Internet Storm Center
Sign In
Sign Up
SANS Network Security: Las Vegas Sept 4-9.
Handler on Duty:
Didier Stevens
Threat Level:
green
Date
Author
Title
1024 BIT
2012-07-18
Rob VandenBrink
Vote NO to Weak Keys!
1024
2012-07-18/a>
Rob VandenBrink
Vote NO to Weak Keys!
BIT
2023-02-19/a>
Didier Stevens
"Unsupported 16-bit Application" or HTML?
2023-01-15/a>
Johannes Ullrich
Elon Musk Themed Crypto Scams Flooding YouTube Today
2022-08-22/a>
Xavier Mertens
32 or 64 bits Malware?
2022-06-04/a>
Guy Bruneau
Spam Email Contains a Very Large ISO file
2022-05-20/a>
Xavier Mertens
A 'Zip Bomb' to Bypass Security Controls & Sandboxes
2022-05-18/a>
Jan Kopriva
Do you want 30 BTC? Nothing is easier (or cheaper) in this phishing campaign...
2022-03-07/a>
Johannes Ullrich
No Bitcoin - No Problem: Follow Up to Last Weeks Donation Scam
2020-07-20/a>
Rick Wanner
Sextortion Update: The Final Final Chapter
2019-03-21/a>
Xavier Mertens
New Wave of Extortion Emails: Central Intelligence Agency Case
2019-02-01/a>
Rick Wanner
Sextortion: Follow the Money Part 3 - The cashout begins!
2019-01-18/a>
John Bambenek
Sextortion Bitcoin on the Move
2018-12-26/a>
Didier Stevens
Bitcoin "Blocklists"
2018-11-13/a>
Johannes Ullrich
November 2018 Microsoft Patch Tuesday
2018-10-12/a>
Xavier Mertens
More Equation Editor Exploit Waves
2018-07-21/a>
Didier Stevens
BTC pickpockets are back
2018-07-15/a>
Didier Stevens
Video: Retrieving and processing JSON data (BTC example)
2018-07-15/a>
Didier Stevens
Extracting BTC addresses from emails
2018-07-14/a>
Didier Stevens
Retrieving and processing JSON data (BTC example)
2018-01-26/a>
Xavier Mertens
Investigating Microsoft BITS Activity
2018-01-25/a>
Xavier Mertens
Ransomware as a Service
2017-10-24/a>
Xavier Mertens
BadRabbit: New ransomware wave hitting RU & UA
2017-09-30/a>
Lorna Hutcheson
Who's Borrowing your Resources?
2017-08-24/a>
Bojan Zdrnja
Free Bitcoins? Why not?
2017-07-18/a>
Bojan Zdrnja
Investigation of BitTorrent Sync (v.2.0) as a P2P Cloud Service (Part 4 ? Windows Thumbnail Cache, Registry, Prefetch Files, and Link Files artefacts)
2017-07-13/a>
Bojan Zdrnja
Investigation of BitTorrent Sync (v.2.0) as a P2P Cloud Service (Part 3 ? Physical Memory artefacts)
2017-03-03/a>
Lorna Hutcheson
BitTorrent or Something Else?
2016-11-13/a>
Guy Bruneau
Bitcoin Miner File Upload via FTP
2016-05-05/a>
Xavier Mertens
Microsoft BITS Used to Download Payloads
2016-03-07/a>
Xavier Mertens
OSX Ransomware Spread via a Rogue BitTorrent Client Installer
2016-01-09/a>
Xavier Mertens
Virtual Bitlocker Containers
2014-07-07/a>
Johannes Ullrich
Multi Platform *Coin Miner Attacking Routers on Port 32764
2014-04-26/a>
Guy Bruneau
Android Users - Beware of Bitcoin Mining Malware
2014-04-01/a>
Johannes Ullrich
cmd.so Synology Scanner Also Found on Routers
2012-07-18/a>
Rob VandenBrink
Vote NO to Weak Keys!
2011-09-05/a>
Bojan Zdrnja
Bitcoin – crypto currency of future or heaven for criminals?
2011-05-31/a>
Johannes Ullrich
Skype EasyBits Add-on
2011-01-04/a>
Johannes Ullrich
Microsoft Advisory: Vulnerability in Graphics Rendering Engine
2010-09-17/a>
Robert Danford
Circa 2007 Linux Kernel Vulnerability Resurfaces (Was CVE-2007-4573, Now CVE-2010-3301)
2010-08-07/a>
Stephen Hall
Countdown to Tuesday...
2010-06-15/a>
Manuel Humberto Santander Pelaez
Mastercard delivering cards with OTP device included
2010-06-02/a>
Rob VandenBrink
SPAM pretending to be from Habitat for Humanity
2010-03-20/a>
Scott Fendley
BitDefender 2010 Update Problem
2009-07-13/a>
Adrien de Beaupre
Vulnerability in Microsoft Office Web Components Control Could Allow Remote Code Execution
2009-03-10/a>
Swa Frantzen
TinyURL and security
2009-02-14/a>
Deborah Hale
Debit Card Compromise Letter
2008-08-15/a>
Jim Clausing
Another MS update that may have escaped notice
2008-07-07/a>
Scott Fendley
Microsoft Snapshot Viewer Security Advisory
2008-06-18/a>
Chris Carboni
Cisco Security Advisory
2006-09-30/a>
Robert Danford
*WebViewFolderIcon ActiveX control exploit(s) in the wild
2006-09-28/a>
Tom Liston
Setslice Killbit Apps
Homepage
Diaries
Podcasts
Jobs
Data
TCP/UDP Port Activity
Port Trends
SSH/Telnet Scanning Activity
Weblogs
Threat Feeds Activity
Threat Feeds Map
Useful InfoSec Links
Presentations & Papers
Research Papers
API
Tools
DShield Sensor
DNS Looking Glass
Honeypot (RPi/AWS)
InfoSec Glossary
Contact Us
Contact Us
About Us
Handlers
About Us
Slack Channel
Mastodon
Bluesky
X
Integrate
our data
into your projects