Internet Storm Center
Sign In
Sign Up
Handler on Duty:
Guy Bruneau
Threat Level:
green
Date
Author
Title
AI ANALYSIS
2026-05-06
Guy Bruneau
An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary]
AI
2026-05-06/a>
Guy Bruneau
An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary]
2026-05-04/a>
Kenneth Hartman
TeamPCP Weekly Analysis: 2026-W18 (2026-04-27 through 2026-05-03)
2026-04-29/a>
Guy Bruneau
Danger of Libredtail [Guest Diary]
2026-04-27/a>
Kenneth Hartman
TeamPCP Supply Chain Campaign: Update 008 - 26-Day Pause Ends with Three Concurrent Compromises (Checkmarx KICS, Bitwarden CLI Cascade, xinference PyPI), CanisterSprawl npm Worm Identified, and Tier 1 Coverage Returns
2026-04-14/a>
Guy Bruneau
Scanning for AI Models
2026-04-08/a>
Kenneth Hartman
TeamPCP Supply Chain Campaign: Update 007 - Cisco Source Code Stolen via Trivy-Linked Breach, Google GTIG Tracks TeamPCP as UNC6780, and CISA KEV Deadline Arrives with No Standalone Advisory
2026-04-03/a>
Kenneth Hartman
TeamPCP Supply Chain Campaign: Update 006 - CERT-EU Confirms European Commission Cloud Breach, Sportradar Details Emerge, and Mandiant Quantifies Campaign at 1,000+ SaaS Environments
2026-04-01/a>
Kenneth Hartman
TeamPCP Supply Chain Campaign: Update 005 - First Confirmed Victim Disclosure, Post-Compromise Cloud Enumeration Documented, and Axios Attribution Narrows
2026-03-30/a>
Kenneth Hartman
TeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Compromise, TeamPCP Runs Dual Ransomware Operations, and AstraZeneca Data Released
2026-03-28/a>
Kenneth Hartman
TeamPCP Supply Chain Campaign: Update 003 - Operational Tempo Shift as Campaign Enters Monetization Phase With No New Compromises in 48 Hours
2026-03-27/a>
Kenneth Hartman
TeamPCP Supply Chain Campaign: Update 002 - Telnyx PyPI Compromise, Vect Ransomware Mass Affiliate Program, and First Named Victim Claim
2026-03-26/a>
Kenneth Hartman
TeamPCP Supply Chain Campaign: Update 001 - Checkmarx Scope Wider Than Reported, CISA KEV Entry, and Detection Tools Available
2026-02-24/a>
Guy Bruneau
Finding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary]
2026-02-21/a>
Brad Duncan
Japanese-Language Phishing Emails
2026-02-18/a>
Xavier Mertens
Tracking Malware Campaigns With Reused Material
2026-02-17/a>
Xavier Mertens
Fake Incident Report Used in Phishing Campaign
2026-02-12/a>
Russ McRee
AI-Powered Knowledge Graph Generator & APTs
2026-02-02/a>
Johannes Ullrich
Scanning for exposed Anthropic Models
2026-01-28/a>
Johannes Ullrich
Odd WebLogic Request. Possible CVE-2026-21962 Exploit Attempt or AI Slop?
2026-01-22/a>
Xavier Mertens
Is AI-Generated Code Secure?
2026-01-20/a>
Xavier Mertens
Add Punycode to your Threat Hunting Routine
2026-01-06/a>
Johannes Ullrich
Tool Review: Tailsnitch
2025-12-10/a>
Guy Bruneau
Using AI Gemma 3 Locally with a Single CPU
2025-11-05/a>
Johannes Ullrich
Updates to Domainname API
2025-10-23/a>
Guy Bruneau
Phishing Cloud Account for Information
2025-10-09/a>
Jesse La Grew
[Guest Diary] Building Better Defenses: RedTail Observations from a Honeypot
2025-08-20/a>
Johannes Ullrich
Airtell Router Scans, and Mislabeled usernames
2025-08-13/a>
Guy Bruneau
AI and Faster Attack Analysis [Guest Diary]
2025-08-07/a>
Guy Bruneau
Mass Internet Scanning from ASN 43350 [Guest Diary]
2025-07-31/a>
Johannes Ullrich
Scattered Spider Related Domain Names
2025-07-13/a>
Johannes Ullrich
Experimental Suspicious Domain Feed
2025-05-28/a>
Jesse La Grew
[Guest Diary] Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack
2025-05-12/a>
Johannes Ullrich
It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities
2025-05-05/a>
Johannes Ullrich
"Mirai" Now Exploits Samsung MagicINFO CMS (CVE-2024-7399)
2025-04-16/a>
Guy Bruneau
RedTail, Remnux and Malware Management [Guest Diary]
2025-03-27/a>
Johannes Ullrich
Sitecore "thumbnailsaccesstoken" Deserialization Scans (and some new reports) CVE-2025-27218
2025-02-17/a>
Russ McRee
ModelScan - Protection Against Model Serialization Attacks
2025-02-05/a>
Johannes Ullrich
Phishing via "com-" prefix domains
2025-01-09/a>
Guy Bruneau
Examining Redtail Analyzing a Sophisticated Cryptomining Malware and its Advanced Tactics [Guest Diary]
2024-12-05/a>
Jesse La Grew
[Guest Diary] Business Email Compromise
2024-09-24/a>
Johannes Ullrich
Exploitation of RAISECOM Gateway Devices Vulnerability CVE-2024-7120
2024-08-22/a>
Johannes Ullrich
OpenAI Scans for Honeypots. Artificially Malicious? Action Abuse?
2024-07-16/a>
Jan Kopriva
"Reply-chain phishing" with a twist
2024-07-08/a>
Xavier Mertens
Kunai: Keep an Eye on your Linux Hosts Activity
2024-06-17/a>
Xavier Mertens
New NetSupport Campaign Delivered Through MSIX Packages
2024-05-22/a>
Guy Bruneau
Analysis of ?redtail? File Uploads to ICS Honeypot, a Multi-Architecture Coin Miner [Guest Diary]
2024-05-08/a>
Xavier Mertens
Analyzing Synology Disks on Linux
2024-04-11/a>
Yee Ching Tok
Evolution of Artificial Intelligence Systems and Ensuring Trustworthiness
2024-03-17/a>
Guy Bruneau
Gamified Learning: Using Capture the Flag Challenges to Supplement Cybersecurity Training [Guest Diary]
2024-03-13/a>
Xavier Mertens
Using ChatGPT to Deobfuscate Malicious Scripts
2024-02-18/a>
Guy Bruneau
Mirai-Mirai On The Wall... [Guest Diary]
2024-02-12/a>
Johannes Ullrich
Exploit against Unnamed "Bytevalue" router vulnerability included in Mirai Bot
2024-02-05/a>
Jesse La Grew
Public Information and Email Spam
2023-12-31/a>
Tom Webb
Pi-Hole Pi4 Docker Deployment
2023-12-27/a>
Guy Bruneau
Unveiling the Mirai: Insights into Recent DShield Honeypot Activity [Guest Diary]
2023-12-23/a>
Xavier Mertens
Python Keylogger Using Mailtrap.io
2023-11-30/a>
John Bambenek
Prophetic Post by Intern on CVE-2023-1389 Foreshadows Mirai Botnet Expansion Today
2023-11-09/a>
Guy Bruneau
Routers Targeted for Gafgyt Botnet [Guest Diary]
2023-11-08/a>
Xavier Mertens
Example of Phishing Campaign Project File
2023-10-18/a>
Jesse La Grew
Hiding in Hex
2023-10-15/a>
Guy Bruneau
Domain Name Used as Password Captured by DShield Sensor
2023-09-29/a>
Xavier Mertens
Are You Still Storing Passwords In Plain Text Files?
2023-07-18/a>
Johannes Ullrich
Exploit Attempts for "Stagil navigation for Jira Menus & Themes" CVE-2023-26255 and CVE-2023-26256
2023-07-13/a>
Jesse La Grew
DShield Honeypot Maintenance and Data Retention
2023-04-04/a>
Johannes Ullrich
Analyzing the efile.com Malware "efail"
2023-03-12/a>
Guy Bruneau
AsynRAT Trojan - Bill Payment (Pago de la factura)
2023-03-11/a>
Xavier Mertens
Overview of a Mirai Payload Generator
2023-02-18/a>
Guy Bruneau
Spear Phishing Handlers for Username/Password
2023-02-15/a>
Rob VandenBrink
DNS Recon Redux - Zone Transfers (plus a time machine) for When You Can't do a Zone Transfer
2023-01-05/a>
Brad Duncan
More Brazil malspam pushing Astaroth (Guildma) in January 2023
2022-12-30/a>
Jan Kopriva
SPF and DMARC use on GOV domains in different ccTLDs
2022-11-28/a>
Johannes Ullrich
Ukraine Themed Twitter Spam Pushing iOS Scareware
2022-10-07/a>
Xavier Mertens
Powershell Backdoor with DGA Capability
2022-09-21/a>
Xavier Mertens
Phishing Campaigns Use Free Online Resources
2022-09-19/a>
Russ McRee
Chainsaw: Hunt, search, and extract event log records
2022-09-18/a>
Didier Stevens
Video: Grep & Tail -f With Notepad++
2022-09-05/a>
Didier Stevens
Quickie: Grep & Tail -f With Notepad++
2022-08-13/a>
Guy Bruneau
Phishing HTML Attachment as Voicemail Audio Transcription
2022-06-21/a>
Johannes Ullrich
Experimental New Domain / Domain Age API
2022-05-13/a>
Johannes Ullrich
From 0-Day to Mirai: 7 days of BIG-IP Exploits
2022-05-07/a>
Guy Bruneau
Phishing PDF Received in my ISC Mailbox
2022-05-05/a>
Brad Duncan
Password-protected Excel spreadsheet pushes Remcos RAT
2022-04-13/a>
Jan Kopriva
How is Ukrainian internet holding up during the Russian invasion?
2022-03-29/a>
Johannes Ullrich
More Fake/Typosquatting Twitter Accounts Asking for Ukraine Crytocurrency Donations
2022-03-22/a>
Johannes Ullrich
Statement by President Biden: What you need to do (or not do)
2022-03-07/a>
Johannes Ullrich
No Bitcoin - No Problem: Follow Up to Last Weeks Donation Scam
2022-03-04/a>
Johannes Ullrich
Scam E-Mail Impersonating Red Cross
2022-03-02/a>
Johannes Ullrich
The More Often Something is Repeated, the More True It Becomes: Dealing with Social Media
2022-02-24/a>
Xavier Mertens
Ukraine & Russia Situation From a Domain Names Perspective
2022-02-10/a>
Johannes Ullrich
Zyxel Network Storage Devices Hunted By Mirai Variant
2021-11-26/a>
Guy Bruneau
Searching for Exposed ASUS Routers Vulnerable to CVE-2021-20090
2021-11-14/a>
Didier Stevens
External Email System FBI Compromised: Sending Out Fake Warnings
2021-10-26/a>
Yee Ching Tok
Hunting for Phishing Sites Masquerading as Outlook Web Access
2021-10-22/a>
Brad Duncan
October 2021 Contest: Forensic Challenge
2021-09-02/a>
Xavier Mertens
Attackers Will Always Abuse Major Events in our Lifes
2021-07-24/a>
Bojan Zdrnja
Active Directory Certificate Services (ADCS - PKI) domain admin vulnerability
2021-06-15/a>
Johannes Ullrich
Multi Perimeter Device Exploit Mirai Version Hunting For Sonicwall, DLink, Cisco and more
2021-05-29/a>
Guy Bruneau
Spear-phishing Email Targeting Outlook Mail Clients
2021-05-22/a>
Xavier Mertens
"Serverless" Phishing Campaign
2021-04-22/a>
Xavier Mertens
How Safe Are Your Docker Images?
2021-03-05/a>
Xavier Mertens
Spam Farm Spotted in the Wild
2021-02-26/a>
Guy Bruneau
Pretending to be an Outlook Version Update
2021-02-10/a>
Brad Duncan
Phishing message to the ISC handlers email distro
2020-11-18/a>
Xavier Mertens
When Security Controls Lead to Security Issues
2020-10-31/a>
Didier Stevens
More File Selection Gaffes
2020-10-24/a>
Guy Bruneau
An Alternative to Shodan, Censys with User-Agent CensysInspect/1.1
2020-10-22/a>
Jan Kopriva
BazarLoader phishing lures: plan a Halloween party, get a bonus and be fired in the same afternoon
2020-10-20/a>
Xavier Mertens
Mirai-alike Python Scanner
2020-10-09/a>
Jan Kopriva
Phishing kits as far as the eye can see
2020-10-03/a>
Guy Bruneau
Scanning for SOHO Routers
2020-09-21/a>
Jan Kopriva
Slightly broken overlay phishing
2020-09-17/a>
Xavier Mertens
Suspicious Endpoint Containment with OSSEC
2020-09-16/a>
Johannes Ullrich
Do Vulnerabilities Ever Get Old? Recent "Mirai" Variant Scanning for 20 Year Old Amanda Version?
2020-08-20/a>
Rob VandenBrink
Office 365 Mail Forwarding Rules (and other Mail Rules too)
2020-06-18/a>
Jan Kopriva
Broken phishing accidentally exploiting Outlook zero-day
2020-06-16/a>
Xavier Mertens
Sextortion to The Next Level
2020-06-13/a>
Guy Bruneau
Mirai Botnet Activity
2020-05-27/a>
Jan Kopriva
Frankenstein's phishing using Google Cloud Storage
2020-04-30/a>
Xavier Mertens
Collecting IOCs from IMAP Folder
2020-04-18/a>
Guy Bruneau
Maldoc Falsely Represented as DOCX Invoice Redirecting to Fake Apple Store
2020-04-17/a>
Xavier Mertens
Weaponized RTF Document Generator & Mailer in PowerShell
2020-04-13/a>
Jan Kopriva
Look at the same phishing campaign 3 months apart
2020-03-28/a>
Didier Stevens
Covid19 Domain Classifier
2020-03-27/a>
Johannes Ullrich
Help us classify Covid19 related domains https://isc.sans.edu/covidclassifier.html (login required)
2020-03-22/a>
Didier Stevens
More COVID-19 Themed Malware
2020-02-27/a>
Xavier Mertens
Offensive Tools Are For Blue Teams Too
2020-02-10/a>
Jan Kopriva
Current PayPal phishing campaign or "give me all your personal information"
2020-02-03/a>
Jan Kopriva
Analysis of a triple-encrypted AZORult downloader
2020-01-16/a>
Jan Kopriva
Picks of 2019 malware - the large, the small and the one full of null bytes
2019-12-15/a>
Didier Stevens
VirusTotal Email Submissions
2019-12-06/a>
Jan Kopriva
Phishing with a self-contained credentials-stealing webpage
2019-12-05/a>
Jan Kopriva
E-mail from Agent Tesla
2019-12-04/a>
Jan Kopriva
Analysis of a strangely poetic malware
2019-11-26/a>
Jan Kopriva
Lessons learned from playing a willing phish
2019-11-22/a>
Xavier Mertens
Abusing Web Filters Misconfiguration for Reconnaissance
2019-11-19/a>
Johannes Ullrich
Cheap Chinese JAWS of DVR Exploitability on Port 60001
2019-10-31/a>
Jan Kopriva
EML attachments in O365 - a recipe for phishing
2019-10-30/a>
Xavier Mertens
Keep an Eye on Remote Access to Mailboxes
2019-10-24/a>
Johannes Ullrich
Your Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment?
2019-10-17/a>
Jan Kopriva
Phishing e-mail spoofing SPF-enabled domain
2019-08-01/a>
Johannes Ullrich
What is Listening On Port 9527/TCP?
2019-07-26/a>
Kevin Shortt
DVRIP Port 34567 - Uptick
2019-07-17/a>
Xavier Mertens
Analyzis of DNS TXT Records
2019-06-27/a>
Rob VandenBrink
Finding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell
2019-04-24/a>
Rob VandenBrink
Where have all the Domain Admins gone? Rooting out Unwanted Domain Administrators
2019-04-13/a>
Johannes Ullrich
Configuring MTA-STS and TLS Reporting For Your Domain
2019-04-11/a>
Johannes Ullrich
How to Find Hidden Cameras in your AirBNB
2019-04-07/a>
Guy Bruneau
Fake Office 365 Payment Information Update
2019-03-27/a>
Xavier Mertens
Running your Own Passive DNS Service
2019-03-21/a>
Xavier Mertens
New Wave of Extortion Emails: Central Intelligence Agency Case
2019-03-06/a>
Xavier Mertens
Keep an Eye on Disposable Email Addresses
2019-02-19/a>
Didier Stevens
Identifying Files: Failure Happens
2019-02-11/a>
Didier Stevens
Have You Seen an Email Virus Recently?
2018-12-23/a>
Guy Bruneau
Scanning Activity, end Goal is to add Hosts to Mirai Botnet
2018-12-21/a>
Lorna Hutcheson
Phishing Attempts That Bypass 2FA
2018-11-18/a>
Guy Bruneau
Multipurpose PCAP Analysis Tool
2018-10-31/a>
Brad Duncan
More malspam using password-protected Word docs
2018-08-23/a>
Xavier Mertens
Simple Phishing Through formcrafts.com
2018-08-22/a>
Deborah Hale
Email/password Frustration
2018-08-19/a>
Didier Stevens
Video: Peeking into msg files - revisited
2018-08-11/a>
Didier Stevens
Peeking into msg files - revisited
2018-07-23/a>
Didier Stevens
Analyzing MSG files
2018-07-15/a>
Didier Stevens
Extracting BTC addresses from emails
2018-06-22/a>
Lorna Hutcheson
XPS Attachment Used for Phishing
2018-05-16/a>
Mark Hofman
EFAIL, a weakness in openPGP and S\MIME
2018-03-01/a>
Johannes Ullrich
Why Does Emperor Xi Dislike Winnie the Pooh and Scrambled Eggs?
2018-01-19/a>
Jim Clausing
Followup to IPv6 brute force and IPv6 blocking
2018-01-07/a>
Guy Bruneau
SSH Scans by Clients Types
2017-12-27/a>
Guy Bruneau
What are your Security Challenges for 2018?
2017-12-13/a>
Xavier Mertens
Tracking Newly Registered Domains
2017-11-16/a>
Xavier Mertens
Suspicious Domains Tracking Dashboard
2017-11-10/a>
Bojan Zdrnja
Battling e-mail phishing
2017-10-15/a>
Didier Stevens
Peeking into .msg files
2017-09-05/a>
Johannes Ullrich
The Mirai Botnet: A Look Back and Ahead At What's Next
2017-08-28/a>
Johannes Ullrich
An Update On DVR Malware: A DVR Torture Chamber
2017-08-14/a>
Didier Stevens
Sometimes it's just SPAM
2017-07-05/a>
Didier Stevens
Selecting domains with random names
2017-06-02/a>
Xavier Mertens
Phishing Campaigns Follow Trends
2017-05-20/a>
Xavier Mertens
Typosquatting: Awareness and Hunting
2017-05-06/a>
Xavier Mertens
The story of the CFO and CEO...
2017-01-13/a>
Xavier Mertens
Who's Attacking Me?
2016-12-26/a>
Russ McRee
Critical security update: PHPMailer 5.2.20 (CVE-2016-10045)
2016-12-19/a>
John Bambenek
UPDATED x1: Mirai Scanning for Port 6789 Looking for New Victims / Now hitting tcp/23231
2016-12-09/a>
Rick Wanner
Mirai - now with DGA
2016-12-07/a>
Xavier Mertens
The Passwords You Should Never Use
2016-11-23/a>
Tom Webb
Mapping Attack Methodology to Controls
2016-10-25/a>
Xavier Mertens
Another Day, Another Spam...
2016-10-23/a>
Johannes Ullrich
ISC Briefing: Large DDoS Attack Against Dyn
2016-10-02/a>
Guy Bruneau
Is there an Infosec Cybersecurity Talent Shortage?
2016-06-29/a>
Xavier Mertens
Phishing Campaign with Blurred Images
2016-06-01/a>
Xavier Mertens
Docker Containers Logging
2016-03-06/a>
Jim Clausing
Novel method for slowing down Locky on Samba server using fail2ban
2016-01-09/a>
Xavier Mertens
Virtual Bitlocker Containers
2015-12-28/a>
Rick Wanner
Adobe Flash and Adobe AIR Updates - https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
2015-09-08/a>
Lenny Zeltser
A Close Look at PayPal Overpayment Scams That Target Craigslist Sellers
2015-02-27/a>
Rick Wanner
Tails 1.3 released - https://tails.boum.org/news/version_1.3/index.en.html
2015-02-20/a>
Tom Webb
Fast analysis of a Tax Scam
2014-09-07/a>
Johannes Ullrich
Odd Persistent Password Bruteforcing
2014-08-12/a>
Adrien de Beaupre
Adobe updates for 2014/08
2014-07-09/a>
Daniel Wesemann
Who owns your typo?
2014-06-11/a>
Daniel Wesemann
Help your pilot fly!
2014-03-13/a>
Daniel Wesemann
Identification and authentication are hard ... finding out intention is even harder
2014-01-31/a>
Chris Mohan
Attack on Yahoo mail accounts
2014-01-30/a>
Johannes Ullrich
New gTLDs appearing in the root zone
2014-01-28/a>
Kevin Shortt
Sendmail v8.14.8 released - http://www.sendmail.com/sm/open_source/download/8.14.8/?show_rs=1#RS
2014-01-24/a>
Johannes Ullrich
How to send mass e-mail the right way
2014-01-16/a>
Kevin Shortt
Port 4028 - Interesting Activity
2014-01-08/a>
Kevin Shortt
Intercepted Email Attempts to Steal Payments
2014-01-01/a>
Russ McRee
Six degrees of celebration: Juniper, ANT, Shodan, Maltego, Cisco, and Tails
2013-12-21/a>
Guy Bruneau
Strange DNS Queries - Request for Packets
2013-10-05/a>
Richard Porter
Adobe Breach Notification, Notifications?
2013-08-21/a>
Rob VandenBrink
Fibre Channel Reconnaissance - Reloaded
2013-06-27/a>
Tony Carothers
Ruby Update for SSL Vulnerability
2013-05-01/a>
Daniel Wesemann
The cost of cleaning up
2013-03-29/a>
Chris Mohan
Fake Link removal requests
2013-02-25/a>
Johannes Ullrich
Mass-Customized Malware Lures: Don't trust your cat!
2013-01-09/a>
Rob VandenBrink
SQL Injection Flaw in Ruby on Rails
2013-01-09/a>
Rob VandenBrink
Hotmail seeing some temporary access issues
2012-08-21/a>
Adrien de Beaupre
RuggedCom fails key management 101 on Rugged Operating System (ROS)
2012-07-25/a>
Johannes Ullrich
Apple OS X 10.8 (Mountain Lion) released
2012-06-15/a>
Johannes Ullrich
Authenticating E-Mail
2012-04-30/a>
Rob VandenBrink
FCC posts Enquiry Documents on Google Wardriving
2012-03-13/a>
Lenny Zeltser
Please transfer this email to your CEO or appropriate person, thanks
2012-02-07/a>
Johannes Ullrich
Secure E-Mail Access
2012-01-22/a>
Lorna Hutcheson
Mailbag - "Attacks"
2011-12-06/a>
Kevin Shortt
Cain & Abel v4.9.43 Released - http://www.oxid.it/
2011-11-11/a>
Rick Wanner
APPLE-SA-2011-11-10-2 Time Capsule and AirPort Base Station (802.11n) Firmware 7.6 update
2011-11-11/a>
Rick Wanner
Adobe Air updated to 3.1.0.4880
2011-07-25/a>
Bojan Zdrnja
When the FakeAV coder(s) fail
2011-07-10/a>
Raul Siles
Jailbreakme Takes Advantage of 0-day PDF Vuln in Apple iOS Devices
2011-06-08/a>
Johannes Ullrich
Spam from compromised Hotmail accounts
2011-05-01/a>
Deborah Hale
Another Potentially Malicious Email Making The Rounds
2011-04-11/a>
Johannes Ullrich
GMail User Using 2FA Warned of Access From China
2011-02-21/a>
Adrien de Beaupre
Winamp forums compromised
2011-01-04/a>
Johannes Ullrich
Microsoft Advisory: Vulnerability in Graphics Rendering Engine
2010-12-30/a>
Rick Wanner
SamuraiWTF Review over at ISSA Toolsmith
2010-10-22/a>
Manuel Humberto Santander Pelaez
Intypedia project
2010-09-09/a>
Marcus Sachs
'Here You Have' Email
2010-08-29/a>
Swa Frantzen
Abandoned free email accounts
2010-08-06/a>
Rob VandenBrink
FOXIT PDF Reader update to resolve iPhone/iPad Jailbreak issue ==> http://www.foxitsoftware.com/announcements/2010861227.html
2010-07-24/a>
Manuel Humberto Santander Pelaez
Transmiting logon information unsecured in the network
2010-05-23/a>
Manuel Humberto Santander Pelaez
e-mail scam announcing Fidel Castro's funeral ... and nasty malware to your computer.
2010-03-08/a>
Raul Siles
Samurai WTF 0.8
2010-03-05/a>
Kyle Haugsness
False scare email proclaiming North Korea nuclear launch against Japan
2010-01-14/a>
Bojan Zdrnja
Rogue AV exploiting Haiti earthquake
2010-01-13/a>
Johannes Ullrich
SMS Donations Advertised via Twitter
2010-01-12/a>
Johannes Ullrich
Baidu defaced - Domain Registrar Tampering
2010-01-12/a>
Johannes Ullrich
Haiti Earthquake: Possible scams / malware
2009-11-13/a>
Deborah Hale
Pushdo/Cutwail Spambot - A Little Known BIG Problem
2009-11-13/a>
Adrien de Beaupre
Conficker patch via email?
2009-11-09/a>
Chris Carboni
80's Flashback on Jailbroken iPhones
2009-10-15/a>
Deborah Hale
Cyber Security Awareness Month - Day 15 - Ports 995, 465, and 993 - Secure Email
2009-10-09/a>
Rob VandenBrink
THAWTE to discontinue free Email Certificate Services and Web of Trust Service
2009-10-08/a>
Johannes Ullrich
Cyber Security Awareness Month - Day 8 - Port 25 - SMTP
2009-10-05/a>
Adrien de Beaupre
Time to change your hotmail/gmail/yahoo password
2009-09-01/a>
Guy Bruneau
Gmail Down
2009-07-18/a>
Patrick Nolan
Chrome update contains Security fixes
2009-05-04/a>
Tom Liston
Facebook phishing malware
2009-05-02/a>
Rick Wanner
More Swine/Mexican/H1N1 related domains
2009-04-27/a>
Johannes Ullrich
Swine Flu (Mexican Flu) related domains
2009-04-07/a>
Johannes Ullrich
SSH scanning from compromised mail servers
2009-02-24/a>
G. N. White
Gmail Access Issues Early This AM
2009-01-11/a>
Deborah Hale
The Frustration of Phishing Attacks
2009-01-03/a>
Rick Wanner
RAID != Backup
2008-11-30/a>
Mari Nichols
Rejected Email Issues
2008-11-29/a>
Pedro Bueno
Possible Mumbai Scams?
2008-11-17/a>
Jim Clausing
Critical update to Adobe AIR
2008-10-17/a>
Rick Wanner
Day 18 - Containing Other Incidents
2008-10-15/a>
Rick Wanner
Day 15 - Containing the Damage From a Lost or Stolen Laptop
2008-10-12/a>
Mari Nichols
Day 12 Containment: Gathering Evidence That Can be Used in Court
2008-07-17/a>
Mari Nichols
Adobe Reader 9 Released
2008-05-22/a>
Chris Carboni
From the mailbag
2008-04-04/a>
Daniel Wesemann
Tax day scams
2008-03-30/a>
Mark Hofman
Mail Anyone?
2006-11-29/a>
Toby Kohlenberg
New Vulnerability Announcement and patches from Apple
2006-09-21/a>
Johannes Ullrich
Apple updates Airport Drivers
2006-08-31/a>
Swa Frantzen
Mailbag grab
ANALYSIS
2026-05-06/a>
Guy Bruneau
An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary]
2026-04-29/a>
Guy Bruneau
Danger of Libredtail [Guest Diary]
2026-03-18/a>
Guy Bruneau
Interesting Message Stored in Cowrie Logs
2026-03-11/a>
Guy Bruneau
When your IoT Device Logs in as Admin, It?s too Late! [Guest Diary]
2026-03-04/a>
Guy Bruneau
Differentiating Between a Targeted Intrusion and an Automated Opportunistic Scanning [Guest Diary]
2026-02-24/a>
Guy Bruneau
Finding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary]
2026-01-07/a>
Guy Bruneau
Analysis using Gephi with DShield Sensor Data
2025-08-13/a>
Guy Bruneau
AI and Faster Attack Analysis [Guest Diary]
2025-07-09/a>
Guy Bruneau
SSH Tunneling in Action: direct-tcp requests [Guest Diary]
2025-07-07/a>
Xavier Mertens
What's My (File)Name?
2025-04-02/a>
Guy Bruneau
Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive [Guest Diary]
2025-03-06/a>
Guy Bruneau
DShield Traffic Analysis using ELK
2025-01-09/a>
Guy Bruneau
Examining Redtail Analyzing a Sophisticated Cryptomining Malware and its Advanced Tactics [Guest Diary]
2024-12-17/a>
Guy Bruneau
Command Injection Exploit For PHPUnit before 4.8.28 and 5.x before 5.6.3 [Guest Diary]
2024-12-11/a>
Guy Bruneau
Vulnerability Symbiosis: vSphere?s CVE-2024-38812 and CVE-2024-38813 [Guest Diary]
2024-10-17/a>
Guy Bruneau
Scanning Activity from Subnet 15.184.0.0/16
2024-09-25/a>
Guy Bruneau
OSINT - Image Analysis or More Where, When, and Metadata [Guest Diary]
2024-09-18/a>
Guy Bruneau
Time-to-Live Analysis of DShield Data with Vega-Lite
2024-09-11/a>
Guy Bruneau
Hygiene, Hygiene, Hygiene! [Guest Diary]
2024-08-27/a>
Guy Bruneau
Vega-Lite with Kibana to Parse and Display IP Activity over Time
2024-08-16/a>
Jesse La Grew
[Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools
2024-06-13/a>
Guy Bruneau
The Art of JQ and Command-line Fu [Guest Diary]
2024-05-28/a>
Guy Bruneau
Is that It? Finding the Unknown: Correlations Between Honeypot Logs & PCAPs [Guest Diary]
2024-04-29/a>
Guy Bruneau
Linux Trojan - Xorddos with Filename eyshcjdmzg
2024-03-29/a>
Xavier Mertens
Quick Forensics Analysis of Apache logs
2024-02-25/a>
Guy Bruneau
Utilizing the VirusTotal API to Query Files Uploaded to DShield Honeypot [Guest Diary]
2024-02-03/a>
Guy Bruneau
DShield Sensor Log Collection with Elasticsearch
2023-11-17/a>
Jan Kopriva
Phishing page with trivial anti-analysis features
2023-02-04/a>
Guy Bruneau
Assemblyline as a Malware Analysis Sandbox
2023-01-21/a>
Guy Bruneau
DShield Sensor JSON Log to Elasticsearch
2023-01-08/a>
Guy Bruneau
DShield Sensor JSON Log Analysis
2022-07-29/a>
Johannes Ullrich
PDF Analysis Intro and OpenActions Entries
2022-07-18/a>
Didier Stevens
Adding Your Own Keywords To My PDF Tools
2022-06-01/a>
Jan Kopriva
HTML phishing attachments - now with anti-analysis features
2021-04-10/a>
Guy Bruneau
Building an IDS Sensor with Suricata & Zeek with Logs to ELK
2021-04-06/a>
Jan Kopriva
Malspam with Lokibot vs. Outlook and RFCs
2021-01-30/a>
Guy Bruneau
PacketSifter as Network Parsing and Telemetry Tool
2021-01-14/a>
Bojan Zdrnja
Dynamically analyzing a heavily obfuscated Excel 4 macro malicious file
2020-12-03/a>
Brad Duncan
Traffic Analysis Quiz: Mr Natural
2020-11-11/a>
Brad Duncan
Traffic Analysis Quiz: DESKTOP-FX23IK5
2020-10-01/a>
Daniel Wesemann
Making sense of Azure AD (AAD) activity logs
2020-09-20/a>
Guy Bruneau
Analysis of a Salesforce Phishing Emails
2020-06-01/a>
Jim Clausing
Stackstrings, type 2
2020-05-02/a>
Guy Bruneau
Phishing PDF with Unusual Hostname
2020-01-25/a>
Guy Bruneau
Is Threat Hunting the new Fad?
2020-01-12/a>
Guy Bruneau
ELK Dashboard and Logstash parser for tcp-honeypot Logs
2019-12-29/a>
Guy Bruneau
ELK Dashboard for Pihole Logs
2019-12-07/a>
Guy Bruneau
Integrating Pi-hole Logs in ELK with Logstash
2019-11-23/a>
Guy Bruneau
Local Malware Analysis with Malice
2019-10-18/a>
Xavier Mertens
Quick Malicious VBS Analysis
2019-06-27/a>
Rob VandenBrink
Finding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell
2019-06-14/a>
Jim Clausing
A few Ghidra tips for IDA users, part 4 - function call graphs
2019-04-17/a>
Jim Clausing
A few Ghidra tips for IDA users, part 2 - strings and parameters
2019-04-08/a>
Jim Clausing
A few Ghidra tips for IDA users, part 1 - the decompiler/unreachable code
2019-04-03/a>
Jim Clausing
A few Ghidra tips for IDA users, part 0 - automatic comments for API call parameters
2019-03-31/a>
Didier Stevens
Maldoc Analysis of the Weekend by a Reader
2019-02-27/a>
Didier Stevens
Maldoc Analysis by a Reader
2018-11-18/a>
Guy Bruneau
Multipurpose PCAP Analysis Tool
2018-10-21/a>
Pasquale Stirparo
Beyond good ol’ LaunchAgent - part 0
2018-08-31/a>
Jim Clausing
Quickie: Using radare2 to disassemble shellcode
2018-06-01/a>
Remco Verhoef
Binary analysis with Radare2
2017-09-29/a>
Lorna Hutcheson
Good Analysis = Understanding(tools + logs + normal)
2017-07-09/a>
Russ McRee
Adversary hunting with SOF-ELK
2017-04-28/a>
Russell Eubanks
KNOW before NO
2017-01-28/a>
Lorna Hutcheson
Packet Analysis - Where do you start?
2016-12-24/a>
Didier Stevens
Pinging All The Way
2016-10-30/a>
Pasquale Stirparo
Volatility Bot: Automated Memory Analysis
2016-10-17/a>
Didier Stevens
Maldoc VBA Anti-Analysis: Video
2016-10-15/a>
Didier Stevens
Maldoc VBA Anti-Analysis
2016-05-14/a>
Guy Bruneau
INetSim as a Basic Honeypot
2016-04-21/a>
Daniel Wesemann
Decoding Pseudo-Darkleech (Part #2)
2015-05-03/a>
Russ McRee
VolDiff, for memory image differential analysis
2014-07-05/a>
Guy Bruneau
Malware Analysis with pedump
2014-04-21/a>
Daniel Wesemann
Finding the bleeders
2014-03-13/a>
Daniel Wesemann
Web server logs containing RS=^ ?
2014-01-14/a>
Chris Mohan
Spamming and scanning botnets - is there something I can do to block them from my site?
2013-10-28/a>
Daniel Wesemann
Exploit cocktail (Struts, Java, Windows) going after 3-month old vulnerabilities
2013-06-18/a>
Russ McRee
Volatility rules...any questions?
2013-05-11/a>
Lenny Zeltser
Extracting Digital Signatures from Signed Malware
2013-03-09/a>
Guy Bruneau
IPv6 Focus Month: IPv6 Encapsulation - Protocol 41
2013-02-03/a>
Lorna Hutcheson
Is it Really an Attack?
2013-01-08/a>
Jim Clausing
Cuckoo 0.5 is out and the world didn't end
2012-12-02/a>
Guy Bruneau
Collecting Logs from Security Devices at Home
2012-09-19/a>
Kevin Liston
Volatility: 2.2 is Coming Soon
2012-09-14/a>
Lenny Zeltser
Analyzing Malicious RTF Files Using OfficeMalScanner's RTFScan
2012-06-21/a>
Russ McRee
Analysis of drive-by attack sample set
2012-06-04/a>
Lenny Zeltser
Decoding Common XOR Obfuscation in Malicious Code
2012-05-23/a>
Mark Baggett
IP Fragmentation Attacks
2012-03-03/a>
Jim Clausing
New automated sandbox for Android malware
2012-02-07/a>
Jim Clausing
Book Review: Practical Packet Analysis, 2nd ed
2011-05-20/a>
Guy Bruneau
Sysinternals Updates, Analyzing Stuxnet Infection with Sysinternals Tools Part 3
2011-04-14/a>
Adrien de Beaupre
Sysinternals updates, a new blog post, and webcast
2011-02-01/a>
Lenny Zeltser
The Importance of HTTP Headers When Investigating Malicious Sites
2010-08-09/a>
Jim Clausing
Free/inexpensive tools for monitoring systems/networks
2010-07-21/a>
Adrien de Beaupre
autorun.inf and .lnk Malware (NOT 'Vulnerability in Windows Shell Could Allow Remote Code Execution' 2286198)
2010-05-26/a>
Bojan Zdrnja
Malware modularization and AV detection evasion
2010-04-11/a>
Marcus Sachs
Network and process forensics toolset
2010-03-26/a>
Daniel Wesemann
Getting the EXE out of the RTF again
2010-02-13/a>
Lorna Hutcheson
Network Traffic Analysis in Reverse
2010-01-14/a>
Bojan Zdrnja
PDF Babushka
2010-01-07/a>
Daniel Wesemann
Static analysis of malicious PDFs
2010-01-07/a>
Daniel Wesemann
Static analysis of malicous PDFs (Part #2)
2009-11-25/a>
Jim Clausing
Updates to my GREM Gold scripts and a new script
2009-11-03/a>
Bojan Zdrnja
Opachki, from (and to) Russia with love
2009-09-25/a>
Lenny Zeltser
Categories of Common Malware Traits
2009-07-26/a>
Jim Clausing
New Volatility plugins
2009-07-02/a>
Daniel Wesemann
Getting the EXE out of the RTF
2009-04-15/a>
Marcus Sachs
2009 Data Breach Investigation Report
2009-03-13/a>
Bojan Zdrnja
When web application security, Microsoft and the AV vendors all fail
2009-02-10/a>
Bojan Zdrnja
More tricks from Conficker and VM detection
2009-02-09/a>
Bojan Zdrnja
Some tricks from Conficker's bag
2009-01-18/a>
Daniel Wesemann
3322. org
2009-01-15/a>
Bojan Zdrnja
Conficker's autorun and social engineering
2009-01-07/a>
Bojan Zdrnja
An Israeli patriot program or a trojan
2009-01-02/a>
Rick Wanner
Tools on my Christmas list.
2008-12-13/a>
Jim Clausing
Followup from last shift and some research to do.
2008-11-17/a>
Marcus Sachs
New Tool: NetWitness Investigator
2008-11-17/a>
Jim Clausing
Finding stealth injected DLLs
2008-09-03/a>
Daniel Wesemann
Static analysis of Shellcode - Part 2
2008-07-07/a>
Pedro Bueno
Bad url classification
2006-10-02/a>
Jim Clausing
Reader's tip of the day: ratios vs. raw counts
2006-09-18/a>
Jim Clausing
Log analysis follow up
2006-09-09/a>
Jim Clausing
Log Analysis tips?
2006-09-09/a>
Jim Clausing
A few preliminary log analysis thoughts
Homepage
Diaries
Podcasts
Jobs
Data
TCP/UDP Port Activity
Port Trends
SSH/Telnet Scanning Activity
Weblogs
Domains
Threat Feeds Activity
Threat Feeds Map
Useful InfoSec Links
Presentations & Papers
Research Papers
API
Tools
DShield Sensor
DNS Looking Glass
Honeypot (RPi/AWS)
InfoSec Glossary
Contact Us
Contact Us
About Us
Handlers
About Us
Slack Channel
Mastodon
Bluesky
X
Have you seen our swag?
Buy SANS ISC Gear