Threat Level: green Handler on Duty: Rob VandenBrink

SANS ISC: Diaries by Keyword - Internet Security | DShield Diaries by Keyword


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Date Author Title

ANGLER EK

2016-08-31Deborah HaleAngler Exploit Kits Reported
2016-04-21Daniel WesemannDecoding Pseudo-Darkleech (#1)
2016-04-21Daniel WesemannDecoding Pseudo-Darkleech (Part #2)
2015-07-27Daniel WesemannAngler's best friends
2015-04-02Brad DuncanAngler Exploit Kit - Recent Traffic Patterns

ANGLER

2016-08-31/a>Deborah HaleAngler Exploit Kits Reported
2016-04-21/a>Daniel WesemannDecoding Pseudo-Darkleech (#1)
2016-04-21/a>Daniel WesemannDecoding Pseudo-Darkleech (Part #2)
2015-07-27/a>Daniel WesemannAngler's best friends
2015-04-02/a>Brad DuncanAngler Exploit Kit - Recent Traffic Patterns

EK

2019-09-12/a>Xavier MertensRig Exploit Kit Delivering VBScript
2019-08-14/a>Brad DuncanRecent example of MedusaHTTP malware
2019-08-05/a>Rick WannerScanning for Bluekeep vulnerable RDP instances
2019-05-22/a>Johannes UllrichAn Update on the Microsoft Windows RDP "Bluekeep" Vulnerability (CVE-2019-0708) [now with pcaps]
2017-02-09/a>Brad DuncanCryptoShield Ransomware from Rig EK
2016-08-31/a>Deborah HaleAngler Exploit Kits Reported
2016-04-21/a>Daniel WesemannDecoding Pseudo-Darkleech (#1)
2016-04-21/a>Daniel WesemannDecoding Pseudo-Darkleech (Part #2)
2015-07-27/a>Daniel WesemannAngler's best friends
2015-05-03/a>Russ McReeVolDiff, for memory image differential analysis
2015-04-02/a>Brad DuncanAngler Exploit Kit - Recent Traffic Patterns
2015-04-01/a>Brad DuncanRig Exploit Kit Changes Traffic Patterns
2014-03-07/a>Tom WebbLinux Memory Dump with Rekall
2014-03-02/a>Stephen HallSunday Reading
2009-10-02/a>Stephen HallNew SysInternal fun for the weekend