Internet Storm Center
Sign In
Sign Up
Handler on Duty:
Didier Stevens
Threat Level:
green
Date
Author
Title
BASE RATE FALLACY
2014-03-13
Daniel Wesemann
Identification and authentication are hard ... finding out intention is even harder
BASE
2024-10-15/a>
Johannes Ullrich
Angular-base64-update Demo Script Exploited (CVE-2024-42640)
2024-09-17/a>
Xavier Mertens
23:59, Time to Exfiltrate!
2023-08-25/a>
Xavier Mertens
Python Malware Using Postgresql for C2 Communications
2023-07-23/a>
Guy Bruneau
Install & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-05-07/a>
Didier Stevens
Quickly Finding Encoded Payloads in Office Documents
2022-10-16/a>
Didier Stevens
Video: Analysis of a Malicious HTML File (QBot)
2022-10-13/a>
Didier Stevens
Analysis of a Malicious HTML File (QBot)
2022-09-09/a>
Didier Stevens
Maldoc With Decoy BASE64
2022-08-26/a>
Xavier Mertens
Paypal Phishing/Coinbase in One Image
2022-06-19/a>
Didier Stevens
Video: Decoding Obfuscated BASE64 Statistically
2022-06-18/a>
Didier Stevens
Decoding Obfuscated BASE64 Statistically
2021-09-16/a>
Jan Kopriva
Phishing 101: why depend on one suspicious message subject when you can use many?
2021-07-18/a>
Didier Stevens
Video: CyberChef BASE85 Decoding
2021-07-17/a>
Didier Stevens
BASE85 Decoding With base64dump.py
2021-07-16/a>
Xavier Mertens
Multiple BaseXX Obfuscations
2021-07-02/a>
Xavier Mertens
"inception.py"... Multiple Base64 Encodings
2021-04-24/a>
Guy Bruneau
Base64 Hashes Used in Web Scanning
2021-01-29/a>
Xavier Mertens
Sensitive Data Shared with Cloud Services
2020-12-26/a>
Didier Stevens
base64dump.py Supported Encodings
2020-12-07/a>
Didier Stevens
Corrupt BASE64 Strings: Detection and Decoding
2020-09-27/a>
Didier Stevens
Decoding Corrupt BASE64 Strings
2020-06-27/a>
Didier Stevens
Video: YARA's BASE64 Strings
2020-06-14/a>
Didier Stevens
YARA's BASE64 Strings
2020-06-08/a>
Didier Stevens
Translating BASE64 Obfuscated Scripts
2020-05-30/a>
Didier Stevens
YARA v4.0.1
2020-05-10/a>
Didier Stevens
YARA v4.0.0: BASE64 Strings
2019-10-27/a>
Guy Bruneau
Unusual Activity with Double Base64 Encoding
2019-06-03/a>
Didier Stevens
Tip: BASE64 Encoded PowerShell Scripts are Recognizable by the Amount of Letter As
2018-02-02/a>
Xavier Mertens
Simple but Effective Malicious XLS Sheet
2017-10-18/a>
Renato Marinho
Baselining Servers to Detect Outliers
2017-08-07/a>
Xavier Mertens
Increase of phpMyAdmin scans
2017-07-24/a>
Russell Eubanks
Trends Over Time
2017-07-08/a>
Xavier Mertens
A VBScript with Obfuscated Base64 Data
2017-03-19/a>
Xavier Mertens
Searching for Base64-encoded PE Files
2017-01-31/a>
Johannes Ullrich
Malicious Office files using fileless UAC bypass to drop KEYBASE malware
2016-11-24/a>
Didier Stevens
Extracting Shellcode From JavaScript
2016-10-08/a>
Russell Eubanks
Unauthorized Change Detected!
2016-01-30/a>
Xavier Mertens
All CVE Details at Your Fingertips
2015-07-05/a>
Didier Stevens
Working with base64
2014-09-27/a>
Guy Bruneau
What has Bash and Heartbleed Taught Us?
2014-03-13/a>
Daniel Wesemann
Identification and authentication are hard ... finding out intention is even harder
2010-06-07/a>
Manuel Humberto Santander Pelaez
Software Restriction Policy to keep malware away
2009-06-04/a>
Raul Siles
New version (v 1.4.3.1) of BASE available
2008-12-17/a>
donald smith
Team CYMRU's Malware Hash Registry
2006-09-13/a>
Swa Frantzen
PHP - shared hosters, take note.
RATE
2017-05-10/a>
Johannes Ullrich
Read This If You Are Using a Script to Pull Data From This Site
2014-03-13/a>
Daniel Wesemann
Identification and authentication are hard ... finding out intention is even harder
2013-03-03/a>
Richard Porter
Uptick in MSSQL Activity
2013-02-06/a>
Johannes Ullrich
Are you losing system logging information (and don't know it)?
2012-10-30/a>
Mark Hofman
Cyber Security Awareness Month - Day 30 - DSD 35 mitigating controls
2010-10-03/a>
Adrien de Beaupre
Canada's Cyber Security Strategy released today
2010-07-08/a>
Kyle Haugsness
Pirate Bay account database compromised
2008-07-18/a>
Adrien de Beaupre
Exit process?
2008-03-30/a>
Mark Hofman
Mail Anyone?
FALLACY
2014-03-13/a>
Daniel Wesemann
Identification and authentication are hard ... finding out intention is even harder
Homepage
Diaries
Podcasts
Jobs
Data
TCP/UDP Port Activity
Port Trends
SSH/Telnet Scanning Activity
Weblogs
Threat Feeds Activity
Threat Feeds Map
Useful InfoSec Links
Presentations & Papers
Research Papers
API
Tools
DShield Sensor
DNS Looking Glass
Honeypot (RPi/AWS)
InfoSec Glossary
Contact Us
Contact Us
About Us
Handlers
About Us
Slack Channel
Mastodon
Bluesky
X
Subscribe to the daily podcast via
RSS
or
iTunes