06-16/a>John BambenekURL Shortening Service Cligs Hacked
2009-06-11/a>Rick WannerMIR-ROR Motile Incident Response - Respond Objectively Remediate
2009-06-10/a>Rick WannerSysInternals Survey
2009-06-01/a>G. N. WhiteYet another "Digital Certificate" malware campaign
2009-05-24/a>Raul SilesFacebook phising using Belgium (.be) domains
2009-05-22/a>Mark HofmanPatching and Adobe
2009-05-22/a>Mark HofmanPatching and Apple - Java issue
2009-05-20/a>Pedro BuenoCyber Warfare and Kylin thoughts
2009-05-19/a>Bojan ZdrnjaAdvanced blind SQL injection (with Oracle examples)
2009-05-11/a>Mari NicholsSysinternals Updates 3 Applications
2009-05-09/a>Patrick NolanShared SQL Injection Lessons Learned blog item
2009-05-06/a>Tom ListonFollow The Bouncing Malware: Gone With the WINS
2009-05-04/a>Tom ListonFacebook phishing malware
2009-05-02/a>Rick WannerMore Swine/Mexican/H1N1 related domains
2009-05-01/a>Adrien de BeaupreIncident Management
2009-04-30/a>Marcus SachsARIN Notification Concerning IPv6
2009-04-28/a>Deborah HaleUpdated List of Domains - Swineflu related
2009-04-27/a>Johannes UllrichSwine Flu (Mexican Flu) related domains
2009-04-26/a>Johannes UllrichPandemic Preparation - Swine Flu
2009-04-24/a>Pedro BuenoDid you check your conference goodies?
2009-04-21/a>Bojan ZdrnjaWeb application vulnerabilities
2009-04-16/a>Adrien de BeaupreIncident Response vs. Incident Handling
2009-04-16/a>Adrien de BeaupreStrange Windows Event Log entry
2009-04-02/a>Bojan ZdrnjaJavaScript insertion and log deletion attack tools
2009-03-27/a>Mark HofmanThere is some SMiShing going on in the EU
2009-03-11/a>Bojan ZdrnjaMassive ARP spoofing attacks on web sites
2009-03-10/a>Swa FrantzenTinyURL and security
2009-03-10/a>Swa FrantzenBrowser plug-ins, transparent proxies and same origin policies
2009-03-02/a>Swa FrantzenObama's leaked chopper blueprints: anything we can learn?
2009-02-25/a>Swa FrantzenTargeted link diversion attempts
2009-02-22/a>Mari NicholsThe Internet Safety Act of 2009
2009-02-20/a>Mark HofmanPhishing with a small twist
2009-02-11/a>Robert DanfordProFTPd SQL Authentication Vulnerability exploit activity
2009-02-06/a>Adrien de BeaupreTime to patch your HP printers
2009-02-01/a>Chris CarboniScanning for Trixbox vulnerabilities
2009-01-31/a>Swa FrantzenDNS DDoS - let's use a long term solution
2009-01-31/a>Swa FrantzenWindows 7 - not so secure ?
2009-01-31/a>John BambenekGoogle Search Engine's Malware Detection Broken
2009-01-20/a>Adrien de BeaupreObamamania
2009-01-18/a>Maarten Van HorenbeeckTargeted social engineering
2009-01-11/a>Deborah HaleThe Frustration of Phishing Attacks
2009-01-08/a>Kyle HaugsnessBIND OpenSSL follow-up
2009-01-07/a>William SaluskyBIND 9.x security patch - resolves potentially new DNS poisoning vector
2009-01-04/a>Rick WannerTwitter/Facebook Phishing Attempt
2009-01-02/a>Rick WannerTools on my Christmas list.
2008-12-28/a>Raul SilesLevel3 Outage?
2008-12-17/a>donald smithInternet Explorer 960714 is released
2008-12-12/a>Johannes UllrichMSIE 0-day Spreading Via SQL Injection
2008-12-12/a>Swa FrantzenBrowser Security Handbook
2008-12-10/a>Bojan Zdrnja0-day exploit for Internet Explorer in the wild
2008-12-02/a>Deborah HaleSonicwall License Manager Failure
2008-12-01/a>Jason LamInput filtering and escaping in SQL injection mitigation
2008-11-25/a>Andre LudwigThe beginnings of a collaborative approach to IDS
2008-11-20/a>Jason LamLarge quantity SQL Injection mitigation
2008-11-14/a>Stephen HallMore updated tools
2008-11-12/a>John BambenekThoughts on Security Intelligence (McColo Corp alleged spam/malware host knocked offline)
2008-11-11/a>Swa FrantzenPhishing for Google adwords
2008-11-02/a>Adrien de BeaupreDaylight saving time
2008-10-31/a>Rick WannerSprint-Cogent Peering Issue
2008-10-30/a>Kevin ListonMaking Intelligence Actionable: Part 2
2008-10-29/a>Deborah HaleDay 29 - Should I Switch Software Vendors?
2008-10-29/a>Deborah HaleEnom Phishing - Caution Enom Registrars
2008-10-20/a>Johannes UllrichFraudulent ATM Reactivation Phone Calls.
2008-10-18/a>Rick WannerUpdates to SysInternals tools!
2008-10-17/a>Patrick NolanDay 17 - Containing a DNS Hijacking
2008-10-17/a>Rick WannerDay 18 - Containing Other Incidents
2008-10-15/a>Rick WannerDay 15 - Containing the Damage From a Lost or Stolen Laptop
2008-10-12/a>Mari NicholsDay 12 Containment: Gathering Evidence That Can be Used in Court
2008-10-10/a>Marcus SachsFake Microsoft Update Email
2008-10-08/a>Johannes UllrichDomaincontrol (GoDaddy) Nameservers DNS Poisoning
2008-10-07/a>Kyle HaugsnessCogent peering problems
2008-10-01/a>Rick WannerHandler Mailbag
2008-09-29/a>Daniel WesemannASPROX mutant
2008-09-22/a>Jim ClausingLessons learned from the Palin (and other) account hijacks
2008-09-20/a>Rick WannerNew (to me) nmap Features
2008-09-16/a>donald smithDon't open that invoice.zip file its not from UPS
2008-09-11/a>David GoldsmithCookieMonster is coming to Pown (err, Town)
2008-09-09/a>Swa Frantzenwordpress upgrade
2008-09-01/a>John BambenekThe Number of Machines Controlled by Botnets Has Jumped 4x in Last 3 Months
2008-08-23/a>Mark HofmanSQL injections - an update
2008-08-15/a>Jim ClausingOMFW 2008 reflections
2008-08-14/a>Johannes UllrichDNSSEC for DShield.org
2008-08-12/a>Johannes UllrichUpcoming Infocon Test and new Color
2008-08-08/a>Mark HofmanMore SQL Injections - very active right now
2008-08-02/a>Maarten Van HorenbeeckA little of that human touch
2008-08-02/a>Swa FrantzenBIND: -P2 patches are released
2008-07-31/a>Swa FrantzenLinus - Linux and Security - follow-up
2008-07-29/a>Swa FrantzenLinus - Linux and Security
2008-07-24/a>Bojan ZdrnjaWhat's brewing in Danmec's pot?
2008-07-24/a>Kyle HaugsnessDNS cache poisoning vulnerability details confirmed
2008-07-11/a>Jim ClausingAnd you thought the DNS issue was an old one...
2008-07-08/a>Johannes UllrichMulitple Vendors DNS Spoofing Vulnerability
2008-07-07/a>Pedro BuenoBad url classification
2008-07-02/a>Jim ClausingAnother little script I threw together
2008-06-30/a>Marcus SachsMore SQL Injection with Fast Flux hosting
2008-06-25/a>Deborah HaleReport of Coreflood.dr Infection
2008-06-24/a>Jason LamSQL Injection mitigation in ASP
2008-06-24/a>Jason LamMicrosoft SQL Injection Prevention Strategy
2008-06-23/a>donald smithPreventing SQL injection
2008-06-18/a>Marcus SachsOlympics Part II
2008-06-17/a>Kyle HaugsnessWhy go high-tech?
2008-06-13/a>Johannes UllrichSQL Injection: More of the same
2008-06-12/a>Bojan ZdrnjaSafari on Windows - not looking good
2008-06-10/a>Swa FrantzenLinux ASN.1 BER kernel buffer overflow
2008-06-02/a>Jim ClausingEmergingthreats.net and ThePlanet
2008-06-01/a>Mark HofmanFree Yahoo email account! Sign me up, Ok well maybe not.
2008-05-26/a>Marcus SachsPredictable Response
2008-05-20/a>Raul SilesList of malicious domains inserted through SQL injection
2008-05-19/a>Maarten Van HorenbeeckText message and telephone aid scams
2008-05-17/a>Lorna HutchesonXP SP3 Issues
2008-05-13/a>Swa FrantzenOpenSSH: Predictable PRNG in debian and ubuntu Linux
2008-05-06/a>John BambenekWindows XP Service Pack 3 Released
2008-05-01/a>Adrien de BeaupreWindows XP SteadyState
2008-04-29/a>Bojan ZdrnjaWindows Service Pack blocker tool
2008-04-24/a>donald smithHundreds of thousands of SQL injections
2008-04-18/a>John BambenekThe Patch Window is Gone: Automated Patch-Based Exploit Generation
2008-04-16/a>Bojan ZdrnjaThe 10.000 web sites infection mystery solved
2008-04-16/a>William StearnsWindows XP Service Pack 3 - unofficial schedule: Apr 21-28
2008-04-16/a>William StearnsPasser, a aassive machine and service sniffer
2008-04-14/a>John BambenekA Federal Subpoena or Just Some More Spam & Malware?
2008-04-11/a>John BambenekADSL Router / Cable Modem / Home Wireless AP Hardening in 5 Steps
2008-04-07/a>John BambenekHP USB Keys Shipped with Malware for your Proliant Server
2008-03-27/a>Pedro BuenoFreedom of Speech...or not?
2008-03-27/a>Maarten Van HorenbeeckGuarding the guardians: a story of PGP key ring theft
2008-03-21/a>donald smithD-Link router based worm?
2008-03-14/a>Kevin Liston2117966.net-- mass iframe injection
2008-03-13/a>Jason LamRemote File Include spoof!?
2008-03-12/a>Joel EslerDon't use G-Archiver
2008-03-12/a>Joel EslerAdobe security updates
2008-01-09/a>Bojan ZdrnjaMass exploits with SQL Injection
2007-02-24/a>Jason LamPrepared Statements and SQL injections
2007-01-03/a>Toby KohlenbergVLC Media Player udp URL handler Format String Vulnerability
2006-12-12/a>Swa FrantzenOffline Microsoft Patching
2006-10-05/a>John BambenekThere are no more Passive Exploits
2006-10-02/a>Jim ClausingBack to green, but the exploits are still running wild
2006-09-28/a>Swa FrantzenPowerpoint, yet another new vulnerability
2006-09-06/a>Johannes UllrichUpdated Packet Attack flash animation

TRANSPORT

2022-01-02/a>Guy BruneauExchange Server - Email Trapped in Transport Queues
2015-09-28/a>Johannes Ullrich"Transport of London" Malicious E-Mail
2011-06-29/a>Johannes UllrichRandom SSL Tips and Tricks

QUEUE

2022-01-02/a>Guy BruneauExchange Server - Email Trapped in Transport Queues