Date Author Title

BASE RATE FALLACY

2014-03-13Daniel WesemannIdentification and authentication are hard ... finding out intention is even harder

BASE

2023-08-25/a>Xavier MertensPython Malware Using Postgresql for C2 Communications
2023-07-23/a>Guy BruneauInstall & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-05-07/a>Didier StevensQuickly Finding Encoded Payloads in Office Documents
2022-10-16/a>Didier StevensVideo: Analysis of a Malicious HTML File (QBot)
2022-10-13/a>Didier StevensAnalysis of a Malicious HTML File (QBot)
2022-09-09/a>Didier StevensMaldoc With Decoy BASE64
2022-08-26/a>Xavier MertensPaypal Phishing/Coinbase in One Image
2022-06-19/a>Didier StevensVideo: Decoding Obfuscated BASE64 Statistically
2022-06-18/a>Didier StevensDecoding Obfuscated BASE64 Statistically
2021-09-16/a>Jan KoprivaPhishing 101: why depend on one suspicious message subject when you can use many?
2021-07-18/a>Didier StevensVideo: CyberChef BASE85 Decoding
2021-07-17/a>Didier StevensBASE85 Decoding With base64dump.py
2021-07-16/a>Xavier MertensMultiple BaseXX Obfuscations
2021-07-02/a>Xavier Mertens"inception.py"... Multiple Base64 Encodings
2021-04-24/a>Guy BruneauBase64 Hashes Used in Web Scanning
2021-01-29/a>Xavier MertensSensitive Data Shared with Cloud Services
2020-12-26/a>Didier Stevensbase64dump.py Supported Encodings
2020-12-07/a>Didier StevensCorrupt BASE64 Strings: Detection and Decoding
2020-09-27/a>Didier StevensDecoding Corrupt BASE64 Strings
2020-06-27/a>Didier StevensVideo: YARA's BASE64 Strings
2020-06-14/a>Didier StevensYARA's BASE64 Strings
2020-06-08/a>Didier StevensTranslating BASE64 Obfuscated Scripts
2020-05-30/a>Didier StevensYARA v4.0.1
2020-05-10/a>Didier StevensYARA v4.0.0: BASE64 Strings
2019-10-27/a>Guy BruneauUnusual Activity with Double Base64 Encoding
2019-06-03/a>Didier StevensTip: BASE64 Encoded PowerShell Scripts are Recognizable by the Amount of Letter As
2018-02-02/a>Xavier MertensSimple but Effective Malicious XLS Sheet
2017-10-18/a>Renato MarinhoBaselining Servers to Detect Outliers
2017-08-07/a>Xavier MertensIncrease of phpMyAdmin scans
2017-07-24/a>Russell EubanksTrends Over Time
2017-07-08/a>Xavier MertensA VBScript with Obfuscated Base64 Data
2017-03-19/a>Xavier MertensSearching for Base64-encoded PE Files
2017-01-31/a>Johannes UllrichMalicious Office files using fileless UAC bypass to drop KEYBASE malware
2016-11-24/a>Didier StevensExtracting Shellcode From JavaScript
2016-10-08/a>Russell EubanksUnauthorized Change Detected!
2016-01-30/a>Xavier MertensAll CVE Details at Your Fingertips
2015-07-05/a>Didier StevensWorking with base64
2014-09-27/a>Guy BruneauWhat has Bash and Heartbleed Taught Us?
2014-03-13/a>Daniel WesemannIdentification and authentication are hard ... finding out intention is even harder
2010-06-07/a>Manuel Humberto Santander PelaezSoftware Restriction Policy to keep malware away
2009-06-04/a>Raul SilesNew version (v 1.4.3.1) of BASE available
2008-12-17/a>donald smithTeam CYMRU's Malware Hash Registry
2006-09-13/a>Swa FrantzenPHP - shared hosters, take note.

RATE

2017-05-10/a>Johannes UllrichRead This If You Are Using a Script to Pull Data From This Site
2014-03-13/a>Daniel WesemannIdentification and authentication are hard ... finding out intention is even harder
2013-03-03/a>Richard PorterUptick in MSSQL Activity
2013-02-06/a>Johannes UllrichAre you losing system logging information (and don't know it)?
2012-10-30/a>Mark HofmanCyber Security Awareness Month - Day 30 - DSD 35 mitigating controls
2010-10-03/a>Adrien de BeaupreCanada's Cyber Security Strategy released today
2010-07-08/a>Kyle HaugsnessPirate Bay account database compromised
2008-07-18/a>Adrien de BeaupreExit process?
2008-03-30/a>Mark HofmanMail Anyone?

FALLACY

2014-03-13/a>Daniel WesemannIdentification and authentication are hard ... finding out intention is even harder