Date Author Title

USE CASE

2017-06-17Guy BruneauMapping Use Cases to Logs. Which Logs are the Most Important to Collect?

USE

2024-10-16/a>Johannes UllrichThe Top 10 Not So Common SSH Usernames and Passwords
2024-07-24/a>Xavier Mertens"Mouse Logger" Malicious Python Script
2024-02-28/a>Johannes UllrichExploit Attempts for Unknown Password Reset Vulnerability
2024-01-24/a>Johannes UllrichHow Bad User Interfaces Make Security Tools Harmful
2024-01-08/a>Jesse La GrewWhat is that User Agent?
2023-09-05/a>Jesse La GrewCommon usernames submitted to honeypots
2022-01-05/a>Xavier MertensCode Reuse In the Malware Landscape
2021-09-24/a>Xavier MertensKeep an Eye on Your Users Mobile Devices (Simple Inventory)
2021-04-24/a>Guy BruneauBase64 Hashes Used in Web Scanning
2021-03-02/a>Russ McReeAdversary Simulation with Sim
2020-04-03/a>Xavier MertensObfuscated with a Simple 0x0A
2019-12-12/a>Xavier MertensCode & Data Reuse in the Malware Ecosystem
2019-07-25/a>Rob VandenBrinkWhen Users Attack! Users (and Admins) Thwarting Security Controls
2019-07-05/a>Didier StevensA "Stream O" Maldoc
2019-07-01/a>Didier StevensMaldoc: Payloads in User Forms
2018-05-27/a>Guy BruneauCapture and Analysis of User Agents
2018-01-01/a>Didier StevensWhat is new?
2017-12-19/a>Xavier MertensExample of 'MouseOver' Link in a Powerpoint File
2017-06-17/a>Guy BruneauMapping Use Cases to Logs. Which Logs are the Most Important to Collect?
2014-11-04/a>Daniel WesemannWhois someone else?
2014-04-05/a>Jim ClausingThose strange e-mails with URLs in them can lead to Android malware
2013-11-22/a>Rick WannerTales of Password Reuse
2013-02-19/a>Johannes UllrichEDUCAUSE Breach
2013-01-15/a>Rob VandenBrinkWhen Disabling IE6 (or Java, or whatever) is not an Option...
2012-09-21/a>Guy BruneauStoring your Collection of Malware Samples with Malwarehouse
2012-07-14/a>Tony CarothersUser Awareness and Education
2012-04-05/a>Johannes UllrichEvil hides everywhere: Web Application Exploits in Headers
2011-08-26/a>Daniel WesemannUser Agent 007
2011-08-09/a>Swa Frantzenabuse handling
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - Remote User VPN Tunnels - to Split or not to Split?
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - Remote User VPN Access – Are things getting too easy, or too hard?
2010-06-01/a>Mark HofmanSPF how useful is it?
2009-12-19/a>Deborah HaleFrustrations of ISP Abuse Handling
2009-11-03/a>Andre LudwigSURBL now posting abuse statistics for TLD's
2009-05-28/a>Jim ClausingMore new volatility plugins
2009-04-06/a>Adrien de BeaupreAbuse addresses
2008-09-18/a>Bojan ZdrnjaMonitoring HTTP User-Agent fields
2008-04-10/a>Deborah HaleAbuse Contacts

CASE

2017-06-17/a>Guy BruneauMapping Use Cases to Logs. Which Logs are the Most Important to Collect?