Date Author Title

LAYER 2 SWITCH NETWORK PROTECTIONS MAN IN THE MIDDLE MITM ATTACK

2009-11-11Rob VandenBrinkLayer 2 Network Protections against Man in the Middle Attacks

LAYER

2019-10-10/a>Rob VandenBrinkMining Live Networks for OUI Data Oddness
2019-09-26/a>Rob VandenBrinkMining MAC Address and OUI Information
2016-10-26/a>Johannes UllrichCritical Flash Player Update APSB16-36
2015-01-23/a>Adrien de BeaupreInfocon change to yellow for Adobe Flash issues
2014-04-28/a>Russ McReeAdobe Security Bulletin: Security updates available for Adobe Flash Player http://adobe.ly/QVjO72
2013-03-02/a>Scott FendleyApple Blocks Older Insecure Versions of Flash Player
2012-11-08/a>Daniel WesemannAdobe Patches
2012-10-24/a>Rob VandenBrinkTime to run Windows Update - - Microsoft Updates KB2755801 for Windows RT / IE10 / Flash Player - http://technet.microsoft.com/en-us/security/advisory/2755801
2012-10-09/a>Johannes UllrichAdobe Flash Player update http://www.adobe.com/support/security/bulletins/apsb12-22.html
2012-09-20/a>Russ McReeFlash Player update but no announcement, check your version http://www.adobe.com/software/flash/about/
2012-08-03/a>Guy BruneauFlash Player 11.3.300.270 for Windows released to address a crash - http://forums.adobe.com/message/4594596#4594596
2012-03-28/a>Kevin ShorttAdobe Flash Player APSB12-07 - 28 March 2012
2012-03-05/a>Johannes UllrichAdobe Flash Player Security Update
2012-02-16/a>Johannes UllrichAdobe Flash Player Update
2011-04-11/a>Johannes UllrichLayer 2 DoS and other IPv6 Tricks
2010-11-01/a>Manuel Humberto Santander PelaezCVE-2010-3654 exploit in the wild
2010-10-30/a>Guy BruneauSecurity Update for Shockwave Player
2010-08-25/a>Pedro BuenoAdobe released security update for Shockwave player that fix several CVEs: APSB1020
2010-06-16/a>Kevin ShorttAdobe Flash Player 10.1 - Security Update Available
2010-06-05/a>Guy BruneauSecurity Advisory for Flash Player, Adobe Reader and Acrobat
2010-05-12/a>Rob VandenBrinkLayer 2 Security - Private VLANs (the Story Continues ...)
2010-02-12/a>G. N. WhiteAdobe Flash Player 10.0.45.2 and AIR 1.5.3.9130 released to correct vulnerability CVE-2010-0186 Details: http://www.adobe.com/support/security/bulletins/apsb10-06.html
2010-01-12/a>Johannes UllrichMicrosoft Advices XP Users to Uninstall Flash Player 6
2009-12-07/a>Rob VandenBrinkLayer 2 Network Protections – reloaded!
2009-11-11/a>Rob VandenBrinkLayer 2 Network Protections against Man in the Middle Attacks
2009-01-21/a>Raul SilesTraffic increase for port UDP/8247
2008-05-27/a>Adrien de BeaupreAdobe flash player vuln
2006-12-12/a>Robert DanfordMS06-078: 2 Windows Media Format Vulnerabilities (CVE-2006-4702, CVE-2006-6134)

2

2024-08-20/a>Johannes UllrichWhere are we with CVE-2024-38063: Microsoft IPv6 Vulnerability
2024-04-23/a>Johannes UllrichStruts "devmode": Still a problem ten years later?
2024-03-14/a>Jan KoprivaIncrease in the number of phishing messages pointing to IPFS and to R2 buckets
2023-12-20/a>Guy BruneauHow to Protect your Webserver from Directory Enumeration Attack ? Apache2 [Guest Diary]
2023-11-30/a>John BambenekProphetic Post by Intern on CVE-2023-1389 Foreshadows Mirai Botnet Expansion Today
2023-11-22/a>Guy BruneauCVE-2023-1389: A New Means to Expand Botnets
2023-11-06/a>Johannes UllrichExploit Activity for CVE-2023-22518, Atlassian Confluence Data Center and Server
2023-08-28/a>Didier StevensAnalysis of RAR Exploit Files (CVE-2023-38831)
2023-08-25/a>Xavier MertensPython Malware Using Postgresql for C2 Communications
2023-07-12/a>Brad DuncanLoader activity for Formbook "QM18"
2023-06-22/a>Brad DuncanQakbot (Qbot) activity, obama271 distribution tag
2023-06-17/a>Brad DuncanFormbook from Possible ModiLoader (DBatLoader)
2023-05-14/a>Guy BruneauVMware Aria Operations addresses multiple Local Privilege Escalations and a Deserialization issue
2023-05-09/a>Russ McReeExploratory Data Analysis with CISSM Cyber Attacks Database - Part 2
2023-03-25/a>Guy BruneauMicrosoft Released an Update for Windows Snipping Tool Vulnerability
2023-02-22/a>Johannes UllrichInternet Wide Scan Fingerprinting Confluence Servers
2022-12-22/a>Guy BruneauExchange OWASSRF Exploited for Remote Code Execution
2022-12-16/a>Guy BruneauVMware Security Updates
2022-12-10/a>Didier StevensOpen Now: 2022 SANS Holiday Hack Challenge & KringleCon
2022-10-24/a>Xavier MertensC2 Communications Through outlook.com
2022-10-15/a>Guy BruneauMalware - Covid Vaccination Supplier Declaration
2022-10-07/a>Xavier MertensPowershell Backdoor with DGA Capability
2022-08-26/a>Guy BruneauHTTP/2 Packet Analysis with Wireshark
2022-08-22/a>Xavier Mertens32 or 64 bits Malware?
2022-08-14/a>Johannes UllrichRealtek SDK SIP ALG Vulnerability: A Big Deal, but not much you can do about it. CVE 2022-27255
2022-07-23/a>Guy BruneauAnalysis of SSH Honeypot Data with PowerBI
2022-06-09/a>Brad DuncanTA570 Qakbot (Qbot) tries CVE-2022-30190 (Follina) exploit (ms-msdt)
2022-05-13/a>Johannes UllrichFrom 0-Day to Mirai: 7 days of BIG-IP Exploits
2022-04-28/a>Johannes UllrichA Day of SMB: What does our SMB/RPC Honeypot see? CVE-2022-26809
2022-04-14/a>Johannes UllrichAn Update on CVE-2022-26809 - MSRPC Vulnerabliity - PATCH NOW
2022-01-12/a>Johannes UllrichA Quick CVE-2022-21907 FAQ
2022-01-02/a>Guy BruneauExchange Server - Email Trapped in Transport Queues
2021-12-19/a>Didier StevensOffice 2021: VBA Project Version
2021-12-18/a>Guy BruneauVMware Security Update - https://www.vmware.com/security/advisories/VMSA-2021-0030.html
2021-12-14/a>Johannes UllrichLog4j: Getting ready for the long haul (CVE-2021-44228)
2021-12-11/a>Johannes UllrichLog4j / Log4Shell Followup: What we see and how to defend (and how to access our data)
2021-11-26/a>Guy BruneauSearching for Exposed ASUS Routers Vulnerable to CVE-2021-20090
2021-11-20/a>Guy BruneauHikvision Security Cameras Potentially Exposed to Remote Code Execution
2021-11-07/a>Didier StevensVideo: Decrypting Cobalt Strike Traffic With Keys Extracted From Process Memory
2021-11-06/a>Didier StevensDecrypting Cobalt Strike Traffic With Keys Extracted From Process Memory
2021-10-30/a>Guy BruneauRemote Desktop Protocol (RDP) Discovery
2021-10-25/a>Didier StevensDecrypting Cobalt Strike Traffic With a "Leaked" Private Key
2021-10-16/a>Guy BruneauApache is Actively Scan for CVE-2021-41773 & CVE-2021-42013
2021-10-06/a>Johannes UllrichApache 2.4.49 Directory Traversal Vulnerability (CVE-2021-41773)
2021-08-20/a>Xavier MertensWaiting for the C2 to Show Up
2021-08-03/a>Johannes UllrichThree Problems with Two Factor Authentication
2021-06-30/a>Johannes UllrichCVE-2021-1675: Incomplete Patch and Leaked RCE Exploit
2021-06-26/a>Guy BruneauCVE-2019-9670: Zimbra Collaboration Suite XXE vulnerability
2021-05-28/a>Xavier MertensMalicious PowerShell Hosted on script.google.com
2021-05-21/a>Xavier MertensLocking Kernel32.dll As Anti-Debugging Technique
2021-05-18/a>Xavier MertensFrom RunDLL32 to JavaScript then PowerShell
2021-04-02/a>Xavier MertensC2 Activity: Sandboxes or Real Victims?
2021-03-19/a>Xavier MertensPastebin.com Used As a Simple C2 Channel
2021-02-25/a>Jim ClausingSo where did those Satori attacks come from?
2021-02-24/a>Brad DuncanMalspam pushes GuLoader for Remcos RAT
2021-02-16/a>Jim ClausingMore weirdness on TCP port 26
2021-02-02/a>Xavier MertensNew Example of XSL Script Processing aka "Mitre T1220"
2020-12-18/a>Jan KoprivaA slightly optimistic tale of how patching went for CVE-2019-19781
2020-12-13/a>Didier StevensKringleCon 2020
2020-12-10/a>Xavier MertensPython Backdoor Talking to a C2 Through Ngrok
2020-11-21/a>Guy BruneauVMware privilege escalation vulnerabilities (CVE-2020-4004, CVE-2020-4005) - https://www.vmware.com/security/advisories/VMSA-2020-0026.html
2020-10-29/a>Johannes UllrichPATCH NOW: CVE-2020-14882 Weblogic Actively Exploited Against Honeypots
2020-10-28/a>Jan KoprivaSMBGhost - the critical vulnerability many seem to have forgotten to patch
2020-08-08/a>Guy BruneauScanning Activity Include Netcat Listener
2020-08-04/a>Johannes UllrichReminder: Patch Cisco ASA / FTD Devices (CVE-2020-3452). Exploitation Continues
2020-07-22/a>Rick WannerA few IoCs related to CVE-2020-5902
2020-07-15/a>Johannes UllrichPATCH NOW - SIGRed - CVE-2020-1350 - Microsoft DNS Server Vulnerability
2020-07-06/a>Johannes UllrichSummary of CVE-2020-5902 F5 BIG-IP RCE Vulnerability Exploits
2020-05-19/a>Rick WannerWhat is up on Port 62234?
2020-05-14/a>Rob VandenBrinkPatch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe
2020-04-29/a>Johannes UllrichPrivacy Preserving Protocols to Trace Covid19 Exposure
2020-02-21/a>Xavier MertensQuick Analysis of an Encrypted Compound Document Format
2020-02-18/a>Jan KoprivaDiscovering contents of folders in Windows without permissions
2020-01-16/a>Bojan ZdrnjaSumming up CVE-2020-0601, or the Let?s Decrypt vulnerability
2020-01-15/a>Johannes UllrichCVE-2020-0601 Followup
2020-01-13/a>Didier StevensCitrix ADC Exploits: Overview of Observed Payloads
2020-01-11/a>Johannes UllrichCitrix ADC Exploits are Public and Heavily Used. Attempts to Install Backdoor
2020-01-07/a>Johannes UllrichA Quick Update on Scanning for CVE-2019-19781 (Citrix ADC / Gateway Vulnerability)
2019-12-02/a>Jim ClausingNext up, what's up with TCP port 26?
2019-11-18/a>Johannes UllrichSMS and 2FA: Another Reason to Move away from It.
2019-11-06/a>Brad DuncanMore malspam pushing Formbook
2019-11-01/a>Didier StevensTip: Password Managers and 2FA
2019-10-10/a>Rob VandenBrinkMining Live Networks for OUI Data Oddness
2019-09-26/a>Rob VandenBrinkMining MAC Address and OUI Information
2019-08-01/a>Johannes UllrichWhat is Listening On Port 9527/TCP?
2019-07-18/a>Rob VandenBrinkThe Other Side of Critical Control 1: 802.1x Wired Network Access Controls
2019-06-19/a>Johannes UllrichCritical Actively Exploited WebLogic Flaw Patched CVE-2019-2729
2019-05-22/a>Johannes UllrichAn Update on the Microsoft Windows RDP "Bluekeep" Vulnerability (CVE-2019-0708) [now with pcaps]
2019-04-28/a>Johannes UllrichUpdate about Weblogic CVE-2019-2725 (Exploits Used in the Wild, Patch Status)
2019-04-02/a>Johannes UllrichFake AV is Back: LaCie Network Drives Used to Spread Malware
2019-03-29/a>Remco VerhoefAnnotating Golang binaries with Cutter and Jupyter
2019-03-15/a>Remco VerhoefBinary Analysis with Jupyter and Radare2
2019-03-09/a>Guy BruneauA Comparison Study of SSH Port Activity - TCP 22 & 2222
2019-02-02/a>Guy BruneauScanning for WebDAV PROPFIND Exploiting CVE-2017-7269
2019-01-09/a>Russ McReegganimate: Animate YouR Security Analysis
2018-12-21/a>Lorna HutchesonPhishing Attempts That Bypass 2FA
2018-10-10/a>Xavier MertensNew Campaign Using Old Equation Editor Vulnerability
2018-10-08/a>Guy BruneauLatest Release of rockNSM 2.1
2018-08-31/a>Jim ClausingQuickie: Using radare2 to disassemble shellcode
2018-08-20/a>Didier StevensOpenSSH user enumeration (CVE-2018-15473)
2018-06-27/a>Renato MarinhoSilently Profiling Unknown Malware Samples
2018-06-15/a>Lorna HutchesonSMTP Strangeness - Possible C2
2018-06-01/a>Remco VerhoefBinary analysis with Radare2
2018-05-22/a>Guy BruneauVMware updates enable Hypervisor-Assisted Guest Mitigations for Speculative Store Bypass issue - https://www.vmware.com/security/advisories/VMSA-2018-0012.html
2018-01-19/a>Jim ClausingFollowup to IPv6 brute force and IPv6 blocking
2017-12-27/a>Guy BruneauWhat are your Security Challenges for 2018?
2017-10-16/a>Johannes UllrichWPA2 "KRACK" Attack
2017-09-08/a>Adrien de BeaupreYASRV (Yet Another Struts RCE Vulnerability) yes a different one from yesterday
2017-09-05/a>Johannes UllrichThe Mirai Botnet: A Look Back and Ahead At What's Next
2017-05-26/a>Lorna HutchesonFile2pcap - A new tool for your toolkit!
2017-05-13/a>Guy BruneauMicrosoft Released Guidance for WannaCrypt
2017-01-30/a>Didier Stevenspy2exe Decompiling - Part 2
2016-10-22/a>Guy BruneauRequest for Packets TCP 4786 - CVE-2016-6385
2016-10-10/a>Didier StevensRadare2: rahash2
2016-09-15/a>Xavier MertensIn Need of a OTP Manager Soon?
2016-07-17/a>Guy BruneauJuniper -> Junos: Self-signed certificate with spoofed trusted Issuer CN accepted as valid - https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10755&actp=search
2016-07-05/a>Johannes UllrichApache Update: TLS Certificate Authentication Bypass with HTTP/2 (CVE-2016-4979)
2016-05-18/a>Russ McReeResources: Windows Auditing & Monitoring, Linux 2FA
2016-03-13/a>Guy BruneauA Look at the Mandiant M-Trends 2016 Report
2016-03-06/a>Jim ClausingNovel method for slowing down Locky on Samba server using fail2ban
2016-02-13/a>Guy BruneauVMware VMSA-2015-0007.3 has been Re-released
2016-01-31/a>Guy BruneauOpenSSL 1.0.2 Advisory and Update
2016-01-05/a>Guy BruneauWhat are you Concerned the Most in 2016?
2015-10-12/a>Guy BruneauCritical Vulnerability in Multiple Cisco Products - Apache Struts 2 Command Execution http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2
2015-08-12/a>Rob VandenBrinkWireshark 1.12.7 is released, multiple fixes. Find the release notes at: https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html and the binaries at: https://www.wireshark.org/download.html
2015-07-12/a>Guy BruneauPHP 5.x Security Updates
2015-06-16/a>John BambenekCVE-2014-4114 and an Interesting AV Bypass Technique
2015-04-15/a>Johannes UllrichMS15-034: HTTP.sys (IIS) DoS And Possible Remote Code Execution. PATCH NOW
2015-02-05/a>Johannes UllrichAdobe Flash Player Update Released, Fixing CVE 2015-0313
2015-01-27/a>Johannes UllrichNew Critical GLibc Vulnerability CVE-2015-0235 (aka GHOST)
2014-09-25/a>Johannes UllrichUpdate on CVE-2014-6271: Vulnerability in bash (shellshock)
2014-09-24/a>Pedro BuenoAttention *NIX admins, time to patch!
2014-09-22/a>Johannes UllrichCyber Security Awareness Month: What's your favorite/most scary false positive
2014-08-23/a>Guy BruneauNSS Labs Cyber Resilience Report
2014-07-07/a>Johannes UllrichMulti Platform *Coin Miner Attacking Routers on Port 32764
2014-06-30/a>Johannes UllrichShould I setup a Honeypot? [SANSFIRE]
2014-06-12/a>Johannes UllrichMetasploit now includes module to exploit CVE-2014-0195 (OpenSSL DTLS Fragment Vuln.)
2014-05-23/a>Richard PorterHighlights from Cisco Live 2014 - The Internet of Everything
2014-04-08/a>Guy BruneauOpenSSL CVE-2014-0160 Fixed
2014-03-24/a>Johannes UllrichNew Microsoft Advisory: Unpatched Word Flaw used in Targeted Attacks
2014-03-02/a>Stephen HallSymantec goes yellow
2014-02-27/a>Richard PorterDDoS and BCP 38
2014-02-07/a>Rob VandenBrinkNew ISO Standards on Vulnerability Handling and Disclosure
2013-12-05/a>Mark HofmanUpdated Standards Part 1 - ISO 27001
2013-11-28/a>Rob VandenBrinkMicrosoft Security Advisory (2914486): Vulnerability in Microsoft Windows Kernel 0 day exploit in wild
2013-10-25/a>Rob VandenBrinkKaspersky flags TCPIP.SYS as Malware
2013-10-15/a>Rob VandenBrinkCSAM: Microsoft Logs - NPS and IAS (RADIUS)
2013-10-10/a>Mark HofmanCSAM Some more unusual scans
2013-10-09/a>Johannes UllrichCSAM: SSL Request Logs
2013-10-02/a>Johannes UllrichCSAM: Misc. DNS Logs
2013-10-01/a>Adrien de BeaupreCSAM! Send us your logs!
2013-10-01/a>John Bambenek*Metaspoit Releases Module to Exploit Unpatched IE Vuln CVE-2013-3893
2013-09-20/a>Russ McReeThreat Level Yellow: Protection recommendations regarding Internet Explorer exploits in the wild
2013-09-18/a>Rob VandenBrinkCisco DCNM Update Released
2013-09-17/a>John BambenekMicrosoft Releases Out-of-Band Advisory for all Versions of Internet Explorer
2013-08-16/a>Kevin ListonCVE-2013-2251 Apache Struts 2.X OGNL Vulnerability
2013-08-09/a>Kevin ShorttCopy Machines - Changing Scanned Content
2013-07-06/a>Guy BruneauMicrosoft July Patch Pre-Announcement
2013-06-01/a>Guy BruneauExploit Sample for Win32/CVE-2012-0158
2013-05-20/a>Guy BruneauSafe - Tools, Tactics and Techniques
2013-05-09/a>Johannes UllrichMicrosoft released a Fix-it for the Internet Explorer 8 Vulnerability http://support.microsoft.com/kb/2847140
2013-04-25/a>Adam SwangerSANS 2013 Forensics Survey - https://www.surveymonkey.com/s/2013SANSForensicsSurvey
2013-04-16/a>Rob VandenBrinkJava 7 Update 21 is available - Watch for Behaviour Changes !
2013-03-25/a>Johannes UllrichIPv6 Focus Month: IPv6 over IPv4 Preference
2013-02-22/a>Chris MohanPHP 5.4.12 and PHP 5.3.22 released http://www.php.net/ChangeLog-5.php
2013-02-11/a>John BambenekOpenSSL 1.0.1e Released with Corrected fix for CVE-2013-1069, more here: http://www.openssl.org/
2013-01-19/a>Guy BruneauJava 7 Update 11 Still has a Flaw
2013-01-10/a>Rob VandenBrinkWhat Else runs Telnets? Or, Pentesters Love Video Conferencing Units Too!
2013-01-09/a>Richard PorterThe 80's called - They Want Their Mainframe Back!
2013-01-07/a>Adam SwangerPlease consider participating in our 2013 ISC StormCast survey at http://www.surveymonkey.com/s/stormcast
2013-01-04/a>Guy Bruneau"FixIt" Patch for CVE-2012-4792 Bypassed
2012-10-30/a>Mark HofmanCyber Security Awareness Month - Day 30 - DSD 35 mitigating controls
2012-10-29/a>Kevin ShorttCyber Security Awareness Month - Day 29 - Clear Desk: The Unacquainted Standard
2012-10-26/a>Russ McReeCyber Security Awareness Month - Day 26 - Attackers use trusted domain to propagate Citadel Zeus variant
2012-10-25/a>Richard PorterCyber Security Awareness Month - Day 25 - Pro Audio & Video Packets on the Wire
2012-10-24/a>Russ McReeCyber Security Awareness Month - Day 24 - A Standard for Information Security Incident Management - ISO 27035
2012-10-23/a>Rob VandenBrinkCyber Security Awareness Month - Day 23: Character Encoding Standards - ASCII and Successors
2012-10-21/a>Johannes UllrichCyber Security Awareness Month - Day 22: Connectors
2012-10-19/a>Johannes UllrichCyber Security Awareness Month - Day 19: Standard log formats and CEE.
2012-10-18/a>Rob VandenBrinkCyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide
2012-10-17/a>Rob VandenBrinkCyber Security Awareness Month - Day 17 - A Standard for Risk Management - ISO 27005
2012-10-16/a>Richard PorterCyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook.
2012-10-16/a>Johannes UllrichCyber Security Awareness Month - Day 16: W3C and HTML
2012-10-14/a>Pedro BuenoCyber Security Awareness Month - Day 14 - Poor Man's File Analysis System - Part 1
2012-10-13/a>Guy BruneauNew Poll - Cyber Security Awareness Month Activities 2012 - https://isc.sans.edu/poll.html
2012-10-12/a>Mark HofmanCyber Security Awareness Month - Day 12 PCI DSS
2012-10-11/a>Rob VandenBrinkCyber Security Awareness Month - Day 11 - Vendor Agnostic Standards (Center for Internet Security)
2012-10-10/a>Kevin ShorttCyber Security Awareness Month - Day 10 - Standard Sudo - Part Two
2012-10-09/a>Johannes UllrichCyber Security Awreness Month - Day 9 - Request for Comment (RFC)
2012-10-08/a>Mark HofmanCyber Security Awareness Month - Day 8 ISO 27001
2012-10-07/a>Tony CarothersCyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1
2012-10-06/a>Manuel Humberto Santander PelaezCyber Security Awareness Month - Day 6 - NERC: The standard that enforces security on power SCADA
2012-10-05/a>Johannes UllrichCyber Security Awareness Month - Day 5: Standards Body Soup, So many Flavors in the bowl.
2012-10-04/a>Johannes UllrichCyber Security Awareness Month - Day 4: Crypto Standards
2012-10-03/a>Kevin ShorttCyber Security Awareness Month - Day 3 - Standard Sudo - Part One
2012-10-02/a>Russ McReeCyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines
2012-10-01/a>Johannes UllrichCyber Security Awareness Month
2012-09-23/a>Tony CarothersUpdate for CVE-2012-3132
2012-09-21/a>Guy BruneauIE Cumulative Updates MS12-063 - KB2744842
2012-09-21/a>Guy BruneauUpdate for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 (2755801)
2012-09-09/a>Guy BruneauPhishing/Spam Pretending to be from BBB
2012-07-30/a>Guy BruneauEnd of Days for MS-CHAPv2
2012-07-18/a>Rob VandenBrinkVote NO to Weak Keys!
2012-07-15/a>Guy BruneauOracle July 2012 Critical Patch Pre-Release Announcement
2012-07-10/a>Rob VandenBrinkToday at SANSFIRE (09 July 2012) - ISC Panel Discussion on the State of the Internet
2012-06-18/a>Guy BruneauCVE-2012-1875 exploit is now available
2012-05-25/a>Guy BruneauTechnical Analysis of Flash Player CVE-2012-0779
2012-05-16/a>Johannes UllrichGot Packets? Odd duplicate DNS replies from 10.x IP Addresses
2012-05-05/a>Tony CarothersVulnerability Exploit for Snow Leopard
2012-04-27/a>Mark HofmanMicrosoft has added MSSQL 2008 R2 SP1 to the list of affected software for MS12-027 (Thanks Ryan). More info here --> http://technet.microsoft.com/security/bulletin/ms12-027
2012-04-19/a>Kevin ShorttOpenSSL Security Advisory - CVE-2012-2110
2012-04-12/a>Guy Bruneauwicd Privilege Escalation 0day exploit for Backtrack 5 R2
2012-02-03/a>Guy BruneauSophos 2012 Security Threat Report
2012-01-12/a>Rob VandenBrinkPHP 5.39 was release on the 10th, amongst other things, it addresses CVE-2011-4885 (prevents attacks based on hash collisions) and CVE-2011-4566 (integer overflow when parsing invalid exif header)
2011-12-21/a>Johannes UllrichNew Vulnerability in Windows 7 64 bit
2011-10-29/a>Richard PorterThe Sub Critical Control? Evidence Collection
2011-10-28/a>Russ McReeCritical Control 19: Data Recovery Capability
2011-10-28/a>Daniel WesemannCritical Control 20: Security Skills Assessment and Training to fill Gaps
2011-10-27/a>Mark BaggettCritical Control 18: Incident Response Capabilities
2011-10-26/a>Rick WannerCritical Control 17:Penetration Tests and Red Team Exercises
2011-10-17/a>Rob VandenBrinkCritical Control 11: Account Monitoring and Control
2011-10-13/a>Guy BruneauCritical Control 10: Continuous Vulnerability Assessment and Remediation
2011-10-12/a>Kevin ShorttCritical Control 8 - Controlled Use of Administrative Privileges
2011-10-11/a>Swa FrantzenCritical Control 7 - Application Software Security
2011-10-10/a>Jim ClausingCritical Control 6 - Maintenance, Monitoring, and Analysis of Security Audit Logs
2011-10-07/a>Mark HofmanCritical Control 5 - Boundary Defence
2011-10-06/a>Rob VandenBrinkApache HTTP Server mod_proxy reverse proxy issue
2011-10-04/a>Rob VandenBrinkCritical Control 2 - Inventory of Authorized and Unauthorized Software
2011-10-04/a>Johannes UllrichCritical Control 3 - Secure Configurations for Hardware and Software on Laptops, Workstations and Servers
2011-10-03/a>Mark HofmanCritical Control 1 - Inventory of Authorized and Unauthorized Devices
2011-10-03/a>Mark BaggettWhat are the 20 Critical Controls?
2011-10-03/a>Tom ListonSecurity 101 : Security Basics in 140 Characters Or Less
2011-10-02/a>Mark HofmanCyber Security Awareness Month Day 1/2 - Schedule
2011-10-02/a>Mark HofmanCyber Security Awareness Month Day 1/2 - Introduction to the controls
2011-09-21/a>Mark HofmanOctober 2011 Cyber Security Awareness Month
2011-08-30/a>Johannes UllrichA Packet Challenge: Help us identify this traffic
2011-08-15/a>Rob VandenBrink8 Years since the Eastern Seaboard Blackout - Has it Been that Long?
2011-08-10/a>Guy BruneauSamba 3.6.0 Released
2011-06-30/a>Rob VandenBrinkUpdate for RSA Authentication Manager
2011-05-22/a>Kevin ShorttFacebook goes two-factor
2011-04-28/a>Chris MohanGathering and use of location information fears - or is it all a bit too late
2011-04-21/a>Guy BruneauSilverlight Update Available
2011-04-18/a>John BambenekWordpress.com Security Breach
2011-04-15/a>Kevin ListonMS11-020 (KB2508429) Upgrading from Critical to PATCH NOW
2011-04-11/a>Johannes UllrichLayer 2 DoS and other IPv6 Tricks
2011-02-23/a>Manuel Humberto Santander PelaezBind DOS vulnerability (CVE-2011-0414)
2011-02-21/a>Adrien de BeaupreWhat’s New, it's Python 3.2
2011-01-08/a>Guy BruneauPandaLabs 2010 Annual Report
2011-01-03/a>Johannes UllrichWhat Will Matter in 2011
2010-12-20/a>Guy BruneauHighlight of Survey Related to Issues Affecting Businesses in 2010
2010-12-20/a>Guy BruneauPatch Issues with Outlook 2007
2010-12-15/a>Manuel Humberto Santander PelaezHP StorageWorks P2000 G3 MSA hardcoded user
2010-11-16/a>Guy Bruneau OpenSSL TLS Extension Parsing Race Condition
2010-10-31/a>Marcus SachsCyber Security Awareness Month - Day 31 - Tying it all together
2010-10-30/a>Guy BruneauSecurity Update for Shockwave Player
2010-10-30/a>Guy BruneauCyber Security Awareness Month - Day 30 - Role of the network team
2010-10-29/a>Manuel Humberto Santander PelaezCyber Security Awareness Month - Day 29- Role of the office geek
2010-10-28/a>Rick WannerCyber Security Awareness Month - Day 27 - Social Media use in the office
2010-10-28/a>Tony CarothersCyber Security Awareness Month - Day 28 - Role of the employee
2010-10-28/a>Manuel Humberto Santander PelaezCVE-2010-3654 - New dangerous 0-day authplay library adobe products vulnerability
2010-10-26/a>Pedro BuenoCyber Security Awareness Month - Day 26 - Sharing Office Files
2010-10-25/a>Kevin ShorttCyber Security Awareness Month - Day 25 - Using Home Computers for Work
2010-10-24/a>Swa FrantzenCyber Security Awarenes Month - Day 24 - Using work computers at home
2010-10-23/a>Mark HofmanCyber Security Awareness Month - Day 23 - The Importance of compliance
2010-10-22/a>Daniel WesemannCyber Security Awareness Month - Day 22 - Security of removable media
2010-10-21/a>Chris CarboniCyber Security Awareness Month - Day 21 - Impossible Requests from the Boss
2010-10-20/a>Jim ClausingCyber Security Awareness Month - Day 20 - Securing Mobile Devices
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - VPN Architectures – SSL or IPSec?
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - Remote User VPN Access – Are things getting too easy, or too hard?
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - VPN and Remote Access Tools
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - Remote Access Tools
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - Remote User VPN Tunnels - to Split or not to Split?
2010-10-18/a>Manuel Humberto Santander PelaezCyber Security Awareness Month - Day 18 - What you should tell your boss when there's a crisis
2010-10-17/a>Stephen HallCyber Security Awareness Month - Day 17 - What a boss should and should not have access to
2010-10-15/a>Marcus SachsCyber Security Awareness Month - Day 15 - What Teachers Need to Know About Their Students
2010-10-15/a>Guy BruneauCyber Security Awareness Month - Day 16 - Securing a donated computer
2010-10-14/a>Johannes UllrichCyber Security Awareness Month - Day 14 - Securing a public computer
2010-10-13/a>Deborah HaleCyber Security Awareness Month - Day 13 - Online Bullying
2010-10-12/a>Scott FendleyCyber Security Awareness Month - Day 12 - Protecting and Managing Your Digital Identity On Social Media Sites
2010-10-11/a>Rick WannerCyber Security Awareness Month - Day 11 - Safe Browsing for Teens
2010-10-10/a>Kevin ListonCyber Security Awareness Month - Day 10 - Safe browsing for pre-teens
2010-10-09/a>Kevin ShorttCyber Security Awareness Month - Day 9 - Disposal of an Old Computer
2010-10-08/a>Rick WannerCyber Security Awareness Month - Day 8 - Patch Management and System Updates
2010-10-06/a>Rob VandenBrinkCyber Security Awareness Month - Day 7 - Remote Access and Monitoring Tools
2010-10-06/a>Marcus SachsCyber Security Awareness Month - Day 6 - Computer Monitoring Tools
2010-10-05/a>Rick WannerCyber Security Awareness Month - Day 5 - Sites you should stay away from
2010-10-04/a>Daniel WesemannCyber Security Awareness Month - Day 4 - Managing EMail
2010-10-03/a>Adrien de Beaupre Cyber Security Awareness Month - Day 3 - Recognizing phishing and online scams
2010-10-02/a>Mark HofmanCyber Security Awareness Month - Day 2 - Securing the Family Network
2010-10-01/a>Marcus SachsCyber Security Awareness Month - 2010
2010-10-01/a>Marcus SachsCyber Security Awareness Month - Day 1 - Securing the Family PC
2010-09-17/a>Robert DanfordCirca 2007 Linux Kernel Vulnerability Resurfaces (Was CVE-2007-4573, Now CVE-2010-3301)
2010-09-13/a>Manuel Humberto Santander PelaezAdobe SING table parsing exploit (CVE-2010-2883) in the wild
2010-09-12/a>Manuel Humberto Santander PelaezAdobe Acrobat pushstring Memory Corruption paper
2010-09-08/a>John BambenekAdobe Acrobat/Reader 0-day in Wild, Adobe Issues Advisory
2010-08-25/a>Pedro BuenoAdobe released security update for Shockwave player that fix several CVEs: APSB1020
2010-08-22/a>Manuel Humberto Santander PelaezSCADA: A big challenge for information security professionals
2010-07-29/a>Rob VandenBrinkSnort 2.8.6.1 and Snort 2.9 Beta Released
2010-07-26/a>Guy BruneauSophosLabs Released Free Tool to Validate Microsoft Shortcut
2010-07-20/a>Manuel Humberto Santander PelaezLNK vulnerability now with Metasploit module implementing the WebDAV method
2010-07-20/a>Manuel Humberto Santander PelaeziTunes buffer overflow vulnerability
2010-07-10/a>Tony CarothersOracle July 2010 Pre-Release Announcement
2010-06-15/a>Manuel Humberto Santander PelaezMicrosoft Windows Help and Support Center vulnerability (CVE 2010-1885) exploit in the wild
2010-05-12/a>Rob VandenBrinkLayer 2 Security - Private VLANs (the Story Continues ...)
2010-04-27/a>Rob VandenBrinkLayer 2 Security - L2TPv3 for Disaster Recovery Sites
2010-04-22/a>Guy BruneauMS10-025 Security Update has been Pulled
2010-04-16/a>G. N. WhiteMS10-021: Encountering A Failed WinXP Update
2010-03-28/a>Rick WannerHoneynet Project: 2010 Forensic Challenge #3
2010-03-10/a>Rob VandenBrinkMicrosoft re-release of KB973811 - attacks on Extended Protection for Authentication
2010-03-01/a>Mark HofmanMicrosoft will drop support for Vista (without any Service Packs) on April 13 and support for XP SP2 ends July 13. (i.e. no more security updates). If you are still running these, it it time to update.
2010-02-23/a>Mark HofmanWhat is your firewall telling you and what is TCP249?
2010-02-21/a>Tony CarothersTCP Port 12174 Request For Packets
2010-02-17/a>Rob VandenBrinkDefining Clouds - " A Cloud by any Other Name Would be a Lot Less Confusing"
2010-02-01/a>Rob VandenBrinkNMAP 5.21 - Is UDP Protocol Specific Scanning Important? Why Should I Care?
2010-01-19/a>Jim ClausingThe IE saga continues, out-of-cycle patch coming soon
2010-01-15/a>Kevin ListonExploit code available for CVE-2010-0249
2010-01-12/a>Adrien de BeauprePoC for CVE-2009-0689 MacOS X 10.5/10.6 vulnerability
2010-01-04/a>Bojan ZdrnjaSophisticated, targeted malicious PDF documents exploiting CVE-2009-4324
2009-12-29/a>Rick WannerWhat's up with port 12174? Possible Symantec server compromise?
2009-12-07/a>Rob VandenBrinkLayer 2 Network Protections – reloaded!
2009-11-14/a>Adrien de BeaupreMicrosoft advisory for Windows 7 / Windows Server 2008 R2 Remote SMB DoS Exploit released
2009-11-12/a>Rob VandenBrinkWindows 7 / Windows Server 2008 Remote SMB Exploit
2009-11-11/a>Rob VandenBrinkLayer 2 Network Protections against Man in the Middle Attacks
2009-10-31/a>Rick WannerCyber Security Awareness Month - Day 31, ident
2009-10-30/a>Rob VandenBrinkCyber Security Awareness Month - Day 30 - The "Common" IPSEC VPN Protocols - IKE / ISAKMP (500/udp), ESP (IP Protocol 50), NAT-T-IKE (500/udp, 4500/udp), PPTP (tcp/1723), GRE (IP Protocol 47)
2009-10-29/a>Kyle HaugsnessCyber Security Awareness Month - Day 29 - dns port 53
2009-10-28/a>Johannes UllrichCyber Security Awareness Month - Day 28 - ntp (123/udp)
2009-10-25/a>Lorna HutchesonCyber Security Awareness Month - Day 25 - Port 80 and 443
2009-10-22/a>Adrien de BeaupreCyber Security Awareness Month - Day 22 port 502 TCP - Modbus
2009-10-22/a>Adrien de BeaupreSysinternals updates: Disk2vhd v1.1, ZoomIt v4.1, Coreinfo v2.0, VMMap v2.4
2009-10-19/a>Daniel WesemannCyber Security Awareness Month - Day 19 - ICMP
2009-10-17/a>Rick WannerCyber Security Awareness Month - Day 17 - Port 22/SSH
2009-10-16/a>Adrien de BeaupreCyber Security Awareness Month - Day 16 - Port 1521 - Oracle TNS Listener
2009-10-11/a>Mark HofmanCyber Security Awareness Month - Day 12 Ports 161/162 Simple Network Management Protocol (SNMP)
2009-10-09/a>Rob VandenBrinkCyber Security Awareness Month - Day 9 - Port 3389/tcp (RDP)
2009-10-08/a>Johannes UllrichCyber Security Awareness Month - Day 8 - Port 25 - SMTP
2009-10-06/a>Adrien de BeaupreCyber Security Awareness Month - Day 6 ports 67&68 udp - bootp and dhcp
2009-10-05/a>Adrien de BeaupreCyber Security Awareness Month - Day 5 port 31337
2009-09-16/a>Bojan ZdrnjaSMB2 remote exploit released
2009-09-08/a>Guy BruneauVista/2008/Windows 7 SMB2 BSOD 0Day
2009-09-07/a>Jim ClausingRequest for packets
2009-08-28/a>Adrien de BeaupreWPA with TKIP done
2009-08-08/a>Kevin ListonSun OpenSSO Enterprise/Sun Access Manager XML Vulnerabilities
2009-07-12/a>Mari NicholsCA Apologizes for False Positive
2009-06-20/a>Mark HofmanG'day from Sansfire2009
2009-06-14/a>Guy BruneauSANSFIRE 2009 Starts Tomorrow
2009-05-28/a>Stephen HallMicrosoft DirectShow vulnerability
2009-05-27/a>donald smithWebDAV write-up
2009-05-26/a>Jason LamVista & Win2K8 SP2 available
2009-05-02/a>Rick WannerSignificant increase in port 2967 traffic
2009-03-24/a>G. N. WhiteCanSecWest Pwn2Own: Would IE8 have been exploitable had the event waited one more day?
2009-02-19/a>Bojan ZdrnjaMS09-002, XML/DOC and initial infection vector
2009-02-17/a>Bojan ZdrnjaMS09-002 exploit in the wild
2009-01-31/a>Swa FrantzenVMware updates
2008-11-04/a>Marcus SachsCyber Security Awareness Month 2008 - Summary and Links
2008-11-03/a>Joel EslerDay 34 -- Feeding The Lessons Learned Back to the Preparation Phase
2008-11-02/a>Mari NicholsDay 33 - Working with Management to Improve Processes
2008-11-01/a>Koon Yaw TanDay 32 - What Should I Make Public?
2008-10-31/a>Rick WannerDay 31 - Legal Awareness
2008-10-30/a>Kevin ListonDay 30 - Applying Patches and Updates
2008-10-29/a>Deborah HaleDay 29 - Should I Switch Software Vendors?
2008-10-28/a>Jason LamDay 28 - Avoiding Finger Pointing and the Blame Game
2008-10-27/a>Johannes UllrichDay 27 - Validation via Vulnerability Scanning
2008-10-25/a>Koon Yaw TanDay 25 - Finding and Removing Hidden Files and Directories
2008-10-25/a>Rick WannerDay 26 - Restoring Systems from Backup
2008-10-24/a>Stephen HallDay 24 - Cleaning Email Servers and Clients
2008-10-22/a>Johannes UllrichDay 22 - Wiping Disks and Media
2008-10-22/a>Chris CarboniDay 23 - Turning off Unused Services
2008-10-21/a>Johannes UllrichDay 21 - Removing Bots, Keyloggers, and Spyware
2008-10-20/a>Raul SilesDay 20 - Eradicating a Rootkit
2008-10-19/a>Lorna HutchesonDay 19 - Eradication: Forensic Analysis Tools - What Happened?
2008-10-17/a>Patrick NolanDay 17 - Containing a DNS Hijacking
2008-10-17/a>Rick WannerDay 18 - Containing Other Incidents
2008-10-16/a>Mark HofmanDay 16 - Containing a Malware Outbreak
2008-10-15/a>Rick WannerDay 15 - Containing the Damage From a Lost or Stolen Laptop
2008-10-14/a>Swa FrantzenDay 14 - Containment: a Personal IdentityTheft Incident
2008-10-13/a>Adrien de BeaupreDay 13 - Containment: Containing on Production Systems Such as a Web Server
2008-10-12/a>Mari NicholsDay 12 Containment: Gathering Evidence That Can be Used in Court
2008-10-11/a>Stephen HallDay 11 - Identification: Other Methods of Identifying an Incident
2008-10-10/a>Marcus SachsDay 10 - Identification: Using Your Help Desk to Identify Security Incidents
2008-10-09/a>Marcus SachsDay 9 - Identification: Log and Audit Analysis
2008-10-08/a>Johannes UllrichDay 8 - Global Incident Awareness
2008-10-07/a>Kyle HaugsnessDay 7 - Identification: Host-based Intrusion Detection Systems
2008-10-06/a>Jim ClausingDay 6 - Network-based Intrusion Detection Systems
2008-10-05/a>Stephen HallDay 5 - Identification: Events versus Incidents
2008-10-04/a>Marcus SachsDay 4 - Preparation: What Goes Into a Response Kit
2008-10-03/a>Jason LamDay 3 - Preparation: Building Checklists
2008-10-02/a>Marcus SachsDay 2 - Preparation: Building a Response Team
2008-10-01/a>Marcus SachsDay 1 - Preparation: Policies, Management Support, and User Awareness
2008-09-30/a>Marcus SachsCyber Security Awareness Month - Daily Topics
2008-09-15/a>donald smithFake antivirus 2009 and search engine results
2008-08-26/a>John BambenekActive attacks using stolen SSH keys (UPDATED)
2008-08-15/a>Jim ClausingAnother MS update that may have escaped notice
2008-04-27/a>Marcus SachsWhat's With Port 20329?
2008-04-22/a>donald smithXP SP3 RC2 Available
2008-04-10/a>Deborah HaleSymantec Threatcon Level 2
2006-09-19/a>Swa FrantzenYet another MSIE 0-day: VML
2006-09-15/a>Swa FrantzenMSIE DirectAnimation ActiveX 0-day update
2006-09-12/a>Swa FrantzenMicrosoft security patches for September 2006
2000-01-02/a>Deborah Hale2010 A Look Back - 2011 A Look Ahead
2000-01-01/a>Manuel Humberto Santander PelaezHappy New Year 2011!!!

SWITCH

2013-03-05/a>Mark HofmanIPv6 Focus Month: Device Defaults
2010-07-10/a>Tony CarothersSoftware Update for Cisco IE 3000 Series Switches
2009-11-11/a>Rob VandenBrinkLayer 2 Network Protections against Man in the Middle Attacks
2009-08-03/a>Mark HofmanSwitch hardening on your network

NETWORK

2023-08-26/a>Xavier MertensmacOS: Who?s Behind This Network Connection?
2023-01-02/a>Xavier MertensNetworkMiner 2.8 Released
2022-01-25/a>Brad DuncanEmotet Stops Using 0.0.0.0 in Spambot Traffic
2021-12-06/a>Xavier MertensThe Importance of Out-of-Band Networks
2021-06-18/a>Daniel WesemannNetwork Forensics on Azure VMs (Part #2)
2021-06-17/a>Daniel Wesemann Network Forensics on Azure VMs (Part #1)
2021-01-30/a>Guy BruneauPacketSifter as Network Parsing and Telemetry Tool
2019-10-16/a>Xavier MertensSecurity Monitoring: At Network or Host Level?
2019-10-06/a>Russ McReevisNetwork for Network Data
2019-07-20/a>Guy BruneauRe-evaluating Network Security - It is Increasingly More Complex
2019-03-27/a>Xavier MertensRunning your Own Passive DNS Service
2018-06-06/a>Xavier MertensConverting PCAP Web Traffic to Apache Log
2017-12-02/a>Xavier MertensUsing Bad Material for the Good
2017-09-28/a>Xavier MertensThe easy way to analyze huge amounts of PCAP data
2017-02-17/a>Rob VandenBrinkRTRBK - Router / Switch / Firewall Backups in PowerShell (tool drop)
2017-01-13/a>Xavier MertensWho's Attacking Me?
2017-01-12/a>Mark BaggettSome tools updates
2016-05-26/a>Xavier MertensKeeping an Eye on Tor Traffic
2015-04-17/a>Didier StevensMemory Forensics Of Network Devices
2015-03-16/a>Johannes UllrichAutomatically Documenting Network Connections From New Devices Connected to Home Networks
2014-10-13/a>Lorna HutchesonFor or Against: Port Security for Network Access Control
2014-06-03/a>Basil Alawi S.TaherAn Introduction to RSA Netwitness Investigator
2014-01-24/a>Chris MohanPhishing via Social Media
2013-11-30/a>Russ McReeA review of Tubes, A Journey to the Center of the Internet
2013-07-17/a>Johannes UllrichNetwork Solutions Outage
2013-07-13/a>Lenny ZeltserDecoy Personas for Safeguarding Online Identity Using Deception
2013-02-03/a>Lorna HutchesonIs it Really an Attack?
2012-12-31/a>Manuel Humberto Santander PelaezHow to determine which NAC solutions fits best to your needs
2012-08-30/a>Bojan ZdrnjaAnalyzing outgoing network traffic (part 2)
2012-08-23/a>Bojan ZdrnjaAnalyzing outgoing network traffic
2012-04-06/a>Johannes UllrichSocial Share Privacy
2011-08-05/a>Johannes UllrichMicrosoft Patch Tuesday Advance Notification: 13 Bulletins coming http://www.microsoft.com/technet/security/Bulletin/MS11-aug.mspx
2011-05-25/a>Lenny ZeltserMonitoring Social Media for Security References to Your Organization
2011-02-14/a>Lorna HutchesonNetwork Visualization
2011-01-23/a>Richard PorterCrime is still Crime!
2010-12-21/a>Rob VandenBrinkNetwork Reliability, Part 2 - HSRP Attacks and Defenses
2010-11-22/a>Lenny ZeltserBrand Impersonations On-Line: Brandjacking and Social Networks
2010-11-08/a>Manuel Humberto Santander PelaezNetwork Security Perimeter: How to choose the correct firewall and IPS for your environment?
2010-09-16/a>Johannes UllrichFacebook "Like Pages"
2010-08-05/a>Rob VandenBrinkAccess Controls for Network Infrastructure
2010-07-07/a>Kevin ShorttFacebook, Facebook, What Do YOU See?
2010-06-10/a>Deborah HaleTop 5 Social Networking Media Risks
2010-04-18/a>Guy BruneauSome NetSol hosted sites breached
2009-12-07/a>Rob VandenBrinkLayer 2 Network Protections – reloaded!
2009-11-25/a>Jim ClausingTool updates
2009-11-11/a>Rob VandenBrinkLayer 2 Network Protections against Man in the Middle Attacks
2009-08-13/a>Jim ClausingNew and updated cheat sheets
2009-08-03/a>Mark HofmanSwitch hardening on your network
2009-07-28/a>Adrien de BeaupreYYAMCCBA
2009-05-28/a>Jim ClausingStego in TCP retransmissions
2009-05-18/a>Rick WannerCisco SAFE Security Reference Guide Updated
2008-04-07/a>John BambenekNetwork Solutions Technical Difficulties? Enom too

PROTECTIONS

2009-12-07/a>Rob VandenBrinkLayer 2 Network Protections – reloaded!
2009-11-11/a>Rob VandenBrinkLayer 2 Network Protections against Man in the Middle Attacks
2009-10-30/a>Rob VandenBrinkNew version of NIST 800-41, Firewalls and Firewall Policy Guidelines

MAN

2024-08-07/a>Guy BruneauSame Scripts, Different Day: What My DShield Honeypot Taught Me About the Importance of Security Fundamentals [Guest Diary]
2024-07-10/a>Jesse La GrewFinding Honeypot Data Clusters Using DBSCAN: Part 1
2024-04-29/a>Johannes UllrichD-Link NAS Device Backdoor Abused
2024-01-25/a>Xavier MertensFacebook AdsManager Targeted by a Python Infostealer
2023-09-09/a>Guy Bruneau?Anyone get the ASN of the Truck that Hit Me?!?: Creating a PowerShell Function to Make 3rd Party API Calls for Extending Honeypot Information [Guest Diary]
2023-06-15/a>Yee Ching TokSupervision and Verification in Vulnerability Management
2023-06-11/a>Guy BruneauDShield Honeypot Activity for May 2023
2023-05-24/a>Tom WebbIR Case/Alert Management
2021-12-06/a>Xavier MertensThe Importance of Out-of-Band Networks
2021-09-15/a>Brad DuncanHancitor campaign abusing Microsoft's OneDrive
2021-08-29/a>Guy BruneauFilter JSON Data by Value with Linux jq
2021-07-09/a>Brad DuncanHancitor tries XLL as initial malware file
2021-02-13/a>Guy BruneauvSphere Replication updates address a command injection vulnerability (CVE-2021-21976) - https://www.vmware.com/security/advisories/VMSA-2021-0001.html
2021-02-05/a>Xavier MertensVBA Macro Trying to Alter the Application Menus
2020-09-16/a>Johannes UllrichDo Vulnerabilities Ever Get Old? Recent "Mirai" Variant Scanning for 20 Year Old Amanda Version?
2020-03-15/a>Guy BruneauVPN Access and Activity Monitoring
2020-02-14/a>Xavier MertensKeep an Eye on Command-Line Browsers
2019-11-01/a>Didier StevensTip: Password Managers and 2FA
2019-09-19/a>Xavier MertensBlocklisting or Whitelisting in the Right Way
2019-07-16/a>Russ McReeCommando VM: The Complete Mandiant Offensive VM
2019-02-24/a>Guy BruneauPacket Editor and Builder by Colasoft
2018-07-30/a>Xavier MertensExploiting the Power of Curl
2018-05-02/a>Russ McReeWindows Commands Reference - An InfoSec Must Have
2017-10-30/a>Johannes UllrichCritical Patch For Oracle's Identity Manager
2017-09-18/a>Johannes UllrichSANS Securingthehuman posted a follow up to their Equifax breach webcast: https://securingthehuman.sans.org/blog/2017/09/15/equifax-webcast-follow-up
2017-01-11/a>Johannes UllrichJanuary 2017 Edition of Ouch! Security Awareness Newsletter Released: https://securingthehuman.sans.org/ouch
2016-07-26/a>Johannes UllrichCommand and Control Channels Using "AAAA" DNS Records
2016-06-23/a>Russell EubanksAn Approach to Vulnerability Management
2016-06-20/a>Xavier MertensUsing Your Password Manager to Monitor Data Leaks
2016-04-15/a>Xavier MertensWindows Command Line Persistence?
2015-10-12/a>Guy BruneauCritical Vulnerability in Multiple Cisco Products - Apache Struts 2 Command Execution http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2
2015-09-23/a>Daniel WesemannMaking our users unlearn what we taught them
2015-07-18/a>Russell EubanksThe Value a "Fresh Set Of Eyes" (FSOE)
2014-08-06/a>Johannes UllrichExploit Available for Symantec End Point Protection
2014-08-04/a>Russ McReeThreats & Indicators: A Security Intelligence Lifecycle
2014-07-30/a>Rick WannerSymantec Endpoint Protection Privilege Escalation Zero Day
2014-07-02/a>Johannes UllrichJuly Ouch! Security Awareness Newsletter Released. E-mail Do's and Don'ts http://www.securingthehuman.org/resources/newsletters/ouch/2014#july2014
2014-06-13/a>Richard PorterA welcomed response, PF Chang's
2014-03-17/a>Johannes UllrichScans for FCKEditor File Manager
2014-03-11/a>Basil Alawi S.TaherIntroduction to Memory Analysis with Mandiant Redline
2014-03-02/a>Stephen HallSymantec goes yellow
2014-02-14/a>Chris MohanSYM14-004 Symantec Endpoint Protection Management Vulnerabilities - http://www.symantec.com/business/support/index?page=content&id=TECH214866
2014-02-05/a>Johannes UllrichSANS Ouch Security Awareness Newsletter What is Malware http://www.securingthehuman.org/ouch
2014-01-23/a>Chris MohanLearning from the breaches that happens to others Part 2
2014-01-14/a>Chris MohanSpamming and scanning botnets - is there something I can do to block them from my site?
2013-12-28/a>Russ McReeWeekend Reading List 27 DEC
2013-09-24/a>Tom WebbIDS, NSM, and Log Management with Security Onion 12.04.3
2013-09-09/a>Johannes UllrichSSL is broken. So what?
2013-02-25/a>Rob VandenBrinkSilent Traitors - Embedded Devices in your Datacenter
2013-02-17/a>Guy BruneauHP ArcSight Connector Appliance and Logger Vulnerabilities
2013-02-04/a>Adam SwangerSAN Securing The Human Monthly Awareness Video - Advanced Persistent Threat (APT) http://www.securingthehuman.org/resources/ncsam
2012-12-27/a>John BambenekIt's 3pm 2 days after Christmas, do you know where your unmanaged SSH keys are?
2012-10-26/a>Adam SwangerSecuring the Human Special Webcast - October 30, 2012
2012-08-21/a>Adrien de BeaupreRuggedCom fails key management 101 on Rugged Operating System (ROS)
2012-06-22/a>Kevin ListonUpdated Poll: Which Patch Delivery Schedule Works the Best for You?
2012-04-23/a>Russ McReeEmergency Operations Centers & Security Incident Management: A Correlation
2012-01-25/a>Bojan ZdrnjapcAnywhere users – patch now!
2011-10-28/a>Russ McReeCritical Control 19: Data Recovery Capability
2011-02-19/a>Guy BruneauSnort Data Acquisition Library
2010-12-21/a>Rob VandenBrinkNetwork Reliability, Part 2 - HSRP Attacks and Defenses
2010-08-19/a>Rob VandenBrinkChange is Good. Change is Bad. Change is Life.
2010-07-25/a>Rick WannerUpdated version of Mandiant's Web Historian
2010-07-24/a>Manuel Humberto Santander PelaezTransmiting logon information unsecured in the network
2010-06-02/a>Rob VandenBrinkSPAM pretending to be from Habitat for Humanity
2010-05-16/a>Rick WannerSymantec triggers on World of Warcraft update
2010-02-07/a>Rick WannerMandiant Mtrends Report
2010-02-06/a>Guy BruneauLANDesk Management Gateway Vulnerability
2010-01-27/a>Raul SilesCommand Line Kung Fu
2009-12-29/a>Rick WannerWhat's up with port 12174? Possible Symantec server compromise?
2009-11-11/a>Rob VandenBrinkLayer 2 Network Protections against Man in the Middle Attacks
2009-07-13/a>Adrien de BeaupreSecurity Update available for Wyse Device Manager
2009-05-19/a>Rick WannerNew Version of Mandiant Highlighter
2009-05-01/a>Adrien de BeaupreIncident Management
2009-03-20/a>donald smithStealthier then a MBR rootkit, more powerful then ring 0 control, it’s the soon to be developed SMM root kit.
2009-03-10/a>Swa Frantzenconspiracy fodder: pifts.exe
2009-02-05/a>Rick WannerMandiant Memoryze review, Hilighter, other Mandiant tools!
2008-04-22/a>donald smithSymantec decomposer rar bypass allowed malicious content.
2006-10-05/a>John BambenekThere are no more Passive Exploits

IN

2024-11-22/a>Xavier MertensAn Infostealer Searching for « BIP-0039 » Data
2024-11-19/a>Xavier MertensDetecting the Presence of a Debugger in Linux
2024-11-17/a>Johannes UllrichAncient TP-Link Backdoor Discovered by Attackers
2024-11-07/a>Xavier MertensSteam Account Checker Poisoned with Infostealer
2024-10-31/a>Guy BruneauOctober 2024 Activity with Username chenzilong
2024-10-14/a>Xavier MertensPhishing Page Delivered Through a Blob URL
2024-10-09/a>Xavier MertensFrom Perfctl to InfoStealer
2024-10-03/a>Guy BruneauKickstart Your DShield Honeypot [Guest Diary]
2024-09-25/a>Guy BruneauOSINT - Image Analysis or More Where, When, and Metadata [Guest Diary]
2024-09-18/a>Guy BruneauTime-to-Live Analysis of DShield Data with Vega-Lite
2024-09-18/a>Xavier MertensPython Infostealer Patching Windows Exodus App
2024-09-11/a>Guy BruneauHygiene, Hygiene, Hygiene! [Guest Diary]
2024-09-04/a>Guy Bruneau Attack Surface [Guest Diary]
2024-08-30/a>Jesse La GrewSimulating Traffic With Scapy
2024-08-29/a>Xavier MertensLive Patching DLLs with Python
2024-08-27/a>Xavier MertensWhy Is Python so Popular to Infect Windows Hosts?
2024-08-27/a>Guy BruneauVega-Lite with Kibana to Parse and Display IP Activity over Time
2024-08-26/a>Xavier MertensFrom Highly Obfuscated Batch File to XWorm and Redline
2024-08-20/a>Guy BruneauMapping Threats with DNSTwist and the Internet Storm Center [Guest Diary]
2024-08-16/a>Jesse La Grew[Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools
2024-08-14/a>Xavier MertensMultiple Malware Dropped Through MSI Package
2024-08-07/a>Guy BruneauSame Scripts, Different Day: What My DShield Honeypot Taught Me About the Importance of Security Fundamentals [Guest Diary]
2024-07-25/a>Xavier MertensXWorm Hidden With Process Hollowing
2024-07-23/a>Johannes UllrichNew Exploit Variation Against D-Link NAS Devices (CVE-2024-3273)
2024-07-16/a>Jan Kopriva"Reply-chain phishing" with a twist
2024-07-16/a>Guy BruneauWho You Gonna Call? AndroxGh0st Busters! [Guest Diary]
2024-07-13/a>Didier Stevens16-bit Hash Collisions in .xls Spreadsheets
2024-07-10/a>Jesse La GrewFinding Honeypot Data Clusters Using DBSCAN: Part 1
2024-07-08/a>Xavier MertensKunai: Keep an Eye on your Linux Hosts Activity
2024-06-26/a>Guy BruneauWhat Setting Live Traps for Cybercriminals Taught Me About Security [Guest Diary]
2024-06-20/a>Guy BruneauNo Excuses, Free Tools to Help Secure Authentication in Ubuntu Linux [Guest Diary]
2024-06-13/a>Guy BruneauThe Art of JQ and Command-line Fu [Guest Diary]
2024-05-31/a>Xavier Mertens"K1w1" InfoStealer Uses gofile.io for Exfiltration
2024-05-30/a>Xavier MertensFeeding MISP with OSSEC
2024-05-28/a>Guy BruneauIs that It? Finding the Unknown: Correlations Between Honeypot Logs & PCAPs [Guest Diary]
2024-05-22/a>Rob VandenBrinkNMAP Scanning without Scanning (Part 2) - The ipinfo API
2024-05-22/a>Guy BruneauAnalysis of ?redtail? File Uploads to ICS Honeypot, a Multi-Architecture Coin Miner [Guest Diary]
2024-05-16/a>Rob VandenBrinkWhy yq? Adventures in XML
2024-05-15/a>Rob VandenBrinkGot MFA? If not, Now is the Time!
2024-05-06/a>Johannes UllrichDetecting XFinity/Comcast DNS Spoofing
2024-04-29/a>Johannes UllrichD-Link NAS Device Backdoor Abused
2024-04-29/a>Guy BruneauLinux Trojan - Xorddos with Filename eyshcjdmzg
2024-04-22/a>Jan KoprivaIt appears that the number of industrial devices accessible from the internet has risen by 30 thousand over the past three years
2024-04-17/a>Xavier MertensMalicious PDF File Used As Delivery Mechanism
2024-04-11/a>Yee Ching TokEvolution of Artificial Intelligence Systems and Ensuring Trustworthiness
2024-04-07/a>Guy BruneauA Use Case for Adding Threat Hunting to Your Security Operations Team. Detecting Adversaries Abusing Legitimate Tools in A Customer Environment. [Guest Diary]
2024-03-19/a>Johannes UllrichAttacker Hunting Firewalls
2024-03-17/a>Guy BruneauGamified Learning: Using Capture the Flag Challenges to Supplement Cybersecurity Training [Guest Diary]
2024-03-14/a>Jan KoprivaIncrease in the number of phishing messages pointing to IPFS and to R2 buckets
2024-03-06/a>Bojan ZdrnjaScanning and abusing the QUIC protocol
2024-02-21/a>Jan KoprivaPhishing pages hosted on archive.org
2024-02-20/a>Xavier MertensPython InfoStealer With Dynamic Sandbox Detection
2024-02-15/a>Jesse La Grew[Guest Diary] Learning by doing: Iterative adventures in troubleshooting
2024-01-31/a>Johannes UllrichThe Fun and Dangers of Top Level Domains (TLDs)
2024-01-25/a>Xavier MertensFacebook AdsManager Targeted by a Python Infostealer
2024-01-24/a>Johannes UllrichHow Bad User Interfaces Make Security Tools Harmful
2024-01-06/a>Xavier MertensAre you sure of your password?
2024-01-02/a>Johannes UllrichFingerprinting SSH Identification Strings
2023-12-31/a>Tom WebbPi-Hole Pi4 Docker Deployment
2023-12-22/a>Xavier MertensShall We Play a Game?
2023-12-06/a>Guy BruneauRevealing the Hidden Risks of QR Codes [Guest Diary]
2023-11-30/a>John BambenekProphetic Post by Intern on CVE-2023-1389 Foreshadows Mirai Botnet Expansion Today
2023-11-22/a>Guy BruneauCVE-2023-1389: A New Means to Expand Botnets
2023-11-17/a>Jan KoprivaPhishing page with trivial anti-analysis features
2023-11-15/a>Xavier MertensRedline Dropped Through MSIX Package
2023-11-09/a>Xavier MertensVisual Examples of Code Injection
2023-11-08/a>Xavier MertensExample of Phishing Campaign Project File
2023-10-29/a>Guy BruneauSpam or Phishing? Looking for Credentials & Passwords
2023-10-28/a>Xavier MertensSize Matters for Many Security Controls
2023-10-16/a>Jan KoprivaAre typos still relevant as an indicator of phishing?
2023-10-15/a>Guy BruneauDomain Name Used as Password Captured by DShield Sensor
2023-10-03/a>Tom WebbAre Local LLMs Useful in Incident Response?
2023-09-29/a>Xavier MertensAre You Still Storing Passwords In Plain Text Files?
2023-09-26/a>Jan KoprivaA new spin on the ZeroFont phishing technique
2023-09-23/a>Guy BruneauScanning for Laravel - a PHP Framework for Web Artisants
2023-09-03/a>Didier StevensAnalysis of a Defective Phishing PDF
2023-08-31/a>Guy BruneauPotential Weaponizing of Honeypot Logs [Guest Diary]
2023-08-31/a>Jan KoprivaThe low, low cost of (committing) cybercrime
2023-08-21/a>Xavier MertensQuick Malware Triage With Inotify Tools
2023-08-20/a>Guy BruneauSystemBC Malware Activity
2023-08-18/a>Xavier MertensFrom a Zalando Phishing to a RAT
2023-08-17/a>Jesse La GrewCommand Line Parsing - Are These Really Unique Strings?
2023-08-11/a>Xavier MertensShow me All Your Windows!
2023-07-24/a>Rob VandenBrinkJQ: Another Tool We Thought We Knew
2023-07-18/a>Johannes UllrichExploit Attempts for "Stagil navigation for Jira Menus & Themes" CVE-2023-26255 and CVE-2023-26256
2023-07-13/a>Jesse La GrewDShield Honeypot Maintenance and Data Retention
2023-07-01/a>Russ McReeSandfly Security
2023-06-29/a>Brad DuncanGuLoader- or DBatLoader/ModiLoader-style infection for Remcos RAT
2023-06-21/a>Yee Ching TokAnalyzing a YouTube Sponsorship Phishing Mail and Malware Targeting Content Creators
2023-06-19/a>Xavier MertensMalware Delivered Through .inf File
2023-06-16/a>Xavier MertensAnother RAT Delivered Through VBS
2023-05-30/a>Johannes UllrichYour Business Data and Machine Learning at Risk: Attacks Against Apache NiFi
2023-05-28/a>Guy BruneauWe Can no Longer Ignore the Cost of Cybersecurity
2023-05-26/a>Xavier MertensUsing DFIR Techniques To Recover From Infrastructure Outages
2023-05-24/a>Tom WebbIR Case/Alert Management
2023-05-20/a>Xavier MertensPhishing Kit Collecting Victim's IP Address
2023-05-19/a>Xavier MertensWhen the Phisher Messes Up With Encoding
2023-05-15/a>Jan KoprivaOngoing Facebook phishing campaign without a sender and (almost) without links
2023-05-04/a>Xavier MertensInfostealer Embedded in a Word Document
2023-05-01/a>Jan Kopriva"Passive" analysis of a phishing attachment
2023-04-26/a>Yee Ching TokStrolling through Cyberspace and Hunting for Phishing Sites
2023-04-17/a>Jan KoprivaThe strange case of Great honeypot of China
2023-04-08/a>Xavier MertensMicrosoft Netlogon: Potential Upcoming Impacts of CVE-2022-38023
2023-04-03/a>Johannes UllrichTax Season Risks
2023-03-31/a>Guy BruneauUsing Linux grep and Windows findstr to Manipulate Files
2023-03-31/a>Jan KoprivaUse of X-Frame-Options and CSP frame-ancestors security headers on 1 million most popular domains
2023-03-25/a>Guy BruneauMicrosoft Released an Update for Windows Snipping Tool Vulnerability
2023-03-22/a>Didier StevensWindows 11 Snipping Tool Privacy Bug: Inspecting PNG Files
2023-03-20/a>Xavier MertensFrom Phishing Kit To Telegram... or Not!
2023-03-15/a>Jan KoprivaIPFS phishing and the need for correctly set HTTP security headers
2023-03-12/a>Guy BruneauAsynRAT Trojan - Bill Payment (Pago de la factura)
2023-03-11/a>Xavier MertensOverview of a Mirai Payload Generator
2023-03-01/a>Xavier MertensPython Infostealer Targeting Gamers
2023-02-27/a>Xavier MertensPhishing Again and Again
2023-02-21/a>Xavier MertensPhishing Page Branded with Your Corporate Website
2023-02-19/a>Didier Stevens"Unsupported 16-bit Application" or HTML?
2023-02-18/a>Guy BruneauSpear Phishing Handlers for Username/Password
2023-02-16/a>Jan KoprivaHTML phishing attachment with browser-in-the-browser technique
2023-02-13/a>Johannes UllrichVenmo Phishing Abusing LinkedIn "slink"
2023-02-10/a>Xavier MertensObfuscated Deactivation of Script Block Logging
2023-02-09/a>Xavier MertensA Backdoor with Smart Screenshot Capability
2023-02-04/a>Guy BruneauAssemblyline as a Malware Analysis Sandbox
2023-01-28/a>Didier StevensSysinternals Updates: RDCMan v2.92, Sysmon v14.14, and ZoomIt v6.12
2023-01-26/a>Tom WebbLive Linux IR with UAC
2023-01-23/a>Xavier MertensWho's Resolving This Domain?
2023-01-21/a>Guy BruneauDShield Sensor JSON Log to Elasticsearch
2023-01-15/a>Johannes UllrichElon Musk Themed Crypto Scams Flooding YouTube Today
2023-01-08/a>Guy BruneauDShield Sensor JSON Log Analysis
2023-01-02/a>Xavier MertensNetworkMiner 2.8 Released
2022-12-21/a>Guy BruneauDShield Sensor Setup in Azure
2022-12-20/a>Xavier MertensLinux File System Monitoring & Actions
2022-12-19/a>Xavier MertensHunting for Mastodon Servers
2022-12-18/a>Guy BruneauInfostealer Malware with Double Extension
2022-12-04/a>Didier StevensFinger.exe LOLBin
2022-12-03/a>Guy BruneauLinux LOLBins Applications Available in Windows
2022-12-02/a>Brad Duncanobama224 distribution Qakbot tries .vhd (virtual hard disk) images
2022-11-29/a>Johannes UllrichIdentifying Groups of "Bot" Accounts on LinkedIn
2022-11-28/a>Johannes UllrichUkraine Themed Twitter Spam Pushing iOS Scareware
2022-11-24/a>Xavier MertensAttackers Keep Phishing Victims Under Stress
2022-11-19/a>Guy BruneauMcAfee Fake Antivirus Phishing Campaign is Back!
2022-11-10/a>Xavier MertensDo you collect "Observables" or "IOCs"?
2022-11-05/a>Guy BruneauWindows Malware with VHD Extension
2022-11-02/a>Rob VandenBrinkBreakpoints in Burp
2022-10-30/a>Didier StevensSysinternals Updates: Process Explorer v17.0, Handle v5.0, Process Monitor v3.92 and Sysmon v14.11
2022-10-27/a>Tom WebbSupersizing your DUO and 365 Integration
2022-10-19/a>Xavier MertensAre Internet Scanning Services Good or Bad for You?
2022-10-15/a>Guy BruneauMalware - Covid Vaccination Supplier Declaration
2022-10-07/a>Xavier MertensPowershell Backdoor with DGA Capability
2022-10-07/a>Xavier MertensCritical Fortinet Vulnerability Ahead
2022-10-04/a>Johannes UllrichCredential Harvesting with Telegram API
2022-09-21/a>Xavier MertensPhishing Campaigns Use Free Online Resources
2022-09-19/a>Russ McReeChainsaw: Hunt, search, and extract event log records
2022-09-15/a>Xavier MertensMalicious Word Document with a Frameset
2022-09-14/a>Xavier MertensEasy Process Injection within Python
2022-09-10/a>Guy BruneauPhishing Word Documents with Suspicious URL
2022-08-28/a>Didier StevensSysinternals Updates: Sysmon v14.0 and ZoomIt v6.01
2022-08-26/a>Guy BruneauHTTP/2 Packet Analysis with Wireshark
2022-08-26/a>Xavier MertensPaypal Phishing/Coinbase in One Image
2022-08-13/a>Guy BruneauPhishing HTML Attachment as Voicemail Audio Transcription
2022-08-11/a>Xavier MertensInfoStealer Script Based on Curl and NSudo
2022-08-02/a>Johannes UllrichA Little DDoS in the Morning - Followup
2022-08-02/a>Johannes UllrichIncrease in Chinese "Hacktivism" Attacks
2022-08-01/a>Johannes UllrichA Little DDoS In the Morning
2022-07-28/a>Johannes UllrichExfiltrating Data With Bookmarks
2022-07-25/a>Xavier MertensPowerShell Script with Fileless Capability
2022-07-23/a>Guy BruneauAnalysis of SSH Honeypot Data with PowerBI
2022-07-22/a>Yee Ching TokAn Analysis of a Discerning Phishing Website
2022-07-20/a>Xavier MertensMalicious Python Script Behaving Like a Rubber Ducky
2022-07-20/a>Johannes UllrichApple Patches Everything Day
2022-07-13/a>Xavier MertensUsing Referers to Detect Phishing Attacks
2022-07-09/a>Didier Stevens7-Zip Editing & MoW
2022-06-26/a>Didier StevensMy Paste Command
2022-06-24/a>Xavier MertensPython (ab)using The Windows GUI
2022-06-23/a>Xavier MertensFLOSS 2.0 Has Been Released
2022-06-21/a>Johannes UllrichExperimental New Domain / Domain Age API
2022-06-19/a>Didier StevensVideo: Decoding Obfuscated BASE64 Statistically
2022-06-18/a>Didier StevensDecoding Obfuscated BASE64 Statistically
2022-06-16/a>Xavier MertensHoudini is Back Delivered Through a JavaScript Dropper
2022-06-12/a>Didier StevensQuickie: Follina, RTF & Explorer Preview Pane
2022-06-09/a>Brad DuncanTA570 Qakbot (Qbot) tries CVE-2022-30190 (Follina) exploit (ms-msdt)
2022-06-02/a>Johannes UllrichQuick Answers in Incident Response: RECmd.exe
2022-06-01/a>Jan KoprivaHTML phishing attachments - now with anti-analysis features
2022-05-31/a>Xavier MertensFirst Exploitation of Follina Seen in the Wild
2022-05-18/a>Jan KoprivaDo you want 30 BTC? Nothing is easier (or cheaper) in this phishing campaign...
2022-05-14/a>Didier StevensQuick Analysis Of Phishing MSG
2022-05-07/a>Guy BruneauPhishing PDF Received in my ISC Mailbox
2022-04-28/a>Johannes UllrichA Day of SMB: What does our SMB/RPC Honeypot see? CVE-2022-26809
2022-04-24/a>Didier StevensAnalyzing a Phishing Word Document
2022-04-23/a>Guy BruneauAre Roku Streaming Devices Safe from Exploitation?
2022-04-14/a>Johannes UllrichAn Update on CVE-2022-26809 - MSRPC Vulnerabliity - PATCH NOW
2022-04-13/a>Jan KoprivaHow is Ukrainian internet holding up during the Russian invasion?
2022-04-11/a>Johannes UllrichSpring: It isn't just about Spring4Shell. Spring Cloud Function Vulnerabilities are being probed too.
2022-04-10/a>Didier StevensVideo: Method For String Extraction Filtering
2022-04-09/a>Didier StevensMethod For String Extraction Filtering
2022-04-07/a>Johannes UllrichWhat is BIMI and how is it supposed to help with Phishing.
2022-04-06/a>Brad DuncanWindows MetaStealer Malware
2022-04-05/a>Johannes UllrichWebLogic Crypto Miner Malware Disabling Alibaba Cloud Monitoring Tools
2022-04-04/a>Johannes UllrichEmptying the Phishtank: Are WordPress sites the Mosquitoes of the Internet?
2022-03-31/a>Johannes UllrichSpring Vulnerability Update - Exploitation Attempts CVE-2022-22965
2022-03-30/a>Johannes UllrichPossible new Java Spring Framework Vulnerability (Updated: not a Spring problem)
2022-03-30/a>Johannes UllrichJava Springtime Confusion: What Vulnerability are We Talking About
2022-03-29/a>Johannes UllrichMore Fake/Typosquatting Twitter Accounts Asking for Ukraine Crytocurrency Donations
2022-03-26/a>Guy BruneauIs buying Cyber Insurance a Must Now?
2022-03-25/a>Xavier MertensXLSB Files: Because Binary is Stealthier Than XML
2022-03-24/a>Xavier MertensMalware Delivered Through Free Sharing Tool
2022-03-23/a>Brad DuncanArkei Variants: From Vidar to Mars Stealer
2022-03-22/a>Johannes UllrichStatement by President Biden: What you need to do (or not do)
2022-03-15/a>Xavier MertensClean Binaries with Suspicious Behaviour
2022-03-09/a>Xavier MertensInfostealer in a Batch File
2022-03-07/a>Johannes UllrichNo Bitcoin - No Problem: Follow Up to Last Weeks Donation Scam
2022-03-04/a>Johannes UllrichScam E-Mail Impersonating Red Cross
2022-03-02/a>Johannes UllrichThe More Often Something is Repeated, the More True It Becomes: Dealing with Social Media
2022-02-25/a>Didier StevensWindows, Fixed IPv4 Addresses and APIPA
2022-02-24/a>Xavier MertensUkraine & Russia Situation From a Domain Names Perspective
2022-02-13/a>Guy BruneauDHL Spear Phishing to Capture Username/Password
2022-02-11/a>Xavier MertensCinaRAT Delivered Through HTML ID Attributes
2022-02-10/a>Johannes UllrichZyxel Network Storage Devices Hunted By Mirai Variant
2022-02-05/a>Didier StevensPower over Ethernet and Thermal Imaging
2022-02-02/a>Johannes UllrichFinding elFinder: Who is looking for your files?
2022-01-31/a>Xavier MertensBe careful with RPMSG files
2022-01-29/a>Guy BruneauSIEM In this Decade, Are They Better than the Last?
2022-01-28/a>Xavier MertensMalicious ISO Embedded in an HTML Page
2022-01-21/a>Xavier MertensObscure Wininet.dll Feature?
2022-01-20/a>Xavier MertensRedLine Stealer Delivered Through FTP
2022-01-18/a>Jan KoprivaPhishing e-mail with...an advertisement?
2022-01-05/a>Xavier MertensCode Reuse In the Malware Landscape
2022-01-04/a>Xavier MertensA Simple Batch File That Blocks People
2022-01-03/a>Xavier MertensMcAfee Phishing Campaign with a Nice Fake Scan
2022-01-02/a>Guy BruneauExchange Server - Email Trapped in Transport Queues
2021-12-28/a>Russ McReeLotL Classifier tests for shells, exfil, and miners
2021-12-23/a>Xavier MertensNicely Crafted indeed.com Login Page
2021-12-21/a>Xavier MertensMore Undetected PowerShell Dropper
2021-12-20/a>Jan KoprivaPowerPoint attachments, Agent Tesla and code reuse in malware
2021-12-14/a>Johannes UllrichLog4j: Getting ready for the long haul (CVE-2021-44228)
2021-12-10/a>Xavier MertensPython Shellcode Injection From JSON Data
2021-12-09/a>Yee Ching TokPhishing Direct Messages via Discord
2021-12-06/a>Xavier MertensThe Importance of Out-of-Band Networks
2021-12-04/a>Guy BruneauA Review of Year 2021
2021-12-01/a>Xavier MertensInfo-Stealer Using webhook.site to Exfiltrate Data
2021-11-25/a>Didier StevensYARA's Private Strings
2021-11-24/a>Jan KoprivaPhishing page hiding itself using dynamically adjusted IP-based allow list
2021-11-21/a>Didier StevensBackdooring PAM
2021-11-20/a>Guy BruneauHikvision Security Cameras Potentially Exposed to Remote Code Execution
2021-11-19/a>Xavier MertensDownloader Disguised as Excel Add-In (XLL)
2021-11-10/a>Xavier MertensShadow IT Makes People More Vulnerable to Phishing
2021-10-31/a>Didier StevensSysinternals: Autoruns and Sysmon updates
2021-10-30/a>Guy BruneauRemote Desktop Protocol (RDP) Discovery
2021-10-26/a>Yee Ching TokHunting for Phishing Sites Masquerading as Outlook Web Access
2021-10-14/a>Xavier MertensPort-Forwarding with Windows for the Win
2021-10-13/a>Johannes UllrichPlease fix your E-Mail Brute forcing tool!
2021-10-09/a>Guy BruneauScanning for Previous Oracle WebLogic Vulnerabilities
2021-10-07/a>Johannes UllrichWho Is Hunting For Your IPTV Set-Top Box?
2021-09-25/a>Didier StevensStrings Analysis: VBA & Excel4 Maldoc
2021-09-25/a>Didier StevensVideo: Strings Analysis: VBA & Excel4 Maldoc
2021-09-24/a>Xavier MertensKeep an Eye on Your Users Mobile Devices (Simple Inventory)
2021-09-20/a>Johannes Ullrich#OMIGOD Exploits Captured in the Wild. Researchers responsible for half of scans for related ports.
2021-09-16/a>Jan KoprivaPhishing 101: why depend on one suspicious message subject when you can use many?
2021-09-09/a>Johannes UllrichUpdates to Our Datafeeds/API
2021-09-07/a>Johannes UllrichWhy I Gave Up on IPv6. And no, it is not because of security issues.
2021-09-02/a>Xavier MertensAttackers Will Always Abuse Major Events in our Lifes
2021-08-24/a>Johannes UllrichAttackers Hunting For Twilio Credentials
2021-08-21/a>Didier StevensNew Versions Of Sysinternals Tools
2021-08-19/a>Johannes UllrichWhen Lightning Strikes. What works and doesn't work.
2021-08-13/a>Guy BruneauScanning for Microsoft Exchange eDiscovery
2021-08-04/a>Yee Ching TokPivoting and Hunting for Shenanigans from a Reported Phishing Domain
2021-08-03/a>Johannes UllrichIs this the Weirdest Phishing (SMishing?) Attempt Ever?
2021-08-01/a>Didier Stevensprocdump Version 10.1
2021-07-31/a>Guy BruneauUnsolicited DNS Queries
2021-07-28/a>Jan KoprivaA sextortion e-mail from...IT support?!
2021-07-24/a>Bojan ZdrnjaActive Directory Certificate Services (ADCS - PKI) domain admin vulnerability
2021-07-21/a>Johannes Ullrich"Summer of SAM": Microsoft Releases Guidance for CVE-2021-36934
2021-07-19/a>Rick WannerNew Windows Print Spooler Vulnerability - CVE-2021-34481
2021-07-16/a>Xavier MertensMultiple BaseXX Obfuscations
2021-07-14/a>Jan KoprivaOne way to fail at malspam - give recipients the wrong password for an encrypted attachment
2021-07-13/a>Johannes UllrichUSPS Phishing Using Telegram to Collect Data
2021-07-10/a>Guy BruneauScanning for Microsoft Secure Socket Tunneling Protocol
2021-07-08/a>Xavier MertensUsing Sudo with Python For More Security Controls
2021-07-06/a>Xavier MertensPython DLL Injection Check
2021-07-03/a>Didier StevensFinding Strings With oledump.py
2021-07-02/a>Xavier Mertens"inception.py"... Multiple Base64 Encodings
2021-06-30/a>Johannes UllrichCVE-2021-1675: Incomplete Patch and Leaked RCE Exploit
2021-06-28/a>Didier StevensCFBF Files Strings Analysis
2021-06-26/a>Guy BruneauCVE-2019-9670: Zimbra Collaboration Suite XXE vulnerability
2021-06-22/a>Jan KoprivaPhishing asking recipients not to report abuse
2021-06-18/a>Daniel WesemannNetwork Forensics on Azure VMs (Part #2)
2021-06-18/a>Daniel WesemannOpen redirects ... and why Phishers love them
2021-06-15/a>Johannes UllrichMulti Perimeter Device Exploit Mirai Version Hunting For Sonicwall, DLink, Cisco and more
2021-06-12/a>Guy BruneauFortinet Targeted for Unpatched SSL VPN Discovery Activity
2021-05-30/a>Didier StevensSysinternals: Procmon, Sysmon, TcpView and Process Explorer update
2021-05-29/a>Guy BruneauSpear-phishing Email Targeting Outlook Mail Clients
2021-05-27/a>Jan KoprivaAll your Base are...nearly equal when it comes to AV evasion, but 64-bit executables are not
2021-05-22/a>Xavier Mertens"Serverless" Phishing Campaign
2021-05-21/a>Xavier MertensLocking Kernel32.dll As Anti-Debugging Technique
2021-05-14/a>Xavier Mertens"Open" Access to Industrial Systems Interface is Also Far From Zero
2021-05-12/a>Jan KoprivaNumber of industrial control systems on the internet is lower then in 2020...but still far from zero
2021-05-10/a>Johannes UllrichCorrectly Validating IP Addresses: Why encoding matters for input validation.
2021-05-08/a>Guy BruneauWho is Probing the Internet for Research Purposes?
2021-05-07/a>Daniel WesemannExposed Azure Storage Containers
2021-05-06/a>Xavier MertensAlternative Ways To Perform Basic Tasks
2021-05-02/a>Didier StevensPuTTY And FileZilla Use The Same Fingerprint Registry Keys
2021-04-30/a>Remco VerhoefQiling: A true instrumentable binary emulation framework
2021-04-29/a>Xavier MertensFrom Python to .Net
2021-04-24/a>Guy BruneauBase64 Hashes Used in Web Scanning
2021-04-23/a>Xavier MertensMalicious PowerPoint Add-On: "Small Is Beautiful"
2021-04-22/a>Xavier MertensHow Safe Are Your Docker Images?
2021-04-19/a>Jan KoprivaHunting phishing websites with favicon hashes
2021-04-09/a>Xavier MertensNo Python Interpreter? This Simple RAT Installs Its Own Copy
2021-04-06/a>Jan KoprivaMalspam with Lokibot vs. Outlook and RFCs
2021-03-31/a>Xavier MertensQuick Analysis of a Modular InfoStealer
2021-03-19/a>Xavier MertensPastebin.com Used As a Simple C2 Channel
2021-03-17/a>Xavier MertensDefenders, Know Your Operating System Like Attackers Do!
2021-03-12/a>Guy BruneauMicrosoft DHCP Logs Shipped to ELK
2021-03-11/a>Johannes UllrichPiktochart - Phishing with Infographics
2021-03-06/a>Xavier MertensSpotting the Red Team on VirusTotal!
2021-03-04/a>Xavier MertensFrom VBS, PowerShell, C Sharp, Process Hollowing to RAT
2021-02-26/a>Guy BruneauPretending to be an Outlook Version Update
2021-02-25/a>Daniel WesemannForensicating Azure VMs
2021-02-17/a>Xavier MertensThe new "LinkedInSecureMessage" ?
2021-02-13/a>Guy BruneauvSphere Replication updates address a command injection vulnerability (CVE-2021-21976) - https://www.vmware.com/security/advisories/VMSA-2021-0001.html
2021-02-13/a>Guy BruneauUsing Logstash to Parse IPtables Firewall Logs
2021-02-10/a>Brad DuncanPhishing message to the ISC handlers email distro
2021-01-30/a>Guy BruneauPacketSifter as Network Parsing and Telemetry Tool
2021-01-19/a>Russ McReeGordon for fast cyber reputation checks
2021-01-17/a>Didier StevensNew Release of Sysmon Adding Detection for Process Tampering
2021-01-15/a>Guy BruneauObfuscated DNS Queries
2021-01-10/a>Didier StevensMaldoc Analysis With CyberChef
2021-01-09/a>Didier StevensMaldoc Strings Analysis
2021-01-02/a>Guy BruneauProtecting Home Office and Enterprise in 2021
2021-01-01/a>Didier StevensStrings 2021
2020-12-29/a>Jan KoprivaWant to know what's in a folder you don't have a permission to access? Try asking your AV solution...
2020-12-26/a>Didier Stevensbase64dump.py Supported Encodings
2020-12-14/a>Johannes UllrichSolarWinds Breach Used to Infiltrate Customer Networks (Solarigate)
2020-12-13/a>Didier StevensKringleCon 2020
2020-12-08/a>Johannes UllrichDecember 2020 Microsoft Patch Tuesday: Exchange, Sharepoint, Dynamics and DNS Spoofing
2020-12-06/a>Didier Stevensoledump's Indicators (video)
2020-12-05/a>Guy BruneauIs IP 91.199.118.137 testing Access to aahwwx.52host.xyz?
2020-12-04/a>Guy BruneauDetecting Actors Activity with Threat Intel
2020-11-19/a>Xavier MertensPowerShell Dropper Delivering Formbook
2020-11-07/a>Guy BruneauCryptojacking Targeting WebLogic TCP/7001
2020-11-05/a>Xavier MertensDid You Spot "Invoke-Expression"?
2020-10-25/a>Didier StevensVideo: Pascal Strings
2020-10-24/a>Guy BruneauAn Alternative to Shodan, Censys with User-Agent CensysInspect/1.1
2020-10-22/a>Jan KoprivaBazarLoader phishing lures: plan a Halloween party, get a bonus and be fired in the same afternoon
2020-10-11/a>Didier StevensAnalyzing MSG Files With plugin_msg_summary
2020-10-09/a>Jan KoprivaPhishing kits as far as the eye can see
2020-10-03/a>Guy BruneauScanning for SOHO Routers
2020-10-02/a>Xavier MertensAnalysis of a Phishing Kit
2020-09-30/a>Johannes UllrichScans for FPURL.xml: Reconnaissance or Not?
2020-09-24/a>Xavier MertensParty in Ibiza with PowerShell
2020-09-21/a>Jan KoprivaSlightly broken overlay phishing
2020-09-20/a>Guy BruneauAnalysis of a Salesforce Phishing Emails
2020-09-17/a>Xavier MertensSuspicious Endpoint Containment with OSSEC
2020-09-02/a>Xavier MertensPython and Risky Windows API Calls
2020-09-01/a>Johannes UllrichExposed Windows Domain Controllers Used in CLDAP DDoS Attacks
2020-08-30/a>Johannes UllrichCenturyLink Outage Causing Internet Wide Problems
2020-08-28/a>Xavier MertensExample of Malicious DLL Injected in PowerShell
2020-08-25/a>Xavier MertensKeep An Eye on LOLBins
2020-08-24/a>Xavier MertensTracking A Malware Campaign Through VT
2020-08-22/a>Guy BruneauRemote Desktop (TCP/3389) and Telnet (TCP/23), What might they have in Common?
2020-08-20/a>Rob VandenBrinkOffice 365 Mail Forwarding Rules (and other Mail Rules too)
2020-08-10/a>Bojan ZdrnjaScoping web application and web service penetration tests
2020-08-08/a>Guy BruneauScanning Activity Include Netcat Listener
2020-08-03/a>Johannes UllrichA Word of Caution: Helping Out People Being Stalked Online
2020-07-30/a>Johannes UllrichPython Developers: Prepare!!!
2020-07-28/a>Johannes UllrichAll I want this Tuesday: More Data
2020-07-27/a>Johannes UllrichIn Memory of Donald Smith
2020-07-26/a>Didier StevensCracking Maldoc VBA Project Passwords
2020-07-20/a>Rick WannerSextortion Update: The Final Final Chapter
2020-07-19/a>Guy BruneauScanning Activity for ZeroShell Unauthenticated Access
2020-07-12/a>Didier StevensMaldoc: VBA Purging Example
2020-07-11/a>Guy BruneauScanning Home Internet Facing Devices to Exploit
2020-07-08/a>Xavier MertensIf You Want Something Done Right, You Have To Do It Yourself... Malware Too!
2020-07-04/a>Russ McReeHappy FouRth of July from the Internet Storm Center
2020-06-29/a>Didier StevensSysmon and Alternate Data Streams
2020-06-25/a>Johannes UllrichTech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release.
2020-06-24/a>Jan KoprivaUsing Shell Links as zero-touch downloaders and to initiate network connections
2020-06-18/a>Jan KoprivaBroken phishing accidentally exploiting Outlook zero-day
2020-06-16/a>Xavier MertensSextortion to The Next Level
2020-06-15/a>Rick WannerHTML based Phishing Run
2020-06-13/a>Guy BruneauMirai Botnet Activity
2020-06-11/a>Xavier MertensAnti-Debugging JavaScript Techniques
2020-06-08/a>Didier StevensTranslating BASE64 Obfuscated Scripts
2020-06-04/a>Xavier MertensAnti-Debugging Technique based on Memory Protection
2020-06-01/a>Jim ClausingStackstrings, type 2
2020-05-27/a>Jan KoprivaFrankenstein's phishing using Google Cloud Storage
2020-05-23/a>Xavier MertensAgentTesla Delivered via a Malicious PowerPoint Add-In
2020-05-22/a>Didier StevensSome Strings to Remember
2020-05-21/a>Xavier MertensMalware Triage with FLOSS: API Calls Based Behavior
2020-05-16/a>Guy BruneauScanning for Outlook Web Access (OWA) & Microsoft Exchange Control Panel (ECP)
2020-05-14/a>Rob VandenBrinkPatch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe
2020-05-04/a>Didier StevensSysmon and File Deletion
2020-05-02/a>Guy BruneauPhishing PDF with Unusual Hostname
2020-04-29/a>Johannes UllrichPrivacy Preserving Protocols to Trace Covid19 Exposure
2020-04-28/a>Jan KoprivaAgent Tesla delivered by the same phishing campaign for over a year
2020-04-27/a>Xavier MertensPowershell Payload Stored in a PSCredential Object
2020-04-18/a>Guy BruneauMaldoc Falsely Represented as DOCX Invoice Redirecting to Fake Apple Store
2020-04-16/a>Johannes UllrichUsing AppLocker to Prevent Living off the Land Attacks
2020-04-13/a>Jan KoprivaLook at the same phishing campaign 3 months apart
2020-04-07/a>Johannes UllrichIncrease in RDP Scanning
2020-04-03/a>Xavier MertensObfuscated with a Simple 0x0A
2020-03-30/a>Jan KoprivaCrashing explorer.exe with(out) a click
2020-03-28/a>Didier StevensCovid19 Domain Classifier
2020-03-27/a>Johannes UllrichHelp us classify Covid19 related domains https://isc.sans.edu/covidclassifier.html (login required)
2020-03-23/a>Didier StevensWindows Zeroday Actively Exploited: Type 1 Font Parsing Remote Code Execution Vulnerability
2020-03-21/a>Guy BruneauHoneypot - Scanning and Targeting Devices & Services
2020-03-16/a>Jan KoprivaDesktop.ini as a post-exploitation tool
2020-03-15/a>Guy BruneauVPN Access and Activity Monitoring
2020-03-14/a>Didier StevensPhishing PDF With Incremental Updates.
2020-03-13/a>Rob VandenBrinkNot all Ethernet NICs are Created Equal - Trying to Capture Invalid Ethernet Frames
2020-03-05/a>Xavier MertensWill You Put Your Password in a Survey?
2020-02-29/a>Guy BruneauHazelcast IMDG Discover Scan
2020-02-18/a>Jan KoprivaDiscovering contents of folders in Windows without permissions
2020-02-17/a>Didier Stevenscurl and SSPI
2020-02-16/a>Guy BruneauSOAR or not to SOAR?
2020-02-15/a>Didier Stevensbsdtar on Windows 10
2020-02-10/a>Jan KoprivaCurrent PayPal phishing campaign or "give me all your personal information"
2020-02-03/a>Jan KoprivaAnalysis of a triple-encrypted AZORult downloader
2020-02-02/a>Didier StevensVideo: Stego & Cryptominers
2020-01-27/a>Johannes UllrichNetwork Security Perspective on Coronavirus Preparedness
2020-01-25/a>Guy BruneauIs Threat Hunting the new Fad?
2020-01-24/a>Xavier MertensWhy Phishing Remains So Popular?
2020-01-21/a>Russ McReeDeepBlueCLI: Powershell Threat Hunting
2020-01-16/a>Jan KoprivaPicks of 2019 malware - the large, the small and the one full of null bytes
2020-01-09/a>Kevin ShorttWindows 7 - End of Life
2020-01-04/a>Didier StevensKringleCon 2019
2019-12-26/a>Xavier MertensBypassing UAC to Install a Cryptominer
2019-12-22/a>Didier StevensExtracting VBA Macros From .DWG Files
2019-12-16/a>Didier StevensMalicious .DWG Files?
2019-12-13/a>Jan KoprivaInternet banking sites and their use of TLS... and SSLv3... and SSLv2?!
2019-12-06/a>Jan KoprivaPhishing with a self-contained credentials-stealing webpage
2019-12-05/a>Jan KoprivaE-mail from Agent Tesla
2019-12-04/a>Jan KoprivaAnalysis of a strangely poetic malware
2019-11-27/a>Brad DuncanFinding an Agent Tesla malware sample
2019-11-26/a>Jan KoprivaLessons learned from playing a willing phish
2019-11-25/a>Xavier MertensMy Little DoH Setup
2019-11-23/a>Guy BruneauLocal Malware Analysis with Malice
2019-11-11/a>Johannes UllrichAre We Going Back to TheMoon (and How is Liquor Involved)?
2019-11-03/a>Didier StevensYou Too? "Unusual Activity with Double Base64 Encoding"
2019-10-31/a>Jan KoprivaEML attachments in O365 - a recipe for phishing
2019-10-30/a>Xavier MertensKeep an Eye on Remote Access to Mailboxes
2019-10-27/a>Guy BruneauUnusual Activity with Double Base64 Encoding
2019-10-24/a>Johannes UllrichYour Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment?
2019-10-20/a>Guy BruneauScanning Activity for NVMS-9000 Digital Video Recorder
2019-10-17/a>Jan KoprivaPhishing e-mail spoofing SPF-enabled domain
2019-10-16/a>Xavier MertensSecurity Monitoring: At Network or Host Level?
2019-10-10/a>Rob VandenBrinkMining Live Networks for OUI Data Oddness
2019-10-09/a>Brad DuncanWhat data does Vidar malware steal from an infected host?
2019-09-27/a>Xavier MertensNew Scans for Polycom Autoconfiguration Files
2019-09-19/a>Xavier MertensBlocklisting or Whitelisting in the Right Way
2019-09-07/a>Guy BruneauUnidentified Scanning Activity
2019-08-25/a>Guy BruneauAre there any Advantages of Buying Cyber Security Insurance?
2019-08-15/a>Didier StevensAnalysis of a Spearphishing Maldoc
2019-08-09/a>Xavier Mertens100% JavaScript Phishing Page
2019-08-08/a>Johannes Ullrich[Guest Diary] The good, the bad and the non-functional, or "how not to do an attack campaign"
2019-07-25/a>Rob VandenBrinkWhen Users Attack! Users (and Admins) Thwarting Security Controls
2019-07-17/a>Xavier MertensAnalyzis of DNS TXT Records
2019-07-13/a>Guy BruneauGuidance to Protect DNS Against Hijacking & Scanning for Version.BIND Still a Thing
2019-07-08/a>Didier StevensMachine Code? No!
2019-07-07/a>Rick WannerOpSec and OSInt
2019-07-04/a>Didier StevensMachine Code?
2019-07-02/a>Xavier MertensMalicious Script With Multiple Payloads
2019-06-27/a>Rob VandenBrinkFinding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell
2019-06-20/a>Xavier MertensUsing a Travel Packing App for Infosec Purpose
2019-06-18/a>Johannes UllrichWhat You Need To Know About TCP "SACK Panic"
2019-06-14/a>Jim ClausingA few Ghidra tips for IDA users, part 4 - function call graphs
2019-06-06/a>Xavier MertensKeep an Eye on Your WMI Logs
2019-05-22/a>Johannes UllrichAn Update on the Microsoft Windows RDP "Bluekeep" Vulnerability (CVE-2019-0708) [now with pcaps]
2019-05-20/a>Tom WebbCVE-2019-0604 Attack
2019-05-13/a>Xavier MertensFrom Phishing To Ransomware?
2019-05-06/a>Didier StevensText and Text
2019-05-03/a>Jim ClausingA few Ghidra tips for IDA users, part 3 - conversion, labels, and comments
2019-04-24/a>Rob VandenBrinkWhere have all the Domain Admins gone? Rooting out Unwanted Domain Administrators
2019-04-17/a>Jim ClausingA few Ghidra tips for IDA users, part 2 - strings and parameters
2019-04-17/a>Xavier MertensMalware Sample Delivered Through UDF Image
2019-04-08/a>Jim ClausingA few Ghidra tips for IDA users, part 1 - the decompiler/unreachable code
2019-04-03/a>Jim ClausingA few Ghidra tips for IDA users, part 0 - automatic comments for API call parameters
2019-04-02/a>Johannes UllrichFake AV is Back: LaCie Network Drives Used to Spread Malware
2019-03-27/a>Xavier MertensRunning your Own Passive DNS Service
2019-03-21/a>Xavier MertensNew Wave of Extortion Emails: Central Intelligence Agency Case
2019-03-05/a>Rob VandenBrinkPowershell, Active Directory and the Windows Host Firewall
2019-02-28/a>Tom WebbPhishing impersonations
2019-02-07/a>Xavier Mertens Phishing Kit with JavaScript Keylogger
2019-02-03/a>Didier StevensVideo: Analyzing a Simple HTML Phishing Attachment
2019-02-01/a>Rick WannerSextortion: Follow the Money Part 3 - The cashout begins!
2019-01-31/a>Xavier MertensTracking Unexpected DNS Changes
2019-01-30/a>Russ McReeCR19-010: The United States vs. Huawei
2019-01-29/a>Johannes UllrichA Not So Well Done Phish (Why Attackers need to Implement IPv6 Now! ;-) )
2019-01-24/a>Brad DuncanMalspam with Word docs uses macro to run Powershell script and steal system data
2019-01-18/a>John BambenekSextortion Bitcoin on the Move
2019-01-14/a>Rob VandenBrinkStill Running Windows 7? Time to think about that upgrade project!
2019-01-10/a>Brad DuncanHeartbreaking Emails: "Love You" Malspam
2019-01-02/a>Xavier MertensMalicious Script Leaking Data via FTP
2019-01-02/a>Lorna HutchesonGift Card Scams on the rise
2018-12-27/a>Didier StevensMatryoshka Phish
2018-12-26/a>Didier StevensBitcoin "Blocklists"
2018-12-23/a>Guy BruneauScanning Activity, end Goal is to add Hosts to Mirai Botnet
2018-12-22/a>Didier StevensKringleCon 2018
2018-12-21/a>Lorna HutchesonPhishing Attempts That Bypass 2FA
2018-12-19/a>Xavier MertensRestricting PowerShell Capabilities with NetSh
2018-12-19/a>Xavier MertensMicrosoft OOB Patch for Internet Explorer: Scripting Engine Memory Corruption Vulnerability
2018-12-16/a>Guy BruneauRandom Port Scan for Open RDP Backdoor
2018-12-13/a>Xavier MertensPhishing Attack Through Non-Delivery Notification
2018-12-09/a>Didier StevensQuickie: String Analysis is Still Useful
2018-11-30/a>Remco VerhoefCoinMiners searching for hosts
2018-11-22/a>Xavier MertensDivided Payload in Multiple Pasties
2018-11-20/a>Xavier MertensQuerying DShield from Cortex
2018-11-18/a>Guy BruneauMultipurpose PCAP Analysis Tool
2018-11-17/a>Xavier MertensQuickly Investigating Websites with Lookyloo
2018-11-15/a>Brad DuncanEmotet infection with IcedID banking Trojan
2018-11-14/a>Brad DuncanDay in the life of a researcher: Finding a wave of Trickbot malspam
2018-11-12/a>Rick WannerUsing the Neutrino ip-blocklist API to test general badness of an IP
2018-11-11/a>Pasquale StirparoCommunity contribution: joining forces or multiply solutions?
2018-10-26/a>Xavier MertensDissecting Malicious Office Documents with Linux
2018-10-17/a>Russ McReeRedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence
2018-09-28/a>Xavier MertensMore Excel DDE Code Injection
2018-09-20/a>Xavier MertensHunting for Suspicious Processes with OSSEC
2018-09-13/a>Xavier MertensMalware Delivered Through MHT Files
2018-09-07/a>Xavier MertensCrypto Mining in a Windows Headless Browser
2018-09-05/a>Rob VandenBrinkWhere have all my Certificates gone? (And when do they expire?)
2018-09-05/a>Xavier MertensMalicious PowerShell Compiling C# Code on the Fly
2018-08-30/a>Xavier MertensCrypto Mining Is More Popular Than Ever!
2018-08-29/a>Xavier Mertens3D Printers in The Wild, What Can Go Wrong?
2018-08-26/a>Didier StevensIdentifying numeric obfuscation
2018-08-23/a>Xavier MertensSimple Phishing Through formcrafts.com
2018-08-12/a>Didier StevensA URL shortener handy for phishers
2018-08-10/a>Remco VerhoefHunting SSL/TLS clients using JA3
2018-08-06/a>Didier StevensNumeric obfuscation: another example
2018-08-05/a>Didier StevensVideo: Maldoc analysis with standard Linux tools
2018-08-04/a>Didier StevensDealing with numeric obfuscation in malicious scripts
2018-07-30/a>Xavier MertensExploiting the Power of Curl
2018-07-29/a>Guy BruneauUsing RITA for Threat Analysis
2018-07-21/a>Didier StevensBTC pickpockets are back
2018-07-17/a>Xavier MertensSearching for Geographically Improbable Login Attempts
2018-07-15/a>Didier StevensVideo: Retrieving and processing JSON data (BTC example)
2018-07-15/a>Didier StevensExtracting BTC addresses from emails
2018-07-14/a>Didier StevensRetrieving and processing JSON data (BTC example)
2018-07-13/a>Xavier MertensCryptominer Delivered Though Compromized JavaScript File
2018-07-03/a>Didier StevensProgress indication for scripts on Windows
2018-07-02/a>Guy BruneauHello Peppa! - PHP Scans
2018-07-01/a>Didier StevensVideo: Analyzing XPS Files
2018-06-30/a>Didier StevensXPS samples
2018-06-26/a>Didier StevensAnalyzing XPS files
2018-06-22/a>Lorna HutchesonXPS Attachment Used for Phishing
2018-06-21/a>Xavier MertensAre Your Hunting Rules Still Working?
2018-06-19/a>Xavier MertensPowerShell: ScriptBlock Logging... Or Not?
2018-06-13/a>Xavier MertensA Bunch of Compromized Wordpress Sites
2018-06-07/a>Remco VerhoefAutomated twitter loot collection
2018-06-05/a>Xavier MertensMalicious Post-Exploitation Batch File
2018-05-24/a>Xavier Mertens"Blocked" Does Not Mean "Forget It"
2018-05-22/a>Xavier MertensMalware Distributed via .slk Files
2018-05-09/a>Xavier MertensNice Phishing Sample Delivering Trickbot
2018-05-07/a>Xavier MertensAdding Persistence Via Scheduled Tasks
2018-05-03/a>Renato MarinhoWebLogic Exploited in the Wild (Again)
2018-05-02/a>Russ McReeWindows Commands Reference - An InfoSec Must Have
2018-03-12/a>Xavier MertensPayload delivery via SMB
2018-03-05/a>Xavier MertensMalicious Bash Script with Multiple Features
2018-03-04/a>Xavier MertensThe Crypto Miners Fight For CPU Cycles
2018-03-02/a>Xavier MertensCommon Patterns Used in Phishing Campaigns Files
2018-02-25/a>Guy BruneauBlackhole Advertising Sites with Pi-hole
2018-02-01/a>Xavier MertensAdaptive Phishing Kit
2018-01-31/a>Tom WebbTax Phishing Time
2018-01-25/a>Xavier MertensRansomware as a Service
2018-01-20/a>Didier StevensAn RTF phish
2018-01-13/a>Rick WannerFlaw in Intel's Active Management Technology (AMT)
2018-01-11/a>Xavier MertensMining or Nothing!
2018-01-07/a>Guy BruneauSSH Scans by Clients Types
2018-01-03/a>John BambenekPhishing to Rural America Leads to Six-figure Wire Fraud Losses
2018-01-02/a>Didier StevensPDF documents & URLs: video
2018-01-01/a>Didier StevensWhat is new?
2017-12-27/a>Guy BruneauWhat are your Security Challenges for 2018?
2017-12-19/a>Xavier MertensExample of 'MouseOver' Link in a Powerpoint File
2017-12-14/a>Russ McReeSecurity Planner: Improve your online safety
2017-12-13/a>Xavier MertensTracking Newly Registered Domains
2017-12-05/a>Tom WebbIR using the Hive Project.
2017-12-02/a>Xavier MertensUsing Bad Material for the Good
2017-12-01/a>Xavier MertensPhishing Kit (Ab)Using Cloud Services
2017-11-29/a>Xavier MertensFileless Malicious PowerShell Sample
2017-11-25/a>Guy BruneauBenefits associated with the use of Open Source Software
2017-11-23/a>Xavier MertensProactive Malicious Domain Search
2017-11-17/a>Xavier MertensTop-100 Malicious IP STIX Feed
2017-11-16/a>Xavier MertensSuspicious Domains Tracking Dashboard
2017-11-15/a>Xavier MertensIf you want something done right, do it yourself!
2017-11-13/a>Guy Bruneaujsonrpc Scanning for root account
2017-11-13/a>Guy BruneauVBE Embeded Script (info.zip)
2017-11-11/a>Xavier MertensKeep An Eye on your Root Certificates
2017-11-10/a>Bojan ZdrnjaBattling e-mail phishing
2017-11-05/a>Didier StevensExtracting the text from PDF documents
2017-11-04/a>Didier StevensPDF documents & URLs
2017-11-01/a>Rob VandenBrinkSecuring SSH Services - Go Blue Team!!
2017-10-18/a>Renato MarinhoBaselining Servers to Detect Outliers
2017-10-06/a>Johannes UllrichWhat's in a cable? The dangers of unauthorized cables
2017-10-02/a>Xavier MertensInvestigating Security Incidents with Passive DNS
2017-09-30/a>Lorna HutchesonWho's Borrowing your Resources?
2017-09-25/a>Renato MarinhoXPCTRA Malware Steals Banking and Digital Wallet User's Credentials
2017-09-22/a>Russell EubanksWhat is the State of Your Union?
2017-09-18/a>Xavier MertensGetting some intelligence from malspam
2017-09-18/a>Johannes UllrichSANS Securingthehuman posted a follow up to their Equifax breach webcast: https://securingthehuman.sans.org/blog/2017/09/15/equifax-webcast-follow-up
2017-09-17/a>Guy BruneaurockNSM as a Incident Response Package
2017-09-13/a>Rob VandenBrinkSysinternals Update: Sysmon v6.10, Process Monitor v3.40, Autoruns v13.80, AccessChk v6.11 - https://blogs.technet.microsoft.com/sysinternals/2017/09/12/sysinternals-update-sysmon-v6-1-process-monitor-v3-4-autoruns-v13-8-accesschk-v6-11/
2017-09-11/a>Russ McReeWindows Auditing with WINspect
2017-09-06/a>Adrien de BeaupreModern Web Application Penetration Testing , Hash Length Extension Attacks
2017-09-02/a>Xavier MertensAutoIT based malware back in the wild
2017-08-24/a>Bojan ZdrnjaFree Bitcoins? Why not?
2017-08-18/a>Renato MarinhoEngineBox Malware Supports 10+ Brazilian Banks
2017-08-16/a>Xavier MertensAnalysis of a Paypal phishing kit
2017-08-15/a>Brad DuncanMalspam pushing Trickbot banking Trojan
2017-08-13/a>Didier StevensThe Good Phishing Email
2017-08-07/a>Xavier MertensIncrease of phpMyAdmin scans
2017-07-30/a>Guy BruneauText Banking Scams
2017-07-24/a>Russell EubanksTrends Over Time
2017-07-16/a>Renato MarinhoSMS Phishing induces victims to photograph its own token card
2017-07-12/a>Xavier MertensBackup Scripts, the FIM of the Poor
2017-07-09/a>Russ McReeAdversary hunting with SOF-ELK
2017-07-05/a>Didier StevensSelecting domains with random names
2017-06-27/a>Brad DuncanA Tale of Two Phishies
2017-06-17/a>Guy BruneauMapping Use Cases to Logs. Which Logs are the Most Important to Collect?
2017-06-15/a>Bojan ZdrnjaUberscammers
2017-06-14/a>Xavier MertensSystemd Could Fallback to Google DNS?
2017-06-08/a>Tom WebbSummer STEM for Kids
2017-06-02/a>Xavier MertensPhishing Campaigns Follow Trends
2017-06-01/a>Xavier MertensSharing Private Data with Webcast Invitations
2017-05-31/a>Pasquale StirparoAnalysis of Competing Hypotheses, WCry and Lazarus (ACH part 2)
2017-05-28/a>Pasquale StirparoAnalysis of Competing Hypotheses (ACH part 1)
2017-05-28/a>Guy BruneauCyberChef a Must Have Tool in your Tool bag!
2017-05-20/a>Xavier MertensTyposquatting: Awareness and Hunting
2017-05-13/a>Guy BruneauHas anyone Tested WannaCry Killswitch? - https://blog.didierstevens.com/2017/05/13/quickpost-wcry-killswitch-check-is-not-proxy-aware/
2017-05-06/a>Xavier MertensThe story of the CFO and CEO...
2017-05-05/a>Xavier MertensHTTP Headers... the Achilles' heel of many applications
2017-05-03/a>Bojan ZdrnjaOAUTH phishing against Google Docs ? beware!
2017-04-22/a>Jim ClausingWTF tcp port 81
2017-04-20/a>Xavier MertensDNS Query Length... Because Size Does Matter
2017-04-18/a>Johannes UllrichYet Another Apple Phish and Some DNS Lessons Learned From It
2017-04-16/a>Johannes UllrichTool to Detect Active Phishing Attacks Using Unicode Look-Alike Domains
2017-03-28/a>Xavier MertensLogical & Physical Security Correlation
2017-03-24/a>Xavier MertensNicely Obfuscated JavaScript Sample
2017-03-15/a>Xavier MertensRetro Hunting!
2017-03-06/a>Renato MarinhoA very convincing Typosquatting + Social Engineering campaign is targeting Santander corporate customers in Brazil
2017-02-12/a>Xavier MertensAnalysis of a Suspicious Piece of JavaScript
2017-02-05/a>Xavier MertensMany Malware Samples Found on Pastebin
2017-02-02/a>Rick WannerMultiple vulnerabilities discovered in popular printer models
2017-02-01/a>Xavier MertensQuick Analysis of Data Left Available by Attackers
2017-01-18/a>Rob VandenBrinkMaking Windows 10 a bit less "Creepy" - Common Privacy Settings
2017-01-12/a>Mark BaggettSome tools updates
2017-01-12/a>Mark BaggettSystem Resource Utilization Monitor
2017-01-11/a>Johannes UllrichJanuary 2017 Edition of Ouch! Security Awareness Newsletter Released: https://securingthehuman.sans.org/ouch
2017-01-10/a>Johannes UllrichRealtors Be Aware: You Are a Target
2017-01-10/a>Johannes UllrichPort 37777 "MapTable" Requests
2017-01-06/a>John BambenekGreat Misadventures of Security Vendors: Absurd Sandboxing Edition
2017-01-04/a>John BambenekMixed Messages : Novel Phishing Attempts Trying to Steal Your E-mail Password Goes Wrong
2016-11-23/a>Tom WebbMapping Attack Methodology to Controls
2016-11-22/a>Didier StevensUpdate:ZIP With Comment
2016-11-18/a>Didier StevensVBA Shellcode and Windows 10
2016-11-16/a>Xavier MertensExample of Getting Analysts & Researchers Away
2016-11-13/a>Guy BruneauBitcoin Miner File Upload via FTP
2016-11-11/a>Rick WannerBenevolent malware? reincarna/Linux.Wifatch
2016-11-02/a>Rob VandenBrinkWhat Does a Pentest Look Like?
2016-10-25/a>Xavier MertensAnother Day, Another Spam...
2016-10-10/a>Didier StevensRadare2: rahash2
2016-10-08/a>Russell EubanksUnauthorized Change Detected!
2016-10-02/a>Guy BruneauIs there an Infosec Cybersecurity Talent Shortage?
2016-09-25/a>Pasquale StirparoDefining Threat Intelligence Requirements
2016-09-04/a>Russ McReeKali Linux 2016.2 Release: https://www.kali.org/news/kali-linux-20162-release/
2016-09-01/a>Xavier MertensMaxmind.com (Ab)used As Anti-Analysis Technique
2016-08-29/a>Russ McReeRecommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
2016-08-24/a>Tom WebbStay on Track During IR
2016-08-23/a>Xavier MertensVoice Message Notifications Deliver Ransomware
2016-08-02/a>Tom WebbWindows 10 Anniversary Update Available
2016-07-31/a>Pasquale StirparoSharing (intel) is caring... or not?
2016-07-27/a>Xavier MertensAnalyze of a Linux botnet client source code
2016-07-21/a>Didier StevensPractice ntds.dit File
2016-07-15/a>Xavier MertensName All the Things!
2016-07-12/a>Xavier MertensHunting for Malicious Files with MISP + OSSEC
2016-07-03/a>Guy BruneauIs Data Privacy part of your Company's Culture?
2016-06-29/a>Xavier MertensPhishing Campaign with Blurred Images
2016-06-12/a>Guy BruneauDNS Sinkhole ISO Version 2.0
2016-06-03/a>Tom ListonMySQL is YourSQL
2016-06-01/a>Xavier MertensDocker Containers Logging
2016-05-29/a>Guy BruneauAnalysis of a Distributed Denial of Service (DDoS)
2016-05-22/a>Pasquale StirparoThe strange case of WinZip MRU Registry key
2016-05-21/a>Didier StevensPython Malware - Part 2
2016-05-18/a>Russ McReeResources: Windows Auditing & Monitoring, Linux 2FA
2016-05-14/a>Guy BruneauINetSim as a Basic Honeypot
2016-05-12/a>Xavier MertensAnother Day, Another Wave of Phishing Emails
2016-05-08/a>Jim ClausingGuest Diary: Linux Capabilities - A friend and foe
2016-05-05/a>Xavier MertensMicrosoft BITS Used to Download Payloads
2016-05-02/a>Rick WannerLean Threat Intelligence
2016-04-29/a>Rob VandenBrinkSysinternals Updated today - Updates to Sysmon, Procdump and Sigcheck. https://blogs.technet.microsoft.com/sysinternals/2016/04/28/update-sysmon-v4-procdump-v8-sigcheck-v2-51/
2016-04-15/a>Xavier MertensWindows Command Line Persistence?
2016-04-02/a>Russell EubanksWhy Can't We Be Friends?
2016-03-30/a>Xavier MertensWhat to watch with your FIM?
2016-03-28/a>Xavier MertensImproving Bash Forensics Capabilities
2016-03-21/a>Xavier MertensIP Addresses Triage
2016-02-24/a>Xavier MertensAnalyzis of a Malicious .lnk File with an Embedded Payload
2016-02-18/a>Xavier MertensHunting for Executable Code in Windows Environments
2016-02-15/a>Bojan ZdrnjaExploiting (pretty) blind SQL injections
2016-02-07/a>Xavier MertensMore Malicious JavaScript Obfuscation
2016-02-02/a>Johannes UllrichTargeted IPv6 Scans Using pool.ntp.org .
2016-01-31/a>Guy BruneauWindows 10 and System Protection for DATA Default is OFF
2016-01-23/a>Didier StevensSigcheck and VirusTotal for Offline Machine
2016-01-20/a>Xavier Mertens/tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters!
2016-01-13/a>Alex StanfordYou Have Got a New Audio Message - Guest Diary by Pasquale Stirparo
2016-01-09/a>Xavier MertensVirtual Bitlocker Containers
2015-12-24/a>Xavier MertensUnity Makes Strength
2015-12-12/a>Russell EubanksWhat Signs Are You Missing?
2015-12-10/a>Rob VandenBrinkUninstalling Problem Applications using Powershell
2015-12-10/a>Rob VandenBrinkNew Burp Feature - ClickBandit
2015-12-09/a>Xavier MertensEnforcing USB Storage Policy with PowerShell
2015-12-04/a>Tom WebbAutomating Phishing Analysis using BRO
2015-11-21/a>Didier StevensMaldoc Social Engineering Trick
2015-11-09/a>John BambenekICYMI: Widespread Unserialize Vulnerability in Java
2015-10-20/a>Bojan ZdrnjaWhen encoding saves the day
2015-10-12/a>Guy BruneauData Visualization,What is your Tool of Choice?
2015-09-29/a>Pedro BuenoTricks for DLL analysis
2015-09-23/a>Daniel WesemannMaking our users unlearn what we taught them
2015-09-21/a>Xavier MertensDetecting XCodeGhost Activity
2015-09-03/a>Xavier MertensQuerying the DShield API from RTIR
2015-08-19/a>Bojan ZdrnjaOutsourcing critical infrastructure (such as DNS)
2015-08-18/a>Russ McReeMicrosoft Security Bulletin MS15-093 - Critical OOB - Internet Explorer RCE
2015-08-16/a>Guy BruneauAre you a "Hunter"?
2015-08-12/a>Rob VandenBrinkWindows Service Accounts - Why They're Evil and Why Pentesters Love them!
2015-08-06/a>Didier StevensSigcheck and virustotal-search
2015-07-23/a>Mark HofmanSome more 0-days from ZDI
2015-07-21/a>Didier StevensSearching Through the VirusTotal Database
2015-07-17/a>Didier StevensProcess Explorer and VirusTotal
2015-07-17/a>Didier StevensAutoruns and VirusTotal
2015-07-17/a>Didier StevensSigcheck and VirusTotal
2015-07-03/a>Didier StevensAnalyzing Quarantine Files
2015-06-29/a>Rob VandenBrinkThe Powershell Diaries 2 - Software Inventory
2015-06-27/a>Guy BruneauIs Windows XP still around in your Network a year after Support Ended?
2015-06-22/a>Johannes UllrichSMTP Brute Forcing
2015-06-01/a>Tom WebbSubmit Dshield ASA Logs
2015-05-30/a>Russell EubanksWeekend Learning - Spoofer Project
2015-05-27/a>Tom WebbSYSINTERNALS Update(AccessChk v6.0, Autoruns v13.4, Process Monitor v3.2, VMMap v3.2)
2015-05-14/a>Daniel WesemannOh Bloat!
2015-04-27/a>Richard PorterWhen Prevention Fails, Incident Response Begins
2015-04-17/a>Didier StevensMemory Forensics Of Network Devices
2015-04-10/a>Didier StevensThe Kill Chain: Now With Pastebin
2015-04-03/a>Didier StevensSSH Fingerprints Are Important
2015-03-26/a>Daniel WesemannPin-up on your Smartphone!
2015-03-07/a>Guy BruneauShould it be Mandatory to have an Independent Security Audit after a Breach?
2015-02-19/a>Daniel WesemannDNS-based DDoS
2015-02-06/a>Johannes UllrichAnthem, TurboTax and How Things "Fit Together" Sometimes
2015-02-04/a>Alex StanfordExploit Kit Evolution - Neutrino
2015-01-31/a>Guy BruneauBeware of Phishing and Spam Super Bowl Fans!
2015-01-29/a>Bojan ZdrnjaBlindly confirming XXE
2015-01-23/a>Adrien de BeaupreInfocon change to yellow for Adobe Flash issues
2014-12-24/a>Rick WannerIncident Response at Sony
2014-12-23/a>John BambenekHow I learned to stop worrying and love malware DGAs....
2014-11-27/a>Russ McReeSyrian Electronic Army attack leads to malvertising
2014-11-25/a>Adrien de BeaupreLess is, umm, less?
2014-09-27/a>Guy BruneauWhat has Bash and Heartbleed Taught Us?
2014-09-26/a>Richard PorterWhy We Have Moved to InfoCon:Yellow
2014-09-22/a>Johannes UllrichFake LogMeIn Certificate Update with Bad AV Detection Rate
2014-09-19/a>Guy BruneauWeb Scan looking for /info/whitelist.pac
2014-09-16/a>Daniel Wesemannhttps://yourfakebank.support -- TLD confusion starts!
2014-09-12/a>Chris MohanAre credential dumps worth reviewing?
2014-09-07/a>Johannes UllrichOdd Persistent Password Bruteforcing
2014-08-27/a>Rob VandenBrinkOne More Day of Trolling in POS Memory
2014-08-20/a>Kevin ShorttSocial Engineering Alive and Well
2014-08-16/a>Lenny ZeltserWeb Server Attack Investigation - Installing a Bot and Reverse Shell via a PHP Vulnerability
2014-08-15/a>Tom WebbAppLocker Event Logs with OSSEC 2.8
2014-08-12/a>Adrien de BeaupreSysinternals updates Sysmon v1.0; Updates: Autoruns v12.01, Coreinfo v3.3, Procexp v16.03 http://blogs.technet.com/b/sysinternals/
2014-08-10/a>Basil Alawi S.TaherIncident Response with Triage-ir
2014-08-09/a>Adrien de BeaupreComplete application ownage via Multi-POST XSRF
2014-08-04/a>Russ McReeThreats & Indicators: A Security Intelligence Lifecycle
2014-07-30/a>Rick WannerSymantec Endpoint Protection Privilege Escalation Zero Day
2014-07-26/a>Chris Mohan"Internet scanning project" scans
2014-07-23/a>Johannes UllrichNew Feature: "Live" SSH Brute Force Logs and New Kippo Client
2014-07-15/a>Daniel WesemannOracle July 2014 CPU (patch bundle)
2014-07-14/a>Johannes UllrichThe Internet of Things: How do you "on-board" devices?
2014-07-14/a>Daniel WesemannE-ZPass phishing scam
2014-07-09/a>Daniel WesemannWho owns your typo?
2014-07-07/a>Johannes UllrichMulti Platform *Coin Miner Attacking Routers on Port 32764
2014-07-06/a>Richard PorterPhysical Access, Point of Sale, Vegas
2014-07-05/a>Guy BruneauJava Support ends for Windows XP
2014-07-02/a>Johannes UllrichJuly Ouch! Security Awareness Newsletter Released. E-mail Do's and Don'ts http://www.securingthehuman.org/resources/newsletters/ouch/2014#july2014
2014-06-23/a>Russ McReeMicrosoft Interflow announced today at 26th FIRST conference
2014-06-12/a>Guy BruneauBIND Security Update for CVE-2014-3859
2014-06-12/a>Daniel WesemannMade any new friends lately?
2014-05-23/a>Richard PorterHighlights from Cisco Live 2014 - The Internet of Everything
2014-05-22/a>Johannes UllrichDiscontinuing Support for ISC Alert Task Bar Icon
2014-05-01/a>Johannes UllrichBusybox Honeypot Fingerprinting and a new DVR scanner
2014-04-26/a>Guy BruneauAndroid Users - Beware of Bitcoin Mining Malware
2014-04-26/a>Guy BruneauNew Project by Linux Foundation - Core Infrastructure Initiative
2014-04-14/a>Kevin ShorttINFOCon Green: Heartbleed - on the mend
2014-04-11/a>Guy BruneauHeartbleed Fix Available for Download for Cisco Products
2014-04-06/a>Basil Alawi S.Taher"Power Worm" PowerShell based Malware
2014-04-05/a>Jim ClausingThose strange e-mails with URLs in them can lead to Android malware
2014-04-04/a>Rob VandenBrinkDealing with Disaster - A Short Malware Incident Response
2014-04-04/a>Rob VandenBrinkWindows 8.1 Released
2014-04-01/a>Johannes Ullrichcmd.so Synology Scanner Also Found on Routers
2014-03-27/a>Alex StanfordApple Credential Phishing via appleidconfirm.net
2014-03-25/a>Johannes UllrichA few updates on "The Moon" worm
2014-03-24/a>Johannes UllrichNew Microsoft Advisory: Unpatched Word Flaw used in Targeted Attacks
2014-03-22/a>Guy BruneauHow the Compromise of a User Account Lead to a Spam Incident
2014-03-12/a>Johannes UllrichWordpress "Pingback" DDoS Attacks
2014-03-10/a>Basil Alawi S.TaherSysinternals Process Explorer v16.02, Process Monitor v3.1, PSExec v2.1 and Sigcheck v2.03 update
2014-03-07/a>Tom WebbLinux Memory Dump with Rekall
2014-03-04/a>Daniel WesemannXPired!
2014-03-02/a>Stephen HallSunday Reading
2014-02-28/a>Daniel WesemannOversharing
2014-02-19/a>Russ McReeThreat modeling in the name of security
2014-02-18/a>Johannes UllrichMore Details About "TheMoon" Linksys Worm
2014-02-15/a>Rob VandenBrinkMore on HNAP - What is it, How to Use it, How to Find it
2014-02-13/a>Johannes UllrichLinksys Worm ("TheMoon") Captured
2014-02-12/a>Johannes UllrichSuspected Mass Exploit Against Linksys E1000 / E1200 Routers
2014-02-10/a>Rob VandenBrinkIsn't it About Time to Get Moving on Chip and PIN?
2014-02-07/a>Rob VandenBrinkHello Virustotal? It's Microsoft Calling.
2014-02-04/a>Johannes UllrichOdd ICMP Echo Request Payload
2014-01-30/a>Johannes UllrichNew gTLDs appearing in the root zone
2014-01-24/a>Johannes UllrichHow to send mass e-mail the right way
2014-01-24/a>Chris MohanPhishing via Social Media
2014-01-23/a>Chris MohanLearning from the breaches that happens to others Part 2
2014-01-22/a>Chris MohanLearning from the breaches that happens to others
2014-01-11/a>Guy Bruneautcpflow 1.4.4 and some of its most Interesting Features
2014-01-10/a>Basil Alawi S.TaherWindows Autorun-3
2014-01-10/a>Basil Alawi S.TaherCisco Small Business Devices backdoor fix
2014-01-04/a>Tom WebbMonitoring Windows Networks Using Syslog (Part One)
2014-01-02/a>John BambenekOpenSSL.org Defaced by Attackers Gaining Access to Hypervisor
2014-01-02/a>Johannes UllrichScans Increase for New Linksys Backdoor (32764/TCP)
2013-12-24/a>Daniel WesemannUnfriendly crontab additions
2013-12-21/a>Daniel WesemannAdobe phishing underway
2013-12-21/a>Guy BruneauStrange DNS Queries - Request for Packets
2013-12-19/a>Rob VandenBrinkPassive Scanning Two Ways - How-Tos for the Holidays
2013-12-19/a>Rob VandenBrinkTarget US - Credit Card Data Breach
2013-12-16/a>Tom WebbThe case of Minerd
2013-12-11/a>Johannes UllrichFacebook Phishing and Malware via Tumblr Redirects
2013-12-09/a>Rob VandenBrinkScanning without Scanning
2013-12-07/a>Guy BruneauSuspected Active Rovnix Botnet Controller
2013-12-02/a>Richard PorterReports of higher than normal SSH Attacks
2013-12-01/a>Richard PorterBPF, PCAP, Binary, hex, why they matter?
2013-11-30/a>Russ McReeA review of Tubes, A Journey to the Center of the Internet
2013-11-27/a>Rob VandenBrinkATM Traffic + TCPDump + Video = Good or Evil?
2013-11-19/a>Johannes UllrichvBulletin.com Compromise - Possible 0-day
2013-11-18/a>Johannes UllrichAm I Sending Traffic to a "Sinkhole"?
2013-11-15/a>Johannes UllrichThe Security Impact of HTTP Caching Headers
2013-11-11/a>Johannes UllrichWhat Happened to the SANS Ads?
2013-11-04/a>Manuel Humberto Santander PelaezWhen attackers use your DNS to check for the sites you are visiting
2013-11-01/a>Russ McReeSecunia's PSI Country Report - Q3 2013
2013-10-30/a>Russ McReeSIR v15: Five good reasons to leave Windows XP behind
2013-10-25/a>Johannes UllrichPHP.net compromise aftermath: Why Code Signing Beats Hashes
2013-10-25/a>Rob VandenBrinkKaspersky flags TCPIP.SYS as Malware
2013-10-22/a>Richard PorterGreenbone and OpenVAS Scanner
2013-10-21/a>Johannes UllrichNew tricks that may bring DNS spoofing back or: "Why you should enable DNSSEC even if it is a pain to do"
2013-10-19/a>Johannes UllrichYet Another WHMCS SQL Injection Exploit
2013-10-17/a>Adrien de BeaupreInternet wide DNS scanning
2013-10-04/a>Pedro BuenoCSAM: WebHosting BruteForce logs
2013-10-01/a>John Bambenek*Metaspoit Releases Module to Exploit Unpatched IE Vuln CVE-2013-3893
2013-09-20/a>Russ McReeThreat Level Yellow: Protection recommendations regarding Internet Explorer exploits in the wild
2013-09-17/a>John BambenekMicrosoft Releases Out-of-Band Advisory for all Versions of Internet Explorer
2013-09-09/a>Johannes UllrichSSL is broken. So what?
2013-09-05/a>Rob VandenBrinkBuilding Your Own GPU Enabled Private Cloud
2013-09-02/a>Guy BruneauSnort IDS Sensor with Sguil New ISO Released
2013-08-26/a>Alex StanfordStop, Drop and File Carve
2013-08-22/a>Russ McReeRead of the Week: A Fuzzy Future in Malware Research
2013-08-19/a>Johannes UllrichRunning Snort on ESXi using the Distributed Switch
2013-08-19/a>Rob VandenBrinkZMAP 1.02 released
2013-08-14/a>Johannes UllrichImaging LUKS Encrypted Drives
2013-08-13/a>Swa FrantzenMicrosoft security advisories: RDP and MD5 deprecation in Microsoft root certificates
2013-08-09/a>Kevin ShorttCopy Machines - Changing Scanned Content
2013-08-05/a>Chris MohanDMARC: another step forward in the fight against phishing?
2013-07-31/a>Johannes UllrichPOP3 Server Brute Forcing Attempts Using Polycom Credentials
2013-07-26/a>Scott FendleyISC BIND DoS
2013-07-20/a>Manuel Humberto Santander PelaezDo you have rogue Internet gateways in your network? Check it with nmap
2013-07-19/a>Stephen HallCyber Intelligence Tsunami
2013-07-18/a>Chris MohanBlog Spam - annoying junk or a source of intelligence?
2013-07-16/a>Johannes UllrichWhy don't we see more examples of web app attacks via POST?
2013-07-13/a>Lenny ZeltserDecoy Personas for Safeguarding Online Identity Using Deception
2013-07-08/a>Richard PorterWhy do we Click?
2013-07-06/a>Guy BruneauIs Metadata the Magic in Modern Network Security?
2013-07-01/a>Manuel Humberto Santander PelaezUsing nmap scripts to enhance vulnerability asessment results
2013-06-29/a>Johannes UllrichInstagram "Fruit" Spam
2013-06-21/a>Guy BruneauSysinternals Updates for Autoruns, Strings & ZoomIt http://blogs.technet.com/b/sysinternals/archive/2013/06/20/updates-autoruns-v11-61-strings-v2-52-zoomit-v4-5.aspx
2013-06-20/a>Johannes UllrichLinkedin DNS Hijack
2013-06-19/a>Kevin ListonWinLink Check-In
2013-06-05/a>Richard PorterWindows Sysinternals Updated http://technet.microsoft.com/en-us/sysinternals/default.aspx
2013-06-05/a>Richard PorterBIND 9 Update fixing CVE-2013-3919
2013-05-23/a>Adrien de BeaupreMoVP II
2013-05-21/a>Adrien de BeaupreMoore, Oklahoma tornado charitable organization scams, malware, and phishing
2013-05-20/a>Guy BruneauSysinternals Updates for Accesschk, Procdump, RAMMap and Strings http://blogs.technet.com/b/sysinternals/archive/2013/05/17/updates-accesschk-v5-11-procdump-v6-0-rammap-v1-22-strings-v2-51.aspx
2013-05-14/a>Swa FrantzenCVE-2013-2094: Linux privilege escalation
2013-05-09/a>Johannes UllrichMicrosoft released a Fix-it for the Internet Explorer 8 Vulnerability http://support.microsoft.com/kb/2847140
2013-05-08/a>Chris MohanSyria drops from Internet 7th May 2013
2013-05-07/a>Jim ClausingIs there an epidemic of typo squatting?
2013-05-07/a>Jim ClausingNGINX updates address buffer overflow (CVE-2013-2028) see http://nginx.org/en/CHANGES-1.4
2013-05-04/a>Kevin ShorttThe Zero-Day Pendulum Swings
2013-05-01/a>Daniel WesemannThe cost of cleaning up
2013-04-23/a>Russ McReeMicrosoft's Security Intelligence Report (SIRv14) released
2013-04-16/a>John BambenekFake Boston Marathon Scams Update
2013-04-15/a>John BambenekPlease send any spam (full headers), URLs or other suspicious content scamming off Boston Marathon explosions to handlers@sans.org
2013-04-15/a>Rob VandenBrinkOops - You Mean That Deleted Server was a Certificate Authority?
2013-03-29/a>Chris MohanFake Link removal requests
2013-03-27/a>Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - IPv6 moving target defense
2013-03-19/a>Johannes UllrichWindows 7 SP1 and Windows Server 2008 R2 SP1 Being "pushed" today
2013-03-19/a>Johannes UllrichIPv6 Focus Month: The warm and fuzzy side of IPv6
2013-03-07/a>Guy BruneauApple Blocking Java Web plug-in
2013-03-06/a>Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - Geolocation Using IPv6 Addresses
2013-03-05/a>Mark HofmanIPv6 Focus Month: Device Defaults
2013-03-02/a>Scott FendleyEvernote Security Issue
2013-03-02/a>Scott FendleyApple Blocks Older Insecure Versions of Flash Player
2013-02-28/a>Daniel WesemannParsing Windows Eventlogs in Powershell
2013-02-22/a>Johannes UllrichZendesk breach affects Tumblr/Pinterest/Twitter
2013-02-19/a>Johannes UllrichAPT1, Unit 61398 and are state sponsored attacks real
2013-02-17/a>Guy BruneauHP ArcSight Connector Appliance and Logger Vulnerabilities
2013-02-11/a>John BambenekIs This Chinese Registrar Really Trying to XSS Me?
2013-02-06/a>Johannes UllrichIntel Network Card (82574L) Packet of Death
2013-02-06/a>Adam SwangerSysinternals in particular Process Explorer update https://blogs.technet.com/b/sysinternals/?Redirected=true
2013-02-06/a>Johannes UllrichAre you losing system logging information (and don't know it)?
2013-02-04/a>Russ McReeAn expose of a recent SANS GIAC XSS vulnerability
2013-02-04/a>Adam SwangerSAN Securing The Human Monthly Awareness Video - Advanced Persistent Threat (APT) http://www.securingthehuman.org/resources/ncsam
2013-01-30/a>Richard PorterGetting Involved with the Local Community
2013-01-25/a>Johannes UllrichVulnerability Scans via Search Engines (Request for Logs)
2013-01-15/a>Rob VandenBrinkWhen Disabling IE6 (or Java, or whatever) is not an Option...
2013-01-13/a>Stephen HallSysinternals Updates
2013-01-10/a>Rob VandenBrinkWhat Else runs Telnets? Or, Pentesters Love Video Conferencing Units Too!
2013-01-09/a>Rob VandenBrinkSQL Injection Flaw in Ruby on Rails
2013-01-05/a>Guy BruneauD-link Wireless-G Router Year Issue (Y2K-plus-13)
2013-01-02/a>Russ McReeEMET 3.5: The Value of Looking Through an Attacker's Eyes
2013-01-01/a>Johannes UllrichFixIt Available for Internet Explorer Vulnerability
2012-12-20/a>Daniel WesemannWhite House strategy on security information sharing and safeguarding
2012-12-13/a>Johannes UllrichWhat if Tomorrow Was the Day?
2012-12-06/a>Daniel WesemannRich Quick Make Money!
2012-12-06/a>Daniel WesemannFake tech support calls - revisited
2012-12-03/a>John BambenekJohn McAfee Exposes His Location in Photo About His Being on Run
2012-12-02/a>Guy BruneauCollecting Logs from Security Devices at Home
2012-11-30/a>Daniel WesemannNmap 6.25 released - lots of new goodies, see http://nmap.org/changelog.html
2012-11-29/a>Kevin ShorttNew Apple Security Update: APPLE-SA-2012-11-29-1 Apple TV 5.1.1
2012-11-28/a>Mark HofmanMcAfee releases extraDAT for W32/Autorun.worm.aaeb-h
2012-11-28/a>Mark HofmanNew version of wireshark is available (1.8.4), some security fixes included.
2012-11-27/a>Chris MohanCan users' phish emails be a security admin's catch of the day?
2012-11-26/a>John BambenekOnline Shopping for the Holidays? Tips, News and a Fair Warning
2012-11-20/a>John BambenekBehind the Random NTP Bizarreness of Incorrect Year Being Set
2012-11-20/a>John BambenekFirefox v 17.0 just released, more here: http://www.mozilla.org/en-US/firefox/17.0/releasenotes/
2012-11-19/a>John BambenekMoneyGram fined $100 million for aiding wire fraud - http://krebsonsecurity.com/2012/11/moneygram-fined-100-million-for-wire-fraud/
2012-11-19/a>John BambenekNew Poll: Top 5 Unresolved Security Problems of 2012
2012-11-17/a>Manuel Humberto Santander PelaezNew Sysinternal Updates: AdExplorer v1.44, Contig v1.7, Coreinfo v3.2, Procdump v5.1. See http://blogs.technet.com/b/sysinternals/archive/2012/11/16/updates-adexplorer-v1-44-contig-v1-7-coreinfo-v3-2-procdump-v5-1.aspx?Redirected=true
2012-11-16/a>Manuel Humberto Santander PelaezInformation Security Incidents are now a concern for colombian government
2012-11-13/a>Jim ClausingMicrosoft November 2012 Black Tuesday Update - Overview
2012-11-12/a>John BambenekRequest for info: Robocall Phishing Against Local/Regional Banks
2012-11-09/a>Mark BaggettRemote Diagnostics with PSR
2012-11-09/a>Mark BaggettFresh batch of Microsoft patches next week
2012-11-08/a>Daniel WesemannGet a 40% discount on your hotel room!
2012-11-07/a>Mark BaggettHelp eliminate unquoted path vulnerabilities
2012-11-07/a>Mark BaggettMultiple 0-Days Reported!
2012-11-07/a>Mark BaggettCisco TACACS+ Authentication Bypass
2012-11-05/a>Johannes UllrichReminder: Ongoing SMTP Brute Forcing Attacks
2012-11-05/a>Johannes UllrichPossible Fake-AV Ads from Doubleclick Servers
2012-11-04/a>Lorna HutchesonWhat's important on your network?
2012-10-31/a>Johannes UllrichCyber Security Awareness Month - Day 31 - Business Continuity and Disaster Recovery
2012-10-30/a>Johannes UllrichHurricane Sandy Update
2012-10-30/a>Richard PorterSplunk 5.0 SP-CAAAHB4 http://www.splunk.com/view/SP-CAAAHB4
2012-10-30/a>Mark HofmanCyber Security Awareness Month - Day 30 - DSD 35 mitigating controls
2012-10-28/a>Tony CarothersFirefox 16.02 Released
2012-10-26/a>Russ McReeCyber Security Awareness Month - Day 26 - Attackers use trusted domain to propagate Citadel Zeus variant
2012-10-26/a>Adam SwangerSecuring the Human Special Webcast - October 30, 2012
2012-10-25/a>Richard PorterCyber Security Awareness Month - Day 25 - Pro Audio & Video Packets on the Wire
2012-10-24/a>Rob VandenBrinkTime to run Windows Update - - Microsoft Updates KB2755801 for Windows RT / IE10 / Flash Player - http://technet.microsoft.com/en-us/security/advisory/2755801
2012-10-24/a>Russ McReeOngoing Windstream outage in the midwest - https://twitter.com/search?q=windstream
2012-10-23/a>Rob VandenBrinkCyber Security Awareness Month - Day 23: Character Encoding Standards - ASCII and Successors
2012-10-21/a>Johannes UllrichCyber Security Awareness Month - Day 22: Connectors
2012-10-21/a>Lorna HutchesonPotential Phish for Regular Webmail Accounts
2012-10-19/a>Johannes UllrichCyber Security Awareness Month - Day 19: Standard log formats and CEE.
2012-10-18/a>Rob VandenBrinkCyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide
2012-10-17/a>Mark HofmanOracle Critical Patch Update October
2012-10-17/a>Mark HofmanNew Acrobat release (including reader) available. Version 11. Some security improvements more here -->http://blogs.adobe.com/adobereader/
2012-10-16/a>Richard PorterCyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook.
2012-10-16/a>Johannes UllrichCyber Security Awareness Month - Day 16: W3C and HTML
2012-10-14/a>Pedro BuenoCyber Security Awareness Month - Day 14 - Poor Man's File Analysis System - Part 1
2012-10-11/a>Rob VandenBrinkCyber Security Awareness Month - Day 11 - Vendor Agnostic Standards (Center for Internet Security)
2012-10-09/a>Johannes UllrichMicrosoft October 2012 Black Tuesday Update - Overview
2012-10-07/a>Tony CarothersCyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1
2012-10-05/a>Johannes UllrichCyber Security Awareness Month - Day 5: Standards Body Soup, So many Flavors in the bowl.
2012-10-05/a>Richard PorterVMWare Security Advisory: VMSA-2012-0014 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html
2012-10-05/a>Richard PorterReports of a Distributed Injection Scan
2012-10-04/a>Mark HofmanAnd the SHA-3 title goes to .....Keccak
2012-10-04/a>Johannes UllrichCyber Security Awareness Month - Day 4: Crypto Standards
2012-10-03/a>Kevin ShorttFake Support Calls Reported
2012-10-02/a>Russ McReeCyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines
2012-10-01/a>Johannes UllrichCyber Security Awareness Month
2012-09-28/a>Joel EslerAdobe certification revocation for October 4th
2012-09-26/a>Johannes UllrichSome Android phones can be reset to factory default by clicking on links
2012-09-26/a>Johannes UllrichMore Java Woes
2012-09-21/a>Johannes UllrichiOS 6 Security Roundup
2012-09-20/a>Russ McReeFlash Player update but no announcement, check your version http://www.adobe.com/software/flash/about/
2012-09-20/a>Russ McReeApple and Cisco Security Advisories 19 SEP 2012
2012-09-20/a>Russ McReeFinancial sector advisory: attacks and threats against financial institutions
2012-09-19/a>Russ McReeScript kiddie scavenging with Shellbot.S
2012-09-17/a>Rob VandenBrinkWhat's on your iPad?
2012-09-14/a>Lenny ZeltserAnalyzing Malicious RTF Files Using OfficeMalScanner's RTFScan
2012-09-14/a>Lenny ZeltserScam Report - Fake Voice Mail Email Notification Redirects to Malicious Site
2012-09-13/a>Mark BaggettTCP Fuzzing with Scapy
2012-09-13/a>Mark BaggettMicrosoft disrupts traffic associated with the Nitol botnet
2012-09-13/a>Mark BaggettMore SSL trouble
2012-09-11/a>Adam SwangerMicrosoft September 2012 Black Tuesday Update - Overview
2012-09-10/a>Johannes UllrichMicrosoft Patch Tuesday Pre-Release
2012-09-10/a>Johannes UllrichGodaddy DDoS Attack
2012-09-10/a>donald smithBlue Toad publishing co compromise lead to UDID release. http://redtape.nbcnews.com/_news/2012/09/10/13781440-exclusive-the-real-source-of-apple-device-ids-leaked-by-anonymous-last-week?lite
2012-09-09/a>Guy BruneauPhishing/Spam Pretending to be from BBB
2012-09-08/a>Guy BruneauWebmin Input Validation Vulnerabilities
2012-09-06/a>Johannes UllrichSSL Requests sent to port 80 (request for help/input)
2012-09-04/a>Johannes UllrichAnother round of "Spot the Exploit E-Mail"
2012-09-02/a>Lorna HutchesonDemonstrating the value of your Intrusion Detection Program and Analysts
2012-09-01/a>Russ McReeBlackhole targeting Java vulnerability via fake Microsoft Services Agreement email phish
2012-08-31/a>Russ McReeNot so fast: Java 7 Update 7 critical vulnerability discovered in less than 24 hours
2012-08-30/a>Bojan ZdrnjaAnalyzing outgoing network traffic (part 2)
2012-08-30/a>Johannes UllrichEditorial: The Slumlord Approach to Network Security http://isc.sans.edu/j/editorial
2012-08-29/a>Johannes Ullrich"Data" URLs used for in-URL phishing
2012-08-27/a>Johannes UllrichThe Good, Bad and Ugly about Assigning IPv6 Addresses
2012-08-27/a>Johannes UllrichMalware Spam harvesting Facebook Information
2012-08-26/a>Lorna HutchesonWho ya gonna contact?
2012-08-23/a>Bojan ZdrnjaAnalyzing outgoing network traffic
2012-08-22/a>Adrien de BeaupreApple Remote Desktop update fixes no encryption issue
2012-08-22/a>Adrien de BeauprePhishing/spam via SMS
2012-08-21/a>Adrien de BeaupreYYABCAFU - Yes Yet Another Bleeping Critical Adobe Flash Update
2012-08-21/a>Adrien de BeaupreRuggedCom fails key management 101 on Rugged Operating System (ROS)
2012-08-20/a>Manuel Humberto Santander PelaezDo we need test procedures in our companies before implementing Antivirus signatures?
2012-08-19/a>Manuel Humberto Santander PelaezAuthentication Issues between entities during protocol message exchange in SCADA Systems
2012-08-17/a>Guy BruneauSuspicious eFax Spear Phishing Messages
2012-08-14/a>Rick WannerMicrosoft August 2012 Black Tuesday Update - Overview
2012-08-12/a>Tony CarothersLayers of the Defense-in-Depth Onion
2012-08-12/a>Tony CarothersOracle Security Alert for CVE-2012-3132
2012-08-09/a>Mark HofmanZeus/Citadel variant causing issues in the Netherlands
2012-08-09/a>Mark HofmanSQL Injection Lilupophilupop style, Part 2
2012-08-07/a>Adrien de BeaupreWho protects small business?
2012-08-05/a>Daniel WesemannPhishing for Payroll with unpatched Java
2012-08-04/a>Kevin ListonVendors: More Patch-Release Options Please
2012-07-31/a>Daniel WesemannSQL injection, lilupophilupop-style
2012-07-30/a>Guy BruneauBIND 9 Security Updates
2012-07-27/a>Daniel WesemannCuckoo 0.4 is out - cool new features for malware analysis http://www.cuckoosandbox.org/
2012-07-25/a>Johannes UllrichApple OS X 10.8 (Mountain Lion) released
2012-07-25/a>Johannes UllrichMicrosoft Exchange/Sharepoint and others: Oracle Outside In Vulnerability
2012-07-24/a>Richard PorterWireshark 1.8.1 Released http://www.wireshark.org/
2012-07-24/a>Richard PorterReport of spike in DNS Queries gd21.net
2012-07-21/a>Rick WannerTippingPoint DNS Version Request increase
2012-07-20/a>Mark BaggettSyria Internet connection cut?
2012-07-19/a>Mark BaggettDiagnosing Malware with Resource Monitor
2012-07-19/a>Mark BaggettA Heap of Overflows?
2012-07-16/a>Richard PorterSysinternals Update @ http://blogs.technet.com/b/sysinternals/archive/2012/07/16/updates-handle-v3-5-process-explorer-v15-22-process-monitor-v3-03-rammap-v1-21-zoomit-v4-3.aspx
2012-07-16/a>Jim ClausingAn analysis of the Yahoo! passwords
2012-07-13/a>Richard PorterYesterday (not as on the ball as Rob) at SANSFire
2012-07-13/a>Russ McRee2 for 1: SANSFIRE & MSRA presentations
2012-07-13/a>Russ McReeYahoo service SQL injection vuln leads to account exposure
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Recording Server - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Manager - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman
2012-07-10/a>Rob VandenBrinkToday at SANSFIRE (09 July 2012) - ISC Panel Discussion on the State of the Internet
2012-07-09/a>Johannes UllrichThe FBI will turn off the Internet on Monday (or not)
2012-07-09/a>Manuel Humberto Santander PelaezInternet Storm Center panel tonight at SANSFIRE 2012!
2012-07-05/a>Adrien de BeaupreMicrosoft advanced notification for July 2012 patch Tuesday
2012-07-05/a>Adrien de BeaupreNew OS X trojan backdoor MaControl variant reported
2012-07-02/a>Joel EslerA rough guide to keeping your website up
2012-07-02/a>Dan GoldbergStorms of June 29th 2012 in Mid Atlantic region of the USA
2012-07-02/a>Joel EslerLinux & Java leap second bug
2012-06-29/a>Jim ClausingUpdated SysInternals tools - Autoruns, Process Explorer, Process Monitor, PSKill -- http://blogs.technet.com/b/sysinternals/archive/2012/06/28/updates-autoruns-v11-32-process-explorer-v15-21-process-monitor-v3-02-pskill-v1-15-rammap-v1-2.aspx
2012-06-28/a>Chris MohanMassive spike in BGP traffic - Possible BGP poisoning?
2012-06-27/a>Daniel WesemannWhat's up with port 79 ?
2012-06-25/a>Rick WannerTargeted Malware for Industrial Espionage?
2012-06-25/a>Guy BruneauIssues with Windows Update Agent
2012-06-22/a>Kevin ListonInvestigator's Tool-kit: Timeline
2012-06-21/a>Raul SilesPrint Bomb? (Take 2)
2012-06-21/a>Russ McReeAnalysis of drive-by attack sample set
2012-06-21/a>Russ McReeWireshark 1.8.0 released 21 JUN 2012 http://www.wireshark.org/download.html
2012-06-19/a>Daniel Wesemann Vulnerabilityqueerprocessbrittleness
2012-06-14/a>Johannes UllrichSpot the Phish: Verizon Wireless
2012-06-10/a>Scott FendleyPreying on Users After Major Security Incidents
2012-06-06/a>Jim ClausingBIND 9 Update - DoS or information disclosure vulnerability
2012-06-06/a>Jim ClausingPotential leak of 6.5+ million LinkedIn password hashes
2012-06-04/a>Lenny ZeltserDecoding Common XOR Obfuscation in Malicious Code
2012-06-04/a>Rob VandenBrinkvSphere 5.0 Hardening Guide Officially Released
2012-05-30/a>Rob VandenBrinkIt's Phishing Season! In fact, it's ALWAYS Phishing Season!
2012-05-23/a>Mark BaggettProblems with MS12-035 affecting XP, SBS and Windows 2003?
2012-05-14/a>Chris MohanLaptops at Security Conferences
2012-05-08/a>Bojan ZdrnjaWindows Firewall Bypass Vulnerability and NetBIOS NS
2012-05-06/a>Jim ClausingTool updates and Win 8
2012-04-30/a>Rob VandenBrinkFCC posts Enquiry Documents on Google Wardriving
2012-04-23/a>Russ McReeEmergency Operations Centers & Security Incident Management: A Correlation
2012-04-18/a>Kevin ShorttSysinternals Updates - 2012 Apr 17
2012-04-10/a>Swa FrantzenWindows Vista RIP
2012-04-06/a>Johannes UllrichSocial Share Privacy
2012-03-16/a>Swa FrantzenINFOCON Yellow - Microsoft RDP - MS12-020
2012-03-13/a>Lenny ZeltserPlease transfer this email to your CEO or appropriate person, thanks
2012-02-20/a>Johannes UllrichThe Ultimate OS X Hardening Guide Collection
2012-02-20/a>Pedro BuenoSimple Malware Research Tools
2012-01-31/a>Russ McReeOSINT tactics: parsing from FOCA for Maltego
2012-01-24/a>Bojan ZdrnjaIs it time to get rid of NetBIOS?
2012-01-21/a>Guy BruneauDNS Sinkhole Scripts Fixes/Update
2012-01-19/a>Chris MohanWHOIS contacts are your friends
2012-01-13/a>Guy BruneauSysinternals Updates - http://blogs.technet.com/b/sysinternals/archive/2012/01/13/updates-autoruns-v11-21-coreinfo-v3-03-portmon-v-3-03-process-explorer-v15-12-mark-s-blog-and-mark-at-rsa-2012.aspx
2012-01-12/a>Rob VandenBrinkStuff I Learned Scripting - Fun with STDERR
2011-12-25/a>Deborah HaleMerry Christmas, Happy Holidays
2011-12-23/a>Daniel WesemannPrinter Pranks
2011-12-21/a>Johannes UllrichNew Vulnerability in Windows 7 64 bit
2011-12-12/a>Daniel WesemannYou won 100$ or a free iPad!
2011-12-08/a>Adrien de BeaupreMicrosoft Security Bulletin Advance Notification for December 2011
2011-12-06/a>Kevin ShorttCain & Abel v4.9.43 Released - http://www.oxid.it/
2011-12-05/a>Stephen HallISC describe DNS crash bug analysis
2011-12-01/a>Mark HofmanSQL Injection Attack happening ATM
2011-11-29/a>John BambenekHacking HP Printers for Fun and Profit
2011-11-28/a>Tom ListonA Puzzlement...
2011-11-24/a>Russ McReeQuick Tip: Pastebin Monitoring & Recon
2011-11-23/a>Johannes UllrichSCADA hacks published on Pastebin
2011-11-16/a>Jason LamPotential 0-day on Bind 9
2011-11-11/a>Rick WannerYay! More Sysinternals updates! http://technet.microsoft.com/en-us/sysinternals
2011-11-10/a>Rob VandenBrinkStuff I Learned Scripting - - Parsing XML in a One-Liner
2011-10-29/a>Richard PorterThe Sub Critical Control? Evidence Collection
2011-10-28/a>Russ McReeCritical Control 19: Data Recovery Capability
2011-10-27/a>Mark BaggettCritical Control 18: Incident Response Capabilities
2011-10-26/a>Rick WannerCritical Control 17:Penetration Tests and Red Team Exercises
2011-10-25/a>Chris MohanRecurring reporting made easy?
2011-10-21/a>Johannes UllrichNew Flash Click Jacking Exploit
2011-10-17/a>Rob VandenBrinkCritical Control 11: Account Monitoring and Control
2011-10-15/a>Guy BruneauDNS Sinkhole Parser Script Update
2011-10-10/a>Tom ListonWhat's In A Name?
2011-10-02/a>Mark HofmanCyber Security Awareness Month Day 1/2 - Schedule
2011-10-02/a>Mark HofmanCyber Security Awareness Month Day 1/2 - Introduction to the controls
2011-09-29/a>Daniel WesemannThe SSD dilemma
2011-09-20/a>Swa FrantzenDiginotar declared bankrupt
2011-09-19/a>Guy BruneauMS Security Advisory Update - Fraudulent DigiNotar Certificates
2011-09-15/a>Swa FrantzenDigiNotar looses their accreditation for qualified certificates
2011-09-13/a>Swa FrantzenGlobalSign back in operation
2011-09-13/a>Swa FrantzenMore DigiNotar intermediate certificates blocklisted at Microsoft
2011-09-09/a>Guy BruneauIPv6 and DNS Sinkhole
2011-09-07/a>Lenny ZeltserGlobalSign Temporarily Stops Issuing Certificates to Investigate a Potential Breach
2011-09-06/a>Swa FrantzenDigiNotar audit - intermediate report available
2011-09-06/a>Johannes UllrichMicrosoft Releases Diginotar Related Patch and Advisory
2011-09-05/a>Bojan ZdrnjaBitcoin – crypto currency of future or heaven for criminals?
2011-09-01/a>Swa FrantzenDigiNotar breach - the story so far
2011-08-31/a>Johannes UllrichPhishing e-mail to custom e-mail addresses
2011-08-31/a>Johannes UllrichKernel.org Compromise
2011-08-31/a>Johannes UllrichFirefox/Thunderbird 6.0.1 released to blocklist bad DigiNotar SSL certificates
2011-08-26/a>Daniel WesemannUser Agent 007
2011-08-25/a>Kevin ShorttIncreased Traffic on Port 3389
2011-08-24/a>Rob VandenBrinkCitrix Access Gateway Cross Site Scripting vulnerability and fix ==> http://support.citrix.com/article/CTX129971
2011-08-17/a>Rob VandenBrinkPutting all of Your Eggs in One Basket - or How NOT to do Layoffs
2011-08-17/a>Rob VandenBrinkSysinternal updates for ProcDump v4.0, Process Monitor v2.96, Process Explorer v15.02 ==> http://blogs.technet.com/b/sysinternals/
2011-08-16/a>Scott FendleyPhishing Scam Victim Response
2011-08-15/a>Rob VandenBrink8 Years since the Eastern Seaboard Blackout - Has it Been that Long?
2011-08-08/a>Rob VandenBrinkPing is Bad (Sometimes)
2011-08-05/a>Johannes UllrichMicrosoft Patch Tuesday Advance Notification: 13 Bulletins coming http://www.microsoft.com/technet/security/Bulletin/MS11-aug.mspx
2011-07-31/a>Daniel WesemannAnatomy of a Unix breach
2011-07-25/a>Chris MohanMonday morning incident handler practice
2011-07-17/a>Mark HofmanSSH Brute Force
2011-07-09/a>Chris MohanSafer Windows Incident Response
2011-07-07/a>Rob VandenBrink"There's a Patch for that" (or maybe not)
2011-07-06/a>Rob VandenBrink"Too Important to Patch" - Wait? What?
2011-07-05/a>Raul SilesTwo DoS remotely exploitable vulnerabilities affect BIND 9: http://www.isc.org/advisories/bind Updgrade to 9.8.0-P4.
2011-07-03/a>Deborah HaleBusiness Continuation in the Face of Disaster
2011-06-30/a>Rob VandenBrinkUpdate for RSA Authentication Manager
2011-06-28/a>Johannes UllrichDNSSEC Tips
2011-06-22/a>Guy BruneauHow Good is your Employee Termination Policy?
2011-06-17/a>Richard PorterWhen do you stop owning Technology?
2011-06-12/a>Mark HofmanCloud thoughts
2011-06-09/a>Richard PorterOne Browser to Rule them All?
2011-06-08/a>Johannes UllrichSpam from compromised Hotmail accounts
2011-06-06/a>Manuel Humberto Santander PelaezPhishing: Same goal, same techniques and people still falling for such scams
2011-06-06/a>Johannes UllrichThe Havij SQL Injection Tool
2011-06-03/a>Guy BruneauSonyPictures Site Compromised
2011-06-01/a>Johannes UllrichEnabling Privacy Enhanced Addresses for IPv6
2011-05-30/a>Johannes UllrichLockheed Martin and RSA Tokens
2011-05-25/a>Lenny ZeltserMonitoring Social Media for Security References to Your Organization
2011-05-20/a>Guy BruneauSysinternals Updates, Analyzing Stuxnet Infection with Sysinternals Tools Part 3
2011-05-10/a>Swa FrantzenChanging MO in scamming our users ?
2011-05-09/a>Johannes UllrichPatch for BIND 9.8.0 DoS Vulnerability
2011-05-06/a>Richard PorterUpdated Exploit Index for Microsoft
2011-05-04/a>Richard PorterMicrosoft Sysinterals Update
2011-05-03/a>Johannes UllrichUpdate on Osama Bin Laden themed Malware
2011-05-02/a>Johannes UllrichBin Laden Death Related Malware
2011-05-01/a>Deborah HaleDroid MarketPlace Has a New App
2011-04-26/a>John BambenekIs the Insider Threat Really Over?
2011-04-25/a>Rob VandenBrinkSony PlayStation Network Outage - Day 5
2011-04-19/a>Bojan ZdrnjaSQL injection: why can’t we learn?
2011-04-14/a>Adrien de BeaupreSysinternals updates, a new blog post, and webcast
2011-04-11/a>Johannes UllrichGMail User Using 2FA Warned of Access From China
2011-04-07/a>Chris MohanBeing a good internet neighbour
2011-04-01/a>John BambenekLizaMoon Mass SQL-Injection Attack Infected at least 500k Websites
2011-03-27/a>Guy BruneauStrange Shockwave File with Surprising Attachments
2011-03-25/a>Kevin ListonAPT Tabletop Exercise
2011-03-22/a>Chris MohanRead only USB stick trick
2011-03-15/a>Lenny ZeltserLimiting Exploit Capabilities by Using Windows Integrity Levels
2011-03-07/a>Bojan ZdrnjaOracle padding attacks (Codegate crypto 400 writeup)
2011-02-28/a>Deborah HalePossible Botnet Scanning
2011-02-25/a>Johannes UllrichThunderbolt Security Speculations
2011-02-24/a>Johannes UllrichWindows 7 / 2008 R2 Service Pack 1 Problems
2011-02-23/a>Johannes UllrichWindows 7 Service Pack 1 out
2011-02-23/a>Manuel Humberto Santander PelaezBind DOS vulnerability (CVE-2011-0414)
2011-02-21/a>Adrien de BeaupreWinamp forums compromised
2011-02-16/a>Jason LamWindows 0-day SMB mrxsmb.dll vulnerability
2011-02-10/a>Chris MohanBefriending Windows Security Log Events
2011-02-09/a>Mark HofmanAdobe Patches (shockwave, Flash, Reader & Coldfusion)
2011-02-08/a>Johannes UllrichTippingpoint Releases Details on Unpatched Bugs
2011-02-07/a>Richard PorterCrime is still Crime! Pt 2
2011-02-05/a>Guy BruneauOpenSSH Legacy Certificate Information Disclosure Vulnerability
2011-02-02/a>Johannes UllrichHaving Phish on Friday
2011-01-30/a>Richard PorterThe Modern Dark Ages?
2011-01-27/a>Robert DanfordMicrosoft Security Advisory for MHTML via Internet Explorer (MS2501696/CVE-2011-0096)
2011-01-25/a>Chris MohanReviewing our preconceptions
2011-01-24/a>Rob VandenBrinkWhere have all the COM Ports Gone? - How enumerating COM ports led to me finding a “misplaced” Microsoft tool
2011-01-23/a>Richard PorterCrime is still Crime!
2011-01-12/a>Richard PorterHow Many Loyalty Cards do you Carry?
2011-01-12/a>Richard PorterYet Another Data Broker? AOL Lifestream.
2011-01-10/a>Manuel Humberto Santander PelaezVirusTotal VTzilla firefox/chrome plugin
2011-01-05/a>Johannes UllrichCurrently Unpatched Windows / Internet Explorer Vulnerabilities
2011-01-04/a>Johannes UllrichMicrosoft Advisory: Vulnerability in Graphics Rendering Engine
2010-12-29/a>Daniel WesemannBeware of strange web sites bearing gifts ...
2010-12-26/a>Manuel Humberto Santander PelaezISC infocon monitor app for OS X
2010-12-23/a>Mark HofmanSkoudis' Annual Xmas Hacking Challenge - The Nightmare Before Charlie Brown's Christmas
2010-12-21/a>Rob VandenBrinkNetwork Reliability, Part 2 - HSRP Attacks and Defenses
2010-12-19/a>Raul SilesIntel's new processors have a remote kill switch (Anti-Theft 3.0)
2010-12-10/a>Mark HofmanMicrosoft patches
2010-12-05/a>Jim ClausingUpdates to a couple of Sysinternals tools
2010-12-02/a>Kevin JohnsonRobert Hansen and our happiness
2010-12-02/a>Kevin JohnsonSQL Injection: Wordpress 3.0.2 released
2010-11-29/a>Stephen HalliPhone phishing - What you see, isn't what you get
2010-11-26/a>Mark HofmanUsing password cracking as metric/indicator for the organisation's security posture
2010-11-24/a>Bojan ZdrnjaPrivilege escalation 0-day in almost all Windows versions
2010-11-22/a>Lenny ZeltserBrand Impersonations On-Line: Brandjacking and Social Networks
2010-11-19/a>Jason LamExchanging and sharing of assessment results
2010-11-18/a>Chris CarboniStopping the ZeroAccess Rootkit
2010-11-17/a>Guy BruneauCisco Unified Videoconferencing Affected by Multiple Vulnerabilities
2010-11-15/a>Stephen HallMinibis hits beta with Version 2.1
2010-11-01/a>Manuel Humberto Santander PelaezCheckpoint UTM-1 edge VPN boxes worldwide did an unscheduled reboot
2010-10-26/a>Pedro BuenoBe (even more) careful with public hotspots. Firesheep released yesterday. Brilliant and scary.
2010-10-22/a>Manuel Humberto Santander PelaezIntypedia project
2010-10-18/a>Manuel Humberto Santander PelaezCyber Security Awareness Month - Day 18 - What you should tell your boss when there's a crisis
2010-10-11/a>Adrien de BeaupreOT: Happy Thanksgiving Day Canada
2010-10-04/a>Mark HofmanOnline Voting
2010-09-25/a>Rick WannerGuest Diary: Andrew Hunt - Visualizing the Hosting Patterns of Modern Cybercriminals
2010-09-17/a>Robert DanfordCirca 2007 Linux Kernel Vulnerability Resurfaces (Was CVE-2007-4573, Now CVE-2010-3301)
2010-09-16/a>Johannes UllrichFacebook "Like Pages"
2010-09-04/a>Kevin ListonInvestigating Malicious Website Reports
2010-08-27/a>Mark HofmanFTP Brute Password guessing attacks
2010-08-23/a>Manuel Humberto Santander PelaezFirefox plugins to perform penetration testing activities
2010-08-23/a>Bojan ZdrnjaDLL hijacking vulnerabilities
2010-08-16/a>Raul SilesBlind Elephant: A New Web Application Fingerprinting Tool
2010-08-15/a>Manuel Humberto Santander PelaezObfuscated SQL Injection attacks
2010-08-13/a>Guy BruneauShadowserver Binary Whitelisting Service
2010-08-10/a>Daniel WesemannSSH - new brute force tool?
2010-08-07/a>Stephen HallCountdown to Tuesday...
2010-08-05/a>Rob VandenBrinkAccess Controls for Network Infrastructure
2010-08-04/a>Tom ListonIncident Reporting - Liston's "How-To" Guide
2010-08-03/a>Johannes UllrichWhen Lightning Strikes
2010-08-02/a>Manuel Humberto Santander PelaezSecuring Windows Internet Kiosk
2010-07-29/a>Rob VandenBrinkNoScript 2.0 released
2010-07-26/a>Guy BruneauSophosLabs Released Free Tool to Validate Microsoft Shortcut
2010-07-24/a>Manuel Humberto Santander PelaezTransmiting logon information unsecured in the network
2010-07-23/a>Mark HofmanvBulletin vB 3.8.6 vulnerability
2010-07-23/a>Mark HofmanSome of our favourite sysinternals tools have been updated. TCPview, Autoruns, ProcDump and Disk2vhd have changed. More here http://blogs.technet.com/b/sysinternals/archive/2010/07/22/updates-tcpview-v3-0-autoruns-v10-02-procdump-v1-81-disk2vhd-v1-61.aspx
2010-07-20/a>Manuel Humberto Santander PelaezLowering infocon back to green
2010-07-07/a>Kevin ShorttFacebook, Facebook, What Do YOU See?
2010-07-04/a>Manuel Humberto Santander PelaezNew Winpcap Version
2010-06-27/a>Manuel Humberto Santander PelaezStudy of clickjacking vulerabilities on popular sites
2010-06-19/a>Guy BruneauDNS Sinkhole ISO Available for Download
2010-06-18/a>Tom ListonIMPORTANT INFORMATION: Distributed SSH Brute Force Attacks
2010-06-17/a>Deborah HaleDigital Copy Machines - Security Risk?
2010-06-17/a>Deborah HaleInternet Fraud Alert Kicks Off Today
2010-06-15/a>Manuel Humberto Santander PelaezMicrosoft Windows Help and Support Center vulnerability (CVE 2010-1885) exploit in the wild
2010-06-15/a>Manuel Humberto Santander PelaeziPhone 4 Order Security Breach Exposes Private Information
2010-06-14/a>Manuel Humberto Santander PelaezNew way of social engineering on IRC
2010-06-10/a>Deborah HaleTop 5 Social Networking Media Risks
2010-06-09/a>Deborah HaleMass Infection of IIS/ASP Sites
2010-06-07/a>Manuel Humberto Santander PelaezSoftware Restriction Policy to keep malware away
2010-06-06/a>Manuel Humberto Santander PelaezNice OS X exploit tutorial
2010-06-04/a>Johannes UllrichChanges to Internet Storm Center Host Name
2010-06-02/a>Bojan ZdrnjaClickjacking attacks on Facebook's Like plugin
2010-05-25/a>donald smithFace book “joke” leads to firing.
2010-05-19/a>Jason LamEFF paper about browser tracking
2010-05-07/a>Johannes UllrichStock market "wipe out" may be due to computer error
2010-05-04/a>Rick WannerSIFT review in the ISSA Toolsmith
2010-05-02/a>Mari NicholsZbot Social Engineering
2010-04-30/a>Johannes UllrichSharepoint XSS Vulnerability
2010-04-30/a>Kevin ListonCVE-2010-0817 SharePoint XSS Scorecard
2010-04-29/a>Bojan ZdrnjaWho needs exploits when you have social engineering?
2010-04-21/a>Guy BruneauGoogle Chrome Security Update v4.1.249.1059 Released: http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html
2010-04-20/a>Raul SilesAre You Ready for a Transportation Collapse...?
2010-04-19/a>Daniel WesemannLinked into scams?
2010-04-14/a>Mark HofmanAnd let the patching games continue
2010-04-13/a>Adrien de BeaupreWeb App Testing Tools
2010-04-13/a>Johannes UllrichMore Legal Threat Malware E-Mail
2010-04-02/a>Guy BruneauOracle Java SE and Java for Business Critical Patch Update Advisory
2010-03-27/a>Guy BruneauHP-UX Running NFS/ONCplus, Inadvertently Enabled NFS
2010-03-27/a>Guy BruneauCreate a Summary of IP Addresses from PCAP Files using Unix Tools
2010-03-21/a>Chris CarboniResponding To The Unexpected
2010-03-18/a>Bojan ZdrnjaDangers of copy&paste
2010-03-15/a>Adrien de BeaupreSpamassassin Milter Plugin Remote Root Attack
2010-03-06/a>Tony CarothersIntegration and the Security of New Technologies
2010-02-22/a>Rob VandenBrinkNew Risks in Penetration Testing
2010-02-17/a>Rob VandenBrinkMultiple Security Updates for ESX 3.x and ESXi 3.x
2010-02-15/a>Johannes UllrichVarious Olympics Related Dangerous Google Searches
2010-02-12/a>G. N. WhiteTime to update those IP Bogon Filters (again)
2010-02-11/a>Deborah HaleThe Mysterious Blue Screen
2010-02-06/a>Guy BruneauLANDesk Management Gateway Vulnerability
2010-02-03/a>Johannes UllrichInformation Disclosure Vulnerability in Internet Explorer
2010-02-02/a>Johannes UllrichTwitter Mass Password Reset due to Phishing
2010-02-01/a>Rob VandenBrinkNMAP 5.21 - Is UDP Protocol Specific Scanning Important? Why Should I Care?
2010-01-27/a>Raul SilesCommand Line Kung Fu
2010-01-26/a>Rob VandenBrinkVMware vSphere Hardening Guide Draft posted for public review
2010-01-22/a>Mari NicholsPass-down for a Successful Incident Response
2010-01-17/a>Mark HofmanWhy not Yellow?
2010-01-14/a>Bojan Zdrnja0-day vulnerability in Internet Explorer 6, 7 and 8
2010-01-10/a>Guy BruneauEasy DNS BIND Sinkhole Setup
2010-01-09/a>G. N. WhiteWhat's Up With All The Port Scanning Using TCP/6000 As A Source Port?
2010-01-08/a>Rob VandenBrinkMicrosoft OfficeOnline, Searching for Trust and Malware
2009-12-17/a>Daniel Wesemannoverlay.xul is back
2009-12-16/a>Rob VandenBrinkBeware the Attack of the Christmas Greeting Cards !
2009-12-15/a>Johannes UllrichImportant BIND name server updates - DNSSEC
2009-12-04/a>Daniel WesemannThe economics of security advice (MSFT research paper)
2009-12-02/a>Rob VandenBrinkSPAM and Malware taking advantage of H1N1 concerns
2009-11-29/a>Patrick Nolan A Cloudy Weekend
2009-11-25/a>Jim ClausingTool updates
2009-11-24/a>Rick WannerMicrosoft Security Advisory 977981 - IE 6 and IE 7
2009-11-24/a>John BambenekBIND Security Advisory (DNSSEC only)
2009-11-14/a>Adrien de BeaupreMicrosoft advisory for Windows 7 / Windows Server 2008 R2 Remote SMB DoS Exploit released
2009-11-13/a>Adrien de BeaupreFlash Origin Policy Attack
2009-11-12/a>Rob VandenBrinkWindows 7 / Windows Server 2008 Remote SMB Exploit
2009-11-11/a>Rob VandenBrinkLayer 2 Network Protections against Man in the Middle Attacks
2009-11-09/a>Chris Carboni80's Flashback on Jailbroken iPhones
2009-11-05/a>Swa FrantzenInsider threat: The snapnames case
2009-10-26/a>Johannes UllrichToday: ISC Login bugfix day. If you have issues logging in using OpenID, please email a copy of your OpenID URL to jullrich\at\sans.edu
2009-10-24/a>Marcus SachsWindows 7 - How is it doing?
2009-10-22/a>Adrien de BeaupreSysinternals updates: Disk2vhd v1.1, ZoomIt v4.1, Coreinfo v2.0, VMMap v2.4
2009-10-19/a>Daniel WesemannScam Email
2009-10-17/a>Rick WannerMozilla disables Microsoft plug-ins?
2009-10-16/a>Adrien de BeaupreDisable MS09-054 patch, or Firefox Plugin?
2009-10-13/a>Daniel WesemannAdobe Reader and Acrobat - Black Tuesday continues
2009-10-08/a>Johannes UllrichFirefox Plugin Collections
2009-10-04/a>Guy BruneauSamba Security Information Disclosure and DoS
2009-10-02/a>Stephen HallNew SysInternal fun for the weekend
2009-09-27/a>Stephen HallUse Emerging Threats signatures? READ THIS!
2009-09-20/a>Mari NicholsInsider Threat and Security Awareness
2009-09-19/a>Rick WannerSysinternals Tools Updates
2009-09-08/a>Guy BruneauVista/2008/Windows 7 SMB2 BSOD 0Day
2009-09-05/a>Mark HofmanCritical Infrastructure and dependencies
2009-08-26/a>Johannes UllrichWSUS 3.0 SP2 released
2009-08-26/a>Johannes UllrichCisco over-the-air-provisioning skyjacking exploit
2009-08-19/a>Daniel WesemannChecking your protection
2009-08-18/a>Deborah HaleWebsite compromises - what's happening?
2009-08-18/a>Deborah HaleSysinternals Procdump Updated
2009-08-13/a>Jim ClausingNew and updated cheat sheets
2009-08-03/a>Mark HofmanSwitch hardening on your network
2009-08-01/a>Deborah HaleWebsite Warnings
2009-07-31/a>Deborah HaleDon't forget to tell your SysAdmin Thanks
2009-07-31/a>Deborah HaleGoogle Safe Browsing
2009-07-29/a>Bojan ZdrnjaBIND 9 DoS attacks in the wild
2009-07-27/a>Raul SilesFilemon and Regmon are dead, long life to Procmon!
2009-07-27/a>Raul SilesNew Hacker Challenge: Prison Break - Breaking, Entering & Decoding
2009-07-18/a>Patrick NolanChrome update contains Security fixes
2009-07-17/a>Bojan ZdrnjaA new fascinating Linux kernel vulnerability
2009-07-16/a>Guy BruneauChanges in Windows Security Center
2009-07-16/a>Bojan ZdrnjaOWC exploits used in SQL injection attacks
2009-07-13/a>Adrien de Beaupre* Infocon raised to yellow for Excel Web Components ActiveX vulnerability
2009-07-12/a>Mari NicholsCA Apologizes for False Positive
2009-07-10/a>Guy BruneauWordPress Fixes Multiple vulnerabilities
2009-07-07/a>Marcus Sachs* INFOCON Status - staying green
2009-07-03/a>Adrien de BeaupreHappy 4th of July!
2009-07-02/a>Daniel WesemannTime to update updating on PCs for 3rd party apps
2009-07-02/a>Daniel WesemannUnpatched Bloatware on new PCs
2009-06-26/a>Mark HofmanPHPMYADMIN scans
2009-06-24/a>Kyle HaugsnessExploit tools are publicly available for phpMyAdmin
2009-06-24/a>Kyle HaugsnessTCP scanning increase for 4899
2009-06-21/a>Scott FendleyphpMyAdmin Scans
2009-06-20/a>Scott FendleySituational Awareness: Spam Crisis and China
2009-06-16/a>John BambenekIran Internet Blackout: Using Twitter for Operational Intelligence
2009-06-16/a>John BambenekURL Shortening Service Cligs Hacked
2009-06-11/a>Rick WannerMIR-ROR Motile Incident Response - Respond Objectively Remediate
2009-06-10/a>Rick WannerSysInternals Survey
2009-06-01/a>G. N. WhiteYet another "Digital Certificate" malware campaign
2009-05-24/a>Raul SilesFacebook phising using Belgium (.be) domains
2009-05-22/a>Mark HofmanPatching and Adobe
2009-05-22/a>Mark HofmanPatching and Apple - Java issue
2009-05-20/a>Pedro BuenoCyber Warfare and Kylin thoughts
2009-05-19/a>Bojan ZdrnjaAdvanced blind SQL injection (with Oracle examples)
2009-05-11/a>Mari NicholsSysinternals Updates 3 Applications
2009-05-09/a>Patrick NolanShared SQL Injection Lessons Learned blog item
2009-05-06/a>Tom ListonFollow The Bouncing Malware: Gone With the WINS
2009-05-04/a>Tom ListonFacebook phishing malware
2009-05-02/a>Rick WannerMore Swine/Mexican/H1N1 related domains
2009-05-01/a>Adrien de BeaupreIncident Management
2009-04-30/a>Marcus SachsARIN Notification Concerning IPv6
2009-04-28/a>Deborah HaleUpdated List of Domains - Swineflu related
2009-04-27/a>Johannes UllrichSwine Flu (Mexican Flu) related domains
2009-04-26/a>Johannes UllrichPandemic Preparation - Swine Flu
2009-04-24/a>Pedro BuenoDid you check your conference goodies?
2009-04-21/a>Bojan ZdrnjaWeb application vulnerabilities
2009-04-16/a>Adrien de BeaupreIncident Response vs. Incident Handling
2009-04-16/a>Adrien de BeaupreStrange Windows Event Log entry
2009-04-02/a>Bojan ZdrnjaJavaScript insertion and log deletion attack tools
2009-03-27/a>Mark HofmanThere is some SMiShing going on in the EU
2009-03-11/a>Bojan ZdrnjaMassive ARP spoofing attacks on web sites
2009-03-10/a>Swa FrantzenTinyURL and security
2009-03-10/a>Swa FrantzenBrowser plug-ins, transparent proxies and same origin policies
2009-03-02/a>Swa FrantzenObama's leaked chopper blueprints: anything we can learn?
2009-02-25/a>Swa FrantzenTargeted link diversion attempts
2009-02-22/a>Mari NicholsThe Internet Safety Act of 2009
2009-02-20/a>Mark HofmanPhishing with a small twist
2009-02-11/a>Robert DanfordProFTPd SQL Authentication Vulnerability exploit activity
2009-02-06/a>Adrien de BeaupreTime to patch your HP printers
2009-02-01/a>Chris CarboniScanning for Trixbox vulnerabilities
2009-01-31/a>Swa FrantzenDNS DDoS - let's use a long term solution
2009-01-31/a>Swa FrantzenWindows 7 - not so secure ?
2009-01-31/a>John BambenekGoogle Search Engine's Malware Detection Broken
2009-01-20/a>Adrien de BeaupreObamamania
2009-01-18/a>Maarten Van HorenbeeckTargeted social engineering
2009-01-11/a>Deborah HaleThe Frustration of Phishing Attacks
2009-01-08/a>Kyle HaugsnessBIND OpenSSL follow-up
2009-01-07/a>William SaluskyBIND 9.x security patch - resolves potentially new DNS poisoning vector
2009-01-04/a>Rick WannerTwitter/Facebook Phishing Attempt
2009-01-02/a>Rick WannerTools on my Christmas list.
2008-12-28/a>Raul SilesLevel3 Outage?
2008-12-17/a>donald smithInternet Explorer 960714 is released
2008-12-12/a>Johannes UllrichMSIE 0-day Spreading Via SQL Injection
2008-12-12/a>Swa FrantzenBrowser Security Handbook
2008-12-10/a>Bojan Zdrnja0-day exploit for Internet Explorer in the wild
2008-12-02/a>Deborah HaleSonicwall License Manager Failure
2008-12-01/a>Jason LamInput filtering and escaping in SQL injection mitigation
2008-11-25/a>Andre LudwigThe beginnings of a collaborative approach to IDS
2008-11-20/a>Jason LamLarge quantity SQL Injection mitigation
2008-11-14/a>Stephen HallMore updated tools
2008-11-12/a>John BambenekThoughts on Security Intelligence (McColo Corp alleged spam/malware host knocked offline)
2008-11-11/a>Swa FrantzenPhishing for Google adwords
2008-11-02/a>Adrien de BeaupreDaylight saving time
2008-10-31/a>Rick WannerSprint-Cogent Peering Issue
2008-10-30/a>Kevin ListonMaking Intelligence Actionable: Part 2
2008-10-29/a>Deborah HaleDay 29 - Should I Switch Software Vendors?
2008-10-29/a>Deborah HaleEnom Phishing - Caution Enom Registrars
2008-10-20/a>Johannes UllrichFraudulent ATM Reactivation Phone Calls.
2008-10-18/a>Rick WannerUpdates to SysInternals tools!
2008-10-17/a>Patrick NolanDay 17 - Containing a DNS Hijacking
2008-10-17/a>Rick WannerDay 18 - Containing Other Incidents
2008-10-15/a>Rick WannerDay 15 - Containing the Damage From a Lost or Stolen Laptop
2008-10-12/a>Mari NicholsDay 12 Containment: Gathering Evidence That Can be Used in Court
2008-10-10/a>Marcus SachsFake Microsoft Update Email
2008-10-08/a>Johannes UllrichDomaincontrol (GoDaddy) Nameservers DNS Poisoning
2008-10-07/a>Kyle HaugsnessCogent peering problems
2008-10-01/a>Rick WannerHandler Mailbag
2008-09-29/a>Daniel WesemannASPROX mutant
2008-09-22/a>Jim ClausingLessons learned from the Palin (and other) account hijacks
2008-09-20/a>Rick WannerNew (to me) nmap Features
2008-09-16/a>donald smithDon't open that invoice.zip file its not from UPS
2008-09-11/a>David GoldsmithCookieMonster is coming to Pown (err, Town)
2008-09-09/a>Swa Frantzenwordpress upgrade
2008-09-01/a>John BambenekThe Number of Machines Controlled by Botnets Has Jumped 4x in Last 3 Months
2008-08-23/a>Mark HofmanSQL injections - an update
2008-08-15/a>Jim ClausingOMFW 2008 reflections
2008-08-14/a>Johannes UllrichDNSSEC for DShield.org
2008-08-12/a>Johannes UllrichUpcoming Infocon Test and new Color
2008-08-08/a>Mark HofmanMore SQL Injections - very active right now
2008-08-02/a>Maarten Van HorenbeeckA little of that human touch
2008-08-02/a>Swa FrantzenBIND: -P2 patches are released
2008-07-31/a>Swa FrantzenLinus - Linux and Security - follow-up
2008-07-29/a>Swa FrantzenLinus - Linux and Security
2008-07-24/a>Bojan ZdrnjaWhat's brewing in Danmec's pot?
2008-07-24/a>Kyle HaugsnessDNS cache poisoning vulnerability details confirmed
2008-07-11/a>Jim ClausingAnd you thought the DNS issue was an old one...
2008-07-08/a>Johannes UllrichMulitple Vendors DNS Spoofing Vulnerability
2008-07-07/a>Pedro BuenoBad url classification
2008-07-02/a>Jim ClausingAnother little script I threw together
2008-06-30/a>Marcus SachsMore SQL Injection with Fast Flux hosting
2008-06-25/a>Deborah HaleReport of Coreflood.dr Infection
2008-06-24/a>Jason LamSQL Injection mitigation in ASP
2008-06-24/a>Jason LamMicrosoft SQL Injection Prevention Strategy
2008-06-23/a>donald smithPreventing SQL injection
2008-06-18/a>Marcus SachsOlympics Part II
2008-06-17/a>Kyle HaugsnessWhy go high-tech?
2008-06-13/a>Johannes UllrichSQL Injection: More of the same
2008-06-12/a>Bojan ZdrnjaSafari on Windows - not looking good
2008-06-10/a>Swa FrantzenLinux ASN.1 BER kernel buffer overflow
2008-06-02/a>Jim ClausingEmergingthreats.net and ThePlanet
2008-06-01/a>Mark HofmanFree Yahoo email account! Sign me up, Ok well maybe not.
2008-05-26/a>Marcus SachsPredictable Response
2008-05-20/a>Raul SilesList of malicious domains inserted through SQL injection
2008-05-19/a>Maarten Van HorenbeeckText message and telephone aid scams
2008-05-17/a>Lorna HutchesonXP SP3 Issues
2008-05-13/a>Swa FrantzenOpenSSH: Predictable PRNG in debian and ubuntu Linux
2008-05-06/a>John BambenekWindows XP Service Pack 3 Released
2008-05-01/a>Adrien de BeaupreWindows XP SteadyState
2008-04-29/a>Bojan ZdrnjaWindows Service Pack blocker tool
2008-04-24/a>donald smithHundreds of thousands of SQL injections
2008-04-18/a>John BambenekThe Patch Window is Gone: Automated Patch-Based Exploit Generation
2008-04-16/a>Bojan ZdrnjaThe 10.000 web sites infection mystery solved
2008-04-16/a>William StearnsWindows XP Service Pack 3 - unofficial schedule: Apr 21-28
2008-04-16/a>William StearnsPasser, a aassive machine and service sniffer
2008-04-14/a>John BambenekA Federal Subpoena or Just Some More Spam & Malware?
2008-04-11/a>John BambenekADSL Router / Cable Modem / Home Wireless AP Hardening in 5 Steps
2008-04-07/a>John BambenekHP USB Keys Shipped with Malware for your Proliant Server
2008-03-27/a>Pedro BuenoFreedom of Speech...or not?
2008-03-27/a>Maarten Van HorenbeeckGuarding the guardians: a story of PGP key ring theft
2008-03-21/a>donald smithD-Link router based worm?
2008-03-14/a>Kevin Liston2117966.net-- mass iframe injection
2008-03-13/a>Jason LamRemote File Include spoof!?
2008-03-12/a>Joel EslerDon't use G-Archiver
2008-03-12/a>Joel EslerAdobe security updates
2008-01-09/a>Bojan ZdrnjaMass exploits with SQL Injection
2007-02-24/a>Jason LamPrepared Statements and SQL injections
2007-01-03/a>Toby KohlenbergVLC Media Player udp URL handler Format String Vulnerability
2006-12-12/a>Swa FrantzenOffline Microsoft Patching
2006-10-05/a>John BambenekThere are no more Passive Exploits
2006-10-02/a>Jim ClausingBack to green, but the exploits are still running wild
2006-09-28/a>Swa FrantzenPowerpoint, yet another new vulnerability
2006-09-06/a>Johannes UllrichUpdated Packet Attack flash animation

THE

2024-06-20/a>Guy BruneauNo Excuses, Free Tools to Help Secure Authentication in Ubuntu Linux [Guest Diary]
2024-03-17/a>Guy BruneauGamified Learning: Using Capture the Flag Challenges to Supplement Cybersecurity Training [Guest Diary]
2023-02-16/a>Jan KoprivaHTML phishing attachment with browser-in-the-browser technique
2022-02-05/a>Didier StevensPower over Ethernet and Thermal Imaging
2022-02-01/a>Xavier MertensAutomation is Nice But Don't Replace Your Knowledge
2021-11-08/a>Xavier Mertens(Ab)Using Security Tools & Controls for the Bad
2021-10-18/a>Xavier MertensMalicious PowerShell Using Client Certificate Authentication
2021-06-24/a>Xavier MertensDo you Like Cookies? Some are for sale!
2021-05-29/a>Guy BruneauSpear-phishing Email Targeting Outlook Mail Clients
2020-04-16/a>Johannes UllrichUsing AppLocker to Prevent Living off the Land Attacks
2019-11-11/a>Johannes UllrichAre We Going Back to TheMoon (and How is Liquor Involved)?
2019-07-10/a>Rob VandenBrinkDumping File Contents in Hex (in PowerShell)
2019-01-30/a>Russ McReeCR19-010: The United States vs. Huawei
2018-11-20/a>Xavier MertensQuerying DShield from Cortex
2018-11-11/a>Pasquale StirparoCommunity contribution: joining forces or multiply solutions?
2018-06-04/a>Rob VandenBrinkDigging into Authenticode Certificates
2017-12-05/a>Tom WebbIR using the Hive Project.
2017-09-18/a>Johannes UllrichSANS Securingthehuman posted a follow up to their Equifax breach webcast: https://securingthehuman.sans.org/blog/2017/09/15/equifax-webcast-follow-up
2017-01-11/a>Johannes UllrichJanuary 2017 Edition of Ouch! Security Awareness Newsletter Released: https://securingthehuman.sans.org/ouch
2016-11-02/a>Rob VandenBrinkWhat Does a Pentest Look Like?
2016-10-07/a>Rick WannerFirst Hurricane Matthew related Phish
2016-09-15/a>Xavier MertensIn Need of a OTP Manager Soon?
2016-05-02/a>Rick WannerLean Threat Intelligence
2015-12-15/a>Russ McReeSecurity Management vs Chaos: Understanding the Butterfly Effect to Manage Outcomes & Reduce Chaos
2015-09-23/a>Daniel WesemannMaking our users unlearn what we taught them
2015-08-16/a>Guy BruneauAre you a "Hunter"?
2015-02-06/a>Johannes UllrichAnthem, TurboTax and How Things "Fit Together" Sometimes
2014-07-02/a>Johannes UllrichJuly Ouch! Security Awareness Newsletter Released. E-mail Do's and Don'ts http://www.securingthehuman.org/resources/newsletters/ouch/2014#july2014
2014-03-13/a>Daniel WesemannIdentification and authentication are hard ... finding out intention is even harder
2014-02-18/a>Johannes UllrichMore Details About "TheMoon" Linksys Worm
2014-02-05/a>Johannes UllrichSANS Ouch Security Awareness Newsletter What is Malware http://www.securingthehuman.org/ouch
2013-12-20/a>Daniel Wesemannauthorized key lime pie
2013-11-13/a>Johannes UllrichPacket Challenge for the Hivemind: What's happening with this Ethernet header?
2013-09-18/a>Rob VandenBrinkCisco DCNM Update Released
2013-09-09/a>Johannes UllrichSSL is broken. So what?
2013-09-05/a>Rob VandenBrinkBuilding Your Own GPU Enabled Private Cloud
2013-08-09/a>Kevin ShorttCopy Machines - Changing Scanned Content
2013-03-23/a>Guy BruneauApple ID Two-step Verification Now Available in some Countries
2013-02-06/a>Johannes UllrichIntel Network Card (82574L) Packet of Death
2013-02-04/a>Adam SwangerSAN Securing The Human Monthly Awareness Video - Advanced Persistent Threat (APT) http://www.securingthehuman.org/resources/ncsam
2012-10-26/a>Adam SwangerSecuring the Human Special Webcast - October 30, 2012
2012-07-10/a>Rob VandenBrinkToday at SANSFIRE (09 July 2012) - ISC Panel Discussion on the State of the Internet
2012-07-02/a>Dan GoldbergStorms of June 29th 2012 in Mid Atlantic region of the USA
2011-05-18/a>Bojan ZdrnjaAndroid, HTTP and authentication tokens
2011-04-28/a>Chris MohanGathering and use of location information fears - or is it all a bit too late
2011-04-11/a>Johannes UllrichLayer 2 DoS and other IPv6 Tricks
2011-01-12/a>Richard PorterHas Big Brother gone Global?
2010-12-21/a>Rob VandenBrinkNetwork Reliability, Part 2 - HSRP Attacks and Defenses
2010-09-21/a>Johannes UllrichImplementing two Factor Authentication on the Cheap
2010-07-24/a>Manuel Humberto Santander PelaezTransmiting logon information unsecured in the network
2010-07-21/a>Adrien de BeaupreDell PowerEdge R410 replacement motherboard firmware contains malware
2010-03-10/a>Rob VandenBrinkMicrosoft re-release of KB973811 - attacks on Extended Protection for Authentication
2010-02-09/a>Adrien de BeaupreWhen is a 0day not a 0day? Samba symlink bad default config
2009-11-11/a>Rob VandenBrinkLayer 2 Network Protections against Man in the Middle Attacks
2008-10-15/a>Rick WannerDay 15 - Containing the Damage From a Lost or Stolen Laptop
2006-10-05/a>John BambenekThere are no more Passive Exploits
2006-09-29/a>Kevin ListonA Report from the Field

MIDDLE

2013-09-09/a>Johannes UllrichSSL is broken. So what?
2010-12-21/a>Rob VandenBrinkNetwork Reliability, Part 2 - HSRP Attacks and Defenses
2010-07-24/a>Manuel Humberto Santander PelaezTransmiting logon information unsecured in the network
2009-11-11/a>Rob VandenBrinkLayer 2 Network Protections against Man in the Middle Attacks
2006-10-05/a>John BambenekThere are no more Passive Exploits

MITM

2014-02-24/a>Russ McReeExplicit Trusted Proxy in HTTP/2.0 or...not so much
2013-11-21/a>Mark BaggettAre large scale Man in The Middle attacks underway?
2013-09-09/a>Johannes UllrichSSL is broken. So what?
2013-01-03/a>Manuel Humberto Santander PelaezNew year and new CA compromised
2011-09-28/a>Richard PorterAll Along the ARP Tower!
2011-04-05/a>Johannes UllrichIPv6 MITM via fake router advertisements
2010-12-21/a>Rob VandenBrinkNetwork Reliability, Part 2 - HSRP Attacks and Defenses
2009-11-11/a>Rob VandenBrinkLayer 2 Network Protections against Man in the Middle Attacks
2009-11-05/a>Swa FrantzenTLS Man-in-the-middle on renegotiation vulnerability made public
2009-08-28/a>Adrien de BeaupreWPA with TKIP done

ATTACK

2024-01-08/a>Jesse La GrewWhat is that User Agent?
2022-08-10/a>Johannes UllrichAnd Here They Come Again: DNS Reflection Attacks
2022-03-26/a>Guy BruneauIs buying Cyber Insurance a Must Now?
2022-02-03/a>Johannes UllrichKeeping Track of Your Attack Surface for Cheap
2021-02-01/a>Rob VandenBrinkTaking a Shot at Reverse Shell Attacks, CNC Phone Home and Data Exfil from Servers
2019-08-25/a>Guy BruneauAre there any Advantages of Buying Cyber Security Insurance?
2019-07-20/a>Guy BruneauRe-evaluating Network Security - It is Increasingly More Complex
2017-09-06/a>Adrien de BeaupreModern Web Application Penetration Testing , Hash Length Extension Attacks
2016-11-02/a>Rob VandenBrinkWhat Does a Pentest Look Like?
2016-06-03/a>Tom ListonMySQL is YourSQL
2015-03-18/a>Daniel WesemannPass the hash!
2015-02-19/a>Daniel WesemannDNS-based DDoS
2014-02-26/a>Russ McReeOngoing NTP Amplification Attacks
2014-02-17/a>Chris MohanNTP reflection attacks continue
2013-12-02/a>Richard PorterReports of higher than normal SSH Attacks
2013-08-19/a>Guy Bruneau Business Risks and Cyber Attacks
2013-07-27/a>Scott FendleyDefending Against Web Server Denial of Service Attacks
2013-07-13/a>Lenny ZeltserDecoy Personas for Safeguarding Online Identity Using Deception
2012-10-05/a>Richard PorterReports of a Distributed Injection Scan
2011-12-28/a>Daniel WesemannHash collisions vulnerability in web servers
2011-12-01/a>Mark HofmanSQL Injection Attack happening ATM
2011-09-28/a>Richard PorterAll Along the ARP Tower!
2011-01-23/a>Richard PorterCrime is still Crime!
2010-12-23/a>Mark HofmanWhite house greeting cards
2010-08-16/a>Raul SilesDDOS: State of the Art
2010-08-15/a>Manuel Humberto Santander PelaezObfuscated SQL Injection attacks
2010-08-13/a>Tom ListonThe Strange Case of Doctor Jekyll and Mr. ED
2010-03-15/a>Adrien de BeaupreSpamassassin Milter Plugin Remote Root Attack
2010-01-29/a>Johannes UllrichAnalyzing isc.sans.org weblogs, part 2, RFI attacks
2009-11-11/a>Rob VandenBrinkLayer 2 Network Protections against Man in the Middle Attacks
2009-08-28/a>Adrien de BeaupreWPA with TKIP done
2009-06-04/a>Raul SilesTargeted e-mail attacks asking to verify wire transfer details
2009-04-20/a>Jason LamDigital Content on TV
2009-04-02/a>Bojan ZdrnjaJavaScript insertion and log deletion attack tools
2009-03-20/a>donald smithStealthier then a MBR rootkit, more powerful then ring 0 control, it’s the soon to be developed SMM root kit.
2009-02-25/a>Swa FrantzenTargeted link diversion attempts
2009-01-30/a>Mark HofmanRequest for info - Scan and webmail
2009-01-18/a>Maarten Van HorenbeeckTargeted social engineering
2008-12-03/a>Andre LudwigNew ISC Poll! Has your organization suffered a DDoS (Distributed Denial of Service) attack in the last year?
2008-07-09/a>Johannes UllrichUnpatched Word Vulnerability
2008-05-26/a>Marcus SachsPredictable Response
2008-03-27/a>Maarten Van HorenbeeckGuarding the guardians: a story of PGP key ring theft