Internet Storm Center
Sign In
Sign Up
Handler on Duty:
Jan Kopriva
Threat Level:
green
Date
Author
Title
UPDATE ON PORT 5000 SCANS
2014-03-06
Mark Baggett
Port 5000 traffic and snort signature
UPDATE
2023-04-22/a>
Didier Stevens
YARA v4.3.1 Release
2023-04-02/a>
Didier Stevens
YARA v4.3.0 Release
2023-01-07/a>
Didier Stevens
YARA v4.3.0-rc1 --skip-larger
2022-12-05/a>
Didier Stevens
VLC's Check For Updates: No Updates?
2022-08-20/a>
Didier Stevens
YARA 4.2.3 Released
2022-07-02/a>
Didier Stevens
YARA 4.2.2 Released
2022-04-30/a>
Didier Stevens
YARA 4.2.1 Released
2022-03-14/a>
Johannes Ullrich
Apple Updates Everything: MacOS 12.3, XCode 13.3, tvOS 15.4, watchOS 8.5, iPadOS 15.4 and more
2021-11-29/a>
Didier Stevens
Wireshark 3.6.0 Released
2021-10-31/a>
Didier Stevens
Sysinternals: Autoruns and Sysmon updates
2021-10-28/a>
Yee Ching Tok
Multiple Apple Patches for October 2021
2021-10-10/a>
Didier Stevens
Wireshark 3.4.9 Released
2021-08-21/a>
Didier Stevens
New Versions Of Sysinternals Tools
2021-07-25/a>
Didier Stevens
Wireshark 3.4.7 Released
2021-04-25/a>
Didier Stevens
Wireshark 3.4.5 Released
2021-03-14/a>
Didier Stevens
Wireshark 3.4.4 Released
2021-02-06/a>
Didier Stevens
YARA v4.0.5
2021-01-31/a>
Didier Stevens
YARA v4.0.4
2020-12-20/a>
Didier Stevens
Wireshark 3.4.2 Released
2020-12-13/a>
Didier Stevens
Wireshark 3.4.1 Released
2020-09-27/a>
Didier Stevens
Wireshark 3.2.7 Released
2020-08-15/a>
Didier Stevens
Wireshark 3.2.6 Released
2020-05-24/a>
Didier Stevens
Wireshark 3.2.4 Released
2020-04-11/a>
Didier Stevens
Wireshark 3.2.3 Released: Mac Users Pay Attention Please
2020-03-14/a>
Didier Stevens
Phishing PDF With Incremental Updates.
2020-03-07/a>
Didier Stevens
Wireshark 3.2.2 Released: Windows' Users Pay Attention Please
2020-02-05/a>
Brad Duncan
Fake browser update pages are "still a thing"
2020-02-01/a>
Didier Stevens
Wireshark 3.2.1 Released
2019-12-21/a>
Didier Stevens
Wireshark 3.2.0 Released
2019-12-08/a>
Didier Stevens
Wireshark 3.0.7 Released
2019-10-27/a>
Didier Stevens
Wireshark 3.0.6 Released
2019-09-21/a>
Didier Stevens
Wireshark 3.0.5 Release: Potential Windows Crash when Updating
2019-07-09/a>
John Bambenek
MSFT July 2019 Patch Tuesday
2017-07-30/a>
Guy Bruneau
Re-release of MS Oulook Security Patches https://portal.msrc.microsoft.com/en-us/security-guidance/summary
2016-09-13/a>
Rob VandenBrink
Apple iOS 10 and 10.0.1 Released
2016-02-27/a>
Guy Bruneau
OpenSSL Security Update Planned for 1 March Release
2015-10-09/a>
Guy Bruneau
Adobe Acrobat and Reader Pre-Announcement
2015-04-04/a>
Didier Stevens
VMware Product Updates Address Critical Information Disclosure Issue In JRE
2014-08-22/a>
Richard Porter
PHP 5.4.32 Released http://www.php.net/ChangeLog-5.php#5.4.32
2014-08-22/a>
Richard Porter
PHP 5.5.16 is available http://www.php.net/ChangeLog-5.php#5.5.16
2014-08-12/a>
Adrien de Beaupre
Adobe updates for 2014/08
2014-08-01/a>
Chris Mohan
WireShark 1.10.9 and 1.12.0 has been released
2014-07-11/a>
Rob VandenBrink
Metasploit Update Alert
2014-06-12/a>
Guy Bruneau
BIND Security Update for CVE-2014-3859
2014-04-24/a>
Rob VandenBrink
Apple IOS updates to 7.1.1, OSX Security update 2014-002, Airport Updates - http://support.apple.com/kb/HT1222, http://support.apple.com/kb/HT6208, http://support.apple.com/kb/HT6207, http://support.apple.com/kb/HT6203
2014-04-12/a>
Guy Bruneau
Critical Security Update for JetPack WordPress Plugin. Bug has existed since Jetpack 1.9, released in October 2012. - http://jetpack.me/2014/04/10/jetpack-security-update/
2014-04-02/a>
Kevin Shortt
Apple Security Update for Safari 6.1.3/7.0.3: http://support.apple.com/kb/HT6181
2014-03-06/a>
Mark Baggett
Port 5000 traffic and snort signature
2014-02-14/a>
Chris Mohan
SYM14-004 Symantec Endpoint Protection Management Vulnerabilities - http://www.symantec.com/business/support/index?page=content&id=TECH214866
2013-12-18/a>
Adrien de Beaupre
Wireshark 1.10.4 and 1.8.12 are available
2013-12-17/a>
Adrien de Beaupre
Apple security updates Mac OS X and Safari
2013-10-17/a>
Adrien de Beaupre
Chrome updated http://googlechromereleases.blogspot.ca/2013/10/stable-channel-update_15.html
2013-10-15/a>
Rob VandenBrink
Java Quarterly Updates
2013-07-28/a>
Guy Bruneau
Wireshark 1.8.9 and 1.10.1 Security Update
2013-07-03/a>
Kevin Shortt
Apple Security Update 2013-003
2013-06-05/a>
Richard Porter
Windows Sysinternals Updated http://technet.microsoft.com/en-us/sysinternals/default.aspx
2013-05-22/a>
Adrien de Beaupre
Apple QuickTime 7.7.4 for Windows updated, MANY security vulnerabilities: http://support.apple.com/kb/HT1222
2013-05-22/a>
Adrien de Beaupre
Chrome 24.0.1312.52 has been updated for Windows, Mac, Linux, and Chrome Frame
2013-04-19/a>
Russ McRee
Java 8 release schedule delayed for renewed focus on security
2013-04-03/a>
Mark Hofman
Firefox 20 and Thunderbird 17.0.5 updates
2013-03-07/a>
Guy Bruneau
Wireshark Security Updates
2013-02-27/a>
Adam Swanger
Adobe Flash Player Security Update - http://www.adobe.com/support/security/bulletins/apsb13-08.html
2013-02-22/a>
Chris Mohan
PHP 5.4.12 and PHP 5.3.22 released http://www.php.net/ChangeLog-5.php
2013-02-22/a>
Chris Mohan
Chrome 25.0.1364.87 addresses multiple vulnerabilities http://googlechromereleases.blogspot.com.au/2013/02/stable-channel-update_21.html
2013-02-12/a>
Adam Swanger
Microsoft February 2013 Black Tuesday Update - Overview
2013-02-01/a>
Jim Clausing
Oracle quitely releases Java 7u13 early
2013-01-17/a>
Russ McRee
PHP 5.4.11 and PHP 5.3.21 released
2013-01-09/a>
Rob VandenBrink
Security Updates for Adobe Flash - http://www.adobe.com/support/security/bulletins/apsb13-01.html
2013-01-09/a>
Johannes Ullrich
New Format for Monthly Threat Update
2013-01-09/a>
Rob VandenBrink
SQL Injection Flaw in Ruby on Rails
2013-01-09/a>
Rob VandenBrink
Firefox and Thunderbird Updates
2013-01-08/a>
Richard Porter
Firefox 18 Released, Security Fixes http://www.mozilla.org/security/known-vulnerabilities/firefox.html
2012-12-11/a>
John Bambenek
Microsoft December 2012 Black Tuesday Update - Overview
2012-11-13/a>
Jim Clausing
Microsoft November 2012 Black Tuesday Update - Overview
2012-10-28/a>
Tony Carothers
Firefox 16.02 Released
2012-09-21/a>
Guy Bruneau
Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 (2755801)
2012-09-20/a>
Russ McRee
Apple and Cisco Security Advisories 19 SEP 2012
2012-08-22/a>
Adrien de Beaupre
Apple Remote Desktop update fixes no encryption issue
2012-08-21/a>
Adrien de Beaupre
YYABCAFU - Yes Yet Another Bleeping Critical Adobe Flash Update
2012-08-15/a>
Guy Bruneau
Wireshark Security Update
2012-08-02/a>
Guy Bruneau
Opera Security Update
2012-07-18/a>
Rob VandenBrink
Snort Updated today
2012-06-25/a>
Guy Bruneau
Issues with Windows Update Agent
2012-06-20/a>
Raul Siles
Firefox 13.0.1 Update
2012-06-06/a>
Jim Clausing
Firefox, Thunderbird, and Seamonkey Security Updates
2012-05-04/a>
Guy Bruneau
Adobe Security Flash Update
2012-03-06/a>
Mark Hofman
Websense posted a small article relating to mass injection into wordpress sites (thanks Chris) More info Here --> http://community.websense.com/blogs/securitylabs/archive/2012/03/05/mass-injection-of-wordpress-sites.aspx
2012-02-04/a>
Scott Fendley
Apple Security Advisory 2012-001 v1.1
2011-11-02/a>
Russ McRee
Wireshark updates: 1.6.3 and 1.4.10 released
2011-10-22/a>
Guy Bruneau
Oracle Java SE Critical Patch Update
2011-10-01/a>
Mark Hofman
Hot on the heels fo FF, Thunderbird v 7.0.1 and SeaMonkey v 2.4.1 have been updated.
2011-09-18/a>
Guy Bruneau
Google Chrome Security Updates
2011-09-06/a>
Guy Bruneau
Firefox 6.0.2 released to removed trust to DigiNotar certificate authority http://www.mozilla.org/en-US/firefox/6.0.2/releasenotes/
2011-09-05/a>
Raul Siles
Java 7 Officially Released
2011-07-15/a>
Deborah Hale
Apple Software Updates
2011-06-28/a>
Johannes Ullrich
Update: Thunderbird 5.0 released. https://www.mozilla.org/en-US/thunderbird/
2011-06-23/a>
Jim Clausing
Apple Security Updates 2011-004
2011-06-09/a>
Richard Porter
Chrome Version 12.0.742.91 Released
2011-06-01/a>
Adrien de Beaupre
Wireshark 1.4.7 and 1.2.17 Released - http://www.wireshark.org/news/20110531.html
2011-05-20/a>
Guy Bruneau
Sysinternals Updates, Analyzing Stuxnet Infection with Sysinternals Tools Part 3
2011-05-16/a>
Jason Lam
Firefox 3.5 forced upgrade coming soon
2011-05-04/a>
Richard Porter
Microsoft Sysinterals Update
2011-05-01/a>
Deborah Hale
Java 6.25 Is Now Available
2011-04-14/a>
Adrien de Beaupre
Sysinternals updates, a new blog post, and webcast
2011-03-21/a>
Kevin Shortt
APPLE-SA-2011-03-21-1 Mac OS X v10.6.7 and Security Update 2011-001
2011-03-09/a>
Chris Mohan
Possible Issue with Forefront Update KB2508823
2011-03-02/a>
Chris Mohan
Microsoft’s Autorun update v2.1 now automatically deployed from Windows Update
2011-02-21/a>
Adrien de Beaupre
Kaspersky update servers unreachable
2011-01-27/a>
Chris Carboni
Opera Updates
2010-12-03/a>
Mark Hofman
AVG Update Bricking windows 7 64 bit
2010-11-30/a>
Joel Esler
VMWare Security Advisory
2010-11-16/a>
Guy Bruneau
Mac OS X Server v10.6.5 (10H575) Security Update: http://support.apple.com/kb/HT4452
2010-08-25/a>
Pedro Bueno
Adobe released security update for Shockwave player that fix several CVEs: APSB1020
2010-08-19/a>
Rob VandenBrink
Don points us to multiple Adobe updates (Reader and Acrobat 9.3.4 among them) ==> http://www.adobe.com/support/downloads/new.jsp
2010-08-10/a>
Jason Lam
Adobe critical security updates
2010-08-10/a>
Daniel Wesemann
New Apple security updates for iPad/Pod/Phone. See http://support.apple.com/kb/ht1222
2010-07-21/a>
Adrien de Beaupre
Update on .LNK vulnerability
2010-06-29/a>
donald smith
Adobe Reader 9.3.3/8.2.3 addressing CVE-2010-1297
2010-05-12/a>
Rob VandenBrink
Adobe Shockwave Update
2010-04-13/a>
Adrien de Beaupre
Security update available for Adobe Reader and Acrobat
2010-04-02/a>
Guy Bruneau
Foxit Reader Security Update
2010-03-29/a>
Adrien de Beaupre
APPLE-SA-2010-03-29-1 Security Update 2010-002 / Mac OS X v10.6.3
2010-03-29/a>
Adrien de Beaupre
OOB Update for Internet Explorer MS10-018
2010-03-22/a>
Guy Bruneau
New Opera 10.51 available with security fixes. More information available at: http://www.opera.com/docs/changelogs/windows/1051/
2010-03-12/a>
Mark Hofman
Firefox 3.6 is being pushed out to users. http://www.mozilla.com/en-US/firefox/3.6/releasenotes/
2010-03-11/a>
Mark Hofman
A new version of Safari is out. Looks like for Mac and Windows. Plenty of security fixes (mostly for Windows Safari users http://support.apple.com/kb/HT4070 )
2010-03-10/a>
Rob VandenBrink
Microsoft re-release of KB973811 - attacks on Extended Protection for Authentication
2010-03-08/a>
Raul Siles
Microsoft announced two important bulletins (fixing multiple vulns. affecting Windows and Office) for tomorrow: http://www.microsoft.com/technet/security/Bulletin/MS10-mar.mspx
2010-03-01/a>
Mark Hofman
Microsoft will drop support for Vista (without any Service Packs) on April 13 and support for XP SP2 ends July 13. (i.e. no more security updates). If you are still running these, it it time to update.
2010-02-27/a>
Guy Bruneau
PHP 5.2.13 Security Update
2010-02-11/a>
Deborah Hale
The Mysterious Blue Screen
2010-01-06/a>
Guy Bruneau
Firefox security and stability update for version 3.5.7 and 3.0.17 available for download
2009-12-16/a>
Rob VandenBrink
Seamonkey Update to 2.0.1, find the release notes here ==> http://www.seamonkey-project.org/releases/seamonkey2.0.1
2009-12-03/a>
Mark Hofman
Apple released some Java updates today APPLE-SA-2009-12-03-1 & 2 (for 10.5 and 10.6). Fixes a number of security issues so updating is a good idea.
2009-12-02/a>
Rob VandenBrink
Microsoft Black Screen of Death - Fact of Fiction?
2009-11-25/a>
Jim Clausing
Tool updates
2009-11-25/a>
Jim Clausing
Microsoft Updates requiring reboot
2009-11-11/a>
Rob VandenBrink
Apple Safari 4.0.4 Released
2009-11-09/a>
Guy Bruneau
Apple Security Update 2009-006 for Mac OS X v10.6.2
2009-11-06/a>
Mark Hofman
A new version of Firefox (3.5.5) just became available. According to the release notes they are stability improvements.
2009-10-22/a>
Adrien de Beaupre
Sysinternals updates: Disk2vhd v1.1, ZoomIt v4.1, Coreinfo v2.0, VMMap v2.4
2009-09-24/a>
Jim Clausing
A couple more tools
2009-09-04/a>
Adrien de Beaupre
SeaMonkey Security Update
2009-08-05/a>
donald smith
Security Update 2009-003 / Mac OS X v10.5.8
2009-08-04/a>
donald smith
Java Security Update
2009-07-18/a>
Patrick Nolan
Chrome update contains Security fixes
2009-06-10/a>
Swa Frantzen
Java 6 update 14 released
2009-06-02/a>
Deborah Hale
Another Quicktime Update
2009-05-26/a>
Jason Lam
Vista & Win2K8 SP2 available
2009-02-10/a>
Swa Frantzen
Java up to date ?
2008-11-29/a>
Pedro Bueno
Ubuntu users: Time to update!
2008-11-13/a>
Jim Clausing
Some recently updated tools
2008-10-10/a>
Marcus Sachs
Fake Microsoft Update Email
2008-09-10/a>
Adrien de Beaupre
Apple updates iPod Touch + Bonjour for Windows
2008-07-11/a>
Jim Clausing
Updates to some of our favorite tools
2008-04-20/a>
Joel Esler
Software Update -- Did Apple Do Enough?
2008-03-20/a>
Joel Esler
APPLE-SA-2008-03-19 AirPort Extreme Base Station Firmware 7.3.1
2008-03-20/a>
Joel Esler
Potential Vulnerability in Flash CS3 Professional, Flash Professional 8 and Flash Basic 8?
ON
2024-11-22/a>
Xavier Mertens
An Infostealer Searching for « BIP-0039 » Data
2024-11-19/a>
Xavier Mertens
Detecting the Presence of a Debugger in Linux
2024-11-07/a>
Xavier Mertens
Steam Account Checker Poisoned with Infostealer
2024-11-06/a>
Jesse La Grew
[Guest Diary] Insights from August Web Traffic Surge
2024-11-05/a>
Xavier Mertens
Python RAT with a Nice Screensharing Feature
2024-10-31/a>
Guy Bruneau
October 2024 Activity with Username chenzilong
2024-10-07/a>
Xavier Mertens
macOS Sequoia: System/Network Admins, Hold On!
2024-09-25/a>
Johannes Ullrich
DNS Reflection Update and Odd Corrupted DNS Requests
2024-09-18/a>
Xavier Mertens
Python Infostealer Patching Windows Exodus App
2024-09-17/a>
Xavier Mertens
23:59, Time to Exfiltrate!
2024-09-16/a>
Xavier Mertens
Managing PE Files With Overlays
2024-09-13/a>
Jesse La Grew
Finding Honeypot Data Clusters Using DBSCAN: Part 2
2024-09-11/a>
Xavier Mertens
Python Libraries Used for Malicious Purposes
2024-09-06/a>
Jesse La Grew
Enrichment Data: Keeping it Fresh
2024-08-30/a>
Jesse La Grew
Simulating Traffic With Scapy
2024-08-29/a>
Xavier Mertens
Live Patching DLLs with Python
2024-08-27/a>
Xavier Mertens
Why Is Python so Popular to Infect Windows Hosts?
2024-08-26/a>
Xavier Mertens
From Highly Obfuscated Batch File to XWorm and Redline
2024-08-23/a>
Jesse La Grew
Pandas Errors: What encoding are my logs in?
2024-08-19/a>
Xavier Mertens
Do you Like Donuts? Here is a Donut Shellcode Delivered Through PowerShell/Python
2024-08-16/a>
Jesse La Grew
[Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools
2024-07-26/a>
Xavier Mertens
ExelaStealer Delivered "From Russia With Love"
2024-07-25/a>
Xavier Mertens
XWorm Hidden With Process Hollowing
2024-07-24/a>
Xavier Mertens
"Mouse Logger" Malicious Python Script
2024-07-10/a>
Jesse La Grew
Finding Honeypot Data Clusters Using DBSCAN: Part 1
2024-07-08/a>
Xavier Mertens
Kunai: Keep an Eye on your Linux Hosts Activity
2024-07-01/a>
Johannes Ullrich
SSH "regreSSHion" Remote Code Execution Vulnerability in OpenSSH.
2024-06-15/a>
Didier Stevens
Overview of My Tools That Handle JSON Data
2024-06-13/a>
Guy Bruneau
The Art of JQ and Command-line Fu [Guest Diary]
2024-06-06/a>
Xavier Mertens
Malicious Python Script with a "Best Before" Date
2024-05-31/a>
Xavier Mertens
"K1w1" InfoStealer Uses gofile.io for Exfiltration
2024-05-30/a>
Xavier Mertens
Feeding MISP with OSSEC
2024-04-29/a>
Johannes Ullrich
D-Link NAS Device Backdoor Abused
2024-04-25/a>
Jesse La Grew
Does it matter if iptables isn't running on my honeypot?
2024-04-22/a>
Jan Kopriva
It appears that the number of industrial devices accessible from the internet has risen by 30 thousand over the past three years
2024-04-17/a>
Xavier Mertens
Malicious PDF File Used As Delivery Mechanism
2024-04-17/a>
Rob VandenBrink
The CVE's They are A-Changing!
2024-03-28/a>
Xavier Mertens
From JavaScript to AsyncRAT
2024-03-13/a>
Xavier Mertens
Using ChatGPT to Deobfuscate Malicious Scripts
2024-03-10/a>
Guy Bruneau
What happens when you accidentally leak your AWS API keys? [Guest Diary]
2024-03-07/a>
Jesse La Grew
[Guest Diary] AWS Deployment Risks - Configuration and Credential File Targeting
2024-03-03/a>
Guy Bruneau
Capturing DShield Packets with a LAN Tap [Guest Diary]
2024-02-28/a>
Johannes Ullrich
Exploit Attempts for Unknown Password Reset Vulnerability
2024-02-25/a>
Guy Bruneau
Utilizing the VirusTotal API to Query Files Uploaded to DShield Honeypot [Guest Diary]
2024-02-20/a>
Xavier Mertens
Python InfoStealer With Dynamic Sandbox Detection
2024-02-18/a>
Guy Bruneau
Mirai-Mirai On The Wall... [Guest Diary]
2024-02-15/a>
Jesse La Grew
[Guest Diary] Learning by doing: Iterative adventures in troubleshooting
2024-02-09/a>
Xavier Mertens
MSIX With Heavily Obfuscated PowerShell Script
2024-02-08/a>
Xavier Mertens
A Python MP3 Player with Builtin Keylogger Capability
2024-02-03/a>
Guy Bruneau
DShield Sensor Log Collection with Elasticsearch
2024-01-30/a>
Johannes Ullrich
What did I say to make you stop talking to me?
2024-01-29/a>
Johannes Ullrich
Exploit Flare Up Against Older Altassian Confluence Vulnerability
2024-01-26/a>
Xavier Mertens
A Batch File With Multiple Payloads
2024-01-25/a>
Xavier Mertens
Facebook AdsManager Targeted by a Python Infostealer
2024-01-19/a>
Xavier Mertens
macOS Python Script Replacing Wallet Applications with Rogue Apps
2024-01-17/a>
Jesse La Grew
Number Usage in Passwords
2024-01-12/a>
Xavier Mertens
One File, Two Payloads
2024-01-08/a>
Jesse La Grew
What is that User Agent?
2024-01-02/a>
Johannes Ullrich
Fingerprinting SSH Identification Strings
2023-12-27/a>
Guy Bruneau
Unveiling the Mirai: Insights into Recent DShield Honeypot Activity [Guest Diary]
2023-12-23/a>
Xavier Mertens
Python Keylogger Using Mailtrap.io
2023-12-22/a>
Xavier Mertens
Shall We Play a Game?
2023-12-20/a>
Guy Bruneau
How to Protect your Webserver from Directory Enumeration Attack ? Apache2 [Guest Diary]
2023-12-16/a>
Xavier Mertens
An Example of RocketMQ Exploit Scanner
2023-12-13/a>
Guy Bruneau
T-shooting Terraform for DShield Honeypot in Azure [Guest Diary]
2023-12-10/a>
Guy Bruneau
Honeypots: From the Skeptical Beginner to the Tactical Enthusiast
2023-11-30/a>
John Bambenek
Prophetic Post by Intern on CVE-2023-1389 Foreshadows Mirai Botnet Expansion Today
2023-11-27/a>
Guy Bruneau
Decoding the Patterns: Analyzing DShield Honeypot Activity [Guest Diary]
2023-11-22/a>
Guy Bruneau
CVE-2023-1389: A New Means to Expand Botnets
2023-11-20/a>
Jesse La Grew
Overflowing Web Honeypot Logs
2023-11-09/a>
Xavier Mertens
Visual Examples of Code Injection
2023-10-31/a>
Xavier Mertens
Multiple Layers of Anti-Sandboxing Techniques
2023-10-29/a>
Guy Bruneau
Spam or Phishing? Looking for Credentials & Passwords
2023-10-15/a>
Guy Bruneau
Domain Name Used as Password Captured by DShield Sensor
2023-10-03/a>
Tom Webb
Are Local LLMs Useful in Incident Response?
2023-09-30/a>
Xavier Mertens
Simple Netcat Backdoor in Python Script
2023-09-26/a>
Johannes Ullrich
Apple Releases MacOS Sonoma Including Numerous Security Patches
2023-09-14/a>
Jesse La Grew
DShield and qemu Sitting in a Tree: L-O-G-G-I-N-G
2023-09-09/a>
Guy Bruneau
?Anyone get the ASN of the Truck that Hit Me?!?: Creating a PowerShell Function to Make 3rd Party API Calls for Extending Honeypot Information [Guest Diary]
2023-09-05/a>
Jesse La Grew
Common usernames submitted to honeypots
2023-09-02/a>
Jesse La Grew
What is the origin of passwords submitted to honeypots?
2023-08-31/a>
Guy Bruneau
Potential Weaponizing of Honeypot Logs [Guest Diary]
2023-08-25/a>
Xavier Mertens
Python Malware Using Postgresql for C2 Communications
2023-08-23/a>
Xavier Mertens
More Exotic Excel Files Dropping AgentTesla
2023-08-23/a>
Guy Bruneau
How I made a qwerty ?keyboard walk? password generator with ChatGPT [Guest Diary]
2023-08-22/a>
Xavier Mertens
Have You Ever Heard of the Fernet Encryption Algorithm?
2023-08-21/a>
Xavier Mertens
Quick Malware Triage With Inotify Tools
2023-08-17/a>
Jesse La Grew
Command Line Parsing - Are These Really Unique Strings?
2023-08-12/a>
Guy Bruneau
DShield Sensor Monitoring with a Docker ELK Stack [Guest Diary]
2023-08-11/a>
Xavier Mertens
Show me All Your Windows!
2023-07-28/a>
Xavier Mertens
ShellCode Hidden with Steganography
2023-07-26/a>
Xavier Mertens
Suspicious IP Addresses Avoided by Malware Samples
2023-07-23/a>
Guy Bruneau
Install & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-07-13/a>
Jesse La Grew
DShield Honeypot Maintenance and Data Retention
2023-07-06/a>
Jesse La Grew
IDS Comparisons with DShield Honeypot Data
2023-07-01/a>
Russ McRee
Sandfly Security
2023-06-27/a>
Xavier Mertens
The Importance of Malware Triage
2023-06-20/a>
Xavier Mertens
Malicious Code Can Be Anywhere
2023-06-16/a>
Xavier Mertens
Another RAT Delivered Through VBS
2023-06-11/a>
Guy Bruneau
DShield Honeypot Activity for May 2023
2023-06-09/a>
Xavier Mertens
Undetected PowerShell Backdoor Disguised as a Profile File
2023-05-28/a>
Guy Bruneau
We Can no Longer Ignore the Cost of Cybersecurity
2023-05-20/a>
Xavier Mertens
Phishing Kit Collecting Victim's IP Address
2023-05-17/a>
Xavier Mertens
Increase in Malicious RAR SFX files
2023-05-14/a>
Guy Bruneau
VMware Aria Operations addresses multiple Local Privilege Escalations and a Deserialization issue
2023-05-14/a>
Guy Bruneau
DShield Sensor Update
2023-05-09/a>
Russ McRee
Exploratory Data Analysis with CISSM Cyber Attacks Database - Part 2
2023-05-03/a>
Xavier Mertens
Increased Number of Configuration File Scans
2023-04-28/a>
Xavier Mertens
Quick IOC Scan With Docker
2023-04-17/a>
Jan Kopriva
The strange case of Great honeypot of China
2023-04-08/a>
Xavier Mertens
Microsoft Netlogon: Potential Upcoming Impacts of CVE-2022-38023
2023-04-05/a>
Jesse La Grew
Exploration of DShield Cowrie Data with jq
2023-03-31/a>
Jan Kopriva
Use of X-Frame-Options and CSP frame-ancestors security headers on 1 million most popular domains
2023-03-30/a>
Xavier Mertens
Bypassing PowerShell Strong Obfuscation
2023-03-29/a>
Didier Stevens
Extracting Multiple Streams From OLE Files
2023-03-28/a>
Jesse La Grew
Network Data Collector Placement Makes a Difference
2023-03-21/a>
Didier Stevens
String Obfuscation: Character Pair Reversal
2023-03-18/a>
Xavier Mertens
Old Backdoor, New Obfuscation
2023-03-11/a>
Xavier Mertens
Overview of a Mirai Payload Generator
2023-03-02/a>
Didier Stevens
YARA: Detect The Unexpected ...
2023-03-01/a>
Xavier Mertens
Python Infostealer Targeting Gamers
2023-02-22/a>
Johannes Ullrich
Internet Wide Scan Fingerprinting Confluence Servers
2023-02-15/a>
Rob VandenBrink
DNS Recon Redux - Zone Transfers (plus a time machine) for When You Can't do a Zone Transfer
2023-02-10/a>
Xavier Mertens
Obfuscated Deactivation of Script Block Logging
2023-02-09/a>
Xavier Mertens
A Backdoor with Smart Screenshot Capability
2023-02-05/a>
Didier Stevens
Video: Analyzing Malicious OneNote Documents
2023-02-04/a>
Guy Bruneau
Assemblyline as a Malware Analysis Sandbox
2023-02-01/a>
Didier Stevens
Detecting (Malicious) OneNote Files
2023-01-31/a>
Jesse La Grew
DShield Honeypot Setup with pfSense
2023-01-26/a>
Tom Webb
Live Linux IR with UAC
2023-01-25/a>
Xavier Mertens
A First Malicious OneNote Document
2023-01-23/a>
Xavier Mertens
Who's Resolving This Domain?
2023-01-21/a>
Guy Bruneau
DShield Sensor JSON Log to Elasticsearch
2023-01-08/a>
Guy Bruneau
DShield Sensor JSON Log Analysis
2022-12-29/a>
Jesse La Grew
Opening the Door for a Knock: Creating a Custom DShield Listener
2022-12-28/a>
Rob VandenBrink
Playing with Powershell and JSON (and Amazon and Firewalls)
2022-12-21/a>
Guy Bruneau
DShield Sensor Setup in Azure
2022-12-20/a>
Xavier Mertens
Linux File System Monitoring & Actions
2022-12-19/a>
Xavier Mertens
Hunting for Mastodon Servers
2022-12-03/a>
Guy Bruneau
Linux LOLBins Applications Available in Windows
2022-11-14/a>
Jesse La Grew
Extracting 'HTTP CONNECT' Requests with Python
2022-11-05/a>
Guy Bruneau
Windows Malware with VHD Extension
2022-11-04/a>
Xavier Mertens
Remcos Downloader with Unicode Obfuscation
2022-10-24/a>
Xavier Mertens
C2 Communications Through outlook.com
2022-10-22/a>
Didier Stevens
rtfdump's Find Option
2022-10-19/a>
Xavier Mertens
Are Internet Scanning Services Good or Bad for You?
2022-10-18/a>
Xavier Mertens
Python Obfuscation for Dummies
2022-10-08/a>
Didier Stevens
Sysmon v14.1 Release
2022-09-26/a>
Xavier Mertens
Easy Python Sandbox Detection
2022-09-14/a>
Xavier Mertens
Easy Process Injection within Python
2022-09-12/a>
Johannes Ullrich
VirusTotal Result Comparisons for Honeypot Malware
2022-09-07/a>
Johannes Ullrich
PHP Deserialization Exploit attempt
2022-08-28/a>
Didier Stevens
Sysinternals Updates: Sysmon v14.0 and ZoomIt v6.01
2022-08-26/a>
Xavier Mertens
Paypal Phishing/Coinbase in One Image
2022-08-24/a>
Brad Duncan
Monster Libra (TA551/Shathak) --> IcedID (Bokbot) --> Cobalt Strike & DarkVNC
2022-08-19/a>
Johannes Ullrich
Windows Security Blocks UPX Compressed (packed) Binaries
2022-08-18/a>
Johannes Ullrich
Honeypot Attack Summaries with Python
2022-08-08/a>
Johannes Ullrich
JSON All the Logs!
2022-07-28/a>
Johannes Ullrich
Exfiltrating Data With Bookmarks
2022-07-20/a>
Xavier Mertens
Malicious Python Script Behaving Like a Rubber Ducky
2022-07-19/a>
Johannes Ullrich
Requests For beacon.http-get. Help Us Figure Out What They Are Looking For
2022-06-24/a>
Xavier Mertens
Python (ab)using The Windows GUI
2022-06-22/a>
Xavier Mertens
Malicious PowerShell Targeting Cryptocurrency Browser Extensions
2022-06-19/a>
Didier Stevens
Video: Decoding Obfuscated BASE64 Statistically
2022-06-18/a>
Didier Stevens
Decoding Obfuscated BASE64 Statistically
2022-06-16/a>
Xavier Mertens
Houdini is Back Delivered Through a JavaScript Dropper
2022-06-15/a>
Johannes Ullrich
Terraforming Honeypots. Installing DShield Sensors in the Cloud
2022-06-03/a>
Xavier Mertens
Sandbox Evasion... With Just a Filename!
2022-06-02/a>
Johannes Ullrich
Quick Answers in Incident Response: RECmd.exe
2022-06-01/a>
Jan Kopriva
HTML phishing attachments - now with anti-analysis features
2022-05-30/a>
Xavier Mertens
New Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme (CVE-2022-30190)
2022-05-24/a>
Yee Ching Tok
ctx Python Library Updated with "Extra" Features
2022-05-03/a>
Johannes Ullrich
Some Honeypot Updates
2022-05-03/a>
Rob VandenBrink
Finding the Real "Last Patched" Day (Interim Version)
2022-04-29/a>
Rob VandenBrink
Using Passive DNS sources for Reconnaissance and Enumeration
2022-04-21/a>
Xavier Mertens
Multi-Cryptocurrency Clipboard Swapper
2022-04-19/a>
Johannes Ullrich
Resetting Linux Passwords with U-Boot Bootloaders
2022-04-03/a>
Didier Stevens
jo
2022-04-02/a>
Didier Stevens
curl 7.82.0 Adds --json Option
2022-03-31/a>
Johannes Ullrich
Spring Vulnerability Update - Exploitation Attempts CVE-2022-22965
2022-03-29/a>
Johannes Ullrich
More Fake/Typosquatting Twitter Accounts Asking for Ukraine Crytocurrency Donations
2022-03-23/a>
Brad Duncan
Arkei Variants: From Vidar to Mars Stealer
2022-03-13/a>
Didier Stevens
YARA 4.2.0 Released
2022-03-09/a>
Xavier Mertens
Infostealer in a Batch File
2022-03-04/a>
Johannes Ullrich
Scam E-Mail Impersonating Red Cross
2022-02-22/a>
Xavier Mertens
A Good Old Equation Editor Vulnerability Delivering Malware
2022-02-20/a>
Didier Stevens
Video: YARA's Console Module
2022-02-10/a>
Johannes Ullrich
Zyxel Network Storage Devices Hunted By Mirai Variant
2022-02-03/a>
Johannes Ullrich
Keeping Track of Your Attack Surface for Cheap
2022-02-01/a>
Xavier Mertens
Automation is Nice But Don't Replace Your Knowledge
2022-01-31/a>
Xavier Mertens
Be careful with RPMSG files
2022-01-30/a>
Didier Stevens
YARA's Console Module
2022-01-20/a>
Xavier Mertens
RedLine Stealer Delivered Through FTP
2022-01-07/a>
Xavier Mertens
Custom Python RAT Builder
2022-01-06/a>
Xavier Mertens
Malicious Python Script Targeting Chinese People
2022-01-01/a>
Didier Stevens
Expect Regressions
2021-12-28/a>
Russ McRee
LotL Classifier tests for shells, exfil, and miners
2021-12-21/a>
Xavier Mertens
More Undetected PowerShell Dropper
2021-12-18/a>
Guy Bruneau
VMware Security Update - https://www.vmware.com/security/advisories/VMSA-2021-0030.html
2021-12-16/a>
Brad Duncan
How the "Contact Forms" campaign tricks people
2021-12-14/a>
Johannes Ullrich
Log4j: Getting ready for the long haul (CVE-2021-44228)
2021-12-10/a>
Xavier Mertens
Python Shellcode Injection From JSON Data
2021-12-06/a>
Xavier Mertens
The Importance of Out-of-Band Networks
2021-12-01/a>
Xavier Mertens
Info-Stealer Using webhook.site to Exfiltrate Data
2021-11-20/a>
Guy Bruneau
Hikvision Security Cameras Potentially Exposed to Remote Code Execution
2021-11-18/a>
Xavier Mertens
JavaScript Downloader Delivers Agent Tesla Trojan
2021-11-14/a>
Didier Stevens
Video: Obfuscated Maldoc: Reversed BASE64
2021-11-10/a>
Xavier Mertens
Shadow IT Makes People More Vulnerable to Phishing
2021-11-08/a>
Xavier Mertens
(Ab)Using Security Tools & Controls for the Bad
2021-10-18/a>
Xavier Mertens
Malicious PowerShell Using Client Certificate Authentication
2021-09-24/a>
Xavier Mertens
Keep an Eye on Your Users Mobile Devices (Simple Inventory)
2021-09-22/a>
Didier Stevens
An XML-Obfuscated Office Document (CVE-2021-40444)
2021-09-17/a>
Xavier Mertens
Malicious Calendar Subscriptions Are Back?
2021-09-15/a>
Brad Duncan
Hancitor campaign abusing Microsoft's OneDrive
2021-08-30/a>
Xavier Mertens
Cryptocurrency Clipboard Swapper Delivered With Love
2021-08-29/a>
Guy Bruneau
Filter JSON Data by Value with Linux jq
2021-08-19/a>
Johannes Ullrich
When Lightning Strikes. What works and doesn't work.
2021-08-17/a>
Johannes Ullrich
Laravel (<=v8.4.2) exploit attempts for CVE-2021-3129 (debug mode: Remote code execution)
2021-08-13/a>
Guy Bruneau
Scanning for Microsoft Exchange eDiscovery
2021-07-31/a>
Guy Bruneau
Unsolicited DNS Queries
2021-07-28/a>
Jan Kopriva
A sextortion e-mail from...IT support?!
2021-07-20/a>
Bojan Zdrnja
Summer of SAM - incorrect permissions on Windows 10/11 hives
2021-07-16/a>
Xavier Mertens
Multiple BaseXX Obfuscations
2021-07-14/a>
Jan Kopriva
One way to fail at malspam - give recipients the wrong password for an encrypted attachment
2021-07-08/a>
Xavier Mertens
Using Sudo with Python For More Security Controls
2021-07-06/a>
Xavier Mertens
Python DLL Injection Check
2021-07-04/a>
Didier Stevens
DIY CD/DVD Destruction - Follow Up
2021-07-02/a>
Xavier Mertens
"inception.py"... Multiple Base64 Encodings
2021-06-27/a>
Didier Stevens
DIY CD/DVD Destruction
2021-06-24/a>
Xavier Mertens
Do you Like Cookies? Some are for sale!
2021-06-21/a>
Rick Wanner
Mitre CWE - Common Weakness Enumeration
2021-06-15/a>
Johannes Ullrich
Multi Perimeter Device Exploit Mirai Version Hunting For Sonicwall, DLink, Cisco and more
2021-06-12/a>
Guy Bruneau
Fortinet Targeted for Unpatched SSL VPN Discovery Activity
2021-06-11/a>
Xavier Mertens
Keeping an Eye on Dangerous Python Modules
2021-06-11/a>
Xavier Mertens
Sonicwall SRA 4600 Targeted By an Old Vulnerability
2021-06-07/a>
Johannes Ullrich
Amazon Sidewalk: Cutting Through the Hype
2021-06-04/a>
Xavier Mertens
Russian Dolls VBS Obfuscation
2021-05-31/a>
Rick Wanner
Quick and dirty Python: nmap
2021-05-30/a>
Didier Stevens
Sysinternals: Procmon, Sysmon, TcpView and Process Explorer update
2021-05-23/a>
Didier Stevens
Video: Making Sense Of Encrypted Cobalt Strike Traffic
2021-05-12/a>
Jan Kopriva
Number of industrial control systems on the internet is lower then in 2020...but still far from zero
2021-05-10/a>
Johannes Ullrich
Correctly Validating IP Addresses: Why encoding matters for input validation.
2021-05-08/a>
Guy Bruneau
Who is Probing the Internet for Research Purposes?
2021-05-04/a>
Rick Wanner
Quick and dirty Python: masscan
2021-04-29/a>
Xavier Mertens
From Python to .Net
2021-04-25/a>
Didier Stevens
Sysinternals: Procmon and Sysmon update
2021-04-22/a>
Xavier Mertens
How Safe Are Your Docker Images?
2021-04-19/a>
Jan Kopriva
Hunting phishing websites with favicon hashes
2021-04-18/a>
Didier Stevens
Decoding Cobalt Strike Traffic
2021-04-12/a>
Didier Stevens
Example of Cleartext Cobalt Strike Traffic (Thanks Brad)
2021-04-09/a>
Xavier Mertens
No Python Interpreter? This Simple RAT Installs Its Own Copy
2021-04-02/a>
Xavier Mertens
C2 Activity: Sandboxes or Real Victims?
2021-03-31/a>
Xavier Mertens
Quick Analysis of a Modular InfoStealer
2021-03-18/a>
Xavier Mertens
Simple Python Keylogger
2021-03-10/a>
Rob VandenBrink
SharpRDP - PSExec without PSExec, PSRemoting without PowerShell
2021-03-07/a>
Didier Stevens
PCAPs and Beacons
2021-03-02/a>
Russ McRee
Adversary Simulation with Sim
2021-02-28/a>
Didier Stevens
Maldocs: Protection Passwords
2021-02-26/a>
Guy Bruneau
Pretending to be an Outlook Version Update
2021-02-22/a>
Didier Stevens
Unprotecting Malicious Documents For Inspection
2021-02-13/a>
Guy Bruneau
vSphere Replication updates address a command injection vulnerability (CVE-2021-21976) - https://www.vmware.com/security/advisories/VMSA-2021-0001.html
2021-02-04/a>
Bojan Zdrnja
Abusing Google Chrome extension syncing for data exfiltration and C&C
2021-02-01/a>
Rob VandenBrink
Taking a Shot at Reverse Shell Attacks, CNC Phone Home and Data Exfil from Servers
2021-01-22/a>
Xavier Mertens
Another File Extension to Block in your MTA: .jnlp
2021-01-19/a>
Russ McRee
Gordon for fast cyber reputation checks
2021-01-18/a>
Didier Stevens
Doc & RTF Malicious Document
2021-01-17/a>
Didier Stevens
New Release of Sysmon Adding Detection for Process Tampering
2021-01-15/a>
Guy Bruneau
Obfuscated DNS Queries
2021-01-04/a>
Jan Kopriva
From a small BAT file to Mass Logger infostealer
2021-01-02/a>
Guy Bruneau
Protecting Home Office and Enterprise in 2021
2020-12-29/a>
Jan Kopriva
Want to know what's in a folder you don't have a permission to access? Try asking your AV solution...
2020-12-22/a>
Xavier Mertens
Malware Victim Selection Through WiFi Identification
2020-12-19/a>
Guy Bruneau
Secure Communication using TLS in Elasticsearch
2020-12-17/a>
Daniel Wesemann
"Amazon" invoice that asks to call 1-866-335-0659 "to cancel" an order that you never made is (obviously) a #scam
2020-12-13/a>
Didier Stevens
KringleCon 2020
2020-12-10/a>
Xavier Mertens
Python Backdoor Talking to a C2 Through Ngrok
2020-12-04/a>
Guy Bruneau
Detecting Actors Activity with Threat Intel
2020-11-30/a>
Didier Stevens
Decrypting PowerShell Payloads (video)
2020-11-22/a>
Didier Stevens
Quick Tip: Extracting all VBA Code from a Maldoc - JSON Format
2020-11-21/a>
Guy Bruneau
VMware privilege escalation vulnerabilities (CVE-2020-4004, CVE-2020-4005) - https://www.vmware.com/security/advisories/VMSA-2020-0026.html
2020-11-20/a>
Xavier Mertens
Malicious Python Code and LittleSnitch Detection
2020-11-19/a>
Xavier Mertens
PowerShell Dropper Delivering Formbook
2020-11-13/a>
Xavier Mertens
Old Worm But New Obfuscation Technique
2020-11-09/a>
Xavier Mertens
How Attackers Brush Up Their Malicious Scripts
2020-11-07/a>
Guy Bruneau
Cryptojacking Targeting WebLogic TCP/7001
2020-11-05/a>
Xavier Mertens
Did You Spot "Invoke-Expression"?
2020-10-24/a>
Guy Bruneau
An Alternative to Shodan, Censys with User-Agent CensysInspect/1.1
2020-10-20/a>
Xavier Mertens
Mirai-alike Python Scanner
2020-10-14/a>
Xavier Mertens
Nicely Obfuscated Python RAT
2020-09-30/a>
Johannes Ullrich
Scans for FPURL.xml: Reconnaissance or Not?
2020-09-29/a>
Xavier Mertens
Managing Remote Access for Partners & Contractors
2020-09-24/a>
Xavier Mertens
Party in Ibiza with PowerShell
2020-09-20/a>
Guy Bruneau
Analysis of a Salesforce Phishing Emails
2020-09-18/a>
Xavier Mertens
A Mix of Python & VBA in a Malicious Word Document
2020-09-17/a>
Xavier Mertens
Suspicious Endpoint Containment with OSSEC
2020-09-04/a>
Jan Kopriva
A blast from the past - XXEncoded VB6.0 Trojan
2020-09-03/a>
Xavier Mertens
Sandbox Evasion Using NTP
2020-09-02/a>
Xavier Mertens
Python and Risky Windows API Calls
2020-08-28/a>
Xavier Mertens
Example of Malicious DLL Injected in PowerShell
2020-08-19/a>
Xavier Mertens
Example of Word Document Delivering Qakbot
2020-08-18/a>
Xavier Mertens
Using API's to Track Attackers
2020-08-16/a>
Didier Stevens
Small Challenge: A Simple Word Maldoc - Part 3
2020-08-10/a>
Bojan Zdrnja
Scoping web application and web service penetration tests
2020-08-04/a>
Johannes Ullrich
Internet Choke Points: Concentration of Authoritative Name Servers
2020-07-30/a>
Johannes Ullrich
Python Developers: Prepare!!!
2020-07-27/a>
Johannes Ullrich
In Memory of Donald Smith
2020-07-24/a>
Xavier Mertens
Compromized Desktop Applications by Web Technologies
2020-07-20/a>
Rick Wanner
Sextortion Update: The Final Final Chapter
2020-07-11/a>
Guy Bruneau
VMware XPC Client validation privilege escalation vulnerability - https://www.vmware.com/security/advisories/VMSA-2020-0017.html
2020-07-08/a>
Xavier Mertens
If You Want Something Done Right, You Have To Do It Yourself... Malware Too!
2020-07-01/a>
Jim Clausing
Setting up the Dshield honeypot and tcp-honeypot.py
2020-06-29/a>
Didier Stevens
Sysmon and Alternate Data Streams
2020-06-28/a>
Guy Bruneau
tcp-honeypot.py Logstash Parser & Dashboard Update
2020-06-25/a>
Johannes Ullrich
Tech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release.
2020-06-20/a>
Tom Webb
Pi Zero HoneyPot
2020-06-16/a>
Xavier Mertens
Sextortion to The Next Level
2020-06-05/a>
Remco Verhoef
Not so FastCGI!
2020-06-04/a>
Xavier Mertens
Anti-Debugging Technique based on Memory Protection
2020-05-31/a>
Guy Bruneau
Windows 10 Built-in Packet Sniffer - PktMon
2020-05-29/a>
Johannes Ullrich
The Impact of Researchers on Our Data
2020-05-04/a>
Didier Stevens
Sysmon and File Deletion
2020-05-01/a>
Jim Clausing
Attack traffic on TCP port 9673
2020-04-27/a>
Xavier Mertens
Powershell Payload Stored in a PSCredential Object
2020-04-24/a>
Xavier Mertens
Malicious Excel With a Strong Obfuscation and Sandbox Evasion
2020-04-03/a>
Xavier Mertens
Obfuscated with a Simple 0x0A
2020-03-23/a>
Didier Stevens
Windows Zeroday Actively Exploited: Type 1 Font Parsing Remote Code Execution Vulnerability
2020-03-15/a>
Guy Bruneau
VPN Access and Activity Monitoring
2020-03-11/a>
Xavier Mertens
Agent Tesla Delivered via Fake Canon EOS Notification on Free OwnCloud Account
2020-02-27/a>
Xavier Mertens
Offensive Tools Are For Blue Teams Too
2020-02-22/a>
Xavier Mertens
Simple but Efficient VBScript Obfuscation
2020-02-16/a>
Guy Bruneau
SOAR or not to SOAR?
2020-02-14/a>
Xavier Mertens
Keep an Eye on Command-Line Browsers
2020-02-08/a>
Russell Eubanks
After Action Review
2020-02-07/a>
Xavier Mertens
Sandbox Detection Tricks & Nice Obfuscation in a Single VBScript
2020-01-27/a>
Johannes Ullrich
Network Security Perspective on Coronavirus Preparedness
2020-01-23/a>
Xavier Mertens
Complex Obfuscation VS Simple Trick
2020-01-16/a>
Jan Kopriva
Picks of 2019 malware - the large, the small and the one full of null bytes
2020-01-12/a>
Guy Bruneau
ELK Dashboard and Logstash parser for tcp-honeypot Logs
2020-01-10/a>
Xavier Mertens
More Data Exfiltration
2020-01-04/a>
Didier Stevens
KringleCon 2019
2019-12-23/a>
Didier Stevens
New oledump.py plugin: plugin_version_vba
2019-11-29/a>
Russ McRee
ISC Snapshot: Search with SauronEye
2019-11-22/a>
Xavier Mertens
Abusing Web Filters Misconfiguration for Reconnaissance
2019-11-20/a>
Brad Duncan
Hancitor infection with Pony, Evil Pony, Ursnif, and Cobalt Strike
2019-11-11/a>
Johannes Ullrich
Are We Going Back to TheMoon (and How is Liquor Involved)?
2019-11-09/a>
Guy Bruneau
Fake Netflix Update Request by Text
2019-11-03/a>
Didier Stevens
You Too? "Unusual Activity with Double Base64 Encoding"
2019-10-29/a>
Xavier Mertens
Generating PCAP Files from YAML
2019-10-24/a>
Johannes Ullrich
Your Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment?
2019-10-19/a>
Russell Eubanks
What Assumptions Are You Making?
2019-10-18/a>
Xavier Mertens
Quick Malicious VBS Analysis
2019-10-16/a>
Xavier Mertens
Security Monitoring: At Network or Host Level?
2019-09-27/a>
Xavier Mertens
New Scans for Polycom Autoconfiguration Files
2019-09-22/a>
Didier Stevens
Video: Encrypted Sextortion PDFs
2019-09-19/a>
Xavier Mertens
Agent Tesla Trojan Abusing Corporate Email Accounts
2019-09-19/a>
Xavier Mertens
Blocklisting or Whitelisting in the Right Way
2019-09-17/a>
Rob VandenBrink
Investigating Gaps in your Windows Event Logs
2019-09-16/a>
Didier Stevens
Encrypted Sextortion PDFs
2019-08-25/a>
Guy Bruneau
Are there any Advantages of Buying Cyber Security Insurance?
2019-08-09/a>
Xavier Mertens
100% JavaScript Phishing Page
2019-08-05/a>
Rick Wanner
Sextortion: Follow the Money - The Final Chapter
2019-07-28/a>
Didier Stevens
Video: Analyzing Compressed PowerShell Scripts
2019-07-25/a>
Rob VandenBrink
When Users Attack! Users (and Admins) Thwarting Security Controls
2019-07-18/a>
Rob VandenBrink
The Other Side of Critical Control 1: 802.1x Wired Network Access Controls
2019-07-13/a>
Guy Bruneau
Guidance to Protect DNS Against Hijacking & Scanning for Version.BIND Still a Thing
2019-07-11/a>
Xavier Mertens
Russian Dolls Malicious Script Delivering Ursnif
2019-07-02/a>
Xavier Mertens
Malicious Script With Multiple Payloads
2019-06-27/a>
Rob VandenBrink
Finding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell
2019-06-20/a>
Xavier Mertens
Using a Travel Packing App for Infosec Purpose
2019-06-19/a>
Johannes Ullrich
Critical Actively Exploited WebLogic Flaw Patched CVE-2019-2729
2019-06-16/a>
Didier Stevens
Sysmon Version 10: DNS Logging
2019-06-10/a>
Xavier Mertens
Interesting JavaScript Obfuscation Example
2019-06-09/a>
Didier Stevens
Tip: Sysmon Will Log DNS Queries
2019-05-16/a>
Xavier Mertens
The Risk of Authenticated Vulnerability Scans
2019-04-26/a>
Rob VandenBrink
Pillaging Passwords from Service Accounts
2019-04-25/a>
Rob VandenBrink
Unpatched Vulnerability Alert - WebLogic Zero Day
2019-04-13/a>
Johannes Ullrich
Configuring MTA-STS and TLS Reporting For Your Domain
2019-04-05/a>
Russ McRee
Beagle: Graph transforms for DFIR data & logs
2019-03-25/a>
Didier Stevens
"VelvetSweatshop" Maldocs: Shellcode Analysis
2019-03-24/a>
Didier Stevens
Decoding QR Codes with Python
2019-03-23/a>
Didier Stevens
"VelvetSweatshop" Maldocs
2019-03-21/a>
Xavier Mertens
New Wave of Extortion Emails: Central Intelligence Agency Case
2019-03-20/a>
Rob VandenBrink
Using AD to find hosts that aren't in AD - fun with the [IPAddress] construct!
2019-03-06/a>
Xavier Mertens
Keep an Eye on Disposable Email Addresses
2019-02-25/a>
Didier Stevens
Sextortion Email Variant: With QR Code
2019-02-24/a>
Guy Bruneau
Packet Editor and Builder by Colasoft
2019-02-06/a>
Brad Duncan
Hancitor malspam and infection traffic from Tuesday 2019-02-05
2019-02-05/a>
Rob VandenBrink
Mitigations against Mimikatz Style Attacks
2019-02-01/a>
Rick Wanner
Sextortion: Follow the Money Part 3 - The cashout begins!
2019-01-31/a>
Xavier Mertens
Tracking Unexpected DNS Changes
2019-01-18/a>
John Bambenek
Sextortion Bitcoin on the Move
2018-12-31/a>
Didier Stevens
Software Crashes: A New Year's Resolution
2018-12-29/a>
Didier Stevens
Video: De-DOSfuscation Example
2018-12-22/a>
Didier Stevens
KringleCon 2018
2018-12-19/a>
Xavier Mertens
Using OSSEC Active-Response as a DFIR Framework
2018-12-15/a>
Didier Stevens
De-DOSfuscation Example
2018-12-14/a>
Rick Wanner
Bombstortion?? Boomstortion??
2018-12-12/a>
Didier Stevens
Yet Another DOSfuscation Sample
2018-11-27/a>
Xavier Mertens
More obfuscated shell scripts: Fake MacOS Flash update
2018-11-27/a>
Rob VandenBrink
Data Exfiltration in Penetration Tests
2018-11-26/a>
Russ McRee
ViperMonkey: VBA maldoc deobfuscation
2018-11-26/a>
Xavier Mertens
Obfuscated bash script targeting QNap boxes
2018-11-16/a>
Xavier Mertens
Basic Obfuscation With Permissive Languages
2018-11-09/a>
Tom Webb
Playing with T-POT
2018-11-06/a>
Xavier Mertens
Malicious Powershell Script Dissection
2018-11-05/a>
Johannes Ullrich
Struts 2.3 Vulnerable to Two Year old File Upload Flaw
2018-10-23/a>
Xavier Mertens
Diving into Malicious AutoIT Code
2018-10-21/a>
Didier Stevens
MSG Files: Compressed RTF
2018-10-17/a>
Russ McRee
RedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence
2018-10-12/a>
Xavier Mertens
More Equation Editor Exploit Waves
2018-10-10/a>
Xavier Mertens
New Campaign Using Old Equation Editor Vulnerability
2018-10-01/a>
Didier Stevens
Decoding Custom Substitution Encodings with translate.py
2018-09-30/a>
Didier Stevens
When DOSfuscation Helps...
2018-09-28/a>
Xavier Mertens
More Excel DDE Code Injection
2018-09-19/a>
Rob VandenBrink
Certificates Revisited - SSL VPN Certificates 2 Ways
2018-09-05/a>
Rob VandenBrink
Where have all my Certificates gone? (And when do they expire?)
2018-09-05/a>
Xavier Mertens
Malicious PowerShell Compiling C# Code on the Fly
2018-09-04/a>
Rob VandenBrink
Let's Trade: You Read My Email, I'll Read Your Password!
2018-08-30/a>
Xavier Mertens
Crypto Mining Is More Popular Than Ever!
2018-08-13/a>
Didier Stevens
New Extortion Tricks: Now Including Your (Partial) Phone Number!
2018-07-30/a>
Didier Stevens
Malicious Word documents using DOSfuscation
2018-07-26/a>
Xavier Mertens
Windows Batch File Deobfuscation
2018-07-24/a>
Tom Webb
Cell Phone Monitoring. Who is Watching the Watchers?
2018-07-15/a>
Didier Stevens
Video: Retrieving and processing JSON data (BTC example)
2018-07-14/a>
Didier Stevens
Retrieving and processing JSON data (BTC example)
2018-07-12/a>
Johannes Ullrich
New Extortion Tricks: Now Including Your Password!
2018-07-02/a>
Guy Bruneau
VMware ESXi, Workstation, and Fusion address multiple out-of-bounds read vulnerabilities https://www.vmware.com/security/advisories/VMSA-2018-0016.html
2018-06-18/a>
Xavier Mertens
Malicious JavaScript Targeting Mobile Browsers
2018-06-17/a>
Didier Stevens
Encrypted Office Documents
2018-06-15/a>
Lorna Hutcheson
SMTP Strangeness - Possible C2
2018-06-05/a>
Xavier Mertens
Malicious Post-Exploitation Batch File
2018-05-30/a>
Bojan Zdrnja
The end of the lock icon
2018-05-28/a>
Kevin Liston
Do you hear Laurel or Yanny or is it On-Off Keying?
2018-05-27/a>
Guy Bruneau
Capture and Analysis of User Agents
2018-05-25/a>
Xavier Mertens
Antivirus Evasion? Easy as 1,2,3
2018-05-22/a>
Guy Bruneau
VMware updates enable Hypervisor-Assisted Guest Mitigations for Speculative Store Bypass issue - https://www.vmware.com/security/advisories/VMSA-2018-0012.html
2018-05-20/a>
Didier Stevens
DASAN GPON home routers exploits in-the-wild
2018-05-19/a>
Xavier Mertens
Malicious Powershell Targeting UK Bank Customers
2018-05-16/a>
Mark Hofman
EFAIL, a weakness in openPGP and S\MIME
2018-05-10/a>
Bojan Zdrnja
Exfiltrating data from (very) isolated environments
2018-04-30/a>
Remco Verhoef
Another approach to webapplication fingerprinting
2018-04-25/a>
Johannes Ullrich
Yet Another Drupal RCE Vulnerability
2018-03-12/a>
Xavier Mertens
Payload delivery via SMB
2017-12-27/a>
Guy Bruneau
What are your Security Challenges for 2018?
2017-12-23/a>
Didier Stevens
Encrypted PDFs
2017-12-14/a>
Russ McRee
Security Planner: Improve your online safety
2017-12-14/a>
Russ McRee
Detection Lab: Visibility & Introspection for Defenders
2017-12-13/a>
Xavier Mertens
Tracking Newly Registered Domains
2017-12-05/a>
Tom Webb
IR using the Hive Project.
2017-11-25/a>
Guy Bruneau
Exim Remote Code Exploit
2017-11-23/a>
Xavier Mertens
Proactive Malicious Domain Search
2017-11-13/a>
Guy Bruneau
jsonrpc Scanning for root account
2017-11-03/a>
Xavier Mertens
Simple Analysis of an Obfuscated JAR File
2017-10-30/a>
Johannes Ullrich
Critical Patch For Oracle's Identity Manager
2017-10-27/a>
Renato Marinho
"Catch-All" Google Chrome Malicious Extension Steals All Posted Data
2017-10-25/a>
Mark Hofman
DUHK attack, continuing a week of named issues
2017-10-24/a>
Xavier Mertens
Stop relying on file extensions
2017-10-12/a>
Xavier Mertens
Version control tools aren't only for Developers
2017-10-05/a>
Johannes Ullrich
pcap2curl: Turning a pcap file into a set of cURL commands for "replay"
2017-10-02/a>
Xavier Mertens
Investigating Security Incidents with Passive DNS
2017-09-30/a>
Lorna Hutcheson
Who's Borrowing your Resources?
2017-09-17/a>
Guy Bruneau
rockNSM as a Incident Response Package
2017-09-16/a>
Guy Bruneau
VMware ESXi, vCenter Server, Fusion and Workstation updates resolve multiple security vulnerabilities - https://www.vmware.com/security/advisories/VMSA-2017-0015.html
2017-09-09/a>
Didier Stevens
Malware analysis output sanitization
2017-09-06/a>
Adrien de Beaupre
Modern Web Application Penetration Testing , Hash Length Extension Attacks
2017-08-29/a>
Renato Marinho
Second Google Chrome Extension Banker Malware in Two Weeks
2017-08-22/a>
Xavier Mertens
Defang all the things!
2017-08-15/a>
Renato Marinho
(Banker(GoogleChromeExtension)).targeting("Brazil")
2017-08-10/a>
Didier Stevens
Maldoc Analysis with ViperMonkey
2017-08-03/a>
Johannes Ullrich
Using a Raspberry Pi honeypot to contribute data to DShield/ISC
2017-08-01/a>
Rob VandenBrink
Rooting Out Hosts that Support Older Samba Versions
2017-07-27/a>
Xavier Mertens
TinyPot, My Small Honeypot
2017-07-24/a>
Russell Eubanks
Trends Over Time
2017-07-08/a>
Xavier Mertens
A VBScript with Obfuscated Base64 Data
2017-07-07/a>
Renato Marinho
DDoS Extortion E-mail: Yet Another Bluff?
2017-06-22/a>
Xavier Mertens
Obfuscating without XOR
2017-06-17/a>
Guy Bruneau
Mapping Use Cases to Logs. Which Logs are the Most Important to Collect?
2017-06-10/a>
Russell Eubanks
An Occasional Look in the Rear View Mirror
2017-05-28/a>
Guy Bruneau
CyberChef a Must Have Tool in your Tool bag!
2017-05-16/a>
Russ McRee
WannaCry? Do your own data analysis.
2017-05-06/a>
Xavier Mertens
The story of the CFO and CEO...
2017-05-06/a>
Russell Eubanks
What Can You Learn On Your Own?
2017-05-05/a>
Xavier Mertens
HTTP Headers... the Achilles' heel of many applications
2017-04-28/a>
Xavier Mertens
Another Day, Another Obfuscation Technique
2017-04-21/a>
Xavier Mertens
Analysis of a Maldoc with Multiple Layers of Obfuscation
2017-04-20/a>
Xavier Mertens
DNS Query Length... Because Size Does Matter
2017-04-19/a>
Xavier Mertens
Hunting for Malicious Excel Sheets
2017-04-13/a>
Rob VandenBrink
Packet Captures Filtered by Process
2017-03-30/a>
Xavier Mertens
Diverting built-in features for the bad
2017-03-25/a>
Russell Eubanks
Distraction as a Service
2017-03-24/a>
Xavier Mertens
Nicely Obfuscated JavaScript Sample
2017-03-18/a>
Xavier Mertens
Example of Multiple Stages Dropper
2017-03-15/a>
Xavier Mertens
Retro Hunting!
2017-03-12/a>
Guy Bruneau
Honeypot Logs and Tracking a VBE Script
2017-03-10/a>
Xavier Mertens
The Side Effect of GeoIP Filters
2017-03-08/a>
Richard Porter
What is really being proxied?
2017-03-04/a>
Xavier Mertens
How your pictures may affect your website reputation
2017-02-28/a>
Xavier Mertens
Amazon S3 Outage
2017-02-28/a>
Xavier Mertens
Analysis of a Simple PHP Backdoor
2017-02-28/a>
Johannes Ullrich
My Catch Of 4 Months In The Amazon IP Address Space
2017-02-21/a>
Jim Clausing
Quick and dirty generic listener
2017-02-13/a>
Rob VandenBrink
Stuff I Learned Decrypting
2017-02-12/a>
Xavier Mertens
Analysis of a Suspicious Piece of JavaScript
2017-02-10/a>
Brad Duncan
Hancitor/Pony malspam
2017-01-28/a>
Lorna Hutcheson
Packet Analysis - Where do you start?
2017-01-13/a>
Xavier Mertens
Who's Attacking Me?
2017-01-12/a>
Mark Baggett
System Resource Utilization Monitor
2017-01-01/a>
Didier Stevens
py2exe Decompiling - Part 1
2016-12-31/a>
Xavier Mertens
Ongoing Scans Below the Radar
2016-12-27/a>
Guy Bruneau
Using daemonlogger as a Software Tap
2016-12-10/a>
Didier Stevens
Sleeping VBS Really Wants To Sleep
2016-12-06/a>
Bojan Zdrnja
Attacking NoSQL applications
2016-11-27/a>
Russ McRee
Scapy vs. CozyDuke
2016-11-23/a>
Tom Webb
Mapping Attack Methodology to Controls
2016-11-16/a>
Xavier Mertens
Example of Getting Analysts & Researchers Away
2016-11-13/a>
Guy Bruneau
Bitcoin Miner File Upload via FTP
2016-10-26/a>
Johannes Ullrich
New VMWare Security Advisory: VMSA-2016-0017 Information Disclosure in VMWare Fusion and VMWare Tools https://www.vmware.com/security/advisories/VMSA-2016-0017.html
2016-10-25/a>
Xavier Mertens
Another Day, Another Spam...
2016-10-08/a>
Russell Eubanks
Unauthorized Change Detected!
2016-09-15/a>
Xavier Mertens
In Need of a OTP Manager Soon?
2016-09-13/a>
Rob VandenBrink
If it's Free, YOU are the Product
2016-09-04/a>
Russ McRee
Kali Linux 2016.2 Release: https://www.kali.org/news/kali-linux-20162-release/
2016-08-29/a>
Russ McRee
Recommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
2016-08-28/a>
Guy Bruneau
Spam with Obfuscated Javascript
2016-08-24/a>
Tom Webb
Stay on Track During IR
2016-08-21/a>
Rick Wanner
Cisco ASA SNMP Remote Code Execution Vulnerability
2016-08-20/a>
Russell Eubanks
What are YOU doing to give back to the security community?
2016-08-19/a>
Xavier Mertens
Data Classification For the Masses
2016-07-27/a>
Xavier Mertens
Critical Xen PV guests vulnerabilities
2016-07-26/a>
Johannes Ullrich
Command and Control Channels Using "AAAA" DNS Records
2016-07-25/a>
Didier Stevens
Python Malware - Part 4
2016-07-16/a>
Didier Stevens
Python Malware - Part 3
2016-07-15/a>
Xavier Mertens
Name All the Things!
2016-07-07/a>
Johannes Ullrich
Patchwork: Is it still "Advanced" if all you have to do is Copy/Paste?
2016-06-22/a>
Bojan Zdrnja
Security through obscurity never works
2016-06-03/a>
Tom Liston
MySQL is YourSQL
2016-06-01/a>
Xavier Mertens
Docker Containers Logging
2016-05-28/a>
Russell Eubanks
Applied Lessons Learned
2016-05-18/a>
Russ McRee
Resources: Windows Auditing & Monitoring, Linux 2FA
2016-05-15/a>
Didier Stevens
Python Malware - Part 1
2016-05-14/a>
Guy Bruneau
INetSim as a Basic Honeypot
2016-04-28/a>
Rob VandenBrink
DNS and DHCP Recon using Powershell
2016-04-27/a>
Tom Webb
Kippos Cousin Cowrie
2016-04-02/a>
Russell Eubanks
Why Can't We Be Friends?
2016-03-30/a>
Xavier Mertens
What to watch with your FIM?
2016-03-23/a>
Bojan Zdrnja
Abusing Oracles
2016-03-15/a>
Xavier Mertens
Dockerized DShield SSH Honeypot
2016-03-13/a>
Xavier Mertens
SSH Honeypots (Ab)used as Proxy
2016-03-13/a>
Guy Bruneau
A Look at the Mandiant M-Trends 2016 Report
2016-02-23/a>
Xavier Mertens
VMware VMSA-2016-0002
2016-02-20/a>
Didier Stevens
Locky: JavaScript Deobfuscation
2016-02-15/a>
Bojan Zdrnja
Exploiting (pretty) blind SQL injections
2016-02-11/a>
Tom Webb
Tomcat IR with XOR.DDoS
2016-02-07/a>
Xavier Mertens
More Malicious JavaScript Obfuscation
2016-02-03/a>
Xavier Mertens
Automating Vulnerability Scans
2016-01-31/a>
Guy Bruneau
Windows 10 and System Protection for DATA Default is OFF
2016-01-29/a>
Xavier Mertens
Scripting Web Categorization
2016-01-15/a>
Xavier Mertens
JavaScript Deobfuscation Tool
2016-01-09/a>
Xavier Mertens
Virtual Bitlocker Containers
2016-01-05/a>
Guy Bruneau
What are you Concerned the Most in 2016?
2016-01-01/a>
Didier Stevens
Failure Is An Option
2015-12-29/a>
Daniel Wesemann
New Years Resolutions
2015-12-24/a>
Xavier Mertens
Unity Makes Strength
2015-12-21/a>
Daniel Wesemann
Critical Security Controls: Getting to know the unknown
2015-12-12/a>
Russell Eubanks
What Signs Are You Missing?
2015-12-04/a>
Tom Webb
Automating Phishing Analysis using BRO
2015-11-04/a>
Richard Porter
Application Aware and Critical Control 2
2015-10-17/a>
Russell Eubanks
CIS Critical Security Controls - Version 6.0
2015-10-12/a>
Guy Bruneau
Data Visualization,What is your Tool of Choice?
2015-10-12/a>
Guy Bruneau
Critical Vulnerability in Multiple Cisco Products - Apache Struts 2 Command Execution http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2
2015-09-28/a>
Johannes Ullrich
"Transport of London" Malicious E-Mail
2015-09-03/a>
Xavier Mertens
Querying the DShield API from RTIR
2015-09-01/a>
Daniel Wesemann
Encryption of "data at rest" in servers
2015-07-31/a>
Russ McRee
Tech tip follow-up: Using the data Invoked with R's system command
2015-07-18/a>
Russell Eubanks
The Value a "Fresh Set Of Eyes" (FSOE)
2015-06-02/a>
Alex Stanford
Guest Diary: Xavier Mertens - Playing with IP Reputation with Dshield & OSSEC
2015-05-29/a>
Russell Eubanks
Trust But Verify
2015-04-29/a>
Daniel Wesemann
UDP/3478 to Amazon 54.84.9.242 -- got packets? (solved)
2015-04-28/a>
Daniel Wesemann
Scammy Nepal earthquake donation requests
2015-04-19/a>
Didier Stevens
Handling Special PDF Compression Methods
2015-04-14/a>
Johannes Ullrich
Odd POST Request To Web Honeypot
2015-04-08/a>
Tom Webb
Is it a breach or not?
2015-03-07/a>
Guy Bruneau
Should it be Mandatory to have an Independent Security Audit after a Breach?
2015-02-22/a>
Russell Eubanks
Leave Things Better Than When You Found Them
2015-02-17/a>
Rob VandenBrink
A Different Kind of Equation
2015-02-11/a>
Johannes Ullrich
Did PCI Just Kill E-Commerce By Saying SSL is Not Sufficient For Payment Info ? (spoiler: TLS!=SSL)
2015-02-10/a>
Mark Baggett
Detecting Mimikatz Use On Your Network
2015-01-23/a>
Adrien de Beaupre
Infocon change to yellow for Adobe Flash issues
2014-12-24/a>
Rick Wanner
Incident Response at Sony
2014-12-04/a>
Mark Baggett
Automating Incident data collection with Python
2014-12-01/a>
Guy Bruneau
Do you have a Data Breach Response Plan?
2014-11-27/a>
Russ McRee
Syrian Electronic Army attack leads to malvertising
2014-11-19/a>
Rob VandenBrink
"Big Data" Needs a Trip to the Security Chiropracter!
2014-10-13/a>
Lorna Hutcheson
For or Against: Port Security for Network Access Control
2014-10-01/a>
Russ McRee
Security Onion news: Updated ShellShock detection scripts for Bro
2014-09-27/a>
Guy Bruneau
What has Bash and Heartbleed Taught Us?
2014-09-26/a>
Richard Porter
Why We Have Moved to InfoCon:Yellow
2014-09-19/a>
Guy Bruneau
CipherShed Fork from TrueCrypt Project, Support Windows, Mac OS and Linux - https://ciphershed.org
2014-08-17/a>
Rick Wanner
Part 1: Is your home network unwittingly contributing to NTP DDOS attacks?
2014-08-17/a>
Rick Wanner
Part 2: Is your home network unwittingly contributing to NTP DDOS attacks?
2014-08-09/a>
Adrien de Beaupre
Complete application ownage via Multi-POST XSRF
2014-07-31/a>
Chris Mohan
A Honeypot for home: Raspberry Pi
2014-07-30/a>
Rick Wanner
Symantec Endpoint Protection Privilege Escalation Zero Day
2014-07-28/a>
Guy Bruneau
Management and Control of Mobile Device Security
2014-07-22/a>
Daniel Wesemann
App "telemetry"
2014-07-14/a>
Johannes Ullrich
The Internet of Things: How do you "on-board" devices?
2014-07-02/a>
Johannes Ullrich
Simple Javascript Extortion Scheme Advertised via Bing
2014-06-30/a>
Johannes Ullrich
Should I setup a Honeypot? [SANSFIRE]
2014-06-28/a>
Mark Hofman
No more Microsoft advisory email notifications?
2014-06-24/a>
Kevin Shortt
NTP DDoS Counts Have Dropped
2014-06-11/a>
Daniel Wesemann
Help your pilot fly!
2014-05-22/a>
Johannes Ullrich
Discontinuing Support for ISC Alert Task Bar Icon
2014-05-01/a>
Johannes Ullrich
Busybox Honeypot Fingerprinting and a new DVR scanner
2014-04-26/a>
Guy Bruneau
Android Users - Beware of Bitcoin Mining Malware
2014-04-21/a>
Daniel Wesemann
Allow us to leave!
2014-04-14/a>
Kevin Shortt
INFOCon Green: Heartbleed - on the mend
2014-04-11/a>
Guy Bruneau
Heartbleed Fix Available for Download for Cisco Products
2014-04-04/a>
Rob VandenBrink
Dealing with Disaster - A Short Malware Incident Response
2014-03-25/a>
Johannes Ullrich
A few updates on "The Moon" worm
2014-03-13/a>
Daniel Wesemann
Identification and authentication are hard ... finding out intention is even harder
2014-03-06/a>
Mark Baggett
Port 5000 traffic and snort signature
2014-03-04/a>
Daniel Wesemann
Triple Handshake Cookie Cutter
2014-02-26/a>
Russ McRee
Ongoing NTP Amplification Attacks
2014-02-18/a>
Johannes Ullrich
More Details About "TheMoon" Linksys Worm
2014-02-10/a>
Rob VandenBrink
A Tale of Two Admins (and no Change Control)
2014-02-09/a>
Basil Alawi S.Taher
Mandiant Highlighter 2
2014-01-23/a>
Chris Mohan
Learning from the breaches that happens to others Part 2
2014-01-22/a>
Chris Mohan
Learning from the breaches that happens to others
2014-01-17/a>
Russ McRee
Massive RFI scans likely a free web app vuln scanner rather than bots
2014-01-11/a>
Guy Bruneau
tcpflow 1.4.4 and some of its most Interesting Features
2014-01-01/a>
Russ McRee
Happy New Year from the Syrian Electronic Army - Skype’s Social Media Accounts Hacked
2013-12-29/a>
Russ McRee
OpenSSL suffers apparent defacement
2013-12-20/a>
Daniel Wesemann
authorized key lime pie
2013-12-16/a>
Tom Webb
The case of Minerd
2013-12-01/a>
Richard Porter
BPF, PCAP, Binary, hex, why they matter?
2013-11-22/a>
Rick Wanner
Port 0 DDOS
2013-11-10/a>
Rick Wanner
Microsoft and Facebook announce bug bounty
2013-10-22/a>
Richard Porter
Greenbone and OpenVAS Scanner
2013-10-21/a>
Johannes Ullrich
New tricks that may bring DNS spoofing back or: "Why you should enable DNSSEC even if it is a pain to do"
2013-10-19/a>
Johannes Ullrich
Yet Another WHMCS SQL Injection Exploit
2013-10-05/a>
Richard Porter
Adobe Breach Notification, Notifications?
2013-10-04/a>
Johannes Ullrich
The Adobe Breach FAQ
2013-10-01/a>
Adrien de Beaupre
CSAM! Send us your logs!
2013-09-24/a>
Tom Webb
IDS, NSM, and Log Management with Security Onion 12.04.3
2013-09-18/a>
Rob VandenBrink
Cisco DCNM Update Released
2013-09-09/a>
Johannes Ullrich
SSL is broken. So what?
2013-09-02/a>
Guy Bruneau
Multiple Cisco Security Notice
2013-08-21/a>
Rob VandenBrink
Fibre Channel Reconnaissance - Reloaded
2013-08-19/a>
Johannes Ullrich
Running Snort on ESXi using the Distributed Switch
2013-08-14/a>
Johannes Ullrich
Imaging LUKS Encrypted Drives
2013-07-27/a>
Scott Fendley
Defending Against Web Server Denial of Service Attacks
2013-07-25/a>
Johannes Ullrich
A Couple of SSH Brute Force Compromises
2013-07-23/a>
Bojan Zdrnja
Sessions with(out) cookies
2013-07-21/a>
Guy Bruneau
Why use Regular Expressions?
2013-07-17/a>
Johannes Ullrich
Network Solutions Outage
2013-07-16/a>
Johannes Ullrich
Why don't we see more examples of web app attacks via POST?
2013-07-13/a>
Lenny Zeltser
Decoy Personas for Safeguarding Online Identity Using Deception
2013-07-06/a>
Guy Bruneau
Is Metadata the Magic in Modern Network Security?
2013-07-04/a>
Russ McRee
Celebrating 4th of July With a Malware PCAP Visualization
2013-06-27/a>
Tony Carothers
Ruby Update for SSL Vulnerability
2013-06-18/a>
Russ McRee
EMET 4.0 is now available for download
2013-05-22/a>
Adrien de Beaupre
Privilege escalation, why should I care?
2013-05-09/a>
John Bambenek
Adobe Releases 0-day Security Advisory for Coldfusion, Exploit Code Available. Advisory here: http://www.adobe.com/support/security/advisories/apsa13-03.html
2013-05-01/a>
Daniel Wesemann
The cost of cleaning up
2013-04-25/a>
Adam Swanger
Guest Diary: Dylan Johnson - A week in the life of some Perimeter Firewalls
2013-04-17/a>
John Bambenek
UPDATEDx1: Boston-Related Malware Campaigns Have Begun - Now with Waco Plant Explosion Fun
2013-04-16/a>
John Bambenek
Fake Boston Marathon Scams Update
2013-04-15/a>
John Bambenek
Please send any spam (full headers), URLs or other suspicious content scamming off Boston Marathon explosions to handlers@sans.org
2013-04-04/a>
Johannes Ullrich
Microsoft April Patch Tuesday Advance Notification
2013-03-29/a>
Chris Mohan
Does your breach email notification look like a phish?
2013-03-27/a>
Adam Swanger
IPv6 Focus Month: Guest Diary: Stephen Groat - IPv6 moving target defense
2013-03-25/a>
Johannes Ullrich
IPv6 Focus Month: IPv6 over IPv4 Preference
2013-03-23/a>
Guy Bruneau
Apple ID Two-step Verification Now Available in some Countries
2013-03-19/a>
Johannes Ullrich
IPv6 Focus Month: The warm and fuzzy side of IPv6
2013-03-18/a>
Johannes Ullrich
IPv6 Focus Month: What is changing with DHCP
2013-03-18/a>
Kevin Shortt
Cisco IOS Type 4 Password Issue: http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20130318-type4
2013-03-13/a>
Mark Baggett
Wipe the drive! Stealthy Malware Persistence Mechanism - Part 1
2013-03-11/a>
Richard Porter
IPv6 Focus Month: Traffic Testing, Firewalls, ACLs, pt 1
2013-03-09/a>
Guy Bruneau
IPv6 Focus Month: IPv6 Encapsulation - Protocol 41
2013-03-08/a>
Johannes Ullrich
IPv6 Focus Month: Filtering ICMPv6 at the Border
2013-03-06/a>
Adam Swanger
IPv6 Focus Month: Guest Diary: Stephen Groat - Geolocation Using IPv6 Addresses
2013-03-05/a>
Mark Hofman
IPv6 Focus Month: Device Defaults
2013-03-04/a>
Johannes Ullrich
IPv6 Focus Month: Addresses
2013-03-02/a>
Scott Fendley
Evernote Security Issue
2013-02-25/a>
Johannes Ullrich
Punkspider enumerates web application vulnerabilities
2013-02-17/a>
Guy Bruneau
HP ArcSight Connector Appliance and Logger Vulnerabilities
2013-02-16/a>
Lorna Hutcheson
Fedora RedHat Vulnerabilty Released
2013-02-14/a>
Adam Swanger
ISC Monthly Threat Update - February 2013 http://isc.sans.edu/podcastdetail.html?id=3121
2013-02-08/a>
Kevin Shortt
Is it Spam or Is it Malware?
2013-02-04/a>
Adam Swanger
SAN Securing The Human Monthly Awareness Video - Advanced Persistent Threat (APT) http://www.securingthehuman.org/resources/ncsam
2013-01-25/a>
Johannes Ullrich
Vulnerability Scans via Search Engines (Request for Logs)
2013-01-10/a>
Rob VandenBrink
What Else runs Telnets? Or, Pentesters Love Video Conferencing Units Too!
2013-01-10/a>
Adam Swanger
ISC Monthly Threat Update New Format
2013-01-09/a>
Rob VandenBrink
SQL Injection Flaw in Ruby on Rails
2013-01-09/a>
Johannes Ullrich
New Format for Monthly Threat Update
2013-01-09/a>
Rob VandenBrink
Security Update - Cisco 7900 Phones - cisco-sa-20130109-uipphone privilege escallation issue - advisory at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone
2013-01-05/a>
Guy Bruneau
Adobe ColdFusion Security Advisory
2013-01-03/a>
Bojan Zdrnja
Memory acquisition traps
2012-12-31/a>
Manuel Humberto Santander Pelaez
How to determine which NAC solutions fits best to your needs
2012-12-27/a>
John Bambenek
It's 3pm 2 days after Christmas, do you know where your unmanaged SSH keys are?
2012-12-18/a>
Dan Goldberg
Mitigating the impact of organizational change: a risk assessment
2012-12-04/a>
Johannes Ullrich
Where do your backup tapes go to die?
2012-12-03/a>
John Bambenek
John McAfee Exposes His Location in Photo About His Being on Run
2012-11-26/a>
John Bambenek
Online Shopping for the Holidays? Tips, News and a Fair Warning
2012-11-23/a>
Rob VandenBrink
What's in Your Change Control Form?
2012-11-16/a>
Guy Bruneau
VMware security updates for vSphere API and ESX Service Console - http://www.vmware.com/security/advisories/VMSA-2012-0016.html
2012-11-16/a>
Manuel Humberto Santander Pelaez
Information Security Incidents are now a concern for colombian government
2012-11-08/a>
Daniel Wesemann
Get a 40% discount on your hotel room!
2012-11-06/a>
Johannes Ullrich
What to watch out For on Election Day
2012-10-30/a>
Mark Hofman
Cyber Security Awareness Month - Day 30 - DSD 35 mitigating controls
2012-10-29/a>
Kevin Shortt
Cyber Security Awareness Month - Day 29 - Clear Desk: The Unacquainted Standard
2012-10-26/a>
Russ McRee
Cyber Security Awareness Month - Day 26 - Attackers use trusted domain to propagate Citadel Zeus variant
2012-10-25/a>
Richard Porter
Cyber Security Awareness Month - Day 25 - Pro Audio & Video Packets on the Wire
2012-10-24/a>
Russ McRee
Cyber Security Awareness Month - Day 24 - A Standard for Information Security Incident Management - ISO 27035
2012-10-23/a>
Rob VandenBrink
Cyber Security Awareness Month - Day 23: Character Encoding Standards - ASCII and Successors
2012-10-21/a>
Johannes Ullrich
Cyber Security Awareness Month - Day 22: Connectors
2012-10-19/a>
Johannes Ullrich
Cyber Security Awareness Month - Day 19: Standard log formats and CEE.
2012-10-18/a>
Rob VandenBrink
Cyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide
2012-10-17/a>
Rob VandenBrink
Cyber Security Awareness Month - Day 17 - A Standard for Risk Management - ISO 27005
2012-10-16/a>
Richard Porter
CyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook.
2012-10-16/a>
Johannes Ullrich
Cyber Security Awareness Month - Day 16: W3C and HTML
2012-10-14/a>
Pedro Bueno
Cyber Security Awareness Month - Day 14 - Poor Man's File Analysis System - Part 1
2012-10-13/a>
Guy Bruneau
New Poll - Cyber Security Awareness Month Activities 2012 - https://isc.sans.edu/poll.html
2012-10-12/a>
Mark Hofman
Cyber Security Awareness Month - Day 12 PCI DSS
2012-10-11/a>
Rob VandenBrink
Cyber Security Awareness Month - Day 11 - Vendor Agnostic Standards (Center for Internet Security)
2012-10-10/a>
Kevin Shortt
Cyber Security Awareness Month - Day 10 - Standard Sudo - Part Two
2012-10-09/a>
Johannes Ullrich
Cyber Security Awreness Month - Day 9 - Request for Comment (RFC)
2012-10-08/a>
Mark Hofman
Cyber Security Awareness Month - Day 8 ISO 27001
2012-10-07/a>
Tony Carothers
Cyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1
2012-10-06/a>
Manuel Humberto Santander Pelaez
Cyber Security Awareness Month - Day 6 - NERC: The standard that enforces security on power SCADA
2012-10-05/a>
Johannes Ullrich
Cyber Security Awareness Month - Day 5: Standards Body Soup, So many Flavors in the bowl.
2012-10-05/a>
Richard Porter
Reports of a Distributed Injection Scan
2012-10-04/a>
Johannes Ullrich
Cyber Security Awareness Month - Day 4: Crypto Standards
2012-10-03/a>
Kevin Shortt
Fake Support Calls Reported
2012-10-03/a>
Kevin Shortt
Cyber Security Awareness Month - Day 3 - Standard Sudo - Part One
2012-10-02/a>
Russ McRee
Cyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines
2012-10-01/a>
Johannes Ullrich
Cyber Security Awareness Month
2012-09-08/a>
Guy Bruneau
Webmin Input Validation Vulnerabilities
2012-09-02/a>
Lorna Hutcheson
Demonstrating the value of your Intrusion Detection Program and Analysts
2012-08-30/a>
Bojan Zdrnja
Analyzing outgoing network traffic (part 2)
2012-08-23/a>
Bojan Zdrnja
Analyzing outgoing network traffic
2012-08-16/a>
Johannes Ullrich
A Poor Man's DNS Anomaly Detection Script
2012-07-31/a>
Daniel Wesemann
SQL injection, lilupophilupop-style
2012-07-25/a>
Johannes Ullrich
Apple OS X 10.8 (Mountain Lion) released
2012-07-18/a>
Rob VandenBrink
Vote NO to Weak Encryption!
2012-07-14/a>
Tony Carothers
User Awareness and Education
2012-07-05/a>
Adrien de Beaupre
Microsoft advanced notification for July 2012 patch Tuesday
2012-07-02/a>
Dan Goldberg
Storms of June 29th 2012 in Mid Atlantic region of the USA
2012-06-25/a>
Rick Wanner
Targeted Malware for Industrial Espionage?
2012-06-20/a>
Raul Siles
CVE-2012-0217 (from MS12-042) applies to other environments too
2012-06-14/a>
Johannes Ullrich
Spot the Phish: Verizon Wireless
2012-06-12/a>
Swa Frantzen
Adobe June 2012 Black Tuesday patches
2012-05-22/a>
Johannes Ullrich
nmap 6 released
2012-05-07/a>
Guy Bruneau
iOS 5.1.1 Software Update for iPod, iPhone, iPad
2012-04-26/a>
Richard Porter
Define Irony: A medical device with a Virus?
2012-04-23/a>
Russ McRee
Emergency Operations Centers & Security Incident Management: A Correlation
2012-04-21/a>
Guy Bruneau
WordPress Release Security Update
2012-03-16/a>
Swa Frantzen
INFOCON Yellow - Microsoft RDP - MS12-020
2012-03-16/a>
Russ McRee
MS12-020 RDP vulnerabilities: Patch, Mitigate, Detect
2012-03-11/a>
Johannes Ullrich
An Analysis of Jester's QR Code Attack. (Guest Diary)
2012-03-03/a>
Jim Clausing
New automated sandbox for Android malware
2012-02-23/a>
donald smith
DNS-Changer "clean DNS" extension requested
2012-02-22/a>
Johannes Ullrich
How to test OS X Mountain Lion's Gatekeeper in Lion
2012-01-27/a>
Mark Hofman
CISCO Ironport C & M Series telnet vulnerability
2012-01-22/a>
Johannes Ullrich
Javascript DDoS Tool Analysis
2012-01-13/a>
Guy Bruneau
Sysinternals Updates - http://blogs.technet.com/b/sysinternals/archive/2012/01/13/updates-autoruns-v11-21-coreinfo-v3-03-portmon-v-3-03-process-explorer-v15-12-mark-s-blog-and-mark-at-rsa-2012.aspx
2012-01-03/a>
Bojan Zdrnja
The tale of obfuscated JavaScript continues
2011-12-13/a>
Johannes Ullrich
December 2011 Adobe Black Tuesday
2011-12-08/a>
Adrien de Beaupre
Microsoft Security Bulletin Advance Notification for December 2011
2011-12-07/a>
Lenny Zeltser
V8 as an Alternative to SpiderMonkey for JavaScript Deobfuscation
2011-12-01/a>
Mark Hofman
SQL Injection Attack happening ATM
2011-11-03/a>
Richard Porter
An Apple, Inc. Sandbox to play in.
2011-11-01/a>
Russ McRee
Honeynet Project: Android Reverse Engineering (A.R.E.) Virtual Machine released
2011-11-01/a>
Russ McRee
Secure languages & frameworks
2011-10-29/a>
Richard Porter
The Sub Critical Control? Evidence Collection
2011-10-28/a>
Russ McRee
Critical Control 19: Data Recovery Capability
2011-10-28/a>
Daniel Wesemann
Critical Control 20: Security Skills Assessment and Training to fill Gaps
2011-10-27/a>
Mark Baggett
Critical Control 18: Incident Response Capabilities
2011-10-26/a>
Rick Wanner
Critical Control 17:Penetration Tests and Red Team Exercises
2011-10-26/a>
Rob VandenBrink
The Theoretical "SSL Renegotiation" Issue gets a Whole Lot More Real !
2011-10-17/a>
Rob VandenBrink
Critical Control 11: Account Monitoring and Control
2011-10-13/a>
Guy Bruneau
Critical Control 10: Continuous Vulnerability Assessment and Remediation
2011-10-12/a>
Kevin Shortt
Critical Control 8 - Controlled Use of Administrative Privileges
2011-10-11/a>
Swa Frantzen
Critical Control 7 - Application Software Security
2011-10-10/a>
Jim Clausing
Critical Control 6 - Maintenance, Monitoring, and Analysis of Security Audit Logs
2011-10-07/a>
Mark Hofman
Critical Control 5 - Boundary Defence
2011-10-04/a>
Rob VandenBrink
Critical Control 2 - Inventory of Authorized and Unauthorized Software
2011-10-04/a>
Johannes Ullrich
Critical Control 3 - Secure Configurations for Hardware and Software on Laptops, Workstations and Servers
2011-10-03/a>
Mark Hofman
Critical Control 1 - Inventory of Authorized and Unauthorized Devices
2011-10-03/a>
Mark Baggett
What are the 20 Critical Controls?
2011-10-03/a>
Tom Liston
Security 101 : Security Basics in 140 Characters Or Less
2011-10-02/a>
Mark Hofman
Cyber Security Awareness Month Day 1/2 - Schedule
2011-10-02/a>
Mark Hofman
Cyber Security Awareness Month Day 1/2 - Introduction to the controls
2011-10-01/a>
Mark Hofman
Hot on the heels fo FF, Thunderbird v 7.0.1 and SeaMonkey v 2.4.1 have been updated.
2011-09-28/a>
Richard Porter
All Along the ARP Tower!
2011-09-21/a>
Mark Hofman
October 2011 Cyber Security Awareness Month
2011-09-05/a>
Bojan Zdrnja
Bitcoin – crypto currency of future or heaven for criminals?
2011-08-26/a>
Johannes Ullrich
SANS Virginia Beach Conference Canceled. Details: http://www.sans.org/virginia-beach-2011/
2011-08-26/a>
Johannes Ullrich
Some Hurricane Technology Tips
2011-08-17/a>
Rob VandenBrink
Putting all of Your Eggs in One Basket - or How NOT to do Layoffs
2011-08-16/a>
Johannes Ullrich
What are the most dangerous web applications and how to secure them?
2011-08-14/a>
Guy Bruneau
FireCAT 2.0 Released
2011-08-13/a>
Rick Wanner
MoonSols Dumpit released...for free!
2011-08-11/a>
Guy Bruneau
BlackBerry Enterprise Server Critical Update
2011-07-30/a>
Deborah Hale
Data Encryption Ban? Really?
2011-07-29/a>
Richard Porter
Apple Lion talking on TCP 5223
2011-07-28/a>
Johannes Ullrich
Announcing: The "404 Project"
2011-07-27/a>
Johannes Ullrich
Internet Storm Center iPhone App now available. Feedback/Feature Requests welcome. Search App Store for "ISC Reader"
2011-07-25/a>
Chris Mohan
Monday morning incident handler practice
2011-07-21/a>
Mark Hofman
Lion Released
2011-07-21/a>
Johannes Ullrich
Lion: What is new in Security
2011-07-19/a>
Richard Porter
SMS Phishing at the SANSFire 2011 Handler Dinner
2011-07-11/a>
John Bambenek
Another Defense Contractor Hacked in AntiSec Hacktivism Spree
2011-07-09/a>
Chris Mohan
Safer Windows Incident Response
2011-07-05/a>
Raul Siles
Helping Developers Understand Security - Spot the Vuln
2011-07-03/a>
Deborah Hale
Business Continuation in the Face of Disaster
2011-06-22/a>
Guy Bruneau
How Good is your Employee Termination Policy?
2011-06-21/a>
Chris Mohan
StartSSL, a web authentication authority, suspend services after a security breach
2011-06-17/a>
Richard Porter
When do you stop owning Technology?
2011-06-12/a>
Mark Hofman
Cloud thoughts
2011-06-09/a>
Richard Porter
One Browser to Rule them All?
2011-06-06/a>
Johannes Ullrich
The Havij SQL Injection Tool
2011-06-04/a>
Rick Wanner
Do you have a personal disaster recovery plan?
2011-05-18/a>
Bojan Zdrnja
Android, HTTP and authentication tokens
2011-04-29/a>
Guy Bruneau
Firefox, Thunderbird and SeaMonkey Security Updates
2011-04-28/a>
Chris Mohan
DSL Reports advise 9,000 accounts were compromised
2011-04-26/a>
John Bambenek
Is the Insider Threat Really Over?
2011-04-25/a>
Rob VandenBrink
Sony PlayStation Network Outage - Day 5
2011-04-22/a>
Manuel Humberto Santander Pelaez
In-house developed applications: The constant headache for the information security officer
2011-04-22/a>
Manuel Humberto Santander Pelaez
iPhoneMap: iPhoneTracker port to Linux
2011-04-20/a>
Daniel Wesemann
Data Breach Investigations Report published by Verizon
2011-04-20/a>
Johannes Ullrich
iPhone GPS Data Storage
2011-04-19/a>
Bojan Zdrnja
SQL injection: why can’t we learn?
2011-04-05/a>
Mark Hofman
Sony DDOS
2011-04-04/a>
Mark Hofman
When your service provider has a breach
2011-04-03/a>
Richard Porter
Extreme Disclosure? Not yet but a great trend!
2011-04-01/a>
John Bambenek
LizaMoon Mass SQL-Injection Attack Infected at least 500k Websites
2011-03-25/a>
Kevin Liston
APT Tabletop Exercise
2011-03-11/a>
Guy Bruneau
Snort IDS Sensor with Sguil Framework ISO
2011-03-09/a>
Chris Mohan
Possible Issue with Forefront Update KB2508823
2011-03-07/a>
Lorna Hutcheson
Call for Packets - Unassigned TCP Options
2011-03-04/a>
Mark Hofman
A new version of Seamonkey is available, includes security fixes. More details here http://www.seamonkey-project.org/news#2011-03-02
2011-02-21/a>
Adrien de Beaupre
What’s New, it's Python 3.2
2011-02-14/a>
Lorna Hutcheson
Network Visualization
2011-02-09/a>
Mark Hofman
Adobe Patches (shockwave, Flash, Reader & Coldfusion)
2011-02-07/a>
Richard Porter
Crime is still Crime! Pt 2
2011-02-05/a>
Guy Bruneau
OpenSSH Legacy Certificate Information Disclosure Vulnerability
2011-01-12/a>
Richard Porter
Yet Another Data Broker? AOL Lifestream.
2011-01-12/a>
Richard Porter
How Many Loyalty Cards do you Carry?
2011-01-03/a>
Johannes Ullrich
What Will Matter in 2011
2010-12-26/a>
Manuel Humberto Santander Pelaez
ISC infocon monitor app for OS X
2010-12-25/a>
Manuel Humberto Santander Pelaez
An interesting vulnerability playground to learn application vulnerabilities
2010-12-12/a>
Raul Siles
New trend regarding web application vulnerabilities?
2010-12-02/a>
Kevin Johnson
SQL Injection: Wordpress 3.0.2 released
2010-11-29/a>
Stephen Hall
iPhone phishing - What you see, isn't what you get
2010-11-24/a>
Bojan Zdrnja
Privilege escalation 0-day in almost all Windows versions
2010-11-17/a>
Guy Bruneau
Conficker B++ Activated on Nov 15
2010-11-17/a>
Guy Bruneau
Cisco Unified Videoconferencing Affected by Multiple Vulnerabilities
2010-11-05/a>
Adrien de Beaupre
Bot honeypot
2010-11-02/a>
Johannes Ullrich
Limited Malicious Search Engine Poisoning for Election
2010-10-31/a>
Marcus Sachs
Cyber Security Awareness Month - Day 31 - Tying it all together
2010-10-30/a>
Guy Bruneau
Cyber Security Awareness Month - Day 30 - Role of the network team
2010-10-29/a>
Manuel Humberto Santander Pelaez
Cyber Security Awareness Month - Day 29- Role of the office geek
2010-10-28/a>
Tony Carothers
Cyber Security Awareness Month - Day 28 - Role of the employee
2010-10-28/a>
Rick Wanner
Cyber Security Awareness Month - Day 27 - Social Media use in the office
2010-10-26/a>
Pedro Bueno
Cyber Security Awareness Month - Day 26 - Sharing Office Files
2010-10-25/a>
Kevin Shortt
Cyber Security Awareness Month - Day 25 - Using Home Computers for Work
2010-10-24/a>
Swa Frantzen
Cyber Security Awarenes Month - Day 24 - Using work computers at home
2010-10-23/a>
Mark Hofman
Cyber Security Awareness Month - Day 23 - The Importance of compliance
2010-10-22/a>
Daniel Wesemann
Cyber Security Awareness Month - Day 22 - Security of removable media
2010-10-22/a>
Manuel Humberto Santander Pelaez
Intypedia project
2010-10-21/a>
Chris Carboni
Cyber Security Awareness Month - Day 21 - Impossible Requests from the Boss
2010-10-20/a>
Jim Clausing
Cyber Security Awareness Month - Day 20 - Securing Mobile Devices
2010-10-19/a>
Rob VandenBrink
Cyber Security Awareness Month - Day 19 - Remote Access Tools
2010-10-19/a>
Rob VandenBrink
Cyber Security Awareness Month - Day 19 - Remote User VPN Tunnels - to Split or not to Split?
2010-10-19/a>
Rob VandenBrink
Cyber Security Awareness Month - Day 19 - VPN Architectures – SSL or IPSec?
2010-10-19/a>
Rob VandenBrink
Cyber Security Awareness Month - Day 19 - Remote User VPN Access – Are things getting too easy, or too hard?
2010-10-19/a>
Rob VandenBrink
Cyber Security Awareness Month - Day 19 - VPN and Remote Access Tools
2010-10-18/a>
Manuel Humberto Santander Pelaez
Cyber Security Awareness Month - Day 18 - What you should tell your boss when there's a crisis
2010-10-17/a>
Stephen Hall
Cyber Security Awareness Month - Day 17 - What a boss should and should not have access to
2010-10-15/a>
Marcus Sachs
Cyber Security Awareness Month - Day 15 - What Teachers Need to Know About Their Students
2010-10-15/a>
Guy Bruneau
Cyber Security Awareness Month - Day 16 - Securing a donated computer
2010-10-14/a>
Johannes Ullrich
Cyber Security Awareness Month - Day 14 - Securing a public computer
2010-10-13/a>
Deborah Hale
Cyber Security Awareness Month - Day 13 - Online Bullying
2010-10-12/a>
Scott Fendley
Cyber Security Awareness Month - Day 12 - Protecting and Managing Your Digital Identity On Social Media Sites
2010-10-11/a>
Rick Wanner
Cyber Security Awareness Month - Day 11 - Safe Browsing for Teens
2010-10-10/a>
Kevin Liston
Cyber Security Awareness Month - Day 10 - Safe browsing for pre-teens
2010-10-09/a>
Kevin Shortt
Cyber Security Awareness Month - Day 9 - Disposal of an Old Computer
2010-10-08/a>
Rick Wanner
Cyber Security Awareness Month - Day 8 - Patch Management and System Updates
2010-10-06/a>
Rob VandenBrink
Cyber Security Awareness Month - Day 7 - Remote Access and Monitoring Tools
2010-10-06/a>
Marcus Sachs
Cyber Security Awareness Month - Day 6 - Computer Monitoring Tools
2010-10-05/a>
Rick Wanner
Cyber Security Awareness Month - Day 5 - Sites you should stay away from
2010-10-04/a>
Daniel Wesemann
Cyber Security Awareness Month - Day 4 - Managing EMail
2010-10-04/a>
Mark Hofman
Online Voting
2010-10-03/a>
Adrien de Beaupre
Cyber Security Awareness Month - Day 3 - Recognizing phishing and online scams
2010-10-02/a>
Mark Hofman
Cyber Security Awareness Month - Day 2 - Securing the Family Network
2010-10-01/a>
Marcus Sachs
Cyber Security Awareness Month - 2010
2010-10-01/a>
Marcus Sachs
Cyber Security Awareness Month - Day 1 - Securing the Family PC
2010-09-26/a>
Daniel Wesemann
Egosurfing, the corporate way
2010-09-25/a>
Rick Wanner
Guest Diary: Andrew Hunt - Visualizing the Hosting Patterns of Modern Cybercriminals
2010-09-21/a>
Johannes Ullrich
Implementing two Factor Authentication on the Cheap
2010-09-04/a>
Kevin Liston
Investigating Malicious Website Reports
2010-08-23/a>
Manuel Humberto Santander Pelaez
Firefox plugins to perform penetration testing activities
2010-08-22/a>
Rick Wanner
Failure of controls...Spanair crash caused by a Trojan
2010-08-19/a>
Rob VandenBrink
Change is Good. Change is Bad. Change is Life.
2010-08-16/a>
Raul Siles
Blind Elephant: A New Web Application Fingerprinting Tool
2010-08-15/a>
Manuel Humberto Santander Pelaez
Obfuscated SQL Injection attacks
2010-08-15/a>
Manuel Humberto Santander Pelaez
Python to test web application security
2010-08-08/a>
Marcus Sachs
Thinking about Cyber Security Awareness Month in October
2010-08-06/a>
Rob VandenBrink
FOXIT PDF Reader update to resolve iPhone/iPad Jailbreak issue ==> http://www.foxitsoftware.com/announcements/2010861227.html
2010-08-05/a>
Manuel Humberto Santander Pelaez
Adobe Acrobat Font Parsing Integer Overflow Vulnerability
2010-08-05/a>
Rob VandenBrink
Access Controls for Network Infrastructure
2010-08-03/a>
Johannes Ullrich
When Lightning Strikes
2010-08-01/a>
Manuel Humberto Santander Pelaez
Evation because IPS fails to validate TCP checksums?
2010-07-29/a>
Rob VandenBrink
The 2010 Verizon Data Breach Report is Out
2010-07-24/a>
Manuel Humberto Santander Pelaez
Transmiting logon information unsecured in the network
2010-07-20/a>
Manuel Humberto Santander Pelaez
Lowering infocon back to green
2010-07-18/a>
Manuel Humberto Santander Pelaez
SAGAN: An open-source event correlation system - Part 1: Installation
2010-07-13/a>
Jim Clausing
VMware Studio Security Update
2010-06-29/a>
Johannes Ullrich
How to be a better spy: Cyber security lessons from the recent russian spy arrests
2010-06-23/a>
Johannes Ullrich
IPv6 Support in iOS 4
2010-06-15/a>
Manuel Humberto Santander Pelaez
TCP evasions for IDS/IPS
2010-06-15/a>
Manuel Humberto Santander Pelaez
iPhone 4 Order Security Breach Exposes Private Information
2010-06-14/a>
Manuel Humberto Santander Pelaez
Another way to get protection for application-level attacks
2010-06-14/a>
Manuel Humberto Santander Pelaez
Python on a microcontroller?
2010-06-14/a>
Manuel Humberto Santander Pelaez
Rogue facebook application acting like a worm
2010-06-09/a>
Deborah Hale
Mass Infection of IIS/ASP Sites
2010-06-07/a>
Manuel Humberto Santander Pelaez
Software Restriction Policy to keep malware away
2010-06-06/a>
Manuel Humberto Santander Pelaez
Nice OS X exploit tutorial
2010-06-04/a>
Rick Wanner
New Honeynet Project Forensic Challenge
2010-06-02/a>
Mark Hofman
OpenSSL version 1.0.0a released. This fixes a number of security issues. Don't forget a number of commercial appliances will be using this, so look for vendor updates soon.
2010-06-02/a>
Rob VandenBrink
New Mac malware - OSX/Onionspy
2010-05-22/a>
Rick Wanner
SANS 2010 Digital Forensics Summit - APT Based Forensic Challenge
2010-05-15/a>
Deborah Hale
Phony Phone Scam
2010-05-12/a>
Rob VandenBrink
Adobe Shockwave Update
2010-04-22/a>
John Bambenek
Data Redaction: You're Doing it Wrong
2010-04-21/a>
Guy Bruneau
Google Chrome Security Update v4.1.249.1059 Released: http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html
2010-04-20/a>
Raul Siles
Are You Ready for a Transportation Collapse...?
2010-04-18/a>
Guy Bruneau
Some NetSol hosted sites breached
2010-04-13/a>
Adrien de Beaupre
Web App Testing Tools
2010-04-12/a>
Adrien de Beaupre
Get yer bogons out!
2010-04-08/a>
Bojan Zdrnja
JavaScript obfuscation in PDF: Sky is the limit
2010-04-06/a>
Daniel Wesemann
Application Logs
2010-04-04/a>
Mari Nichols
Financial Management of Cyber Risk
2010-04-02/a>
Guy Bruneau
Firefox 3.6.3 fix for CVE-2010-1121 http://www.mozilla.org/security/announce/2010/mfsa2010-25.html
2010-04-02/a>
Guy Bruneau
Security Advisory for ESX Service Console
2010-03-30/a>
Marcus Sachs
Zigbee Analysis Tools
2010-03-28/a>
Rick Wanner
Honeynet Project: 2010 Forensic Challenge #3
2010-03-27/a>
Guy Bruneau
HP-UX Running NFS/ONCplus, Inadvertently Enabled NFS
2010-03-25/a>
Kevin Liston
Responding to "Copyright Lawsuit filed against you"
2010-03-21/a>
Scott Fendley
Skipfish - Web Application Security Tool
2010-03-21/a>
Chris Carboni
Responding To The Unexpected
2010-03-10/a>
Rob VandenBrink
Microsoft Security Advisory 981374 - Remote Code Execution Vulnerability for IE6 and IE7
2010-03-10/a>
Rob VandenBrink
Microsoft re-release of KB973811 - attacks on Extended Protection for Authentication
2010-03-08/a>
Raul Siles
Samurai WTF 0.8
2010-03-07/a>
Mari Nichols
DHS issues Cybersecurity challenge
2010-03-06/a>
Tony Carothers
Integration and the Security of New Technologies
2010-03-05/a>
Kyle Haugsness
Javascript obfuscators used in the wild
2010-03-03/a>
Johannes Ullrich
Reports about large number of fake Amazon order confirmations
2010-02-22/a>
Rob VandenBrink
New Risks in Penetration Testing
2010-02-21/a>
Patrick Nolan
Looking for "more useful" malware information? Help develop the format.
2010-02-20/a>
Mari Nichols
Is "Green IT" Defeating Security?
2010-02-17/a>
Rob VandenBrink
Defining Clouds - " A Cloud by any Other Name Would be a Lot Less Confusing"
2010-02-17/a>
Rob VandenBrink
Multiple Security Updates for ESX 3.x and ESXi 3.x
2010-02-15/a>
Johannes Ullrich
Various Olympics Related Dangerous Google Searches
2010-02-06/a>
Guy Bruneau
LANDesk Management Gateway Vulnerability
2010-02-03/a>
Rob VandenBrink
APPLE-SA-2010-02-02-1 iPhone OS 3.1.3 and iPhone OS 3.1.3 for iPod touch
2010-02-02/a>
Guy Bruneau
Adobe ColdFusion Information Disclosure
2010-01-29/a>
Adrien de Beaupre
Neo-legacy applications
2010-01-27/a>
Raul Siles
European Union Security Challenge (Campus Party 2010)
2010-01-24/a>
Pedro Bueno
Outdated client applications
2010-01-22/a>
Mari Nichols
Pass-down for a Successful Incident Response
2010-01-17/a>
Mark Hofman
Why not Yellow?
2010-01-08/a>
Rob VandenBrink
Microsoft OfficeOnline, Searching for Trust and Malware
2009-12-21/a>
Marcus Sachs
iPhone Botnet Analysis
2009-12-19/a>
Deborah Hale
Educationing Our Communities
2009-12-16/a>
Rob VandenBrink
Seamonkey Update to 2.0.1, find the release notes here ==> http://www.seamonkey-project.org/releases/seamonkey2.0.1
2009-12-07/a>
Rob VandenBrink
Layer 2 Network Protections – reloaded!
2009-12-02/a>
Rob VandenBrink
SPAM and Malware taking advantage of H1N1 concerns
2009-11-29/a>
Patrick Nolan
A Cloudy Weekend
2009-11-25/a>
Jim Clausing
Updates to my GREM Gold scripts and a new script
2009-11-24/a>
John Bambenek
BIND Security Advisory (DNSSEC only)
2009-11-13/a>
Adrien de Beaupre
TLS & SSLv3 renegotiation vulnerability explained
2009-11-13/a>
Adrien de Beaupre
Conficker patch via email?
2009-11-11/a>
Rob VandenBrink
Layer 2 Network Protections against Man in the Middle Attacks
2009-11-09/a>
Chris Carboni
80's Flashback on Jailbroken iPhones
2009-11-08/a>
Bojan Zdrnja
iPhone worm in the wild
2009-11-02/a>
Rob VandenBrink
Microsoft releases v1.02 of Enhanced Mitigation Evaluation Toolkit (EMET)
2009-10-30/a>
Rob VandenBrink
New version of NIST 800-41, Firewalls and Firewall Policy Guidelines
2009-10-29/a>
Kyle Haugsness
Cyber Security Awareness Month - Day 29 - dns port 53
2009-10-28/a>
Johannes Ullrich
Cyber Security Awareness Month - Day 28 - ntp (123/udp)
2009-10-27/a>
Rob VandenBrink
New VMware Desktop Products Released (Workstation, Fusion, ACE)
2009-10-26/a>
Johannes Ullrich
Web honeypot Update
2009-10-25/a>
Lorna Hutcheson
Cyber Security Awareness Month - Day 25 - Port 80 and 443
2009-10-22/a>
Adrien de Beaupre
Cyber Security Awareness Month - Day 22 port 502 TCP - Modbus
2009-10-20/a>
Raul Siles
WASC 2008 Statistics
2009-10-19/a>
Daniel Wesemann
Cyber Security Awareness Month - Day 19 - ICMP
2009-10-18/a>
Mari Nichols
Computer Security Awareness Month - Day 18 - Telnet an oldie but a goodie
2009-10-17/a>
Rick Wanner
Unusual traffic from Loopback to Unused ARIN address
2009-10-16/a>
Adrien de Beaupre
Cyber Security Awareness Month - Day 16 - Port 1521 - Oracle TNS Listener
2009-10-15/a>
Deborah Hale
Yet another round of Viral Spam
2009-10-11/a>
Mark Hofman
Cyber Security Awareness Month - Day 12 Ports 161/162 Simple Network Management Protocol (SNMP)
2009-10-09/a>
Rob VandenBrink
Cyber Security Awareness Month - Day 9 - Port 3389/tcp (RDP)
2009-10-09/a>
Rob VandenBrink
AT&T Cell Phone Phish
2009-10-06/a>
Adrien de Beaupre
Cyber Security Awareness Month - Day 6 ports 67&68 udp - bootp and dhcp
2009-10-05/a>
Adrien de Beaupre
Cyber Security Awareness Month - Day 5 port 31337
2009-10-04/a>
Guy Bruneau
Samba Security Information Disclosure and DoS
2009-10-02/a>
Stephen Hall
Verizon New York area issues
2009-10-02/a>
Stephen Hall
Cyber Security Awareness Month - Day 2 - Port 0
2009-10-02/a>
Stephen Hall
VMware Fusion updates to fixes a couple of bugs
2009-09-26/a>
Kyle Haugsness
Conficker detection hints
2009-09-25/a>
Deborah Hale
Conficker Continues to Impact Networks
2009-09-23/a>
Marcus Sachs
Addendum to SRI's Conficker C Analysis Published
2009-09-19/a>
Rick Wanner
Sysinternals Tools Updates
2009-09-18/a>
Jason Lam
Results from Webhoneypot project
2009-09-16/a>
Raul Siles
Review the security controls of your Web Applications... all them!
2009-09-12/a>
Jim Clausing
Apple Updates
2009-09-07/a>
Lorna Hutcheson
Encrypting Data
2009-09-04/a>
Adrien de Beaupre
SeaMonkey Security Update
2009-08-29/a>
Guy Bruneau
Immunet Protect - Cloud and Community Malware Protection
2009-08-28/a>
Adrien de Beaupre
WPA with TKIP done
2009-08-13/a>
Jim Clausing
Tools for extracting files from pcaps
2009-08-08/a>
Guy Bruneau
XML Libraries Data Parsing Vulnerabilities
2009-08-01/a>
Deborah Hale
Website Warnings
2009-07-31/a>
Deborah Hale
Don't forget to tell your SysAdmin Thanks
2009-07-31/a>
Deborah Hale
The iPhone patch is out
2009-07-30/a>
Deborah Hale
iPhone Hijack
2009-07-28/a>
Adrien de Beaupre
YYAMCCBA
2009-07-27/a>
Raul Siles
New Hacker Challenge: Prison Break - Breaking, Entering & Decoding
2009-07-23/a>
John Bambenek
Missouri Passes Breach Notification Law: Gap Still Exists for Banking Account Information
2009-07-18/a>
Patrick Nolan
Chrome update contains Security fixes
2009-07-16/a>
Bojan Zdrnja
OWC exploits used in SQL injection attacks
2009-07-13/a>
Adrien de Beaupre
* Infocon raised to yellow for Excel Web Components ActiveX vulnerability
2009-07-10/a>
Guy Bruneau
WordPress Fixes Multiple vulnerabilities
2009-07-07/a>
Marcus Sachs
* INFOCON Status - staying green
2009-07-05/a>
Bojan Zdrnja
More on ColdFusion hacks
2009-07-03/a>
Adrien de Beaupre
FCKEditor advisory
2009-07-02/a>
Bojan Zdrnja
Cold Fusion web sites getting compromised
2009-06-30/a>
Chris Carboni
Obfuscated Code
2009-06-30/a>
Chris Carboni
De-Obfuscation Submissions
2009-06-27/a>
Tony Carothers
New NIAP Strategy on the Horizon
2009-06-21/a>
Bojan Zdrnja
Apache HTTP DoS tool mitigation
2009-06-16/a>
John Bambenek
Iran Internet Blackout: Using Twitter for Operational Intelligence
2009-06-11/a>
Rick Wanner
MIR-ROR Motile Incident Response - Respond Objectively Remediate
2009-06-11/a>
Rick Wanner
WHO Declares Flu A(H1N1) a Pandemic
2009-06-11/a>
Jason Lam
Dshield Web Honeypot going beta
2009-05-29/a>
Lorna Hutcheson
VMWare Patches Released
2009-05-26/a>
Jason Lam
A new Web application security blog
2009-05-25/a>
Jim Clausing
More tools for (US) Memorial Day
2009-05-20/a>
Tom Liston
Web Toolz
2009-05-19/a>
Bojan Zdrnja
Advanced blind SQL injection (with Oracle examples)
2009-05-15/a>
Daniel Wesemann
Warranty void if seal shredded?
2009-05-09/a>
Patrick Nolan
Shared SQL Injection Lessons Learned blog item
2009-05-01/a>
Adrien de Beaupre
Incident Management
2009-04-24/a>
John Bambenek
Data Leak Prevention: Proactive Security Requirements of Breach Notification Laws
2009-04-21/a>
Bojan Zdrnja
Web application vulnerabilities
2009-04-20/a>
Jason Lam
Digital Content on TV
2009-04-16/a>
Adrien de Beaupre
Incident Response vs. Incident Handling
2009-04-16/a>
Adrien de Beaupre
Some conficker lessons learned
2009-04-10/a>
Stephen Hall
Firefox 3 updates now in Seamonkey
2009-04-09/a>
Johannes Ullrich
Conficker update with payload
2009-04-09/a>
Jim Clausing
Conficker Working Group site down
2009-04-07/a>
Bojan Zdrnja
Advanced JavaScript obfuscation (or why signature scanning is a failure)
2009-04-05/a>
Marcus Sachs
Open Source Conficker-C Scanner/Detector Released
2009-04-02/a>
Handlers
A view from the CWG Trenches
2009-03-30/a>
Daniel Wesemann
Locate Conficker infected hosts with a network scan!
2009-03-29/a>
Chris Carboni
April 1st - What Will Really Happen?
2009-03-26/a>
Mark Hofman
Webhoneypot fun
2009-03-26/a>
Mark Hofman
Sanitising media
2009-03-20/a>
Stephen Hall
Making the most of your runbooks
2009-03-10/a>
Swa Frantzen
conspiracy fodder: pifts.exe
2009-03-08/a>
Marcus Sachs
Behind the Estonia Cyber Attacks
2009-03-02/a>
Swa Frantzen
Obama's leaked chopper blueprints: anything we can learn?
2009-02-25/a>
Andre Ludwig
Preview/Iphone/Linux pdf issues
2009-02-25/a>
Swa Frantzen
Targeted link diversion attempts
2009-02-17/a>
Jason Lam
DShield Web Honeypot - Alpha Preview Release
2009-02-13/a>
Andre Ludwig
Third party information on conficker
2009-02-12/a>
Mark Hofman
Australian Bushfires
2009-02-11/a>
Robert Danford
ProFTPd SQL Authentication Vulnerability exploit activity
2009-02-10/a>
Bojan Zdrnja
More tricks from Conficker and VM detection
2009-02-09/a>
Bojan Zdrnja
Some tricks from Conficker's bag
2009-01-25/a>
Rick Wanner
Twam?? Twammers?
2009-01-20/a>
Adrien de Beaupre
Obamamania
2009-01-16/a>
G. N. White
Conficker.B/Downadup.B/Kido: F-Secure publishes details pertaining to their counting methodology of compromised machines
2009-01-15/a>
Bojan Zdrnja
Conficker's autorun and social engineering
2009-01-12/a>
William Salusky
Downadup / Conficker - MS08-067 exploit and Windows domain account lockout
2009-01-12/a>
William Salusky
Web Application Firewalls (WAF) - Have you deployed WAF technology?
2009-01-07/a>
William Salusky
BIND 9.x security patch - resolves potentially new DNS poisoning vector
2008-12-12/a>
Johannes Ullrich
MSIE 0-day Spreading Via SQL Injection
2008-12-09/a>
Swa Frantzen
Contacting us might be hard today
2008-12-02/a>
Deborah Hale
Sonicwall License Manager Failure
2008-12-01/a>
Jason Lam
Call for volunteers - Web Honeypot Project
2008-12-01/a>
Jason Lam
Input filtering and escaping in SQL injection mitigation
2008-11-25/a>
Andre Ludwig
The beginnings of a collaborative approach to IDS
2008-11-20/a>
Jason Lam
Large quantity SQL Injection mitigation
2008-11-17/a>
Jim Clausing
A new cheat sheet and a contest
2008-11-16/a>
Maarten Van Horenbeeck
Detection of Trojan control channels
2008-11-02/a>
Mari Nichols
Day 33 - Working with Management to Improve Processes
2008-10-17/a>
Rick Wanner
Day 18 - Containing Other Incidents
2008-10-15/a>
Rick Wanner
Day 15 - Containing the Damage From a Lost or Stolen Laptop
2008-10-12/a>
Mari Nichols
Day 12 Containment: Gathering Evidence That Can be Used in Court
2008-09-29/a>
Daniel Wesemann
ASPROX mutant
2008-09-22/a>
Maarten Van Horenbeeck
Data exfiltration and the use of anonymity providers
2008-09-22/a>
Jim Clausing
Lessons learned from the Palin (and other) account hijacks
2008-09-21/a>
Mari Nichols
You still have time!
2008-09-20/a>
Rick Wanner
New (to me) nmap Features
2008-09-11/a>
David Goldsmith
CookieMonster is coming to Pown (err, Town)
2008-09-10/a>
Adrien de Beaupre
Apple updates iPod Touch + Bonjour for Windows
2008-09-09/a>
Swa Frantzen
Evil side economy: $1 for breaking 1000 CAPTCHAs
2008-09-07/a>
Daniel Wesemann
Staying current, but not too current
2008-09-03/a>
Daniel Wesemann
Static analysis of Shellcode - Part 2
2008-09-03/a>
donald smith
New bgp hijack isn't very new.
2008-09-01/a>
John Bambenek
The Number of Machines Controlled by Botnets Has Jumped 4x in Last 3 Months
2008-08-23/a>
Mark Hofman
SQL injections - an update
2008-08-12/a>
Johannes Ullrich
Upcoming Infocon Test and new Color
2008-08-10/a>
Stephen Hall
From lolly pops to afterglow
2008-08-08/a>
Mark Hofman
More SQL Injections - very active right now
2008-08-03/a>
Deborah Hale
Securing A Network - Lessons Learned
2008-07-24/a>
Bojan Zdrnja
What's brewing in Danmec's pot?
2008-07-17/a>
Mari Nichols
Adobe Reader 9 Released
2008-07-14/a>
Daniel Wesemann
Obfuscated JavaScript Redux
2008-07-11/a>
Jim Clausing
Handling the load
2008-06-30/a>
Marcus Sachs
More SQL Injection with Fast Flux hosting
2008-06-25/a>
Deborah Hale
Report of Coreflood.dr Infection
2008-06-24/a>
Jason Lam
SQL Injection mitigation in ASP
2008-06-24/a>
Jason Lam
Microsoft SQL Injection Prevention Strategy
2008-06-23/a>
donald smith
Preventing SQL injection
2008-06-13/a>
Johannes Ullrich
SQL Injection: More of the same
2008-06-13/a>
Johannes Ullrich
Floods: More of the same (2)
2008-06-07/a>
Jim Clausing
Followup to 'How do you monitor your website?'
2008-05-26/a>
Marcus Sachs
Predictable Response
2008-05-20/a>
Raul Siles
List of malicious domains inserted through SQL injection
2008-05-17/a>
Jim Clausing
Disaster donation scams continue
2008-04-24/a>
donald smith
Hundreds of thousands of SQL injections
2008-04-16/a>
Bojan Zdrnja
The 10.000 web sites infection mystery solved
2008-04-07/a>
John Bambenek
Network Solutions Technical Difficulties? Enom too
2008-04-07/a>
John Bambenek
HP USB Keys Shipped with Malware for your Proliant Server
2008-04-06/a>
Daniel Wesemann
Advanced obfuscated JavaScript analysis
2008-04-03/a>
Bojan Zdrnja
Mixed (VBScript and JavaScript) obfuscation
2008-03-30/a>
Mark Hofman
Mail Anyone?
2008-03-14/a>
Kevin Liston
2117966.net-- mass iframe injection
2008-01-09/a>
Bojan Zdrnja
Mass exploits with SQL Injection
2007-02-24/a>
Jason Lam
Prepared Statements and SQL injections
2006-10-02/a>
Jim Clausing
Back to green, but the exploits are still running wild
2006-09-30/a>
Swa Frantzen
Yellow: WebViewFolderIcon setslice exploit spreading
PORT
2024-06-17/a>
Xavier Mertens
New NetSupport Campaign Delivered Through MSIX Packages
2024-04-25/a>
Jesse La Grew
Does it matter if iptables isn't running on my honeypot?
2023-08-18/a>
Xavier Mertens
From a Zalando Phishing to a RAT
2022-10-31/a>
Rob VandenBrink
NMAP without NMAP - Port Testing and Scanning with PowerShell
2022-10-21/a>
Brad Duncan
sczriptzzbn inject pushes malware for NetSupport RAT
2022-10-19/a>
Xavier Mertens
Are Internet Scanning Services Good or Bad for You?
2022-01-02/a>
Guy Bruneau
Exchange Server - Email Trapped in Transport Queues
2021-10-14/a>
Xavier Mertens
Port-Forwarding with Windows for the Win
2021-06-03/a>
Jim Clausing
Strange goings on with port 37
2021-02-25/a>
Jim Clausing
So where did those Satori attacks come from?
2021-02-16/a>
Jim Clausing
More weirdness on TCP port 26
2020-10-24/a>
Guy Bruneau
An Alternative to Shodan, Censys with User-Agent CensysInspect/1.1
2020-02-05/a>
Brad Duncan
Fake browser update pages are "still a thing"
2019-11-19/a>
Johannes Ullrich
Cheap Chinese JAWS of DVR Exploitability on Port 60001
2019-08-01/a>
Johannes Ullrich
What is Listening On Port 9527/TCP?
2019-07-26/a>
Kevin Shortt
DVRIP Port 34567 - Uptick
2019-03-09/a>
Guy Bruneau
A Comparison Study of SSH Port Activity - TCP 22 & 2222
2018-12-16/a>
Guy Bruneau
Random Port Scan for Open RDP Backdoor
2018-01-09/a>
Jim Clausing
What is going on with port 3333?
2017-09-22/a>
Russell Eubanks
What is the State of Your Union?
2017-09-05/a>
Johannes Ullrich
The Mirai Botnet: A Look Back and Ahead At What's Next
2017-08-18/a>
Guy Bruneau
tshark 2.4 New Feature - Command Line Export Objects
2017-06-16/a>
Lorna Hutcheson
What is going on with Port 83?
2017-04-22/a>
Jim Clausing
WTF tcp port 81
2017-01-28/a>
Guy Bruneau
Request for Packets and Logs - TCP 5358
2017-01-10/a>
Johannes Ullrich
Port 37777 "MapTable" Requests
2016-05-26/a>
Xavier Mertens
Keeping an Eye on Tor Traffic
2016-04-25/a>
Guy Bruneau
Highlights from the 2016 HPE Annual Cyber Threat Report
2016-02-02/a>
Johannes Ullrich
Targeted IPv6 Scans Using pool.ntp.org .
2015-09-28/a>
Johannes Ullrich
"Transport of London" Malicious E-Mail
2015-06-27/a>
Guy Bruneau
Is Windows XP still around in your Network a year after Support Ended?
2015-04-08/a>
Tom Webb
Is it a breach or not?
2014-10-13/a>
Lorna Hutcheson
For or Against: Port Security for Network Access Control
2014-09-15/a>
Johannes Ullrich
Google DNS Server IP Address Spoofed for SNMP reflective Attacks
2014-07-05/a>
Guy Bruneau
Java Support ends for Windows XP
2014-06-11/a>
Daniel Wesemann
Help your pilot fly!
2014-05-23/a>
Richard Porter
Highlights from Cisco Live 2014 - The Internet of Everything
2014-03-26/a>
Johannes Ullrich
Let's Finally "Nail" This Port 5000 Traffic - Synology owners needed.
2014-03-13/a>
Daniel Wesemann
Identification and authentication are hard ... finding out intention is even harder
2014-03-06/a>
Mark Baggett
Port 5000 traffic and snort signature
2014-01-22/a>
Chris Mohan
Learning from the breaches that happens to others
2014-01-11/a>
Guy Bruneau
tcpflow 1.4.4 and some of its most Interesting Features
2014-01-02/a>
Johannes Ullrich
Scans Increase for New Linksys Backdoor (32764/TCP)
2013-11-25/a>
Johannes Ullrich
More Bad Port 0 Traffic
2013-11-22/a>
Rick Wanner
Port 0 DDOS
2013-10-30/a>
Russ McRee
SIR v15: Five good reasons to leave Windows XP behind
2013-05-19/a>
Kevin Shortt
Port 51616 - Got Packets?
2013-03-03/a>
Richard Porter
Uptick in MSSQL Activity
2013-01-08/a>
Richard Porter
Yahoo Web Interface Report: Compose and Send
2012-12-06/a>
Daniel Wesemann
Fake tech support calls - revisited
2012-10-03/a>
Kevin Shortt
Fake Support Calls Reported
2012-01-27/a>
Mark Hofman
CISCO Ironport C & M Series telnet vulnerability
2012-01-13/a>
Guy Bruneau
Sysinternals Updates - http://blogs.technet.com/b/sysinternals/archive/2012/01/13/updates-autoruns-v11-21-coreinfo-v3-03-portmon-v-3-03-process-explorer-v15-12-mark-s-blog-and-mark-at-rsa-2012.aspx
2011-11-11/a>
Rick Wanner
APPLE-SA-2011-11-10-2 Time Capsule and AirPort Base Station (802.11n) Firmware 7.6 update
2011-10-25/a>
Chris Mohan
Recurring reporting made easy?
2011-08-25/a>
Kevin Shortt
Increased Traffic on Port 3389
2011-06-29/a>
Johannes Ullrich
Random SSL Tips and Tricks
2011-06-21/a>
Chris Mohan
Australian government security audit report shows tough love to agencies
2011-05-23/a>
Mark Hofman
Microsoft Support Scam (again)
2011-04-20/a>
Daniel Wesemann
Data Breach Investigations Report published by Verizon
2011-01-25/a>
Chris Mohan
Reviewing our preconceptions
2011-01-24/a>
Rob VandenBrink
Where have all the COM Ports Gone? - How enumerating COM ports led to me finding a “misplaced” Microsoft tool
2011-01-15/a>
Jim Clausing
What's up with port 8881?
2011-01-08/a>
Guy Bruneau
PandaLabs 2010 Annual Report
2010-11-24/a>
Jim Clausing
Help with odd port scans
2010-08-16/a>
Raul Siles
The Seven Deadly Sins of Security Vulnerability Reporting
2010-07-29/a>
Rob VandenBrink
The 2010 Verizon Data Breach Report is Out
2010-07-06/a>
Rob VandenBrink
Bogus Support Organizations use Live Operators to Install Malware
2010-06-15/a>
Manuel Humberto Santander Pelaez
Microsoft Windows Help and Support Center vulnerability (CVE 2010-1885) exploit in the wild
2010-04-20/a>
Raul Siles
Are You Ready for a Transportation Collapse...?
2010-03-01/a>
Mark Hofman
Microsoft will drop support for Vista (without any Service Packs) on April 13 and support for XP SP2 ends July 13. (i.e. no more security updates). If you are still running these, it it time to update.
2010-02-03/a>
Rob VandenBrink
Support for Legacy Browsers
2010-01-09/a>
G. N. White
What's Up With All The Port Scanning Using TCP/6000 As A Source Port?
2009-10-28/a>
Johannes Ullrich
Cyber Security Awareness Month - Day 28 - ntp (123/udp)
2009-10-25/a>
Lorna Hutcheson
Cyber Security Awareness Month - Day 25 - Port 80 and 443
2009-10-21/a>
Pedro Bueno
Cyber Security Awareness Month - Day 21 - Port 135
2009-10-17/a>
Rick Wanner
Cyber Security Awareness Month - Day 17 - Port 22/SSH
2009-10-15/a>
Deborah Hale
Cyber Security Awareness Month - Day 15 - Ports 995, 465, and 993 - Secure Email
2009-10-11/a>
Mark Hofman
Cyber Security Awareness Month - Day 12 Ports 161/162 Simple Network Management Protocol (SNMP)
2009-10-08/a>
Johannes Ullrich
Cyber Security Awareness Month - Day 8 - Port 25 - SMTP
2009-05-02/a>
Rick Wanner
Significant increase in port 2967 traffic
2009-04-15/a>
Marcus Sachs
2009 Data Breach Investigation Report
2009-01-21/a>
Raul Siles
Traffic increase for port UDP/8247
2008-12-16/a>
donald smith
Cisco's Annual Security report has been released.
2008-08-02/a>
Maarten Van Horenbeeck
A little of that human touch
2008-07-02/a>
Jim Clausing
The scoop on the spike in UDP port 7 traffic
2008-05-26/a>
Marcus Sachs
Port 1533 on the Rise
2008-04-27/a>
Marcus Sachs
What's With Port 20329?
2008-04-10/a>
Deborah Hale
DSLReports Being Attacked Again
2008-04-08/a>
Swa Frantzen
Symantec's Global Internet Security Threat Report
2006-11-29/a>
Toby Kohlenberg
New Vulnerability Announcement and patches from Apple
2006-09-21/a>
Johannes Ullrich
Apple updates Airport Drivers
5000
2016-02-13/a>
Guy Bruneau
VMware VMSA-2015-0007.3 has been Re-released
2014-03-26/a>
Johannes Ullrich
Let's Finally "Nail" This Port 5000 Traffic - Synology owners needed.
2014-03-06/a>
Mark Baggett
Port 5000 traffic and snort signature
SCANS
2024-08-22/a>
Johannes Ullrich
OpenAI Scans for Honeypots. Artificially Malicious? Action Abuse?
2022-03-20/a>
Didier Stevens
MGLNDD_* Scans
2022-01-16/a>
Guy Bruneau
10 Most Popular Targeted Ports in the Past 3 Weeks
2018-07-02/a>
Guy Bruneau
Hello Peppa! - PHP Scans
2018-05-06/a>
Guy Bruneau
Scans Attempting to use PowerShell to Download PHP Script
2016-12-31/a>
Xavier Mertens
Ongoing Scans Below the Radar
2015-11-04/a>
Johannes Ullrich
Internet Wide Scanners Wanted
2014-03-06/a>
Mark Baggett
Port 5000 traffic and snort signature
2013-02-03/a>
Lorna Hutcheson
Is it Really an Attack?
Homepage
Diaries
Podcasts
Jobs
Data
TCP/UDP Port Activity
Port Trends
SSH/Telnet Scanning Activity
Weblogs
Threat Feeds Activity
Threat Feeds Map
Useful InfoSec Links
Presentations & Papers
Research Papers
API
Tools
DShield Sensor
DNS Looking Glass
Honeypot (RPi/AWS)
InfoSec Glossary
Contact Us
Contact Us
About Us
Handlers
About Us
Slack Channel
Mastodon
Bluesky
X
Have you heard our daily podcast covering the latest
information security threats
?