2023-08-11 | Xavier Mertens | Show me All Your Windows! |
2022-02-18 | Xavier Mertens | Remcos RAT Delivered Through Double Compressed Archive |
2020-04-30 | Xavier Mertens | Collecting IOCs from IMAP Folder |
2020-02-28 | Xavier Mertens | Show me Your Clipboard Data! |
2020-02-14 | Xavier Mertens | Keep an Eye on Command-Line Browsers |
2019-01-21 | Didier Stevens | Suspicious GET Request: Do You Know What This Is? |
2018-02-25 | Didier Stevens | Retrieving malware over Tor on Windows |
2015-01-27 | Johannes Ullrich | New Critical GLibc Vulnerability CVE-2015-0235 (aka GHOST) |
2013-07-16 | Johannes Ullrich | Why don't we see more examples of web app attacks via POST? |
2011-01-13 | Rob VandenBrink | Is Infosec seeing "Death by a Thousand Budget Cuts"? |
2010-12-23 | Mark Hofman | White house greeting cards |
2009-06-04 | Raul Siles | Targeted e-mail attacks asking to verify wire transfer details |
2009-02-25 | Swa Frantzen | Targeted link diversion attempts |
2009-01-18 | Maarten Van Horenbeeck | Targeted social engineering |
2008-09-22 | Maarten Van Horenbeeck | Data exfiltration and the use of anonymity providers |
2008-07-09 | Johannes Ullrich | Unpatched Word Vulnerability |
2008-05-26 | Marcus Sachs | Predictable Response |
2008-04-24 | Maarten Van Horenbeeck | Targeted attacks using malicious PDF files |
2008-03-27 | Maarten Van Horenbeeck | Guarding the guardians: a story of PGP key ring theft |