Current Handlers
Volunteer incident handlers donate their valuable time to analyze detects and anomalies, and post a daily
diary of their analysis and thoughts on the Storm Center website. Below you will find Handler details
including personal pages, additional scripts or papers, or whatever the respective handler is interested in
offering. All content is owned by the respective handler.
Interested in becoming a handler? A roadmap is available to learn how.
Guy Bruneau
Tony Carothers
Jim Clausing
Scott Fendley
Jan Kopriva
Jesse La Grew
Renato Marinho
Russ McRee
Xavier Mertens
Manuel Humberto Santander Pelaez
Didier Stevens
Yee Ching Tok
Johannes Ullrich
Rob VandenBrink
Tom Webb
Bojan Zdrnja
Guy Bruneau
Guy has a B.A. (IT) from University of Quebec and holds the prestigious GIAC Security Expert (GSE) certification as well as the GIAC GSEC(G), GCIA(G), GCIH(G), GCUX(G), GCFA, GPEN certifications.
Twitter: | @guybruneau |
---|
Click to View Handler Created Tools
Recent Diaries:
- Leveraging Honeypot Data for Offensive Security Operations [Guest Diary]
- Examining Redtail Analyzing a Sophisticated Cryptomining Malware and its Advanced Tactics [Guest Diary]
- Phishing for Banking Information
- Command Injection Exploit For PHPUnit before 4.8.28 and 5.x before 5.6.3 [Guest Diary]
- Vulnerability Symbiosis: vSphere?s CVE-2024-38812 and CVE-2024-38813 [Guest Diary]
Tony Carothers
Recent Diaries:
- Zero Trust and Entra ID Conditional Access
- Cisco Security Advisory: Default Credentials
- Exploit o' the day: DROWN
- Disaster Recovery Starts with a Plan
- GnuPG (GPG) 2.1.9 release announced
Jim Clausing
Twitter: | @jclausing |
---|
Mastodon: | @clausing@infosec.exchange |
---|
Recent Diaries:
- New tool: immutable.py
- Security related Docker containers
- Tool update: mac-robber.py and le-hex-to-ip.py
- New tool: linux-pkgs.sh
- Tool updates: le-hex-to-ip.py and sigs.py
Upcoming Courses:
SANS Security East Baltimore 2025, Baltimore
March 03, 2025 - March 08, 2025
LINUX Incident Response and Threat Hunting
SANS Security West 2025, San Diego
May 05, 2025 - May 10, 2025
LINUX Incident Response and Threat Hunting
SANS Baltimore Spring 2025 - Live Online, Online | US Eastern
June 02, 2025 - June 07, 2025
Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Scott Fendley
Twitter: | @itsecuritygeek |
---|
Recent Diaries:
- July 2023 Microsoft Patch Update
- Warranty Repairs and Non-Removable Storage Risks
- Apple May 2021 Security Updates
- Critical Vuln in vCenter vmdir (CVE-2020-3952)
- Oracle Critical Patch Update Release
Jan Kopriva
Twitter: | @jk0pr |
---|
Mastodon: | @jkopriva@infosec.exchange |
---|
Recent Diaries:
- Changes in SSL and TLS support in 2024
- The strange case of disappearing Russian servers
- Self-contained HTML phishing attachment using Telegram to exfiltrate stolen credentials
- Phishing links with @ sign and the need for effective security awareness building
- Script obfuscation using multiple instances of the same function
Jesse La Grew
Jesse La Grew has been an IT professional within higher education for over 20 years. He holds a variety of GIAC certifications including the GDSA, GCCC, GCFA, GCFE, GCIA, GPYC, GSOC, GCIH, GSEC, GISF, GCTI, GCPM and GSTRT and is also a CISSP. He recently received his Bachelor's Degree at SANS Technology Institute and is progressing through his Master's program at the same institution. Jesse's background in IT started in a desktop support role. This transitioned into a cyber security focus when becoming involved in building and supporting environments meeting PCI and FISMA compliance standards. He currently works as Chief Information Security Officer at Madison College.
Twitter: | @stealthcrane |
---|
Mastodon: | @stealthcrane@infosec.exchange |
---|
Recent Diaries:
- Extracting Practical Observations from Impractical Datasets
- Capturing Honeypot Data Beyond the Logs
- [Guest Diary] A Deep Dive into TeamTNT and Spinning YARN
- CURLing for Crypto on Honeypots
- [Guest Diary] Business Email Compromise
Renato Marinho
Renato Marinho is Chief Research Officer at Morphus Labs. His journey in the area began in 2001, when he created Nettion, one of the first firewalls to use the contemporary UTM (Unified Threat Management) concept. Experienced in cyber security, Marinho was internationally recognized in 2016 by his research that unveiled Mamba, the first full disk encryption ransomware. At Morphus Labs, he oversees research, innovation and development of new products. Master and PhD candidate in Applied Informatics, he is also professor at University of Fortaleza teaching Computer Forensics in the post-graduate course. He is also a speaker having presented at Ignite Cybersecurity Conference, BSides Delaware, BSides Vienna, WSKS Portugal and Brazilian CSIRTs Forum.
Twitter: | @renato_marinho |
---|
Mastodon: | @renatomarinho@infosec.exchange |
---|
Recent Diaries:
- Microsoft January 2025 Patch Tuesday
- Microsoft November 2024 Patch Tuesday
- Microsoft August 2024 Patch Tuesday
- Microsoft May 2024 Patch Tuesday
- Microsoft February 2024 Patch Tuesday
Russ McRee
Twitter: | @holisticinfosec |
---|
Click to View Handler Created Tools
Recent Diaries:
- Sandfly Security
- Exploratory Data Analysis with CISSM Cyber Attacks Database - Part 2
- Exploratory Data Analysis with CISSM Cyber Attacks Database - Part 1
- Prowler v3: AWS & Azure security assessments
- Chainsaw: Hunt, search, and extract event log records
Xavier Mertens
Xavier Mertens is a freelance security consultant based in Belgium. Xavier's own company (https://xameco.be) offers services like incident handling, forensic, SOC activities, and pentesting. He holds GCIA, GFCE, GCFA, GXPN, GREM, GDAT, GNFA, GCTI, GPYC SANS certifications but also CISSP, and CISA. Xavier is a SANS Certified Instructor (FOR610 - Malware Analysis and Reverse Engineering). His blog about security is https://blog.rootshell.be and he is co-organizer of the BruCON security conference (http://www.brucon.org).
Twitter: | @xme |
---|
Mastodon: | @xme@infosec.exchange |
---|
Recent Diaries:
- Make Malware Happy
- SwaetRAT Delivery Through Python
- Goodware Hash Sets
- No Holiday Season for Attackers
- More SSH Fun!
Upcoming Courses:
SANS London March 2025, London
March 03, 2025 - March 08, 2025
Reverse-Engineering Malware: Malware Analysis Tools and Techniques
SANS Secure Canberra 2025 - Live Online, Online | Australia Eastern Daylight Time
March 31, 2025 - April 05, 2025
Reverse-Engineering Malware: Malware Analysis Tools and Techniques
SANS 2025, Orlando
April 13, 2025 - April 17, 2025
Reverse-Engineering Malware: Advanced Code Analysis
Manuel Humberto Santander Pelaez
Mr. Santander Peláez currently serves as the CTO of Transportadora de Gas Internacional in Bogotá, Colombia. His areas of interest are Intrusion Detection, Computer Forensics, Incident Response, SCADA Security, cyber defense, threat intelligence and threat hunting.
Twitter: | @manuelsantander |
---|
Mastodon: | @manuelsantander@infosec.exchange |
---|
Recent Diaries:
- Noticing command and control channels by reviewing DNS protocols
- Controlling network access to ICS systems
- Management of DMARC control for email impersonation of domains in the .co TLD - part 2
- Management of DMARC control for email impersonation of domains in the .co TLD - part 1
- Security headers you should add into your application to increase cyber risk protection
Didier Stevens
Didier Stevens (Microsoft MVP Consumer Security) holds many certifications from SANS, Microsoft, Cisco, ... He is a Senior Analyst (NVISO https://www.nviso.be). Didier started his own company in 2012 to provide IT security training services (http://DidierStevensLabs.com). You can find his open source security tools on his IT security related blog at https://blog.DidierStevens.com.
Twitter: | @DidierStevens |
---|
Recent Diaries:
- Partial ZIP File Downloads
- Multi-OLE
- Wireshark 4.4.3 Released
- Compiling Decompyle++ For Windows
- Extracting Files Embedded Inside Word Documents
Yee Ching Tok
Dr. Tok is currently a Senior Consultant at JT Consultancy & Management Pte. Ltd. and a Research Fellow at ASSET (Automated Systems SEcuriTy) Research Group in Singapore University of Technology and Design (SUTD) under the Information Systems Technology and Design (ISTD) Pillar. He was a recipient of the SG Digital (Postgraduate) Scholarship program from Infocomm Media Development Authority (IMDA), and won the Cybersecurity Awards in 2019 under the Professional category for his contributions to the Singapore information security industry. Yee Ching is a SANS Lethal Forensicator and also serves as a Co-Opted Committee Member in the Association of Information Security Professionals (AiSP). For more information, please visit https://poppopretn.com/aboutme/.
Twitter: | @poppopretn |
---|
Mastodon: | @poppopretn@infosec.exchange |
---|
Recent Diaries:
- The Curious Case of a 12-Year-Old Netgear Router Vulnerability
- PacketCrypt Classic Cryptocurrency Miner on PHP Servers
- Rolling Back Packages on Ubuntu/Debian
- Evolution of Artificial Intelligence Systems and Ensuring Trustworthiness
- 5Ghoul Revisited: Three Months Later
Johannes Ullrich
Dr. Johannes Ullrich is the Dean of Research and a faculty member of the SANS Technology Institute. In November of 2000, Johannes started the DShield.org project, which he later integrated into the Internet Storm Center. His work with the Internet Storm Center has been widely recognized. In 2004, Network World named him one of the 50 most powerful people in the networking industry. Secure Computing Magazine named him in 2005 one of the Top 5 influential IT security thinkers. His research interests include IPv6, Network Traffic Analysis and Secure Software Development. Johannes is regularly invited to speak at conferences and has been interviewed by major publications, radio as well as TV stations. He is a member of the SANS Technology Institute's Faculty and Administration as well as Curriculum and Long Range Planning Committee. As chief research officer for the SANS Institute, Johannes is currently responsible for the GIAC Gold program. Prior to working for SANS, Johannes worked as a lead support engineer for a Web development company and as a research physicist. Johannes holds a PhD in Physics from SUNY Albany and is located in Jacksonville, Florida. More Details: http://www.linkedin.com/in/johannesullrich
Twitter: | @johullrich |
---|
Mastodon: | @jullrich@infosec.exchange |
---|
Recent Diaries:
- Hikvision Password Reset Brute Forcing
- Exploit attempts inspired by recent Struts2 File Upload Vulnerability (CVE-2024-53677, CVE-2023-50164)
- Apple Updates Everything (iOS, iPadOS, macOS, watchOS, tvOS, visionOS)
- Microsoft Patch Tuesday: December 2024
- Apple Fixes Two Exploited Vulnerabilities
Upcoming Courses:
SANS Cyber Security East: Jan 2025, Online | US Eastern
January 27, 2025 - February 01, 2025
Application Security: Securing Web Apps, APIs, and Microservices
SANS Security East Baltimore 2025, Baltimore
March 03, 2025 - March 08, 2025
Network Monitoring and Threat Detection In-Depth
SANS 2025, Orlando
April 13, 2025 - April 18, 2025
Application Security: Securing Web Apps, APIs, and Microservices
Rob VandenBrink
Twitter: | @rvandenbrink |
---|
Click to View Handler Created Tools
Recent Diaries:
- NMAP Scanning without Scanning (Part 2) - The ipinfo API
- Scanning without Scanning with NMAP (APIs FTW)
- Why yq? Adventures in XML
- Got MFA? If not, Now is the Time!
- API Rug Pull - The NIST NVD Database and API (Part 4 of 3)
Tom Webb
Twitter: | @twsecblog |
---|
Mastodon: | @tom_webb@infosec.exchange |
---|
Recent Diaries:
- Windows Defender Chrome Extension Detection
- Pi-Hole Pi4 Docker Deployment
- Are Local LLMs Useful in Incident Response?
- Zeek and Defender Endpoint
- IR Case/Alert Management
Bojan Zdrnja
Twitter: | @bojanz |
---|
Mastodon: | @bojanz@infosec.exchange |
---|
Click to View Handler Created Tools
Recent Diaries:
- Credential Guard and Kerberos delegation
- The amazingly scary xz sshd backdoor
- Scanning and abusing the QUIC protocol
- Survival time for web sites
- Some things never change ? such as SQL Authentication ?encryption?
Upcoming Courses:
SANS Amsterdam March 2025, Amsterdam
March 31, 2025 - April 05, 2025
Web App Penetration Testing and Ethical Hacking
SANS 2025, Orlando
April 13, 2025 - April 18, 2025
Web App Penetration Testing and Ethical Hacking
SANS Offensive Operations East 2025, Baltimore
June 09, 2025 - June 14, 2025
Web App Penetration Testing and Ethical Hacking