Date Author Title

STUFF I LEARNED SCRIPTING

2011-11-10Rob VandenBrinkStuff I Learned Scripting - - Parsing XML in a One-Liner

STUFF

2024-05-15/a>Rob VandenBrinkGot MFA? If not, Now is the Time!
2011-11-10/a>Rob VandenBrinkStuff I Learned Scripting - - Parsing XML in a One-Liner

I

2024-11-19/a>Xavier MertensDetecting the Presence of a Debugger in Linux
2024-11-18/a>Johannes UllrichExploit attempts for unpatched Citrix vulnerability
2024-11-17/a>Johannes UllrichAncient TP-Link Backdoor Discovered by Attackers
2024-11-07/a>Xavier MertensSteam Account Checker Poisoned with Infostealer
2024-11-06/a>Jesse La Grew[Guest Diary] Insights from August Web Traffic Surge
2024-10-31/a>Guy BruneauOctober 2024 Activity with Username chenzilong
2024-10-28/a>Johannes UllrichApple Updates Everything
2024-10-17/a>Guy BruneauScanning Activity from Subnet 15.184.0.0/16
2024-10-15/a>Johannes UllrichA Network Nerd's Take on Emergency Preparedness
2024-10-14/a>Xavier MertensPhishing Page Delivered Through a Blob URL
2024-10-09/a>Xavier MertensFrom Perfctl to InfoStealer
2024-10-08/a>Johannes UllrichMicrosoft Patch Tuesday - October 2024
2024-10-07/a>Xavier MertensmacOS Sequoia: System/Network Admins, Hold On!
2024-10-03/a>Guy BruneauKickstart Your DShield Honeypot [Guest Diary]
2024-09-26/a>Johannes UllrichPatch for Critical CUPS vulnerability: Don't Panic
2024-09-25/a>Johannes UllrichDNS Reflection Update and Odd Corrupted DNS Requests
2024-09-25/a>Guy BruneauOSINT - Image Analysis or More Where, When, and Metadata [Guest Diary]
2024-09-24/a>Johannes UllrichExploitation of RAISECOM Gateway Devices Vulnerability CVE-2024-7120
2024-09-18/a>Guy BruneauTime-to-Live Analysis of DShield Data with Vega-Lite
2024-09-18/a>Xavier MertensPython Infostealer Patching Windows Exodus App
2024-09-17/a>Xavier Mertens23:59, Time to Exfiltrate!
2024-09-16/a>Xavier MertensManaging PE Files With Overlays
2024-09-13/a>Jesse La GrewFinding Honeypot Data Clusters Using DBSCAN: Part 2
2024-09-11/a>Xavier MertensPython Libraries Used for Malicious Purposes
2024-09-11/a>Guy BruneauHygiene, Hygiene, Hygiene! [Guest Diary]
2024-09-06/a>Jesse La GrewEnrichment Data: Keeping it Fresh
2024-09-04/a>Guy Bruneau Attack Surface [Guest Diary]
2024-08-30/a>Jesse La GrewSimulating Traffic With Scapy
2024-08-29/a>Xavier MertensLive Patching DLLs with Python
2024-08-27/a>Xavier MertensWhy Is Python so Popular to Infect Windows Hosts?
2024-08-27/a>Guy BruneauVega-Lite with Kibana to Parse and Display IP Activity over Time
2024-08-26/a>Xavier MertensFrom Highly Obfuscated Batch File to XWorm and Redline
2024-08-23/a>Jesse La GrewPandas Errors: What encoding are my logs in?
2024-08-22/a>Johannes UllrichOpenAI Scans for Honeypots. Artificially Malicious? Action Abuse?
2024-08-20/a>Johannes UllrichWhere are we with CVE-2024-38063: Microsoft IPv6 Vulnerability
2024-08-20/a>Guy BruneauMapping Threats with DNSTwist and the Internet Storm Center [Guest Diary]
2024-08-16/a>Jesse La Grew[Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools
2024-08-14/a>Xavier MertensMultiple Malware Dropped Through MSI Package
2024-08-07/a>Guy BruneauSame Scripts, Different Day: What My DShield Honeypot Taught Me About the Importance of Security Fundamentals [Guest Diary]
2024-08-01/a>Johannes UllrichTracking Proxy Scans with IPv4.Games
2024-07-31/a>Johannes UllrichIncreased Activity Against Apache OFBiz CVE-2024-32113
2024-07-30/a>Johannes UllrichApple Patches Everything. July 2024 Edition
2024-07-26/a>Xavier MertensExelaStealer Delivered "From Russia With Love"
2024-07-25/a>Xavier MertensXWorm Hidden With Process Hollowing
2024-07-23/a>Johannes UllrichNew Exploit Variation Against D-Link NAS Devices (CVE-2024-3273)
2024-07-22/a>Johannes UllrichCrowdStrike: The Monday After
2024-07-19/a>Johannes UllrichWidespread Windows Crashes Due to Crowdstrike Updates
2024-07-16/a>Jan Kopriva"Reply-chain phishing" with a twist
2024-07-16/a>Guy BruneauWho You Gonna Call? AndroxGh0st Busters! [Guest Diary]
2024-07-13/a>Didier Stevens16-bit Hash Collisions in .xls Spreadsheets
2024-07-10/a>Jesse La GrewFinding Honeypot Data Clusters Using DBSCAN: Part 1
2024-07-09/a>Johannes UllrichMicrosoft Patch Tuesday July 2024
2024-07-08/a>Xavier MertensKunai: Keep an Eye on your Linux Hosts Activity
2024-07-01/a>Johannes UllrichSSH "regreSSHion" Remote Code Execution Vulnerability in OpenSSH.
2024-06-26/a>Guy BruneauWhat Setting Live Traps for Cybercriminals Taught Me About Security [Guest Diary]
2024-06-20/a>Guy BruneauNo Excuses, Free Tools to Help Secure Authentication in Ubuntu Linux [Guest Diary]
2024-06-17/a>Xavier MertensNew NetSupport Campaign Delivered Through MSIX Packages
2024-06-13/a>Guy BruneauThe Art of JQ and Command-line Fu [Guest Diary]
2024-06-11/a>Johannes UllrichMicrosoft Patch Tuesday June 2024
2024-06-07/a>Johannes UllrichFinding End of Support Dates: UK PTSI Regulation
2024-06-06/a>Xavier MertensMalicious Python Script with a "Best Before" Date
2024-06-04/a>Johannes UllrichNo-Defender, Yes-Defender
2024-06-03/a>Didier StevensA Wireshark Lua Dissector for Fixed Field Length Protocols
2024-05-31/a>Xavier Mertens"K1w1" InfoStealer Uses gofile.io for Exfiltration
2024-05-30/a>Xavier MertensFeeding MISP with OSSEC
2024-05-28/a>Guy BruneauIs that It? Finding the Unknown: Correlations Between Honeypot Logs & PCAPs [Guest Diary]
2024-05-22/a>Rob VandenBrinkNMAP Scanning without Scanning (Part 2) - The ipinfo API
2024-05-22/a>Guy BruneauAnalysis of ?redtail? File Uploads to ICS Honeypot, a Multi-Architecture Coin Miner [Guest Diary]
2024-05-16/a>Rob VandenBrinkWhy yq? Adventures in XML
2024-05-15/a>Rob VandenBrinkGot MFA? If not, Now is the Time!
2024-05-08/a>Xavier MertensAnalyzing Synology Disks on Linux
2024-05-06/a>Johannes UllrichDetecting XFinity/Comcast DNS Spoofing
2024-04-29/a>Guy BruneauLinux Trojan - Xorddos with Filename eyshcjdmzg
2024-04-29/a>Johannes UllrichD-Link NAS Device Backdoor Abused
2024-04-25/a>Jesse La GrewDoes it matter if iptables isn't running on my honeypot?
2024-04-22/a>Jan KoprivaIt appears that the number of industrial devices accessible from the internet has risen by 30 thousand over the past three years
2024-04-17/a>Xavier MertensMalicious PDF File Used As Delivery Mechanism
2024-04-16/a>Yee Ching TokRolling Back Packages on Ubuntu/Debian
2024-04-11/a>Yee Ching TokEvolution of Artificial Intelligence Systems and Ensuring Trustworthiness
2024-04-07/a>Guy BruneauA Use Case for Adding Threat Hunting to Your Security Operations Team. Detecting Adversaries Abusing Legitimate Tools in A Customer Environment. [Guest Diary]
2024-03-31/a>Didier StevensWireshark 4.2.4 Released
2024-03-29/a>Xavier MertensQuick Forensics Analysis of Apache logs
2024-03-28/a>Xavier MertensFrom JavaScript to AsyncRAT
2024-03-19/a>Johannes UllrichAttacker Hunting Firewalls
2024-03-17/a>Guy BruneauGamified Learning: Using Capture the Flag Challenges to Supplement Cybersecurity Training [Guest Diary]
2024-03-14/a>Jan KoprivaIncrease in the number of phishing messages pointing to IPFS and to R2 buckets
2024-03-13/a>Xavier MertensUsing ChatGPT to Deobfuscate Malicious Scripts
2024-03-12/a>Johannes UllrichMicrosoft Patch Tuesday - March 2024
2024-03-10/a>Guy BruneauWhat happens when you accidentally leak your AWS API keys? [Guest Diary]
2024-03-07/a>Jesse La Grew[Guest Diary] AWS Deployment Risks - Configuration and Credential File Targeting
2024-03-06/a>Bojan ZdrnjaScanning and abusing the QUIC protocol
2024-03-05/a>Johannes UllrichApple Releases iOS/iPadOS Updates with Zero Day Fixes.
2024-03-03/a>Guy BruneauCapturing DShield Packets with a LAN Tap [Guest Diary]
2024-02-29/a>Jesse La Grew[Guest Diary] Dissecting DarkGate: Modular Malware Delivery and Persistence as a Service.
2024-02-28/a>Johannes UllrichExploit Attempts for Unknown Password Reset Vulnerability
2024-02-27/a>Johannes UllrichTake Downs and the Rest of Us: Do they matter?
2024-02-25/a>Guy BruneauUtilizing the VirusTotal API to Query Files Uploaded to DShield Honeypot [Guest Diary]
2024-02-21/a>Jan KoprivaPhishing pages hosted on archive.org
2024-02-20/a>Xavier MertensPython InfoStealer With Dynamic Sandbox Detection
2024-02-18/a>Guy BruneauMirai-Mirai On The Wall... [Guest Diary]
2024-02-15/a>Jesse La Grew[Guest Diary] Learning by doing: Iterative adventures in troubleshooting
2024-02-12/a>Johannes UllrichExploit against Unnamed "Bytevalue" router vulnerability included in Mirai Bot
2024-02-09/a>Xavier MertensMSIX With Heavily Obfuscated PowerShell Script
2024-02-06/a>Jan KoprivaComputer viruses are celebrating their 40th birthday (well, 54th, really)
2024-02-05/a>Jesse La GrewPublic Information and Email Spam
2024-02-03/a>Guy BruneauDShield Sensor Log Collection with Elasticsearch
2024-01-31/a>Johannes UllrichThe Fun and Dangers of Top Level Domains (TLDs)
2024-01-30/a>Johannes UllrichWhat did I say to make you stop talking to me?
2024-01-29/a>Johannes UllrichExploit Flare Up Against Older Altassian Confluence Vulnerability
2024-01-26/a>Xavier MertensA Batch File With Multiple Payloads
2024-01-25/a>Xavier MertensFacebook AdsManager Targeted by a Python Infostealer
2024-01-24/a>Johannes UllrichHow Bad User Interfaces Make Security Tools Harmful
2024-01-22/a>Johannes UllrichApple Updates Everything - New 0 Day in WebKit
2024-01-18/a>Johannes UllrichMore Scans for Ivanti Connect "Secure" VPN. Exploits Public
2024-01-17/a>Jesse La GrewNumber Usage in Passwords
2024-01-16/a>Johannes UllrichScans for Ivanti Connect "Secure" VPN Vulnerability (CVE-2023-46805, CVE-2024-21887)
2024-01-12/a>Xavier MertensOne File, Two Payloads
2024-01-07/a>Guy BruneauSuspicious Prometei Botnet Activity
2024-01-06/a>Xavier MertensAre you sure of your password?
2024-01-04/a>Jim ClausingWireshark updates
2024-01-02/a>Johannes UllrichFingerprinting SSH Identification Strings
2023-12-31/a>Tom WebbPi-Hole Pi4 Docker Deployment
2023-12-27/a>Guy BruneauUnveiling the Mirai: Insights into Recent DShield Honeypot Activity [Guest Diary]
2023-12-23/a>Xavier MertensPython Keylogger Using Mailtrap.io
2023-12-22/a>Xavier MertensShall We Play a Game?
2023-12-20/a>Guy BruneauHow to Protect your Webserver from Directory Enumeration Attack ? Apache2 [Guest Diary]
2023-12-16/a>Xavier MertensAn Example of RocketMQ Exploit Scanner
2023-12-15/a>Xavier MertensCSharp Payload Phoning to a CobaltStrike Server
2023-12-13/a>Guy BruneauT-shooting Terraform for DShield Honeypot in Azure [Guest Diary]
2023-12-12/a>Johannes UllrichMicrosoft Patch Tuesday December 2023
2023-12-11/a>Rob VandenBrinkWhat is sitemap.xml, and Why a Pentester Should Care
2023-12-11/a>Johannes UllrichApple Patches Everything
2023-12-10/a>Guy BruneauHoneypots: From the Skeptical Beginner to the Tactical Enthusiast
2023-12-09/a>Didier StevensIPv4-mapped IPv6 Address Used For Obfuscation
2023-12-06/a>Guy BruneauRevealing the Hidden Risks of QR Codes [Guest Diary]
2023-12-05/a>Didier StevensCobalt Strike's "Runtime Configuration"
2023-11-30/a>John BambenekProphetic Post by Intern on CVE-2023-1389 Foreshadows Mirai Botnet Expansion Today
2023-11-27/a>Guy BruneauDecoding the Patterns: Analyzing DShield Honeypot Activity [Guest Diary]
2023-11-25/a>Didier StevensWireshark 4.2.0 Released
2023-11-22/a>Guy BruneauCVE-2023-1389: A New Means to Expand Botnets
2023-11-20/a>Jesse La GrewOverflowing Web Honeypot Logs
2023-11-18/a>Xavier MertensQuasar RAT Delivered Through Updated SharpLoader
2023-11-17/a>Jan KoprivaPhishing page with trivial anti-analysis features
2023-11-15/a>Xavier MertensRedline Dropped Through MSIX Package
2023-11-09/a>Xavier MertensVisual Examples of Code Injection
2023-11-09/a>Guy BruneauRouters Targeted for Gafgyt Botnet [Guest Diary]
2023-11-08/a>Xavier MertensExample of Phishing Campaign Project File
2023-11-06/a>Johannes UllrichExploit Activity for CVE-2023-22518, Atlassian Confluence Data Center and Server
2023-11-01/a>Xavier MertensMalware Dropped Through a ZPAQ Archive
2023-10-31/a>Xavier MertensMultiple Layers of Anti-Sandboxing Techniques
2023-10-29/a>Guy BruneauSpam or Phishing? Looking for Credentials & Passwords
2023-10-28/a>Xavier MertensSize Matters for Many Security Controls
2023-10-25/a>Johannes UllrichApple Patches Everything. Releases iOS 17.1, MacOS 14.1 and updates for older versions fixing exploited vulnerability
2023-10-23/a>Johannes UllrichHow an AppleTV may take down your (#IPv6) network
2023-10-20/a>Yee Ching TokVMware Releases Security Patches for Fusion, Workstation and Aria Operations for Logs
2023-10-18/a>Jesse La GrewHiding in Hex
2023-10-16/a>Jan KoprivaAre typos still relevant as an indicator of phishing?
2023-10-15/a>Guy BruneauDomain Name Used as Password Captured by DShield Sensor
2023-10-10/a>Johannes UllrichOctober 2023 Microsoft Patch Tuesday Summary
2023-10-09/a>Didier StevensZIP's DOSTIME & DOSDATE Formats
2023-10-08/a>Didier StevensWireshark 4.2.0 First Release Candidate
2023-10-07/a>Jim ClausingWireshark releases 2 updates in one day. Mac users especially will want the latest.
2023-10-07/a>Didier StevensBinary IPv6 Addresses
2023-10-05/a>Jim ClausingNew tool: le-hex-to-ip.py
2023-10-03/a>Tom WebbAre Local LLMs Useful in Incident Response?
2023-09-29/a>Xavier MertensAre You Still Storing Passwords In Plain Text Files?
2023-09-26/a>Jan KoprivaA new spin on the ZeroFont phishing technique
2023-09-26/a>Johannes UllrichApple Releases MacOS Sonoma Including Numerous Security Patches
2023-09-23/a>Guy BruneauScanning for Laravel - a PHP Framework for Web Artisants
2023-09-18/a>Johannes UllrichInternet Wide Multi VPN Search From Single /24 Network
2023-09-14/a>Jesse La GrewDShield and qemu Sitting in a Tree: L-O-G-G-I-N-G
2023-09-11/a>Johannes UllrichApple fixes 0-Day Vulnerability in Older Operating Systems
2023-09-09/a>Guy Bruneau?Anyone get the ASN of the Truck that Hit Me?!?: Creating a PowerShell Function to Make 3rd Party API Calls for Extending Honeypot Information [Guest Diary]
2023-09-07/a>Johannes UllrichApple Releases iOS/iPadOS 16.6.1, macOS 13.5.2, watchOS 9.6.2 fixing two zeroday vulnerabilities
2023-09-06/a>Johannes UllrichSecurity Relevant DNS Records
2023-09-05/a>Jesse La GrewCommon usernames submitted to honeypots
2023-09-03/a>Didier StevensAnalysis of a Defective Phishing PDF
2023-09-02/a>Jesse La GrewWhat is the origin of passwords submitted to honeypots?
2023-08-31/a>Jan KoprivaThe low, low cost of (committing) cybercrime
2023-08-31/a>Guy BruneauPotential Weaponizing of Honeypot Logs [Guest Diary]
2023-08-28/a>Johannes UllrichHome Office / Small Business Hurricane Prep
2023-08-26/a>Xavier MertensmacOS: Who?s Behind This Network Connection?
2023-08-23/a>Xavier MertensMore Exotic Excel Files Dropping AgentTesla
2023-08-22/a>Xavier MertensHave You Ever Heard of the Fernet Encryption Algorithm?
2023-08-21/a>Xavier MertensQuick Malware Triage With Inotify Tools
2023-08-20/a>Guy BruneauSystemBC Malware Activity
2023-08-18/a>Xavier MertensFrom a Zalando Phishing to a RAT
2023-08-17/a>Jesse La GrewCommand Line Parsing - Are These Really Unique Strings?
2023-08-12/a>Guy BruneauDShield Sensor Monitoring with a Docker ELK Stack [Guest Diary]
2023-08-11/a>Xavier MertensShow me All Your Windows!
2023-08-04/a>Xavier MertensAre Leaked Credentials Dumps Used by Attackers?
2023-07-29/a>Xavier MertensDo Attackers Pay More Attention to IPv6?
2023-07-26/a>Xavier MertensSuspicious IP Addresses Avoided by Malware Samples
2023-07-24/a>Rob VandenBrinkJQ: Another Tool We Thought We Knew
2023-07-23/a>Guy BruneauInstall & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-07-21/a>Rob VandenBrinkShodan's API For The (Recon) Win!
2023-07-18/a>Johannes UllrichExploit Attempts for "Stagil navigation for Jira Menus & Themes" CVE-2023-26255 and CVE-2023-26256
2023-07-13/a>Jesse La GrewDShield Honeypot Maintenance and Data Retention
2023-07-07/a>Xavier MertensDSSuite (Didier's Toolbox) Docker Image Update
2023-07-06/a>Jesse La GrewIDS Comparisons with DShield Honeypot Data
2023-07-01/a>Russ McReeSandfly Security
2023-06-30/a>Yee Ching TokDShield pfSense Client Update
2023-06-29/a>Brad DuncanGuLoader- or DBatLoader/ModiLoader-style infection for Remcos RAT
2023-06-28/a>Jan KoprivaKazakhstan - the world's last SSLv2 superpower... and a country with potentially vulnerable last-mile internet infrastructure
2023-06-27/a>Xavier MertensThe Importance of Malware Triage
2023-06-24/a>Guy BruneauEmail Spam with Attachment Modiloader
2023-06-22/a>Brad DuncanQakbot (Qbot) activity, obama271 distribution tag
2023-06-22/a>Johannes UllrichApple Patches Exploited Vulnerabilities in iOS/iPadOS, macOS, watchOS and Safari
2023-06-21/a>Yee Ching TokAnalyzing a YouTube Sponsorship Phishing Mail and Malware Targeting Content Creators
2023-06-19/a>Xavier MertensMalware Delivered Through .inf File
2023-06-17/a>Brad DuncanFormbook from Possible ModiLoader (DBatLoader)
2023-06-16/a>Xavier MertensAnother RAT Delivered Through VBS
2023-06-15/a>Yee Ching TokSupervision and Verification in Vulnerability Management
2023-06-11/a>Guy BruneauDShield Honeypot Activity for May 2023
2023-06-09/a>Xavier MertensUndetected PowerShell Backdoor Disguised as a Profile File
2023-06-05/a>Johannes UllrichBrute Forcing Simple Archive Passwords
2023-05-30/a>Johannes UllrichYour Business Data and Machine Learning at Risk: Attacks Against Apache NiFi
2023-05-30/a>Brad DuncanMalspam pushes ModiLoader (DBatLoader) infection for Remcos RAT
2023-05-28/a>Guy BruneauWe Can no Longer Ignore the Cost of Cybersecurity
2023-05-26/a>Xavier MertensUsing DFIR Techniques To Recover From Infrastructure Outages
2023-05-24/a>Jesse La GrewMore Data Enrichment for Cowrie Logs
2023-05-24/a>Tom WebbIR Case/Alert Management
2023-05-22/a>Johannes UllrichProbes for recent ABUS Security Camera Vulnerability: Attackers keep an eye on everything.
2023-05-20/a>Xavier MertensPhishing Kit Collecting Victim's IP Address
2023-05-19/a>Xavier MertensWhen the Phisher Messes Up With Encoding
2023-05-18/a>Johannes UllrichA Quick Survey of .zip Domains: Your highest risk is running into Rick Astley.
2023-05-17/a>Xavier MertensIncrease in Malicious RAR SFX files
2023-05-16/a>Jesse La GrewSignals Defense With Faraday Bags & Flipper Zero
2023-05-15/a>Jan KoprivaOngoing Facebook phishing campaign without a sender and (almost) without links
2023-05-14/a>Guy BruneauVMware Aria Operations addresses multiple Local Privilege Escalations and a Deserialization issue
2023-05-14/a>Guy BruneauDShield Sensor Update
2023-05-09/a>Russ McReeExploratory Data Analysis with CISSM Cyber Attacks Database - Part 2
2023-05-04/a>Xavier MertensInfostealer Embedded in a Word Document
2023-05-03/a>Xavier MertensIncreased Number of Configuration File Scans
2023-05-01/a>Jan Kopriva"Passive" analysis of a phishing attachment
2023-04-29/a>Didier StevensWireshark 4.0.5 Released
2023-04-28/a>Xavier MertensQuick IOC Scan With Docker
2023-04-26/a>Yee Ching TokStrolling through Cyberspace and Hunting for Phishing Sites
2023-04-18/a>Johannes UllrichUDDIs are back? Attackers rediscovering old exploits.
2023-04-17/a>Jan KoprivaThe strange case of Great honeypot of China
2023-04-12/a>Brad DuncanRecent IcedID (Bokbot) activity
2023-04-08/a>Xavier MertensMicrosoft Netlogon: Potential Upcoming Impacts of CVE-2022-38023
2023-04-07/a>Xavier MertensDetecting Suspicious API Usage with YARA Rules
2023-04-07/a>Johannes UllrichApple Patching Two 0-Day Vulnerabilities in iOS and macOS
2023-04-05/a>Jesse La GrewExploration of DShield Cowrie Data with jq
2023-04-04/a>Johannes UllrichAnalyzing the efile.com Malware "efail"
2023-04-03/a>Johannes UllrichTax Season Risks
2023-03-31/a>Guy BruneauUsing Linux grep and Windows findstr to Manipulate Files
2023-03-31/a>Jan KoprivaUse of X-Frame-Options and CSP frame-ancestors security headers on 1 million most popular domains
2023-03-30/a>Xavier MertensBypassing PowerShell Strong Obfuscation
2023-03-27/a>Johannes UllrichApple Updates Everything (including Studio Display)
2023-03-25/a>Guy BruneauMicrosoft Released an Update for Windows Snipping Tool Vulnerability
2023-03-22/a>Didier StevensWindows 11 Snipping Tool Privacy Bug: Inspecting PNG Files
2023-03-21/a>Didier StevensString Obfuscation: Character Pair Reversal
2023-03-20/a>Xavier MertensFrom Phishing Kit To Telegram... or Not!
2023-03-18/a>Xavier MertensOld Backdoor, New Obfuscation
2023-03-16/a>Xavier MertensSimple Shellcode Dissection
2023-03-15/a>Jan KoprivaIPFS phishing and the need for correctly set HTTP security headers
2023-03-12/a>Guy BruneauAsynRAT Trojan - Bill Payment (Pago de la factura)
2023-03-11/a>Xavier MertensOverview of a Mirai Payload Generator
2023-03-07/a>Johannes UllrichHackers Love This VSCode Extension: What You Can Do to Stay Safe
2023-03-01/a>Xavier MertensPython Infostealer Targeting Gamers
2023-02-28/a>Brad DuncanBB17 distribution Qakbot (Qbot) activity
2023-02-27/a>Xavier MertensPhishing Again and Again
2023-02-26/a>Didier Stevensoledump & MSI Files
2023-02-24/a>Brad DuncanURL files and WebDAV used for IcedID (Bokbot) infection
2023-02-22/a>Johannes UllrichInternet Wide Scan Fingerprinting Confluence Servers
2023-02-21/a>Xavier MertensPhishing Page Branded with Your Corporate Website
2023-02-19/a>Didier Stevens"Unsupported 16-bit Application" or HTML?
2023-02-18/a>Guy BruneauSpear Phishing Handlers for Username/Password
2023-02-16/a>Jan KoprivaHTML phishing attachment with browser-in-the-browser technique
2023-02-15/a>Rob VandenBrinkDNS Recon Redux - Zone Transfers (plus a time machine) for When You Can't do a Zone Transfer
2023-02-14/a>Johannes UllrichMicrosoft February 2023 Patch Tuesday
2023-02-13/a>Johannes UllrichVenmo Phishing Abusing LinkedIn "slink"
2023-02-10/a>Xavier MertensObfuscated Deactivation of Script Block Logging
2023-02-09/a>Xavier MertensA Backdoor with Smart Screenshot Capability
2023-02-06/a>Johannes UllrichAPIs Used by Bots to Detect Public IP address
2023-02-05/a>Didier StevensVideo: Analyzing Malicious OneNote Documents
2023-02-04/a>Guy BruneauAssemblyline as a Malware Analysis Sandbox
2023-02-03/a>Jim ClausingVMware workstation 17.0.1 fixes arbitrary file deletion issue - https://www.vmware.com/security/advisories/VMSA-2023-0003.html
2023-02-01/a>Didier StevensDetecting (Malicious) OneNote Files
2023-01-31/a>Jesse La GrewDShield Honeypot Setup with pfSense
2023-01-28/a>Didier StevensSysinternals Updates: RDCMan v2.92, Sysmon v14.14, and ZoomIt v6.12
2023-01-26/a>Tom WebbLive Linux IR with UAC
2023-01-25/a>Xavier MertensA First Malicious OneNote Document
2023-01-24/a>Johannes UllrichApple Updates (almost) Everything: Patch Overview
2023-01-23/a>Xavier MertensWho's Resolving This Domain?
2023-01-22/a>Didier StevensWireshark 4.0.3 Released
2023-01-21/a>Guy BruneauDShield Sensor JSON Log to Elasticsearch
2023-01-17/a>Johannes UllrichPacket Tuesday: IPv6 Router Advertisements https://www.youtube.com/watch?v=uRWpB_lYIZ8
2023-01-15/a>Johannes UllrichElon Musk Themed Crypto Scams Flooding YouTube Today
2023-01-12/a>Russ McReeProwler v3: AWS & Azure security assessments
2023-01-11/a>Jan KoprivaPassive detection of internet-connected systems affected by vulnerabilities from the CISA KEV catalog
2023-01-08/a>Guy BruneauDShield Sensor JSON Log Analysis
2023-01-06/a>Xavier MertensAutoIT Remains Popular in the Malware Landscape
2023-01-05/a>Brad DuncanMore Brazil malspam pushing Astaroth (Guildma) in January 2023
2023-01-04/a>Rob VandenBrinkUpdate to RTRBK - Diff and File Dates in PowerShell
2023-01-02/a>Xavier MertensNetworkMiner 2.8 Released
2022-12-30/a>Jan KoprivaSPF and DMARC use on GOV domains in different ccTLDs
2022-12-29/a>Jesse La GrewOpening the Door for a Knock: Creating a Custom DShield Listener
2022-12-22/a>Guy BruneauExchange OWASSRF Exploited for Remote Code Execution
2022-12-21/a>Guy BruneauDShield Sensor Setup in Azure
2022-12-20/a>Xavier MertensLinux File System Monitoring & Actions
2022-12-19/a>Xavier MertensHunting for Mastodon Servers
2022-12-18/a>Guy BruneauInfostealer Malware with Double Extension
2022-12-07/a>Jim ClausingWireshark 4.0.2 and 3.6.10 released
2022-12-04/a>Didier StevensFinger.exe LOLBin
2022-12-03/a>Guy BruneauLinux LOLBins Applications Available in Windows
2022-12-02/a>Brad Duncanobama224 distribution Qakbot tries .vhd (virtual hard disk) images
2022-11-29/a>Johannes UllrichIdentifying Groups of "Bot" Accounts on LinkedIn
2022-11-28/a>Johannes UllrichUkraine Themed Twitter Spam Pushing iOS Scareware
2022-11-24/a>Xavier MertensAttackers Keep Phishing Victims Under Stress
2022-11-19/a>Guy BruneauMcAfee Fake Antivirus Phishing Campaign is Back!
2022-11-17/a>Johannes UllrichLessons Learned from Automatic Failover: When 8.8.8.8 "disappears". IPv6 to the Rescue?
2022-11-10/a>Xavier MertensDo you collect "Observables" or "IOCs"?
2022-11-05/a>Guy BruneauWindows Malware with VHD Extension
2022-11-04/a>Xavier MertensRemcos Downloader with Unicode Obfuscation
2022-11-02/a>Brad DuncanWho put the "Dark" in DarkVNC?
2022-11-02/a>Rob VandenBrinkBreakpoints in Burp
2022-10-30/a>Didier StevensSysinternals Updates: Process Explorer v17.0, Handle v5.0, Process Monitor v3.92 and Sysmon v14.11
2022-10-27/a>Tom WebbSupersizing your DUO and 365 Integration
2022-10-24/a>Xavier MertensC2 Communications Through outlook.com
2022-10-23/a>Didier StevensVideo: PNG Analysis
2022-10-22/a>Didier Stevensrtfdump's Find Option
2022-10-21/a>Brad Duncansczriptzzbn inject pushes malware for NetSupport RAT
2022-10-19/a>Xavier MertensAre Internet Scanning Services Good or Bad for You?
2022-10-18/a>Xavier MertensPython Obfuscation for Dummies
2022-10-17/a>Xavier MertensFileless Powershell Dropper
2022-10-16/a>Didier StevensVideo: Analysis of a Malicious HTML File (QBot)
2022-10-15/a>Guy BruneauMalware - Covid Vaccination Supplier Declaration
2022-10-13/a>Didier StevensAnalysis of a Malicious HTML File (QBot)
2022-10-11/a>Johannes UllrichOctober 2022 Microsoft Patch Tuesday
2022-10-10/a>Didier StevensWireshark: Specifying a Protocol Stack Layer in Display Filters
2022-10-08/a>Didier StevensWireshark 4.0.0 Released
2022-10-07/a>Xavier MertensPowershell Backdoor with DGA Capability
2022-10-07/a>Xavier MertensCritical Fortinet Vulnerability Ahead
2022-10-04/a>Johannes UllrichCredential Harvesting with Telegram API
2022-09-29/a>Didier StevensPNG Analysis
2022-09-26/a>Xavier MertensEasy Python Sandbox Detection
2022-09-23/a>Xavier MertensKids Like Cookies, Malware Too!
2022-09-21/a>Xavier MertensPhishing Campaigns Use Free Online Resources
2022-09-19/a>Russ McReeChainsaw: Hunt, search, and extract event log records
2022-09-18/a>Didier StevensVideo: Grep & Tail -f With Notepad++
2022-09-18/a>Tom WebbPreventing ISO Malware
2022-09-17/a>Didier StevensVideo: Analyzing Obfuscated VBS with CyberChef
2022-09-15/a>Xavier MertensMalicious Word Document with a Frameset
2022-09-14/a>Xavier MertensEasy Process Injection within Python
2022-09-12/a>Johannes UllrichVirusTotal Result Comparisons for Honeypot Malware
2022-09-11/a>Didier StevensWireshark 3.6.8 and 4.0.0rc1 Released
2022-09-10/a>Guy BruneauPhishing Word Documents with Suspicious URL
2022-09-07/a>Johannes UllrichPHP Deserialization Exploit attempt
2022-09-06/a>Didier StevensAnalysis of an Encoded Cobalt Strike Beacon
2022-09-05/a>Didier StevensQuickie: Grep & Tail -f With Notepad++
2022-09-04/a>Didier StevensVideo: VBA Maldoc & UTF7 (APT-C-35)
2022-09-03/a>Didier StevensVideo: James Webb JPEG With Malware
2022-09-01/a>Johannes UllrichJolokia Scans: Possible Hunt for Vulnerable Apache Geode Servers (CVE-2022-37021)
2022-08-31/a>Johannes UllrichUnderscores and DNS: The Privacy Story
2022-08-30/a>Johannes UllrichTwo things that will never die: bash scripts and IRC!
2022-08-28/a>Didier StevensSysinternals Updates: Sysmon v14.0 and ZoomIt v6.01
2022-08-28/a>Didier StevensDealing With False Positives when Scanning Memory Dumps for Cobalt Strike Beacons
2022-08-26/a>Xavier MertensPaypal Phishing/Coinbase in One Image
2022-08-26/a>Guy BruneauHTTP/2 Packet Analysis with Wireshark
2022-08-24/a>Brad DuncanMonster Libra (TA551/Shathak) --> IcedID (Bokbot) --> Cobalt Strike & DarkVNC
2022-08-23/a>Xavier MertensWho's Looking at Your security.txt File?
2022-08-22/a>Xavier Mertens32 or 64 bits Malware?
2022-08-19/a>Brad DuncanBrazil malspam pushes Astaroth (Guildma) malware
2022-08-17/a>Johannes UllrichA Quick VoIP Experiment
2022-08-17/a>Johannes UllrichApple Patches Two Exploited Vulnerabilities
2022-08-14/a>Johannes UllrichRealtek SDK SIP ALG Vulnerability: A Big Deal, but not much you can do about it. CVE 2022-27255
2022-08-13/a>Guy BruneauPhishing HTML Attachment as Voicemail Audio Transcription
2022-08-12/a>Brad DuncanMonster Libra (TA551/Shathak) pushes IcedID (Bokbot) with Dark VNC and Cobalt Strike
2022-08-11/a>Xavier MertensInfoStealer Script Based on Curl and NSudo
2022-08-10/a>Johannes UllrichAnd Here They Come Again: DNS Reflection Attacks
2022-08-04/a>Jan KoprivaTLP 2.0 is here
2022-08-03/a>Johannes Ullrichl9explore and LeakIX Internet wide recon scans.
2022-08-02/a>Johannes UllrichIncrease in Chinese "Hacktivism" Attacks
2022-08-02/a>Johannes UllrichA Little DDoS in the Morning - Followup
2022-08-01/a>Johannes UllrichA Little DDoS In the Morning
2022-07-30/a>Didier StevensWireshark 3.6.7 Released
2022-07-29/a>Johannes UllrichPDF Analysis Intro and OpenActions Entries
2022-07-28/a>Johannes UllrichExfiltrating Data With Bookmarks
2022-07-27/a>Brad DuncanIcedID (Bokbot) with Dark VNC and Cobalt Strike
2022-07-26/a>Xavier MertensHow is Your macOS Security Posture?
2022-07-25/a>Xavier MertensPowerShell Script with Fileless Capability
2022-07-24/a>Didier StevensVideo: Maldoc: non-ASCII VBA Identifiers
2022-07-23/a>Guy BruneauAnalysis of SSH Honeypot Data with PowerBI
2022-07-22/a>Yee Ching TokAn Analysis of a Discerning Phishing Website
2022-07-21/a>Didier StevensMaldoc: non-ASCII VBA Identifiers
2022-07-20/a>Xavier MertensMalicious Python Script Behaving Like a Rubber Ducky
2022-07-20/a>Johannes UllrichApple Patches Everything Day
2022-07-18/a>Didier StevensAdding Your Own Keywords To My PDF Tools
2022-07-17/a>Didier StevensPython: Files In Use By Another Process
2022-07-13/a>Xavier MertensUsing Referers to Detect Phishing Attacks
2022-07-09/a>Didier Stevens7-Zip Editing & MoW
2022-07-08/a>Johannes UllrichISC Website Redesign
2022-07-07/a>Brad DuncanEmotet infection with Cobalt Strike
2022-07-06/a>Johannes UllrichHow Many SANs are Insane?
2022-07-05/a>Jan KoprivaEternalBlue 5 years after WannaCry and NotPetya
2022-07-04/a>Didier Stevens7-Zip & MoW: "For Office files"
2022-07-03/a>Didier Stevens7-Zip & MoW
2022-06-30/a>Brad DuncanCase Study: Cobalt Strike Server Lives on After Its Domain Is Suspended
2022-06-28/a>Johannes UllrichPossible Scans for HiByMusic Devices
2022-06-27/a>Johannes UllrichEncrypted Client Hello: Anybody Using it Yet?
2022-06-26/a>Didier StevensMy Paste Command
2022-06-26/a>Didier StevensMore Decoding Analysis
2022-06-25/a>Xavier MertensMalicious Code Passed to PowerShell via the Clipboard
2022-06-24/a>Xavier MertensPython (ab)using The Windows GUI
2022-06-23/a>Xavier MertensFLOSS 2.0 Has Been Released
2022-06-22/a>Xavier MertensMalicious PowerShell Targeting Cryptocurrency Browser Extensions
2022-06-21/a>Johannes UllrichExperimental New Domain / Domain Age API
2022-06-19/a>Didier StevensWireshark 3.6.6 Released
2022-06-19/a>Didier StevensVideo: Decoding Obfuscated BASE64 Statistically
2022-06-18/a>Didier StevensDecoding Obfuscated BASE64 Statistically
2022-06-17/a>Brad DuncanMalspam pushes Matanbuchus malware, leads to Cobalt Strike
2022-06-16/a>Xavier MertensHoudini is Back Delivered Through a JavaScript Dropper
2022-06-12/a>Didier StevensQuickie: Follina, RTF & Explorer Preview Pane
2022-06-10/a>Russ McReeEPSScall: An Exploit Prediction Scoring System App
2022-06-09/a>Brad DuncanTA570 Qakbot (Qbot) tries CVE-2022-30190 (Follina) exploit (ms-msdt)
2022-06-04/a>Guy BruneauSpam Email Contains a Very Large ISO file
2022-06-03/a>Xavier MertensSandbox Evasion... With Just a Filename!
2022-06-02/a>Johannes UllrichQuick Answers in Incident Response: RECmd.exe
2022-06-01/a>Jan KoprivaHTML phishing attachments - now with anti-analysis features
2022-05-31/a>Xavier MertensFirst Exploitation of Follina Seen in the Wild
2022-05-30/a>Xavier MertensNew Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme (CVE-2022-30190)
2022-05-29/a>Didier StevensExtracting The Overlay Of A PE File
2022-05-28/a>Didier StevensHuge Signed PE File: Keeping The Signature
2022-05-26/a>Didier StevensHuge Signed PE File
2022-05-24/a>Yee Ching Tokctx Python Library Updated with "Extra" Features
2022-05-23/a>Johannes UllrichAttacker Scanning for jQuery-File-Upload
2022-05-20/a>Xavier MertensA 'Zip Bomb' to Bypass Security Controls & Sandboxes
2022-05-19/a>Brad DuncanBumblebee Malware from TransferXL URLs
2022-05-18/a>Jan KoprivaDo you want 30 BTC? Nothing is easier (or cheaper) in this phishing campaign...
2022-05-15/a>Didier StevensWireshark 3.6.5 Released
2022-05-14/a>Didier StevensQuick Analysis Of Phishing MSG
2022-05-13/a>Johannes UllrichFrom 0-Day to Mirai: 7 days of BIG-IP Exploits
2022-05-10/a>Renato MarinhoMicrosoft May 2022 Patch Tuesday
2022-05-09/a>Xavier MertensOctopus Backdoor is Back with a New Embedded Obfuscated Bat File
2022-05-08/a>Johannes UllrichF5 BIG-IP Unauthenticated RCE Vulnerability (CVE-2022-1388)
2022-05-07/a>Guy BruneauPhishing PDF Received in my ISC Mailbox
2022-05-05/a>Brad DuncanPassword-protected Excel spreadsheet pushes Remcos RAT
2022-05-03/a>Johannes UllrichSome Honeypot Updates
2022-05-03/a>Rob VandenBrinkFinding the Real "Last Patched" Day (Interim Version)
2022-04-29/a>Rob VandenBrinkUsing Passive DNS sources for Reconnaissance and Enumeration
2022-04-28/a>Johannes UllrichA Day of SMB: What does our SMB/RPC Honeypot see? CVE-2022-26809
2022-04-27/a>Jan KoprivaMITRE ATT&CK v11 - a small update that can help (not just) with detection engineering
2022-04-24/a>Didier StevensAnalyzing a Phishing Word Document
2022-04-23/a>Guy BruneauAre Roku Streaming Devices Safe from Exploitation?
2022-04-21/a>Xavier MertensMulti-Cryptocurrency Clipboard Swapper
2022-04-20/a>Brad Duncan"aa" distribution Qakbot (Qbot) infection with DarkVNC traffic
2022-04-19/a>Johannes UllrichResetting Linux Passwords with U-Boot Bootloaders
2022-04-17/a>Didier StevensVideo: Office Protects You From Malicious ISO Files
2022-04-16/a>Didier StevensOffice Protects You From Malicious ISO Files
2022-04-14/a>Johannes UllrichAn Update on CVE-2022-26809 - MSRPC Vulnerabliity - PATCH NOW
2022-04-13/a>Jan KoprivaHow is Ukrainian internet holding up during the Russian invasion?
2022-04-11/a>Johannes UllrichSpring: It isn't just about Spring4Shell. Spring Cloud Function Vulnerabilities are being probed too.
2022-04-10/a>Didier StevensVideo: Method For String Extraction Filtering
2022-04-09/a>Didier StevensMethod For String Extraction Filtering
2022-04-07/a>Johannes UllrichWhat is BIMI and how is it supposed to help with Phishing.
2022-04-06/a>Brad DuncanWindows MetaStealer Malware
2022-04-05/a>Johannes UllrichWebLogic Crypto Miner Malware Disabling Alibaba Cloud Monitoring Tools
2022-04-04/a>Johannes UllrichEmptying the Phishtank: Are WordPress sites the Mosquitoes of the Internet?
2022-03-31/a>Johannes UllrichSpring Vulnerability Update - Exploitation Attempts CVE-2022-22965
2022-03-31/a>Johannes UllrichApple Patches Actively Exploited Vulnerability in macOS, iOS and iPadOS,
2022-03-30/a>Johannes UllrichPossible new Java Spring Framework Vulnerability (Updated: not a Spring problem)
2022-03-30/a>Johannes UllrichJava Springtime Confusion: What Vulnerability are We Talking About
2022-03-29/a>Johannes UllrichMore Fake/Typosquatting Twitter Accounts Asking for Ukraine Crytocurrency Donations
2022-03-28/a>Johannes UllrichBGP Hijacking of Twitter Prefix by RTComm.ru
2022-03-27/a>Didier StevensWireshark 3.6.3 Released
2022-03-27/a>Didier StevensVideo: Maldoc Cleaned by Anti-Virus
2022-03-26/a>Guy BruneauIs buying Cyber Insurance a Must Now?
2022-03-25/a>Xavier MertensXLSB Files: Because Binary is Stealthier Than XML
2022-03-24/a>Xavier MertensMalware Delivered Through Free Sharing Tool
2022-03-23/a>Brad DuncanArkei Variants: From Vidar to Mars Stealer
2022-03-22/a>Johannes UllrichStatement by President Biden: What you need to do (or not do)
2022-03-18/a>Johannes UllrichScans for Movable Type Vulnerability (CVE-2021-20837)
2022-03-16/a>Brad DuncanQakbot infection with Cobalt Strike and VNC activity
2022-03-15/a>Xavier MertensClean Binaries with Suspicious Behaviour
2022-03-14/a>Johannes UllrichApple Updates Everything: MacOS 12.3, XCode 13.3, tvOS 15.4, watchOS 8.5, iPadOS 15.4 and more
2022-03-12/a>Didier StevensICMP Messages: Original Datagram Field
2022-03-10/a>Xavier MertensCredentials Leaks on VirusTotal
2022-03-09/a>Xavier MertensInfostealer in a Batch File
2022-03-07/a>Johannes UllrichNo Bitcoin - No Problem: Follow Up to Last Weeks Donation Scam
2022-03-06/a>Didier StevensVideo: TShark & Multiple IP Addresses
2022-03-04/a>Johannes UllrichScam E-Mail Impersonating Red Cross
2022-03-03/a>Johannes UllrichAttackers Search For Exposed "LuCI" Folders: Help me understand this attack
2022-03-02/a>Johannes UllrichThe More Often Something is Repeated, the More True It Becomes: Dealing with Social Media
2022-02-26/a>Guy BruneauUsing Snort IDS Rules with NetWitness PacketDecoder
2022-02-25/a>Didier StevensWindows, Fixed IPv4 Addresses and APIPA
2022-02-24/a>Xavier MertensUkraine & Russia Situation From a Domain Names Perspective
2022-02-22/a>Xavier MertensA Good Old Equation Editor Vulnerability Delivering Malware
2022-02-20/a>Didier StevensVideo: YARA's Console Module
2022-02-19/a>Didier StevensWireshark 3.6.2 Released
2022-02-18/a>Xavier MertensRemcos RAT Delivered Through Double Compressed Archive
2022-02-16/a>Brad DuncanAstaroth (Guildma) infection
2022-02-14/a>Johannes UllrichReminder: Decoding TLS Client Hellos to non TLS servers
2022-02-13/a>Guy BruneauDHL Spear Phishing to Capture Username/Password
2022-02-11/a>Xavier MertensCinaRAT Delivered Through HTML ID Attributes
2022-02-10/a>Johannes UllrichZyxel Network Storage Devices Hunted By Mirai Variant
2022-02-10/a>Johannes UllrichiOS/iPadOS and MacOS Update: Single WebKit 0-Day Vulnerability Patched
2022-02-09/a>Brad DuncanExample of Cobalt Strike from Emotet infection
2022-02-07/a>Johannes Ullrichweb3 phishing via self-customizing landing pages
2022-02-05/a>Didier StevensPower over Ethernet and Thermal Imaging
2022-02-02/a>Johannes UllrichFinding elFinder: Who is looking for your files?
2022-02-01/a>Xavier MertensAutomation is Nice But Don't Replace Your Knowledge
2022-01-31/a>Xavier MertensBe careful with RPMSG files
2022-01-29/a>Guy BruneauSIEM In this Decade, Are They Better than the Last?
2022-01-28/a>Xavier MertensMalicious ISO Embedded in an HTML Page
2022-01-27/a>Johannes UllrichApple Patches Everything
2022-01-26/a>Jan KoprivaOver 20 thousand servers have their iLO interfaces exposed to the internet, many with outdated and vulnerable versions of FW
2022-01-25/a>Brad DuncanEmotet Stops Using 0.0.0.0 in Spambot Traffic
2022-01-25/a>Bojan ZdrnjaLocal privilege escalation vulnerability in polkit's pkexec (CVE-2021-4034)
2022-01-21/a>Xavier MertensObscure Wininet.dll Feature?
2022-01-20/a>Xavier MertensRedLine Stealer Delivered Through FTP
2022-01-18/a>Jan KoprivaPhishing e-mail with...an advertisement?
2022-01-16/a>Guy Bruneau10 Most Popular Targeted Ports in the Past 3 Weeks
2022-01-11/a>Johannes UllrichMicrosoft Patch Tuesday - January 2022
2022-01-09/a>Didier StevensExtracting Cobalt Strike Beacons from MSBuild Scripts
2022-01-08/a>Didier StevensTShark & jq
2022-01-07/a>Xavier MertensCustom Python RAT Builder
2022-01-05/a>Xavier MertensCode Reuse In the Malware Landscape
2022-01-04/a>Xavier MertensA Simple Batch File That Blocks People
2022-01-03/a>Xavier MertensMcAfee Phishing Campaign with a Nice Fake Scan
2022-01-02/a>Guy BruneauExchange Server - Email Trapped in Transport Queues
2022-01-01/a>Didier StevensExpect Regressions
2021-12-28/a>Russ McReeLotL Classifier tests for shells, exfil, and miners
2021-12-26/a>Didier StevensQuicktip: TShark's Options -e and -T
2021-12-25/a>Didier StevensTShark Tip: Extracting Field Values From Capture Files
2021-12-23/a>Xavier MertensNicely Crafted indeed.com Login Page
2021-12-23/a>Johannes UllrichDefending Cloud IMDS Against log4shell (and more)
2021-12-22/a>Brad DuncanDecember 2021 Forensic Contest: Answers and Analysis
2021-12-21/a>Xavier MertensMore Undetected PowerShell Dropper
2021-12-20/a>Jan KoprivaPowerPoint attachments, Agent Tesla and code reuse in malware
2021-12-19/a>Didier StevensOffice 2021: VBA Project Version
2021-12-17/a>Rob VandenBrinkDR Automation - Using Public DNS APIs
2021-12-16/a>Brad DuncanHow the "Contact Forms" campaign tricks people
2021-12-14/a>Johannes UllrichLog4j: Getting ready for the long haul (CVE-2021-44228)
2021-12-10/a>Xavier MertensPython Shellcode Injection From JSON Data
2021-12-09/a>Yee Ching TokPhishing Direct Messages via Discord
2021-12-08/a>Brad DuncanDecember 2021 Forensic Challenge
2021-12-06/a>Xavier MertensThe Importance of Out-of-Band Networks
2021-12-04/a>Guy BruneauA Review of Year 2021
2021-12-02/a>Brad DuncanTA551 (Shathak) pushes IcedID (Bokbot)
2021-12-01/a>Xavier MertensInfo-Stealer Using webhook.site to Exfiltrate Data
2021-11-30/a>Johannes UllrichHunting for PHPUnit Installed via Composer
2021-11-29/a>Didier StevensWireshark 3.6.0 Released
2021-11-28/a>Didier StevensVideo: YARA Rules for Office Maldocs
2021-11-27/a>Didier StevensVideo: SANS Holiday Hack Challenge 2021 Q&A with Ed Skoudis
2021-11-26/a>Guy BruneauSearching for Exposed ASUS Routers Vulnerable to CVE-2021-20090
2021-11-25/a>Didier StevensYARA's Private Strings
2021-11-24/a>Jan KoprivaPhishing page hiding itself using dynamically adjusted IP-based allow list
2021-11-23/a>Didier StevensYARA Rule for OOXML Maldocs: Less False Positives
2021-11-21/a>Didier StevensBackdooring PAM
2021-11-20/a>Guy BruneauHikvision Security Cameras Potentially Exposed to Remote Code Execution
2021-11-19/a>Xavier MertensDownloader Disguised as Excel Add-In (XLL)
2021-11-18/a>Xavier MertensJavaScript Downloader Delivers Agent Tesla Trojan
2021-11-15/a>Rob VandenBrinkChanging your AD Password Using the Clipboard - Not as Easy as You'd Think!
2021-11-14/a>Didier StevensVideo: Obfuscated Maldoc: Reversed BASE64
2021-11-14/a>Didier StevensExternal Email System FBI Compromised: Sending Out Fake Warnings
2021-11-10/a>Xavier MertensShadow IT Makes People More Vulnerable to Phishing
2021-11-08/a>Xavier Mertens(Ab)Using Security Tools & Controls for the Bad
2021-11-07/a>Didier StevensVideo: Decrypting Cobalt Strike Traffic With Keys Extracted From Process Memory
2021-11-06/a>Didier StevensDecrypting Cobalt Strike Traffic With Keys Extracted From Process Memory
2021-11-04/a>Tom WebbXmount for Disk Images
2021-11-01/a>Yee Ching TokRevisiting BrakTooth: Two Months Later
2021-10-31/a>Didier StevensSysinternals: Autoruns and Sysmon updates
2021-10-31/a>Didier StevensVideo: Phishing ZIP With Malformed Filename
2021-10-30/a>Guy BruneauRemote Desktop Protocol (RDP) Discovery
2021-10-28/a>Yee Ching TokMultiple Apple Patches for October 2021
2021-10-26/a>Yee Ching TokHunting for Phishing Sites Masquerading as Outlook Web Access
2021-10-25/a>Didier StevensDecrypting Cobalt Strike Traffic With a "Leaked" Private Key
2021-10-24/a>Didier StevensPhishing ZIP With Malformed Filename
2021-10-22/a>Brad DuncanOctober 2021 Contest: Forensic Challenge
2021-10-21/a>Brad Duncan"Stolen Images Evidence" campaign pushes Sliver-based malware
2021-10-20/a>Xavier MertensThanks to COVID-19, New Types of Documents are Lost in The Wild
2021-10-18/a>Xavier MertensMalicious PowerShell Using Client Certificate Authentication
2021-10-16/a>Guy BruneauApache is Actively Scan for CVE-2021-41773 & CVE-2021-42013
2021-10-14/a>Xavier MertensPort-Forwarding with Windows for the Win
2021-10-13/a>Johannes UllrichPlease fix your E-Mail Brute forcing tool!
2021-10-11/a>Johannes UllrichThings that go "Bump" in the Night: Non HTTP Requests Hitting Web Servers
2021-10-10/a>Didier StevensWireshark 3.4.9 Released
2021-10-09/a>Guy BruneauScanning for Previous Oracle WebLogic Vulnerabilities
2021-10-08/a>Rob VandenBrinkSorting Things Out - Sorting Data by IP Address
2021-10-07/a>Johannes UllrichWho Is Hunting For Your IPTV Set-Top Box?
2021-10-04/a>Johannes UllrichBoutique "Dark" Botnet Hunting for Crumbs
2021-10-03/a>Didier StevensVideo: CVE-2021-40444 Maldocs: Extracting URLs
2021-09-25/a>Didier StevensStrings Analysis: VBA & Excel4 Maldoc
2021-09-25/a>Didier StevensVideo: Strings Analysis: VBA & Excel4 Maldoc
2021-09-24/a>Xavier MertensKeep an Eye on Your Users Mobile Devices (Simple Inventory)
2021-09-22/a>Didier StevensAn XML-Obfuscated Office Document (CVE-2021-40444)
2021-09-21/a>Johannes UllrichA First Look at Apple's iOS 15 "Private Relay" feature.
2021-09-20/a>Johannes Ullrich#OMIGOD Exploits Captured in the Wild. Researchers responsible for half of scans for related ports.
2021-09-19/a>Didier StevensVideo: Simple Analysis Of A CVE-2021-40444 .docx Document
2021-09-17/a>Xavier MertensMalicious Calendar Subscriptions Are Back?
2021-09-16/a>Jan KoprivaPhishing 101: why depend on one suspicious message subject when you can use many?
2021-09-15/a>Brad DuncanHancitor campaign abusing Microsoft's OneDrive
2021-09-14/a>Renato MarinhoMicrosoft September 2021 Patch Tuesday
2021-09-11/a>Guy BruneauShipping to Elasticsearch Microsoft DNS Logs
2021-09-09/a>Johannes UllrichUpdates to Our Datafeeds/API
2021-09-08/a>Brad Duncan"Stolen Images Evidence" Campaign Continues Pushing BazarLoader Malware
2021-09-08/a>Johannes UllrichMicrosoft Offers Workaround for 0-Day Office Vulnerability (CVE-2021-40444)
2021-09-07/a>Johannes UllrichWhy I Gave Up on IPv6. And no, it is not because of security issues.
2021-09-02/a>Xavier MertensAttackers Will Always Abuse Major Events in our Lifes
2021-08-31/a>Yee Ching TokBrakTooth: Impacts, Implications and Next Steps
2021-08-30/a>Xavier MertensCryptocurrency Clipboard Swapper Delivered With Love
2021-08-29/a>Guy BruneauFilter JSON Data by Value with Linux jq
2021-08-24/a>Johannes UllrichAttackers Hunting For Twilio Credentials
2021-08-21/a>Didier StevensNew Versions Of Sysinternals Tools
2021-08-19/a>Johannes UllrichWhen Lightning Strikes. What works and doesn't work.
2021-08-17/a>Johannes UllrichLaravel (<=v8.4.2) exploit attempts for CVE-2021-3129 (debug mode: Remote code execution)
2021-08-13/a>Brad DuncanExample of Danabot distributed through malspam
2021-08-13/a>Guy BruneauScanning for Microsoft Exchange eDiscovery
2021-08-11/a>Brad DuncanTA551 (Shathak) continues pushing BazarLoader, infections lead to Cobalt Strike
2021-08-09/a>Jan KoprivaProxyShell - how many Exchange servers are affected and where are they?
2021-08-06/a>Xavier MertensMalicious Microsoft Word Remains A Key Infection Vector
2021-08-04/a>Yee Ching TokPivoting and Hunting for Shenanigans from a Reported Phishing Domain
2021-08-03/a>Johannes UllrichIs this the Weirdest Phishing (SMishing?) Attempt Ever?
2021-08-01/a>Didier Stevensprocdump Version 10.1
2021-07-31/a>Guy BruneauUnsolicited DNS Queries
2021-07-30/a>Xavier MertensInfected With a .reg File
2021-07-29/a>Xavier MertensMalicious Content Delivered Through archive.org
2021-07-28/a>Jan KoprivaA sextortion e-mail from...IT support?!
2021-07-26/a>Didier StevensFailed Malspam: Recovering The Password
2021-07-25/a>Didier StevensWireshark 3.4.7 Released
2021-07-24/a>Bojan ZdrnjaActive Directory Certificate Services (ADCS - PKI) domain admin vulnerability
2021-07-24/a>Xavier MertensAgent.Tesla Dropped via a .daa Image and Talking to Telegram
2021-07-21/a>Johannes Ullrich"Summer of SAM": Microsoft Releases Guidance for CVE-2021-36934
2021-07-20/a>Bojan ZdrnjaSummer of SAM - incorrect permissions on Windows 10/11 hives
2021-07-19/a>Rick WannerNew Windows Print Spooler Vulnerability - CVE-2021-34481
2021-07-18/a>Didier StevensVideo: CyberChef BASE85 Decoding
2021-07-16/a>Xavier MertensMultiple BaseXX Obfuscations
2021-07-14/a>Jan KoprivaOne way to fail at malspam - give recipients the wrong password for an encrypted attachment
2021-07-13/a>Johannes UllrichUSPS Phishing Using Telegram to Collect Data
2021-07-10/a>Guy BruneauScanning for Microsoft Secure Socket Tunneling Protocol
2021-07-09/a>Brad DuncanHancitor tries XLL as initial malware file
2021-07-08/a>Xavier MertensUsing Sudo with Python For More Security Controls
2021-07-06/a>Xavier MertensPython DLL Injection Check
2021-07-04/a>Didier StevensDIY CD/DVD Destruction - Follow Up
2021-07-03/a>Didier StevensFinding Strings With oledump.py
2021-07-02/a>Xavier Mertens"inception.py"... Multiple Base64 Encodings
2021-06-30/a>Johannes UllrichCVE-2021-1675: Incomplete Patch and Leaked RCE Exploit
2021-06-30/a>Brad DuncanJune 2021 Forensic Contest: Answers and Analysis
2021-06-28/a>Didier StevensCFBF Files Strings Analysis
2021-06-27/a>Didier StevensDIY CD/DVD Destruction
2021-06-26/a>Guy BruneauCVE-2019-9670: Zimbra Collaboration Suite XXE vulnerability
2021-06-25/a>Jim ClausingIs this traffic bAD?
2021-06-24/a>Xavier MertensDo you Like Cookies? Some are for sale!
2021-06-22/a>Jan KoprivaPhishing asking recipients not to report abuse
2021-06-21/a>Rick WannerMitre CWE - Common Weakness Enumeration
2021-06-20/a>Didier StevensVideo: oledump Cheat Sheet
2021-06-19/a>Xavier MertensEasy Access to the NIST RDS Database
2021-06-18/a>Daniel WesemannNetwork Forensics on Azure VMs (Part #2)
2021-06-18/a>Daniel WesemannOpen redirects ... and why Phishers love them
2021-06-17/a>Daniel Wesemann Network Forensics on Azure VMs (Part #1)
2021-06-15/a>Johannes UllrichMulti Perimeter Device Exploit Mirai Version Hunting For Sonicwall, DLink, Cisco and more
2021-06-12/a>Guy BruneauFortinet Targeted for Unpatched SSL VPN Discovery Activity
2021-06-11/a>Xavier MertensKeeping an Eye on Dangerous Python Modules
2021-06-11/a>Xavier MertensSonicwall SRA 4600 Targeted By an Old Vulnerability
2021-06-09/a>Jan KoprivaArchitecture, compilers and black magic, or "what else affects the ability of AVs to detect malicious files"
2021-06-07/a>Johannes UllrichAmazon Sidewalk: Cutting Through the Hype
2021-06-04/a>Xavier MertensRussian Dolls VBS Obfuscation
2021-06-02/a>Jim ClausingWireshark 3.4.6 (and 3.2.14) released
2021-05-30/a>Didier StevensSysinternals: Procmon, Sysmon, TcpView and Process Explorer update
2021-05-30/a>Didier StevensVideo: Cobalt Strike & DNS - Part 1
2021-05-29/a>Guy BruneauSpear-phishing Email Targeting Outlook Mail Clients
2021-05-28/a>Xavier MertensMalicious PowerShell Hosted on script.google.com
2021-05-27/a>Jan KoprivaAll your Base are...nearly equal when it comes to AV evasion, but 64-bit executables are not
2021-05-22/a>Xavier Mertens"Serverless" Phishing Campaign
2021-05-21/a>Xavier MertensLocking Kernel32.dll As Anti-Debugging Technique
2021-05-20/a>Johannes UllrichAre Cookie Banners a Waste of Time or a Complete Waste of Time?
2021-05-19/a>Brad DuncanMay 2021 Forensic Contest: Answers and Analysis
2021-05-18/a>Xavier MertensFrom RunDLL32 to JavaScript then PowerShell
2021-05-14/a>Xavier Mertens"Open" Access to Industrial Systems Interface is Also Far From Zero
2021-05-12/a>Jan KoprivaNumber of industrial control systems on the internet is lower then in 2020...but still far from zero
2021-05-10/a>Johannes UllrichCorrectly Validating IP Addresses: Why encoding matters for input validation.
2021-05-08/a>Guy BruneauWho is Probing the Internet for Research Purposes?
2021-05-07/a>Daniel WesemannExposed Azure Storage Containers
2021-05-06/a>Xavier MertensAlternative Ways To Perform Basic Tasks
2021-05-05/a>Brad DuncanMay 2021 Forensic Contest
2021-05-02/a>Didier StevensPuTTY And FileZilla Use The Same Fingerprint Registry Keys
2021-04-30/a>Remco VerhoefQiling: A true instrumentable binary emulation framework
2021-04-29/a>Xavier MertensFrom Python to .Net
2021-04-28/a>Xavier MertensDeeper Analyzis of my Last Malicious PowerPoint Add-On
2021-04-25/a>Didier StevensWireshark 3.4.5 Released
2021-04-24/a>Guy BruneauBase64 Hashes Used in Web Scanning
2021-04-23/a>Xavier MertensMalicious PowerPoint Add-On: "Small Is Beautiful"
2021-04-22/a>Xavier MertensHow Safe Are Your Docker Images?
2021-04-19/a>Jan KoprivaHunting phishing websites with favicon hashes
2021-04-16/a>Xavier MertensHTTPS Support for All Internal Services
2021-04-13/a>Richard PorterMicrosoft April 2021 Patch Tuesday
2021-04-10/a>Guy BruneauBuilding an IDS Sensor with Suricata & Zeek with Logs to ELK
2021-04-09/a>Xavier MertensNo Python Interpreter? This Simple RAT Installs Its Own Copy
2021-04-07/a>Johannes UllrichWiFi IDS and Private MAC Addresses
2021-04-06/a>Jan KoprivaMalspam with Lokibot vs. Outlook and RFCs
2021-04-02/a>Xavier MertensC2 Activity: Sandboxes or Real Victims?
2021-04-01/a>Brad DuncanApril 2021 Forensic Quiz
2021-03-31/a>Xavier MertensQuick Analysis of a Modular InfoStealer
2021-03-19/a>Xavier MertensPastebin.com Used As a Simple C2 Channel
2021-03-17/a>Xavier MertensDefenders, Know Your Operating System Like Attackers Do!
2021-03-15/a>Didier StevensFinding Metasploit & Cobalt Strike URLs
2021-03-14/a>Didier StevensWireshark 3.4.4 Released
2021-03-12/a>Guy BruneauMicrosoft DHCP Logs Shipped to ELK
2021-03-11/a>Johannes UllrichPiktochart - Phishing with Infographics
2021-03-10/a>Rob VandenBrinkSharpRDP - PSExec without PSExec, PSRemoting without PowerShell
2021-03-06/a>Xavier MertensSpotting the Red Team on VirusTotal!
2021-03-05/a>Xavier MertensSpam Farm Spotted in the Wild
2021-03-04/a>Xavier MertensFrom VBS, PowerShell, C Sharp, Process Hollowing to RAT
2021-03-03/a>Brad DuncanQakbot infection with Cobalt Strike
2021-03-03/a>Johannes UllrichMicrosoft Releases Exchange Emergency Patch to Fix Actively Exploited Vulnerability
2021-03-02/a>Russ McReeAdversary Simulation with Sim
2021-02-28/a>Didier StevensMaldocs: Protection Passwords
2021-02-26/a>Guy BruneauPretending to be an Outlook Version Update
2021-02-25/a>Jim ClausingSo where did those Satori attacks come from?
2021-02-25/a>Daniel WesemannForensicating Azure VMs
2021-02-22/a>Didier StevensUnprotecting Malicious Documents For Inspection
2021-02-20/a>Didier StevensQuickie: Extracting HTTP URLs With tshark
2021-02-17/a>Xavier MertensThe new "LinkedInSecureMessage" ?
2021-02-17/a>Brad DuncanMalspam pushing Trickbot gtag rob13
2021-02-16/a>Jim ClausingMore weirdness on TCP port 26
2021-02-15/a>Johannes UllrichSecuring and Optimizing Networks: Using pfSense Traffic Shaper Limiters to Combat Bufferbloat
2021-02-14/a>Didier StevensVideo: tshark & Malware Analysis
2021-02-13/a>Guy BruneauvSphere Replication updates address a command injection vulnerability (CVE-2021-21976) - https://www.vmware.com/security/advisories/VMSA-2021-0001.html
2021-02-13/a>Guy BruneauUsing Logstash to Parse IPtables Firewall Logs
2021-02-12/a>Xavier MertensAgentTesla Dropped Through Automatic Click in Microsoft Help File
2021-02-10/a>Brad DuncanPhishing message to the ISC handlers email distro
2021-02-08/a>Didier StevensQuickie: tshark & Malware Analysis
2021-02-04/a>Bojan ZdrnjaAbusing Google Chrome extension syncing for data exfiltration and C&C
2021-02-03/a>Brad DuncanExcel spreadsheets push SystemBC malware
2021-02-01/a>Rob VandenBrinkTaking a Shot at Reverse Shell Attacks, CNC Phone Home and Data Exfil from Servers
2021-01-30/a>Guy BruneauPacketSifter as Network Parsing and Telemetry Tool
2021-01-30/a>Guy BruneauWireshark 3.2.11 is now available which contains Bug Fixes - https://www.wireshark.org
2021-01-29/a>Xavier MertensSensitive Data Shared with Cloud Services
2021-01-28/a>Daniel WesemannEmotet vs. Windows Attack Surface Reduction
2021-01-27/a>Jan KoprivaTriOp - tool for gathering (not just) security-related data from Shodan.io (tool drop)
2021-01-22/a>Xavier MertensAnother File Extension to Block in your MTA: .jnlp
2021-01-21/a>Xavier MertensPowershell Dropping a REvil Ransomware
2021-01-19/a>Russ McReeGordon for fast cyber reputation checks
2021-01-18/a>Didier StevensDoc & RTF Malicious Document
2021-01-18/a>Rob VandenBrinkThe CIS Benchmark for Cisco Nexus (NX-OS) 1.0 went live last week, find it here: https://www.cisecurity.org/cis-benchmarks/
2021-01-17/a>Didier StevensNew Release of Sysmon Adding Detection for Process Tampering
2021-01-15/a>Brad DuncanThrowback Friday: An Example of Rig Exploit Kit
2021-01-15/a>Guy BruneauObfuscated DNS Queries
2021-01-14/a>Bojan ZdrnjaDynamically analyzing a heavily obfuscated Excel 4 macro malicious file
2021-01-13/a>Brad DuncanHancitor activity resumes after a hoilday break
2021-01-10/a>Didier StevensMaldoc Analysis With CyberChef
2021-01-09/a>Didier StevensMaldoc Strings Analysis
2021-01-07/a>Rob VandenBrinkUsing the NIST Database and API to Keep Up with Vulnerabilities and Patches (Part 1 of 3)
2021-01-07/a>Rob VandenBrinkDirectly related to today's main story on CPE/CVEs - Code Exec in Cisco Jabber, all platforms https://nvd.nist.gov/vuln/detail/CVE-2020-26085
2021-01-05/a>Johannes UllrichNetfox Detective: An Alternative Open-Source Packet Analysis Tool
2021-01-04/a>Jan KoprivaFrom a small BAT file to Mass Logger infostealer
2021-01-02/a>Guy BruneauProtecting Home Office and Enterprise in 2021
2021-01-01/a>Didier StevensStrings 2021
2020-12-29/a>Jan KoprivaWant to know what's in a folder you don't have a permission to access? Try asking your AV solution...
2020-12-26/a>Didier Stevensbase64dump.py Supported Encodings
2020-12-23/a>Jim ClausingAnalysis Dridex Dropper, IoC extraction (guest diary)
2020-12-22/a>Xavier MertensMalware Victim Selection Through WiFi Identification
2020-12-20/a>Didier StevensWireshark 3.4.2 Released
2020-12-19/a>Guy BruneauSecure Communication using TLS in Elasticsearch
2020-12-18/a>Jan KoprivaA slightly optimistic tale of how patching went for CVE-2019-19781
2020-12-16/a>Daniel WesemannDNS Logs in Public Clouds
2020-12-15/a>Didier StevensAnalyzing FireEye Maldocs
2020-12-14/a>Johannes UllrichSolarWinds Breach Used to Infiltrate Customer Networks (Solarigate)
2020-12-13/a>Didier StevensWireshark 3.4.1 Released
2020-12-13/a>Didier StevensKringleCon 2020
2020-12-12/a>Didier StevensOffice 95 Excel 4 Macros
2020-12-08/a>Johannes UllrichDecember 2020 Microsoft Patch Tuesday: Exchange, Sharepoint, Dynamics and DNS Spoofing
2020-12-06/a>Didier Stevensoledump's Indicators (video)
2020-12-05/a>Guy BruneauIs IP 91.199.118.137 testing Access to aahwwx.52host.xyz?
2020-12-04/a>Guy BruneauDetecting Actors Activity with Threat Intel
2020-12-03/a>Brad DuncanTraffic Analysis Quiz: Mr Natural
2020-11-30/a>Didier StevensDecrypting PowerShell Payloads (video)
2020-11-25/a>Xavier MertensLive Patching Windows API Calls Using PowerShell
2020-11-23/a>Didier StevensQuick Tip: Cobalt Strike Beacon Analysis
2020-11-21/a>Guy BruneauVMware privilege escalation vulnerabilities (CVE-2020-4004, CVE-2020-4005) - https://www.vmware.com/security/advisories/VMSA-2020-0026.html
2020-11-20/a>Xavier MertensMalicious Python Code and LittleSnitch Detection
2020-11-19/a>Xavier MertensPowerShell Dropper Delivering Formbook
2020-11-18/a>Xavier MertensWhen Security Controls Lead to Security Issues
2020-11-16/a>Jan KoprivaHeartbleed, BlueKeep and other vulnerabilities that didn't disappear just because we don't talk about them anymore
2020-11-13/a>Xavier MertensOld Worm But New Obfuscation Technique
2020-11-12/a>Daniel WesemannExposed Blob Storage in Azure
2020-11-12/a>Daniel WesemannPreventing Exposed Azure Blob Storage
2020-11-11/a>Brad DuncanTraffic Analysis Quiz: DESKTOP-FX23IK5
2020-11-09/a>Xavier MertensHow Attackers Brush Up Their Malicious Scripts
2020-11-08/a>Didier StevensQuick Tip: Extracting all VBA Code from a Maldoc
2020-11-07/a>Guy BruneauCryptojacking Targeting WebLogic TCP/7001
2020-11-06/a>Johannes UllrichRediscovering Limitations of Stateful Firewalls: "NAT Slipstreaming" ? Implications, Detections and Mitigations
2020-11-05/a>Xavier MertensDid You Spot "Invoke-Expression"?
2020-10-31/a>Didier StevensMore File Selection Gaffes
2020-10-30/a>Xavier MertensQuick Status of the CAA DNS Record Adoption
2020-10-29/a>Johannes UllrichPATCH NOW: CVE-2020-14882 Weblogic Actively Exploited Against Honeypots
2020-10-26/a>Didier StevensExcel 4 Macros: "Abnormal Sheet Visibility"
2020-10-25/a>Didier StevensVideo: Pascal Strings
2020-10-24/a>Guy BruneauAn Alternative to Shodan, Censys with User-Agent CensysInspect/1.1
2020-10-23/a>Russ McReeSooty: SOC Analyst's All-in-One Tool
2020-10-22/a>Jan KoprivaBazarLoader phishing lures: plan a Halloween party, get a bonus and be fired in the same afternoon
2020-10-21/a>Daniel Wesemann20 new Cisco security advisories for ASA and Firepower with CVSS>7: https://tools.cisco.com/security/center/publicationListing.x
2020-10-20/a>Xavier MertensMirai-alike Python Scanner
2020-10-14/a>Brad DuncanMore TA551 (Shathak) Word docs push IcedID (Bokbot)
2020-10-14/a>Xavier MertensNicely Obfuscated Python RAT
2020-10-11/a>Didier StevensAnalyzing MSG Files With plugin_msg_summary
2020-10-09/a>Jan KoprivaPhishing kits as far as the eye can see
2020-10-07/a>Johannes UllrichToday, Nobody is Going to Attack You.
2020-10-03/a>Guy BruneauScanning for SOHO Routers
2020-10-02/a>Xavier MertensAnalysis of a Phishing Kit
2020-10-01/a>Daniel WesemannIOC's turning into IOOI's
2020-10-01/a>Daniel WesemannMaking sense of Azure AD (AAD) activity logs
2020-09-30/a>Johannes UllrichScans for FPURL.xml: Reconnaissance or Not?
2020-09-27/a>Didier StevensWireshark 3.2.7 Released
2020-09-24/a>Xavier MertensParty in Ibiza with PowerShell
2020-09-23/a>Xavier MertensMalicious Word Document with Dynamic Content
2020-09-21/a>Jan KoprivaSlightly broken overlay phishing
2020-09-20/a>Guy BruneauAnalysis of a Salesforce Phishing Emails
2020-09-17/a>Xavier MertensSuspicious Endpoint Containment with OSSEC
2020-09-16/a>Johannes UllrichDo Vulnerabilities Ever Get Old? Recent "Mirai" Variant Scanning for 20 Year Old Amanda Version?
2020-09-15/a>Brad DuncanTraffic Analysis Quiz: Oh No... Another Infection!
2020-09-11/a>Rob VandenBrinkWhat's in Your Clipboard? Pillaging and Protecting the Clipboard
2020-09-10/a>Brad DuncanRecent Dridex activity
2020-09-09/a>Johannes UllrichA First Look at macOS 11 Big Sur Network Traffic (New! Now with more GREASE!)
2020-09-04/a>Jan KoprivaA blast from the past - XXEncoded VB6.0 Trojan
2020-09-02/a>Xavier MertensPython and Risky Windows API Calls
2020-09-01/a>Johannes UllrichExposed Windows Domain Controllers Used in CLDAP DDoS Attacks
2020-08-31/a>Didier StevensFinding The Original Maldoc
2020-08-30/a>Johannes UllrichCenturyLink Outage Causing Internet Wide Problems
2020-08-29/a>Didier StevensMalicious Excel Sheet with a NULL VT Score: More Info
2020-08-28/a>Xavier MertensExample of Malicious DLL Injected in PowerShell
2020-08-25/a>Xavier MertensKeep An Eye on LOLBins
2020-08-24/a>Xavier MertensTracking A Malware Campaign Through VT
2020-08-22/a>Guy BruneauRemote Desktop (TCP/3389) and Telnet (TCP/23), What might they have in Common?
2020-08-20/a>Rob VandenBrinkOffice 365 Mail Forwarding Rules (and other Mail Rules too)
2020-08-19/a>Xavier MertensExample of Word Document Delivering Qakbot
2020-08-18/a>Rick WannerISC Blocked
2020-08-18/a>Xavier MertensUsing API's to Track Attackers
2020-08-16/a>Didier StevensSmall Challenge: A Simple Word Maldoc - Part 3
2020-08-15/a>Didier StevensWireshark 3.2.6 Released
2020-08-12/a>Russ McReeTo the Brim at the Gates of Mordor Pt. 1
2020-08-10/a>Bojan ZdrnjaScoping web application and web service penetration tests
2020-08-08/a>Guy BruneauScanning Activity Include Netcat Listener
2020-08-07/a>Brad DuncanTA551 (Shathak) Word docs push IcedID (Bokbot)
2020-08-05/a>Brad DuncanTraffic Analysis Quiz: What's the Malware From This Infection?
2020-08-04/a>Johannes UllrichReminder: Patch Cisco ASA / FTD Devices (CVE-2020-3452). Exploitation Continues
2020-08-04/a>Johannes UllrichInternet Choke Points: Concentration of Authoritative Name Servers
2020-08-03/a>Johannes UllrichA Word of Caution: Helping Out People Being Stalked Online
2020-08-01/a>Jan KoprivaWhat pages do bad bots look for?
2020-07-30/a>Johannes UllrichPython Developers: Prepare!!!
2020-07-28/a>Johannes UllrichAll I want this Tuesday: More Data
2020-07-27/a>Didier StevensAnalyzing Metasploit ASP .NET Payloads
2020-07-27/a>Johannes UllrichIn Memory of Donald Smith
2020-07-26/a>Didier StevensCracking Maldoc VBA Project Passwords
2020-07-25/a>Didier Stevensndisasm Update 2.15
2020-07-24/a>Xavier MertensCompromized Desktop Applications by Web Technologies
2020-07-23/a>Xavier MertensSimple Blocklisting with MISP & pfSense
2020-07-22/a>Rick WannerA few IoCs related to CVE-2020-5902
2020-07-21/a>Jan KoprivaCouple of interesting Covid-19 related stats
2020-07-20/a>Rick WannerSextortion Update: The Final Final Chapter
2020-07-19/a>Guy BruneauScanning Activity for ZeroShell Unauthenticated Access
2020-07-16/a>John BambenekHunting for SigRed Exploitation
2020-07-15/a>Johannes UllrichPATCH NOW - SIGRed - CVE-2020-1350 - Microsoft DNS Server Vulnerability
2020-07-15/a>Brad DuncanWord docs with macros for IcedID (Bokbot)
2020-07-12/a>Didier StevensMaldoc: VBA Purging Example
2020-07-11/a>Guy BruneauVMware XPC Client validation privilege escalation vulnerability - https://www.vmware.com/security/advisories/VMSA-2020-0017.html
2020-07-11/a>Guy BruneauScanning Home Internet Facing Devices to Exploit
2020-07-08/a>Xavier MertensIf You Want Something Done Right, You Have To Do It Yourself... Malware Too!
2020-07-06/a>Johannes UllrichSummary of CVE-2020-5902 F5 BIG-IP RCE Vulnerability Exploits
2020-07-05/a>Didier StevensCVE-2020-5902 F5 BIG-IP Exploitation Attempt
2020-07-04/a>Russ McReeHappy FouRth of July from the Internet Storm Center
2020-07-01/a>Jim ClausingSetting up the Dshield honeypot and tcp-honeypot.py
2020-06-30/a>Russ McReeISC Snapshot: SpectX IP Hitcount Query
2020-06-29/a>Didier StevensSysmon and Alternate Data Streams
2020-06-27/a>Didier StevensVideo: YARA's BASE64 Strings
2020-06-25/a>Johannes UllrichTech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release.
2020-06-24/a>Jan KoprivaUsing Shell Links as zero-touch downloaders and to initiate network connections
2020-06-20/a>Tom WebbPi Zero HoneyPot
2020-06-19/a>Remco VerhoefSigma rules! The generic signature format for SIEM systems.
2020-06-18/a>Jan KoprivaBroken phishing accidentally exploiting Outlook zero-day
2020-06-16/a>Xavier MertensSextortion to The Next Level
2020-06-16/a>Johannes UllrichOdd "Protest" Spam (Scam?) Targeting Atlanta Police Foundation
2020-06-15/a>Rick WannerHTML based Phishing Run
2020-06-13/a>Guy BruneauMirai Botnet Activity
2020-06-12/a>Xavier MertensMalicious Excel Delivering Fileless Payload
2020-06-11/a>Xavier MertensAnti-Debugging JavaScript Techniques
2020-06-08/a>Didier StevensTranslating BASE64 Obfuscated Scripts
2020-06-05/a>Johannes UllrichCyber Security for Protests
2020-06-04/a>Xavier MertensAnti-Debugging Technique based on Memory Protection
2020-06-01/a>Jim ClausingStackstrings, type 2
2020-05-31/a>Guy BruneauWindows 10 Built-in Packet Sniffer - PktMon
2020-05-29/a>Johannes UllrichThe Impact of Researchers on Our Data
2020-05-28/a>Xavier MertensFlashback on CVE-2019-19781
2020-05-27/a>Jan KoprivaFrankenstein's phishing using Google Cloud Storage
2020-05-24/a>Didier StevensWireshark 3.2.4 Released
2020-05-23/a>Xavier MertensAgentTesla Delivered via a Malicious PowerPoint Add-In
2020-05-22/a>Didier StevensSome Strings to Remember
2020-05-21/a>Xavier MertensMalware Triage with FLOSS: API Calls Based Behavior
2020-05-20/a>Brad DuncanMicrosoft Word document with malicious macro pushes IcedID (Bokbot)
2020-05-19/a>Rick WannerCisco Advisories for FTD, ASA, Firepower 1000
2020-05-19/a>Rick WannerWireshark Release - 2.6.17, 3.0.11 and 3.2.4 - https://www.wireshark.org/news/20200519.html
2020-05-16/a>Guy BruneauScanning for Outlook Web Access (OWA) & Microsoft Exchange Control Panel (ECP)
2020-05-14/a>Rob VandenBrinkPatch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe
2020-05-13/a>Brad DuncanMalspam with links to zip archives pushes Dridex malware
2020-05-08/a>Xavier MertensUsing Nmap As a Lightweight Vulnerability Scanner
2020-05-06/a>Xavier MertensKeeping an Eye on Malicious Files Life Time
2020-05-05/a>Russ McReeCloud Security Features Don't Replace the Need for Personnel Security Capabilities
2020-05-04/a>Didier StevensSysmon and File Deletion
2020-05-03/a>Didier StevensZIP & AES
2020-05-02/a>Guy BruneauPhishing PDF with Unusual Hostname
2020-04-30/a>Xavier MertensCollecting IOCs from IMAP Folder
2020-04-29/a>Johannes UllrichPrivacy Preserving Protocols to Trace Covid19 Exposure
2020-04-28/a>Jan KoprivaAgent Tesla delivered by the same phishing campaign for over a year
2020-04-27/a>Xavier MertensPowershell Payload Stored in a PSCredential Object
2020-04-26/a>Didier StevensVideo: Malformed .docm File
2020-04-24/a>Xavier MertensMalicious Excel With a Strong Obfuscation and Sandbox Evasion
2020-04-21/a>Russ McReeSpectX: Log Parser for DFIR
2020-04-20/a>Didier StevensKPOT AutoIt Script: Analysis
2020-04-18/a>Guy BruneauMaldoc Falsely Represented as DOCX Invoice Redirecting to Fake Apple Store
2020-04-17/a>Xavier MertensWeaponized RTF Document Generator & Mailer in PowerShell
2020-04-16/a>Johannes UllrichUsing AppLocker to Prevent Living off the Land Attacks
2020-04-13/a>Jan KoprivaLook at the same phishing campaign 3 months apart
2020-04-11/a>Didier StevensWireshark 3.2.3 Released: Mac Users Pay Attention Please
2020-04-10/a>Xavier MertensPowerShell Sample Extracting Payload From SSL
2020-04-10/a>Scott FendleyCritical Vuln in vCenter vmdir (CVE-2020-3952)
2020-04-08/a>Brad DuncanGerman malspam pushes ZLoader malware
2020-04-07/a>Johannes UllrichIncrease in RDP Scanning
2020-04-04/a>Didier StevensNew Bypass Technique or Corrupt Word Document?
2020-04-03/a>Xavier MertensObfuscated with a Simple 0x0A
2020-04-02/a>Tom WebbTPOT's Cowrie to ISC Logs
2020-03-31/a>Johannes UllrichKwampirs Targeted Attacks Involving Healthcare Sector
2020-03-30/a>Jan KoprivaCrashing explorer.exe with(out) a click
2020-03-28/a>Didier StevensCovid19 Domain Classifier
2020-03-27/a>Xavier MertensMalicious JavaScript Dropping Payload in the Registry
2020-03-27/a>Johannes UllrichHelp us classify Covid19 related domains https://isc.sans.edu/covidclassifier.html (login required)
2020-03-25/a>Brad DuncanRecent Dridex activity
2020-03-24/a>Russ McReeAnother Critical COVID-19 Shortage: Digital Security
2020-03-23/a>Didier StevensKPOT Deployed via AutoIt Script
2020-03-23/a>Didier StevensWindows Zeroday Actively Exploited: Type 1 Font Parsing Remote Code Execution Vulnerability
2020-03-22/a>Didier StevensMore COVID-19 Themed Malware
2020-03-21/a>Guy BruneauHoneypot - Scanning and Targeting Devices & Services
2020-03-19/a>Xavier MertensCOVID-19 Themed Multistage Malware
2020-03-18/a>Brad DuncanTrickbot gtag red5 distributed as a DLL file
2020-03-16/a>Jan KoprivaDesktop.ini as a post-exploitation tool
2020-03-15/a>Guy BruneauVPN Access and Activity Monitoring
2020-03-14/a>Didier StevensPhishing PDF With Incremental Updates.
2020-03-13/a>Rob VandenBrinkNot all Ethernet NICs are Created Equal - Trying to Capture Invalid Ethernet Frames
2020-03-12/a>Xavier MertensCritical SMBv3 Vulnerability: Remote Code Execution
2020-03-12/a>Brad DuncanHancitor distributed through coronavirus-themed malspam
2020-03-10/a>Johannes UllrichMicrosoft Patch Tuesday March 2020
2020-03-07/a>Didier StevensWireshark 3.2.2 Released: Windows' Users Pay Attention Please
2020-03-05/a>Xavier MertensWill You Put Your Password in a Survey?
2020-03-02/a>Jan KoprivaSecure vs. cleartext protocols - couple of interesting stats
2020-02-29/a>Guy BruneauHazelcast IMDG Discover Scan
2020-02-28/a>Xavier MertensShow me Your Clipboard Data!
2020-02-27/a>Xavier MertensOffensive Tools Are For Blue Teams Too
2020-02-25/a>Jan KoprivaQuick look at a couple of current online scam campaigns
2020-02-22/a>Xavier MertensSimple but Efficient VBScript Obfuscation
2020-02-21/a>Xavier MertensQuick Analysis of an Encrypted Compound Document Format
2020-02-18/a>Jan KoprivaDiscovering contents of folders in Windows without permissions
2020-02-17/a>Didier Stevenscurl and SSPI
2020-02-16/a>Guy BruneauSOAR or not to SOAR?
2020-02-15/a>Didier Stevensbsdtar on Windows 10
2020-02-12/a>Brad DuncanMalpsam pushes Ursnif through Italian language Word docs
2020-02-10/a>Jan KoprivaCurrent PayPal phishing campaign or "give me all your personal information"
2020-02-07/a>Xavier MertensSandbox Detection Tricks & Nice Obfuscation in a Single VBScript
2020-02-05/a>Brad DuncanFake browser update pages are "still a thing"
2020-02-03/a>Jan KoprivaAnalysis of a triple-encrypted AZORult downloader
2020-02-02/a>Didier StevensVideo: Stego & Cryptominers
2020-02-01/a>Didier StevensWireshark 3.2.1 Released
2020-01-28/a>Brad DuncanEmotet epoch 1 infection with Trickbot gtag mor84
2020-01-27/a>Johannes UllrichNetwork Security Perspective on Coronavirus Preparedness
2020-01-25/a>Russell EubanksVisibility Gap of Your Security Tools
2020-01-25/a>Guy BruneauIs Threat Hunting the new Fad?
2020-01-24/a>Xavier MertensWhy Phishing Remains So Popular?
2020-01-23/a>Xavier MertensComplex Obfuscation VS Simple Trick
2020-01-22/a>Brad DuncanGerman language malspam pushes Ursnif
2020-01-21/a>Russ McReeDeepBlueCLI: Powershell Threat Hunting
2020-01-16/a>Bojan ZdrnjaSumming up CVE-2020-0601, or the Let?s Decrypt vulnerability
2020-01-16/a>Jan KoprivaPicks of 2019 malware - the large, the small and the one full of null bytes
2020-01-15/a>Johannes UllrichCVE-2020-0601 Followup
2020-01-13/a>Didier StevensCitrix ADC Exploits: Overview of Observed Payloads
2020-01-12/a>Guy BruneauELK Dashboard and Logstash parser for tcp-honeypot Logs
2020-01-11/a>Johannes UllrichCitrix ADC Exploits are Public and Heavily Used. Attempts to Install Backdoor
2020-01-10/a>Xavier MertensMore Data Exfiltration
2020-01-09/a>Kevin ShorttWindows 7 - End of Life
2020-01-07/a>Johannes UllrichA Quick Update on Scanning for CVE-2019-19781 (Citrix ADC / Gateway Vulnerability)
2020-01-06/a>Johannes UllrichIncrease in Number of Sources January 3rd and 4th: spoofed
2020-01-04/a>Didier StevensKringleCon 2019
2020-01-03/a>Kevin ShorttCCPA - Quick Overview
2019-12-31/a>Johannes UllrichSome Thoughts About the Critical Citrix ADC/Gateway Vulnerability (CVE-2019-19781)
2019-12-29/a>Guy BruneauELK Dashboard for Pihole Logs
2019-12-28/a>Didier StevensCorrupt Office Documents
2019-12-26/a>Xavier MertensBypassing UAC to Install a Cryptominer
2019-12-24/a>Brad DuncanMalspam with links to Word docs pushes IcedID (Bokbot)
2019-12-23/a>Didier StevensNew oledump.py plugin: plugin_version_vba
2019-12-22/a>Didier StevensExtracting VBA Macros From .DWG Files
2019-12-21/a>Didier StevensWireshark 3.2.0 Released
2019-12-16/a>Didier StevensMalicious .DWG Files?
2019-12-15/a>Didier StevensVirusTotal Email Submissions
2019-12-13/a>Jan KoprivaInternet banking sites and their use of TLS... and SSLv3... and SSLv2?!
2019-12-12/a>Xavier MertensCode & Data Reuse in the Malware Ecosystem
2019-12-11/a>Brad DuncanGerman language malspam pushes yet another wave of Trickbot
2019-12-09/a>Didier Stevens(Lazy) Sunday Maldoc Analysis
2019-12-08/a>Didier StevensWireshark 3.0.7 Released
2019-12-07/a>Guy BruneauIntegrating Pi-hole Logs in ELK with Logstash
2019-12-06/a>Jan KoprivaPhishing with a self-contained credentials-stealing webpage
2019-12-05/a>Jan KoprivaE-mail from Agent Tesla
2019-12-04/a>Jan KoprivaAnalysis of a strangely poetic malware
2019-12-03/a>Brad DuncanUrsnif infection with Dridex
2019-11-27/a>Brad DuncanFinding an Agent Tesla malware sample
2019-11-26/a>Jan KoprivaLessons learned from playing a willing phish
2019-11-25/a>Xavier MertensMy Little DoH Setup
2019-11-23/a>Guy BruneauLocal Malware Analysis with Malice
2019-11-22/a>Xavier MertensAbusing Web Filters Misconfiguration for Reconnaissance
2019-11-20/a>Brad DuncanHancitor infection with Pony, Evil Pony, Ursnif, and Cobalt Strike
2019-11-19/a>Johannes UllrichCheap Chinese JAWS of DVR Exploitability on Port 60001
2019-11-18/a>Johannes UllrichSMS and 2FA: Another Reason to Move away from It.
2019-11-13/a>Brad DuncanAn example of malspam pushing Lokibot malware, November 2019
2019-11-11/a>Johannes UllrichAre We Going Back to TheMoon (and How is Liquor Involved)?
2019-11-09/a>Guy BruneauFake Netflix Update Request by Text
2019-11-08/a>Xavier MertensMicrosoft Apps Diverted from Their Main Use
2019-11-03/a>Didier StevensYou Too? "Unusual Activity with Double Base64 Encoding"
2019-11-02/a>Didier StevensRemark on EML Attachments
2019-10-31/a>Jan KoprivaEML attachments in O365 - a recipe for phishing
2019-10-30/a>Xavier MertensKeep an Eye on Remote Access to Mailboxes
2019-10-27/a>Didier StevensWireshark 3.0.6 Released
2019-10-27/a>Guy BruneauUnusual Activity with Double Base64 Encoding
2019-10-25/a>Rob VandenBrinkMore on DNS Archeology (with PowerShell)
2019-10-24/a>Johannes UllrichYour Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment?
2019-10-20/a>Guy BruneauScanning Activity for NVMS-9000 Digital Video Recorder
2019-10-19/a>Russell EubanksWhat Assumptions Are You Making?
2019-10-18/a>Xavier MertensQuick Malicious VBS Analysis
2019-10-17/a>Jan KoprivaPhishing e-mail spoofing SPF-enabled domain
2019-10-16/a>Xavier MertensSecurity Monitoring: At Network or Host Level?
2019-10-10/a>Rob VandenBrinkMining Live Networks for OUI Data Oddness
2019-10-09/a>Brad DuncanWhat data does Vidar malware steal from an infected host?
2019-10-06/a>Russ McReevisNetwork for Network Data
2019-10-03/a>Xavier Mertens"Lost_Files" Ransomware
2019-10-03/a>Jim ClausingBuffer overflows found in libpcap and tcpdump
2019-09-27/a>Xavier MertensNew Scans for Polycom Autoconfiguration Files
2019-09-26/a>Rob VandenBrinkMining MAC Address and OUI Information
2019-09-24/a>Xavier MertensHuge Amount of remotewebaccess.com Sites Found in Certificate Transparency Logs
2019-09-22/a>Didier StevensVideo: Encrypted Sextortion PDFs
2019-09-21/a>Didier StevensWireshark 3.0.5 Release: Potential Windows Crash when Updating
2019-09-19/a>Xavier MertensAgent Tesla Trojan Abusing Corporate Email Accounts
2019-09-19/a>Xavier MertensBlocklisting or Whitelisting in the Right Way
2019-09-18/a>Brad DuncanEmotet malspam is back
2019-09-17/a>Rob VandenBrinkInvestigating Gaps in your Windows Event Logs
2019-09-16/a>Didier StevensEncrypted Sextortion PDFs
2019-09-07/a>Guy BruneauUnidentified Scanning Activity
2019-09-03/a>Johannes Ullrich[Guest Diary] Tricky LNK points to TrickBot
2019-08-30/a>Xavier MertensMalware Dropping a Local Node.js Instance
2019-08-28/a>Xavier MertensMalware Samples Compiling Their Next Stage on Premise
2019-08-28/a>Johannes Ullrich[Guest Diary] Open Redirect: A Small But Very Common Vulnerability
2019-08-25/a>Guy BruneauAre there any Advantages of Buying Cyber Security Insurance?
2019-08-22/a>Xavier MertensSimple Mimikatz & RDPWrapper Dropper
2019-08-21/a>Russ McReeKAPE: Kroll Artifact Parser and Extractor
2019-08-19/a>Didier StevensCompressed ISO Files (ISZ)
2019-08-18/a>Didier StevensVideo: Analyzing DAA Files
2019-08-16/a>Didier StevensThe DAA File Format
2019-08-15/a>Didier StevensAnalysis of a Spearphishing Maldoc
2019-08-14/a>Brad DuncanRecent example of MedusaHTTP malware
2019-08-12/a>Didier StevensMalicious .DAA Attachments
2019-08-09/a>Xavier Mertens100% JavaScript Phishing Page
2019-08-08/a>Johannes Ullrich[Guest Diary] The good, the bad and the non-functional, or "how not to do an attack campaign"
2019-08-05/a>Rick WannerSextortion: Follow the Money - The Final Chapter
2019-08-05/a>Rick WannerScanning for Bluekeep vulnerable RDP instances
2019-08-04/a>Didier Stevens Detecting ZLIB Compression
2019-08-01/a>Johannes UllrichWhat is Listening On Port 9527/TCP?
2019-07-28/a>Didier StevensVideo: Analyzing Compressed PowerShell Scripts
2019-07-26/a>Kevin ShorttDVRIP Port 34567 - Uptick
2019-07-25/a>Rob VandenBrinkWhen Users Attack! Users (and Admins) Thwarting Security Controls
2019-07-24/a>Xavier MertensMay People Be Considered as IOC?
2019-07-20/a>Guy BruneauRe-evaluating Network Security - It is Increasingly More Complex
2019-07-18/a>Rob VandenBrinkThe Other Side of Critical Control 1: 802.1x Wired Network Access Controls
2019-07-18/a>Xavier MertensMalicious PHP Script Back on Stage?
2019-07-17/a>Xavier MertensAnalyzis of DNS TXT Records
2019-07-16/a>Russ McReeCommando VM: The Complete Mandiant Offensive VM
2019-07-15/a>Didier Stevensisodump.py and Malicious ISO Files
2019-07-13/a>Guy BruneauGuidance to Protect DNS Against Hijacking & Scanning for Version.BIND Still a Thing
2019-07-11/a>Johannes UllrichRemembering Mike Assante
2019-07-11/a>Xavier MertensRussian Dolls Malicious Script Delivering Ursnif
2019-07-09/a>John BambenekSolving the WHOIS and Privacy Problem: A Draft of Implementing WHOIS in DNS
2019-07-09/a>John BambenekMSFT July 2019 Patch Tuesday
2019-07-08/a>Didier StevensMachine Code? No!
2019-07-07/a>Rick WannerOpSec and OSInt
2019-07-06/a>Didier StevensMalicious XSL Files
2019-07-04/a>Didier StevensMachine Code?
2019-07-02/a>Xavier MertensMalicious Script With Multiple Payloads
2019-06-28/a>Rob VandenBrinkVerifying Running Processes against VirusTotal - Domain-Wide
2019-06-27/a>Rob VandenBrinkFinding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell
2019-06-25/a>Brad DuncanRig Exploit Kit sends Pitou.B Trojan
2019-06-20/a>Xavier MertensUsing a Travel Packing App for Infosec Purpose
2019-06-19/a>Johannes UllrichCritical Actively Exploited WebLogic Flaw Patched CVE-2019-2729
2019-06-18/a>Brad DuncanMalspam with password-protected Word docs pushing Dridex
2019-06-18/a>Johannes UllrichWhat You Need To Know About TCP "SACK Panic"
2019-06-17/a>Brad DuncanAn infection from Rig exploit kit
2019-06-14/a>Jim ClausingA few Ghidra tips for IDA users, part 4 - function call graphs
2019-06-10/a>Xavier MertensInteresting JavaScript Obfuscation Example
2019-06-06/a>Xavier MertensKeep an Eye on Your WMI Logs
2019-06-04/a>Russ McReeISC snapshot: r-cyber with rud.is
2019-05-29/a>Xavier MertensBehavioural Malware Analysis with Microsoft ASA
2019-05-26/a>Didier StevensVideo: nmap Service Detection Customization
2019-05-22/a>Johannes UllrichAn Update on the Microsoft Windows RDP "Bluekeep" Vulnerability (CVE-2019-0708) [now with pcaps]
2019-05-20/a>Tom WebbCVE-2019-0604 Attack
2019-05-16/a>Xavier MertensThe Risk of Authenticated Vulnerability Scans
2019-05-13/a>Xavier MertensFrom Phishing To Ransomware?
2019-05-10/a>Xavier MertensDSSuite - A Docker Container with Didier's Tools
2019-05-06/a>Didier StevensText and Text
2019-05-03/a>Jim ClausingA few Ghidra tips for IDA users, part 3 - conversion, labels, and comments
2019-05-01/a>Xavier MertensAnother Day, Another Suspicious UDF File
2019-04-28/a>Johannes UllrichUpdate about Weblogic CVE-2019-2725 (Exploits Used in the Wild, Patch Status)
2019-04-27/a>Didier StevensQuick Tip for Dissecting CVE-2017-11882 Exploits
2019-04-26/a>Rob VandenBrinkPillaging Passwords from Service Accounts
2019-04-25/a>Rob VandenBrinkUnpatched Vulnerability Alert - WebLogic Zero Day
2019-04-25/a>Rob VandenBrinkService Accounts Redux - Collecting Service Accounts with PowerShell
2019-04-24/a>Rob VandenBrinkWhere have all the Domain Admins gone? Rooting out Unwanted Domain Administrators
2019-04-22/a>Didier Stevens.rar Files and ACE Exploit CVE-2018-20250
2019-04-17/a>Jim ClausingA few Ghidra tips for IDA users, part 2 - strings and parameters
2019-04-17/a>Xavier MertensMalware Sample Delivered Through UDF Image
2019-04-13/a>Johannes UllrichConfiguring MTA-STS and TLS Reporting For Your Domain
2019-04-11/a>Johannes UllrichHow to Find Hidden Cameras in your AirBNB
2019-04-08/a>Jim ClausingA few Ghidra tips for IDA users, part 1 - the decompiler/unreachable code
2019-04-07/a>Guy BruneauFake Office 365 Payment Information Update
2019-04-05/a>Russ McReeBeagle: Graph transforms for DFIR data & logs
2019-04-04/a>Xavier MertensNew Waves of Scans Detected by an Old Rule
2019-04-03/a>Jim ClausingA few Ghidra tips for IDA users, part 0 - automatic comments for API call parameters
2019-04-02/a>Johannes UllrichFake AV is Back: LaCie Network Drives Used to Spread Malware
2019-04-01/a>Didier StevensAnalysis of PDFs Created with OpenOffice/LibreOffice
2019-03-31/a>Didier StevensMaldoc Analysis of the Weekend by a Reader
2019-03-27/a>Xavier MertensRunning your Own Passive DNS Service
2019-03-25/a>Didier Stevens"VelvetSweatshop" Maldocs: Shellcode Analysis
2019-03-24/a>Didier StevensDecoding QR Codes with Python
2019-03-23/a>Didier Stevens"VelvetSweatshop" Maldocs
2019-03-21/a>Xavier MertensNew Wave of Extortion Emails: Central Intelligence Agency Case
2019-03-18/a>Didier StevensWireshark 3.0.0 and Npcap: Some Remarks
2019-03-17/a>Didier StevensVideo: Maldoc Analysis: Excel 4.0 Macro
2019-03-15/a>Remco VerhoefBinary Analysis with Jupyter and Radare2
2019-03-14/a>Didier StevensTip: Ghidra & ZIP Files
2019-03-11/a>Didier StevensWireshark 3.0.0 and Npcap
2019-03-08/a>Remco VerhoefAnalysing meterpreter payload with Ghidra
2019-03-06/a>Brad DuncanMalspam with password-protected word docs still pushing IcedID (Bokbot) with Trickbot
2019-03-06/a>Johannes UllrichMarch Edition of Ouch! Newsletter: Securely Disposing Mobile Devices https://www.sans.org/security-awareness-training/resources/disposing-your-mobile-device
2019-03-06/a>Xavier MertensKeep an Eye on Disposable Email Addresses
2019-03-05/a>Rob VandenBrinkPowershell, Active Directory and the Windows Host Firewall
2019-02-28/a>Tom WebbPhishing impersonations
2019-02-27/a>Didier StevensMaldoc Analysis by a Reader
2019-02-26/a>Russ McReeAd Blocking With Pi Hole
2019-02-25/a>Didier StevensSextortion Email Variant: With QR Code
2019-02-24/a>Guy BruneauPacket Editor and Builder by Colasoft
2019-02-21/a>Xavier MertensSimple Powershell Keyloggers are Back
2019-02-19/a>Didier StevensIdentifying Files: Failure Happens
2019-02-14/a>Xavier MertensOld H-Worm Delivered Through GitHub
2019-02-11/a>Didier StevensHave You Seen an Email Virus Recently?
2019-02-10/a>Didier StevensVideo: Maldoc Analysis of the Weekend
2019-02-07/a>Xavier Mertens Phishing Kit with JavaScript Keylogger
2019-02-06/a>Brad DuncanHancitor malspam and infection traffic from Tuesday 2019-02-05
2019-02-05/a>Rob VandenBrinkMitigations against Mimikatz Style Attacks
2019-02-03/a>Didier StevensVideo: Analyzing a Simple HTML Phishing Attachment
2019-02-02/a>Guy BruneauScanning for WebDAV PROPFIND Exploiting CVE-2017-7269
2019-02-01/a>Rick WannerSextortion: Follow the Money Part 3 - The cashout begins!
2019-01-31/a>Xavier MertensTracking Unexpected DNS Changes
2019-01-30/a>Russ McReeCR19-010: The United States vs. Huawei
2019-01-29/a>Johannes UllrichA Not So Well Done Phish (Why Attackers need to Implement IPv6 Now! ;-) )
2019-01-27/a>Russell EubanksResolve to Be More Involved In Your Local Community - REVISITED
2019-01-26/a>Didier StevensVideo: Analyzing Encrypted Malicious Office Documents
2019-01-24/a>Brad DuncanMalspam with Word docs uses macro to run Powershell script and steal system data
2019-01-22/a>Xavier MertensDNS Firewalling with MISP
2019-01-21/a>Didier StevensSuspicious GET Request: Do You Know What This Is?
2019-01-18/a>John BambenekSextortion Bitcoin on the Move
2019-01-16/a>Brad DuncanEmotet infections and follow-up malware
2019-01-14/a>Rob VandenBrinkStill Running Windows 7? Time to think about that upgrade project!
2019-01-14/a>Rob VandenBrinkMicrosoft LAPS - Blue Team / Red Team
2019-01-12/a>Guy BruneauSnorpy a Web Base Tool to Build Snort/Suricata Rules
2019-01-10/a>Brad DuncanHeartbreaking Emails: "Love You" Malspam
2019-01-09/a>Russ McReegganimate: Animate YouR Security Analysis
2019-01-02/a>Lorna HutchesonGift Card Scams on the rise
2019-01-02/a>Xavier MertensMalicious Script Leaking Data via FTP
2018-12-31/a>Didier StevensSoftware Crashes: A New Year's Resolution
2018-12-29/a>Didier StevensVideo: De-DOSfuscation Example
2018-12-27/a>Didier StevensMatryoshka Phish
2018-12-26/a>Didier StevensBitcoin "Blocklists"
2018-12-23/a>Guy BruneauScanning Activity, end Goal is to add Hosts to Mirai Botnet
2018-12-22/a>Didier StevensKringleCon 2018
2018-12-21/a>Lorna HutchesonPhishing Attempts That Bypass 2FA
2018-12-19/a>Xavier MertensRestricting PowerShell Capabilities with NetSh
2018-12-19/a>Xavier MertensMicrosoft OOB Patch for Internet Explorer: Scripting Engine Memory Corruption Vulnerability
2018-12-19/a>Xavier MertensUsing OSSEC Active-Response as a DFIR Framework
2018-12-18/a>Brad DuncanMalspam links to password-protected Word docs that push IcedID (Bokbot)
2018-12-17/a>Didier StevensPassword Protected ZIP with Maldoc
2018-12-16/a>Guy BruneauRandom Port Scan for Open RDP Backdoor
2018-12-15/a>Didier StevensDe-DOSfuscation Example
2018-12-14/a>Rick WannerBombstortion?? Boomstortion??
2018-12-13/a>Xavier MertensPhishing Attack Through Non-Delivery Notification
2018-12-12/a>Didier StevensYet Another DOSfuscation Sample
2018-12-11/a>Richard PorterMicrosoft December 2018 Patch Tuesday
2018-12-09/a>Johannes UllrichArrest of Huawei CFO Inspires Advance Fee Scam
2018-12-09/a>Didier StevensQuickie: String Analysis is Still Useful
2018-12-05/a>Brad DuncanCampaign evolution: Hancitor changes its Word macros
2018-12-04/a>Brad DuncanMalspam pushing Lokibot malware
2018-12-01/a>Didier StevensWireshark update 2.6.5 available
2018-11-30/a>Remco VerhoefCoinMiners searching for hosts
2018-11-27/a>Xavier MertensMore obfuscated shell scripts: Fake MacOS Flash update
2018-11-27/a>Rob VandenBrinkData Exfiltration in Penetration Tests
2018-11-26/a>Russ McReeViperMonkey: VBA maldoc deobfuscation
2018-11-26/a>Xavier MertensObfuscated bash script targeting QNap boxes
2018-11-23/a>Didier StevensVideo: Dissecting a CVE-2017-11882 Exploit
2018-11-22/a>Xavier MertensDivided Payload in Multiple Pasties
2018-11-20/a>Xavier MertensQuerying DShield from Cortex
2018-11-20/a>Xavier MertensVMware Affected by Dell EMC Avamar Vulnerability
2018-11-19/a>Xavier MertensThe Challenge of Managing Your Digital Library
2018-11-18/a>Guy BruneauMultipurpose PCAP Analysis Tool
2018-11-17/a>Xavier MertensQuickly Investigating Websites with Lookyloo
2018-11-16/a>Xavier MertensBasic Obfuscation With Permissive Languages
2018-11-15/a>Brad DuncanEmotet infection with IcedID banking Trojan
2018-11-14/a>Brad DuncanDay in the life of a researcher: Finding a wave of Trickbot malspam
2018-11-13/a>Johannes UllrichNovember 2018 Microsoft Patch Tuesday
2018-11-12/a>Rick WannerUsing the Neutrino ip-blocklist API to test general badness of an IP
2018-11-11/a>Pasquale StirparoCommunity contribution: joining forces or multiply solutions?
2018-11-10/a>Didier StevensVideo: CyberChef: BASE64/XOR Recipe
2018-11-06/a>Xavier MertensMalicious Powershell Script Dissection
2018-11-05/a>Johannes UllrichStruts 2.3 Vulnerable to Two Year old File Upload Flaw
2018-11-04/a>Pasquale StirparoBeyond good ol' LaunchAgent - part 1
2018-10-31/a>Brad DuncanMore malspam using password-protected Word docs
2018-10-30/a>Brad DuncanCampaign evolution: Hancitor malspam starts pushing Ursnif this week
2018-10-26/a>Xavier MertensDissecting Malicious Office Documents with Linux
2018-10-23/a>Xavier MertensDiving into Malicious AutoIT Code
2018-10-22/a>Xavier MertensMalicious Powershell using a Decoy Picture
2018-10-21/a>Pasquale StirparoBeyond good ol’ LaunchAgent - part 0
2018-10-21/a>Didier StevensMSG Files: Compressed RTF
2018-10-18/a>Russ McReeCisco Security Advisories 17 OCT 2018
2018-10-17/a>Russ McReeVMSA-2018-0026 VMware ESXi, Workstation & Fusion updates address out-of-bounds read vulnerability https://www.vmware.com/security/advisories/VMSA-2018-0026.html
2018-10-17/a>Russ McReeRedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence
2018-10-12/a>Xavier MertensMore Equation Editor Exploit Waves
2018-10-10/a>Xavier Mertens"OG" Tools Remain Valuable
2018-10-10/a>Xavier MertensNew Campaign Using Old Equation Editor Vulnerability
2018-10-09/a>Johannes UllrichOctober 2018 Microsoft Patch Tuesday
2018-10-08/a>Guy BruneauApple Security Updates
2018-10-08/a>Guy BruneauLatest Release of rockNSM 2.1
2018-10-01/a>Didier StevensDecoding Custom Substitution Encodings with translate.py
2018-09-30/a>Didier StevensWhen DOSfuscation Helps...
2018-09-28/a>Xavier MertensMore Excel DDE Code Injection
2018-09-26/a>Brad DuncanOne Emotet infection leads to three follow-up malware infections
2018-09-24/a>Didier StevensAnalyzing Encoded Shellcode with scdbg
2018-09-22/a>Didier StevensSuspicious DNS Requests ... Issued by a Firewall
2018-09-20/a>Xavier MertensHunting for Suspicious Processes with OSSEC
2018-09-19/a>Rob VandenBrinkCertificates Revisited - SSL VPN Certificates 2 Ways
2018-09-18/a>Rob VandenBrinkUsing Certificate Transparency as an Attack / Defense Tool
2018-09-13/a>Xavier MertensMalware Delivered Through MHT Files
2018-09-11/a>Johannes UllrichMicrosoft September Patch Tuesday Summary
2018-09-07/a>Xavier MertensCrypto Mining in a Windows Headless Browser
2018-09-05/a>Rob VandenBrinkWhere have all my Certificates gone? (And when do they expire?)
2018-09-05/a>Xavier MertensMalicious PowerShell Compiling C# Code on the Fly
2018-09-04/a>Rob VandenBrinkLet's Trade: You Read My Email, I'll Read Your Password!
2018-08-31/a>Jim ClausingQuickie: Using radare2 to disassemble shellcode
2018-08-30/a>Xavier MertensCrypto Mining Is More Popular Than Ever!
2018-08-29/a>Xavier Mertens3D Printers in The Wild, What Can Go Wrong?
2018-08-26/a>Didier StevensIdentifying numeric obfuscation
2018-08-26/a>Didier Stevens"When was this machine infected?"
2018-08-25/a>Didier StevensMicrosoft Publisher malware: static analysis
2018-08-24/a>Xavier MertensMicrosoft Publisher Files Delivering Malware
2018-08-23/a>Xavier MertensSimple Phishing Through formcrafts.com
2018-08-22/a>Deborah HaleEmail/password Frustration
2018-08-21/a>Xavier MertensMalicious DLL Loaded Through AutoIT
2018-08-20/a>Didier StevensOpenSSH user enumeration (CVE-2018-15473)
2018-08-19/a>Didier StevensVideo: Peeking into msg files - revisited
2018-08-15/a>Xavier MertensTruncating Payloads and Anonymizing PCAP files
2018-08-13/a>Didier StevensNew Extortion Tricks: Now Including Your (Partial) Phone Number!
2018-08-12/a>Didier StevensA URL shortener handy for phishers
2018-08-11/a>Didier StevensPeeking into msg files - revisited
2018-08-10/a>Remco VerhoefHunting SSL/TLS clients using JA3
2018-08-06/a>Didier StevensNumeric obfuscation: another example
2018-08-05/a>Didier StevensVideo: Maldoc analysis with standard Linux tools
2018-08-04/a>Didier StevensDealing with numeric obfuscation in malicious scripts
2018-08-01/a>Johannes UllrichWhen Cameras and Routers attack Phones. Spike in CVE-2014-8361 Exploits Against Port 52869
2018-07-30/a>Didier StevensMalicious Word documents using DOSfuscation
2018-07-30/a>Xavier MertensExploiting the Power of Curl
2018-07-29/a>Guy BruneauUsing RITA for Threat Analysis
2018-07-26/a>Xavier MertensWindows Batch File Deobfuscation
2018-07-24/a>Tom WebbCell Phone Monitoring. Who is Watching the Watchers?
2018-07-23/a>Didier StevensAnalyzing MSG files
2018-07-21/a>Didier StevensBTC pickpockets are back
2018-07-20/a>Kevin ListonWeblogic Exploit Code Made Public (CVE-2018-2893)
2018-07-17/a>Xavier MertensSearching for Geographically Improbable Login Attempts
2018-07-15/a>Didier StevensVideo: Retrieving and processing JSON data (BTC example)
2018-07-15/a>Didier StevensExtracting BTC addresses from emails
2018-07-14/a>Didier StevensRetrieving and processing JSON data (BTC example)
2018-07-13/a>Xavier MertensCryptominer Delivered Though Compromized JavaScript File
2018-07-12/a>Johannes UllrichNew Extortion Tricks: Now Including Your Password!
2018-07-03/a>Didier StevensProgress indication for scripts on Windows
2018-07-02/a>Guy BruneauVMware ESXi, Workstation, and Fusion address multiple out-of-bounds read vulnerabilities https://www.vmware.com/security/advisories/VMSA-2018-0016.html
2018-07-02/a>Guy BruneauHello Peppa! - PHP Scans
2018-07-01/a>Didier StevensVideo: Analyzing XPS Files
2018-06-30/a>Didier StevensXPS samples
2018-06-27/a>Renato MarinhoSilently Profiling Unknown Malware Samples
2018-06-26/a>Didier StevensAnalyzing XPS files
2018-06-25/a>Didier StevensGuilty by association
2018-06-22/a>Lorna HutchesonXPS Attachment Used for Phishing
2018-06-21/a>Xavier MertensAre Your Hunting Rules Still Working?
2018-06-19/a>Xavier MertensPowerShell: ScriptBlock Logging... Or Not?
2018-06-18/a>Xavier MertensMalicious JavaScript Targeting Mobile Browsers
2018-06-17/a>Didier StevensEncrypted Office Documents
2018-06-16/a>Russ McReeAnomaly Detection & Threat Hunting with Anomalize
2018-06-15/a>Lorna HutchesonSMTP Strangeness - Possible C2
2018-06-13/a>Remco VerhoefFrom Microtik with Love
2018-06-13/a>Xavier MertensA Bunch of Compromized Wordpress Sites
2018-06-12/a>Johannes UllrichMicrosoft June 2018 Patch Tuesday
2018-06-07/a>Remco VerhoefAutomated twitter loot collection
2018-06-05/a>Xavier MertensMalicious Post-Exploitation Batch File
2018-06-04/a>Rob VandenBrinkDigging into Authenticode Certificates
2018-06-01/a>Remco VerhoefBinary analysis with Radare2
2018-05-30/a>Bojan ZdrnjaThe end of the lock icon
2018-05-28/a>Kevin ListonDo you hear Laurel or Yanny or is it On-Off Keying?
2018-05-25/a>Xavier MertensAntivirus Evasion? Easy as 1,2,3
2018-05-24/a>Xavier Mertens"Blocked" Does Not Mean "Forget It"
2018-05-23/a>Remco VerhoefTrack naughty and nice binaries with Google Santa
2018-05-22/a>Guy BruneauVMware updates enable Hypervisor-Assisted Guest Mitigations for Speculative Store Bypass issue - https://www.vmware.com/security/advisories/VMSA-2018-0012.html
2018-05-22/a>Xavier MertensMalware Distributed via .slk Files
2018-05-22/a>Xavier MertensVMware Workstation and Fusion updates address signature bypass and multiple denial-of-service vulnerabilities https://www.vmware.com/security/advisories/VMSA-2018-0013.html
2018-05-20/a>Didier StevensDASAN GPON home routers exploits in-the-wild
2018-05-19/a>Xavier MertensMalicious Powershell Targeting UK Bank Customers
2018-05-16/a>Mark HofmanEFAIL, a weakness in openPGP and S\MIME
2018-05-10/a>Bojan ZdrnjaExfiltrating data from (very) isolated environments
2018-05-09/a>Xavier MertensNice Phishing Sample Delivering Trickbot
2018-05-07/a>Xavier MertensAdding Persistence Via Scheduled Tasks
2018-05-03/a>Renato MarinhoWebLogic Exploited in the Wild (Again)
2018-05-02/a>Russ McReeWindows Commands Reference - An InfoSec Must Have
2018-05-01/a>Xavier MertensDiving into a Simple Maldoc Generator
2018-04-30/a>Remco VerhoefAnother approach to webapplication fingerprinting
2018-04-28/a>Rick WannerMicrosoft Security Update for Spectre V2
2018-03-12/a>Xavier MertensPayload delivery via SMB
2018-03-11/a>Guy BruneaurockNSM Configuration & Installation Steps http://handlers.sans.org/gbruneau/rockNSM%20as%20an%20Incident%20Response%20Package.htm
2018-03-08/a>Xavier MertensCRIMEB4NK IRC Bot
2018-03-06/a>Mark HofmanThe joys of changing Privacy Laws
2018-03-05/a>Xavier MertensMalicious Bash Script with Multiple Features
2018-03-04/a>Xavier MertensThe Crypto Miners Fight For CPU Cycles
2018-03-03/a>Xavier MertensReminder: Beware of the "Cloud"
2018-03-02/a>Xavier MertensCommon Patterns Used in Phishing Campaigns Files
2018-03-01/a>Johannes UllrichWhy Does Emperor Xi Dislike Winnie the Pooh and Scrambled Eggs?
2018-02-25/a>Guy BruneauBlackhole Advertising Sites with Pi-hole
2018-02-02/a>Xavier MertensSimple but Effective Malicious XLS Sheet
2018-02-01/a>Xavier MertensAdaptive Phishing Kit
2018-01-31/a>Tom WebbTax Phishing Time
2018-01-30/a>Kevin ListonCisco ASA WebVPN Vulnerability
2018-01-29/a>Didier StevensComment your Packet Captures - Extra!
2018-01-26/a>Xavier MertensInvestigating Microsoft BITS Activity
2018-01-25/a>Xavier MertensRansomware as a Service
2018-01-23/a>John BambenekLife after GDPR: Implications for Cybersecurity
2018-01-23/a>Johannes UllrichApple Updates Everything, Again
2018-01-22/a>Didier StevensHTTPS on every port?
2018-01-20/a>Didier StevensAn RTF phish
2018-01-19/a>Jim ClausingFollowup to IPv6 brute force and IPv6 blocking
2018-01-18/a>Xavier MertensComment your Packet Captures!
2018-01-13/a>Rick WannerFlaw in Intel's Active Management Technology (AMT)
2018-01-12/a>Bojan ZdrnjaThose pesky registry keys required by critical security patches
2018-01-11/a>Xavier MertensMining or Nothing!
2018-01-10/a>Russ McReeGitHub InfoSec Threepeat: HELK, ptf, and VulnWhisperer
2018-01-09/a>Jim ClausingAre you watching for brute force attacks on IPv6?
2018-01-07/a>Guy BruneauSSH Scans by Clients Types
2018-01-03/a>John BambenekPhishing to Rural America Leads to Six-figure Wire Fraud Losses
2018-01-02/a>Didier StevensPDF documents & URLs: video
2018-01-01/a>Didier StevensWhat is new?
2017-12-30/a>Xavier Mertens2017, The Flood of CVEs
2017-12-27/a>Guy BruneauWhat are your Security Challenges for 2018?
2017-12-23/a>Didier StevensEncrypted PDFs
2017-12-20/a>Richard PorterVMWare Security Advisory: VMSA-2017-0021: https://www.vmware.com/security/advisories/VMSA-2017-0021.html
2017-12-19/a>Xavier MertensExample of 'MouseOver' Link in a Powerpoint File
2017-12-18/a>Didier StevensPhish or scam? - Part 2
2017-12-17/a>Didier StevensPhish or scam? - Part 1
2017-12-16/a>Xavier MertensMicrosoft Office VBA Macro Obfuscation via Metadata
2017-12-14/a>Russ McReeSecurity Planner: Improve your online safety
2017-12-14/a>Russ McReeDetection Lab: Visibility & Introspection for Defenders
2017-12-13/a>Xavier MertensTracking Newly Registered Domains
2017-12-12/a>Johannes UllrichDecember Microsoft Patch Tuesday Summary
2017-12-05/a>Tom WebbIR using the Hive Project.
2017-12-02/a>Xavier MertensUsing Bad Material for the Good
2017-12-01/a>Xavier MertensPhishing Kit (Ab)Using Cloud Services
2017-11-29/a>Xavier MertensFileless Malicious PowerShell Sample
2017-11-28/a>Xavier MertensApple High Sierra Uses a Passwordless Root Account
2017-11-25/a>Guy BruneauBenefits associated with the use of Open Source Software
2017-11-25/a>Guy BruneauExim Remote Code Exploit
2017-11-23/a>Xavier MertensProactive Malicious Domain Search
2017-11-17/a>Xavier MertensTop-100 Malicious IP STIX Feed
2017-11-16/a>Xavier MertensSuspicious Domains Tracking Dashboard
2017-11-15/a>Xavier MertensIf you want something done right, do it yourself!
2017-11-13/a>Guy Bruneaujsonrpc Scanning for root account
2017-11-13/a>Guy BruneauVBE Embeded Script (info.zip)
2017-11-11/a>Xavier MertensKeep An Eye on your Root Certificates
2017-11-10/a>Bojan ZdrnjaBattling e-mail phishing
2017-11-06/a>Didier StevensMetasploit's Maldoc
2017-11-05/a>Didier StevensExtracting the text from PDF documents
2017-11-04/a>Didier StevensPDF documents & URLs
2017-11-03/a>Xavier MertensSimple Analysis of an Obfuscated JAR File
2017-11-01/a>Rob VandenBrinkSecuring SSH Services - Go Blue Team!!
2017-10-30/a>Didier StevensPE files and debug info
2017-10-30/a>Johannes UllrichCritical Patch For Oracle's Identity Manager
2017-10-27/a>Renato Marinho"Catch-All" Google Chrome Malicious Extension Steals All Posted Data
2017-10-25/a>Mark HofmanDUHK attack, continuing a week of named issues
2017-10-24/a>Xavier MertensStop relying on file extensions
2017-10-24/a>Xavier MertensBadRabbit: New ransomware wave hitting RU & UA
2017-10-20/a>Rick WannerCisco fixes for KRACKs not complete
2017-10-19/a>Brad DuncanHSBC-themed malspam uses ISO attachments to push Loki Bot malware
2017-10-18/a>Renato MarinhoBaselining Servers to Detect Outliers
2017-10-17/a>Brad DuncanHancitor malspam uses DDE attack
2017-10-15/a>Didier StevensPeeking into .msg files
2017-10-12/a>Xavier MertensVersion control tools aren't only for Developers
2017-10-06/a>Johannes UllrichWhat's in a cable? The dangers of unauthorized cables
2017-10-02/a>Xavier MertensInvestigating Security Incidents with Passive DNS
2017-09-30/a>Lorna HutchesonWho's Borrowing your Resources?
2017-09-29/a>Lorna HutchesonGood Analysis = Understanding(tools + logs + normal)
2017-09-28/a>Xavier MertensThe easy way to analyze huge amounts of PCAP data
2017-09-25/a>Renato MarinhoXPCTRA Malware Steals Banking and Digital Wallet User's Credentials
2017-09-24/a>Jim ClausingForensic use of mount --bind
2017-09-22/a>Russell EubanksWhat is the State of Your Union?
2017-09-19/a>Jim ClausingNew tool: mac-robber.py
2017-09-18/a>Xavier MertensGetting some intelligence from malspam
2017-09-18/a>Johannes UllrichSANS Securingthehuman posted a follow up to their Equifax breach webcast: https://securingthehuman.sans.org/blog/2017/09/15/equifax-webcast-follow-up
2017-09-17/a>Guy BruneaurockNSM as a Incident Response Package
2017-09-16/a>Guy BruneauVMware ESXi, vCenter Server, Fusion and Workstation updates resolve multiple security vulnerabilities - https://www.vmware.com/security/advisories/VMSA-2017-0015.html
2017-09-13/a>Rob VandenBrinkNo IPv6? Challenge Accepted! (Part 1)
2017-09-13/a>Rob VandenBrinkSysinternals Update: Sysmon v6.10, Process Monitor v3.40, Autoruns v13.80, AccessChk v6.11 - https://blogs.technet.microsoft.com/sysinternals/2017/09/12/sysinternals-update-sysmon-v6-1-process-monitor-v3-4-autoruns-v13-8-accesschk-v6-11/
2017-09-11/a>Russ McReeWindows Auditing with WINspect
2017-09-10/a>Didier StevensAnalyzing JPEG files
2017-09-09/a>Didier StevensMalware analysis output sanitization
2017-09-06/a>Adrien de BeaupreModern Web Application Penetration Testing , Hash Length Extension Attacks
2017-09-05/a>Johannes UllrichThe Mirai Botnet: A Look Back and Ahead At What's Next
2017-09-05/a>Adrien de BeaupreStruts vulnerability patch released by apache, patch now
2017-09-02/a>Xavier MertensAutoIT based malware back in the wild
2017-08-29/a>Renato MarinhoSecond Google Chrome Extension Banker Malware in Two Weeks
2017-08-28/a>Johannes UllrichAn Update On DVR Malware: A DVR Torture Chamber
2017-08-26/a>Didier StevensMalware analysis: searching for dots
2017-08-25/a>Xavier MertensMalicious AutoIT script delivered in a self-extracting RAR file
2017-08-24/a>Bojan ZdrnjaFree Bitcoins? Why not?
2017-08-23/a>Xavier MertensMalicious script dropping an executable signed by Avast?
2017-08-18/a>Guy Bruneautshark 2.4 New Feature - Command Line Export Objects
2017-08-18/a>Renato MarinhoEngineBox Malware Supports 10+ Brazilian Banks
2017-08-17/a>Xavier MertensMaldoc with auto-updated link
2017-08-16/a>Xavier MertensAnalysis of a Paypal phishing kit
2017-08-15/a>Brad DuncanMalspam pushing Trickbot banking Trojan
2017-08-15/a>Renato Marinho(Banker(GoogleChromeExtension)).targeting("Brazil")
2017-08-14/a>Didier StevensSometimes it's just SPAM
2017-08-13/a>Didier StevensThe Good Phishing Email
2017-08-10/a>Didier StevensMaldoc Analysis with ViperMonkey
2017-08-07/a>Xavier MertensIncrease of phpMyAdmin scans
2017-08-03/a>Johannes UllrichUsing a Raspberry Pi honeypot to contribute data to DShield/ISC
2017-08-01/a>Rob VandenBrinkRooting Out Hosts that Support Older Samba Versions
2017-07-30/a>Renato MarinhoSMBLoris - the new SMB flaw
2017-07-30/a>Guy BruneauText Banking Scams
2017-07-24/a>Russell EubanksTrends Over Time
2017-07-21/a>Didier StevensMalicious .iso Attachments
2017-07-19/a>Xavier MertensBots Searching for Keys & Config Files
2017-07-18/a>Bojan ZdrnjaInvestigation of BitTorrent Sync (v.2.0) as a P2P Cloud Service (Part 4 ? Windows Thumbnail Cache, Registry, Prefetch Files, and Link Files artefacts)
2017-07-16/a>Renato MarinhoSMS Phishing induces victims to photograph its own token card
2017-07-13/a>Bojan ZdrnjaInvestigation of BitTorrent Sync (v.2.0) as a P2P Cloud Service (Part 3 ? Physical Memory artefacts)
2017-07-12/a>Xavier MertensBackup Scripts, the FIM of the Poor
2017-07-11/a>Renato MarinhoJuly's Microsoft Patch Tuesday
2017-07-09/a>Russ McReeAdversary hunting with SOF-ELK
2017-07-08/a>Xavier MertensA VBScript with Obfuscated Base64 Data
2017-07-07/a>Renato MarinhoDDoS Extortion E-mail: Yet Another Bluff?
2017-07-05/a>Didier StevensSelecting domains with random names
2017-07-02/a>Didier StevensPE Section Name Descriptions
2017-06-28/a>Brad DuncanCatching up with Blank Slate: a malspam campaign still going strong
2017-06-27/a>Brad DuncanA Tale of Two Phishies
2017-06-22/a>Xavier MertensObfuscating without XOR
2017-06-17/a>Guy BruneauMapping Use Cases to Logs. Which Logs are the Most Important to Collect?
2017-06-15/a>Bojan ZdrnjaUberscammers
2017-06-14/a>Xavier MertensSystemd Could Fallback to Google DNS?
2017-06-10/a>Russell EubanksAn Occasional Look in the Rear View Mirror
2017-06-08/a>Tom WebbSummer STEM for Kids
2017-06-02/a>Xavier MertensPhishing Campaigns Follow Trends
2017-06-01/a>Xavier MertensSharing Private Data with Webcast Invitations
2017-05-31/a>Pasquale StirparoAnalysis of Competing Hypotheses, WCry and Lazarus (ACH part 2)
2017-05-30/a>Johannes UllrichFreeRadius Authentication Bypass
2017-05-28/a>Pasquale StirparoAnalysis of Competing Hypotheses (ACH part 1)
2017-05-28/a>Guy BruneauCyberChef a Must Have Tool in your Tool bag!
2017-05-26/a>Lorna HutchesonFile2pcap - A new tool for your toolkit!
2017-05-25/a>Xavier MertensCritical Vulnerability in Samba from 3.5.0 onwards
2017-05-23/a>Rob VandenBrinkWhat did we Learn from WannaCry? - Oh Wait, We Already Knew That!
2017-05-20/a>Xavier MertensTyposquatting: Awareness and Hunting
2017-05-18/a>Xavier MertensMy Little CVE Bot
2017-05-17/a>Richard PorterWait What? We don?t have to change passwords every 90 days?
2017-05-16/a>Russ McReeWannaCry? Do your own data analysis.
2017-05-13/a>Guy BruneauHas anyone Tested WannaCry Killswitch? - https://blog.didierstevens.com/2017/05/13/quickpost-wcry-killswitch-check-is-not-proxy-aware/
2017-05-10/a>Johannes UllrichRead This If You Are Using a Script to Pull Data From This Site
2017-05-08/a>Renato MarinhoExploring a P2P Transient Botnet - From Discovery to Enumeration
2017-05-06/a>Xavier MertensThe story of the CFO and CEO...
2017-05-05/a>Xavier MertensHTTP Headers... the Achilles' heel of many applications
2017-05-03/a>Bojan ZdrnjaPowershelling with exploits
2017-05-03/a>Bojan ZdrnjaOAUTH phishing against Google Docs ? beware!
2017-05-02/a>Richard PorterDo you have Intel AMT? Then you have a problem today! Intel Active Management Technology INTEL-SA-00075
2017-04-28/a>Xavier MertensAnother Day, Another Obfuscation Technique
2017-04-28/a>Russell EubanksKNOW before NO
2017-04-22/a>Jim ClausingWTF tcp port 81
2017-04-21/a>Xavier MertensAnalysis of a Maldoc with Multiple Layers of Obfuscation
2017-04-20/a>Xavier MertensDNS Query Length... Because Size Does Matter
2017-04-19/a>Xavier MertensHunting for Malicious Excel Sheets
2017-04-18/a>Johannes UllrichYet Another Apple Phish and Some DNS Lessons Learned From It
2017-04-16/a>Johannes UllrichTool to Detect Active Phishing Attacks Using Unicode Look-Alike Domains
2017-04-14/a>Rick WannerWireshark 2.2.6 available -> https://www.wireshark.org/docs/relnotes/wireshark-2.2.6.html
2017-04-11/a>Brad DuncanDridex malspam seen on Monday 2017-04-10
2017-04-10/a>Didier StevensPassword History: Insights Shared by a Reader
2017-04-07/a>Xavier MertensTracking Website Defacers with HTTP Referers
2017-04-05/a>Xavier MertensWhitelists: The Holy Grail of Attackers
2017-04-02/a>Guy BruneauIPFire - A Household Multipurpose Security Gateway
2017-03-31/a>Xavier MertensPro & Con of Outsourcing your SOC
2017-03-30/a>Xavier MertensDiverting built-in features for the bad
2017-03-28/a>Xavier MertensLogical & Physical Security Correlation
2017-03-25/a>Russell EubanksDistraction as a Service
2017-03-24/a>Xavier MertensNicely Obfuscated JavaScript Sample
2017-03-18/a>Rick WannerCisco IOS Remote Code Execution Vulnerability -> https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp
2017-03-18/a>Xavier MertensExample of Multiple Stages Dropper
2017-03-15/a>Xavier MertensRetro Hunting!
2017-03-14/a>Johannes UllrichFebruary and March Microsoft Patch Tuesday
2017-03-11/a>Russell EubanksWhat's On Your Not To Do List?
2017-03-10/a>Xavier MertensThe Side Effect of GeoIP Filters
2017-03-08/a>Richard PorterWhat is really being proxied?
2017-03-06/a>Renato MarinhoA very convincing Typosquatting + Social Engineering campaign is targeting Santander corporate customers in Brazil
2017-03-04/a>Xavier MertensHow your pictures may affect your website reputation
2017-03-03/a>Lorna HutchesonBitTorrent or Something Else?
2017-02-28/a>Xavier MertensAnalysis of a Simple PHP Backdoor
2017-02-28/a>Johannes UllrichMy Catch Of 4 Months In The Amazon IP Address Space
2017-02-27/a>Tom WebbDynamite Phishing
2017-02-25/a>Guy BruneauUnpatched Microsoft Edge and IE Bug
2017-02-15/a>Xavier MertensHow was your stay at the Hotel La Playa?
2017-02-14/a>Johannes UllrichMicrosoft Patch Tuesday Delayed
2017-02-13/a>Rob VandenBrinkStuff I Learned Decrypting
2017-02-12/a>Xavier MertensAnalysis of a Suspicious Piece of JavaScript
2017-02-10/a>Brad DuncanHancitor/Pony malspam
2017-02-09/a>Brad DuncanCryptoShield Ransomware from Rig EK
2017-02-09/a>Brad DuncanTicketbleed vulnerability affects some f5 appliances
2017-02-07/a>Johannes UllrichMy Password is [taco] Using Emojis for Stronger Passwords
2017-02-05/a>Xavier MertensMany Malware Samples Found on Pastebin
2017-02-04/a>Xavier MertensDetecting Undisclosed Vulnerabilities with Security Tools & Features
2017-02-03/a>Lorna HutchesonCisco - Issue with Clock Signal Component
2017-02-02/a>Rick WannerMultiple vulnerabilities discovered in popular printer models
2017-02-01/a>Xavier MertensQuick Analysis of Data Left Available by Attackers
2017-01-31/a>Johannes UllrichMalicious Office files using fileless UAC bypass to drop KEYBASE malware
2017-01-28/a>Lorna HutchesonPacket Analysis - Where do you start?
2017-01-26/a>Xavier MertensIOC's: Risks of False Positive Alerts Flood Ahead
2017-01-24/a>Johannes UllrichCritical Vulnerability in Cisco WebEx Chrome Plugin
2017-01-24/a>Xavier MertensMalicious SVG Files in the Wild
2017-01-18/a>Rob VandenBrinkMaking Windows 10 a bit less "Creepy" - Common Privacy Settings
2017-01-14/a>Xavier MertensBackup Files Are Good but Can Be Evil
2017-01-13/a>Xavier MertensWho's Attacking Me?
2017-01-12/a>Mark BaggettSome tools updates
2017-01-12/a>Mark BaggettSystem Resource Utilization Monitor
2017-01-11/a>Johannes UllrichJanuary 2017 Edition of Ouch! Security Awareness Newsletter Released: https://securingthehuman.sans.org/ouch
2017-01-10/a>Johannes UllrichRealtors Be Aware: You Are a Target
2017-01-10/a>Johannes UllrichPort 37777 "MapTable" Requests
2017-01-07/a>Xavier MertensUsing Security Tools to Compromize a Network
2017-01-06/a>John BambenekGreat Misadventures of Security Vendors: Absurd Sandboxing Edition
2017-01-06/a>John BambenekRansomware Operators Cold Calling UK Schools to Get Malware Through
2017-01-04/a>John BambenekMixed Messages : Novel Phishing Attempts Trying to Steal Your E-mail Password Goes Wrong
2016-12-27/a>Guy BruneauUsing daemonlogger as a Software Tap
2016-12-26/a>Russ McReeCritical security update: PHPMailer 5.2.20 (CVE-2016-10045)
2016-12-24/a>Didier StevensPinging All The Way
2016-12-19/a>John BambenekUPDATED x1: Mirai Scanning for Port 6789 Looking for New Victims / Now hitting tcp/23231
2016-12-13/a>Xavier MertensUAC Bypass in JScript Dropper
2016-12-11/a>Russ McReeSteganography in Action: Image Steganography & StegExpose
2016-12-10/a>Didier StevensSleeping VBS Really Wants To Sleep
2016-12-09/a>Rick WannerMirai - now with DGA
2016-12-07/a>Xavier MertensThe Passwords You Should Never Use
2016-12-05/a>Didier StevensHancitor Maldoc Videos
2016-11-25/a>Xavier MertensFree Software Quick Security Checklist
2016-11-24/a>Didier StevensExtracting Shellcode From JavaScript
2016-11-23/a>Tom WebbMapping Attack Methodology to Controls
2016-11-22/a>Didier StevensUpdate:ZIP With Comment
2016-11-21/a>Didier StevensZIP With Comment
2016-11-20/a>Pasquale StirparoHow many “Epoch” times? Epocalypse.py timestamp converter
2016-11-18/a>Brad DuncanWireshark update: version 2.2.2 (stable release) and 2.0.8 (old stable release) - https://www.wireshark.org/download.html
2016-11-18/a>Didier StevensVBA Shellcode and Windows 10
2016-11-16/a>Xavier MertensExample of Getting Analysts & Researchers Away
2016-11-13/a>Guy BruneauBitcoin Miner File Upload via FTP
2016-11-11/a>Rick WannerBenevolent malware? reincarna/Linux.Wifatch
2016-11-02/a>Rob VandenBrinkWhat Does a Pentest Look Like?
2016-10-31/a>Russ McReeSEC505 DFIR capture script: snapshot.ps1
2016-10-30/a>Pasquale StirparoVolatility Bot: Automated Memory Analysis
2016-10-26/a>Johannes UllrichNew VMWare Security Advisory: VMSA-2016-0017 Information Disclosure in VMWare Fusion and VMWare Tools https://www.vmware.com/security/advisories/VMSA-2016-0017.html
2016-10-25/a>Xavier MertensAnother Day, Another Spam...
2016-10-23/a>Johannes UllrichISC Briefing: Large DDoS Attack Against Dyn
2016-10-22/a>Guy BruneauRequest for Packets TCP 4786 - CVE-2016-6385
2016-10-19/a>Xavier MertensSpam Delivered via .ICS Files
2016-10-17/a>Didier StevensMaldoc VBA Anti-Analysis: Video
2016-10-15/a>Didier StevensMaldoc VBA Anti-Analysis
2016-10-11/a>Xavier MertensWiFi Still Remains a Good Attack Vector
2016-10-10/a>Didier StevensRadare2: rahash2
2016-10-08/a>Russell EubanksUnauthorized Change Detected!
2016-10-07/a>Rick WannerFirst Hurricane Matthew related Phish
2016-10-02/a>Guy BruneauIs there an Infosec Cybersecurity Talent Shortage?
2016-09-30/a>Xavier MertensAnother Day, Another Malicious Behaviour
2016-09-28/a>Xavier MertensSNMP Pwn3ge
2016-09-25/a>Pasquale StirparoDefining Threat Intelligence Requirements
2016-09-17/a>Guy BruneauMultiple Cisco Products affected by IKEv1 Vulnerability
2016-09-15/a>Xavier MertensIn Need of a OTP Manager Soon?
2016-09-13/a>Rob VandenBrinkIf it's Free, YOU are the Product
2016-09-13/a>Rob VandenBrinkMicrosoft Patch Tuesday Analysis
2016-09-10/a>Xavier MertensOngoing IMAP Scan, Anyone Else?
2016-09-09/a>Xavier MertensCollecting Users Credentials from Locked Devices
2016-09-05/a>Xavier MertensMalware Delivered via '.pub' Files
2016-09-04/a>Russ McReeKali Linux 2016.2 Release: https://www.kali.org/news/kali-linux-20162-release/
2016-09-02/a>Johannes UllrichApple Patches "Trident" Vulnerabilities in OS X / Safari
2016-09-01/a>Xavier MertensMaxmind.com (Ab)used As Anti-Analysis Technique
2016-08-31/a>Deborah HaleCisco Security Advisories Issued
2016-08-29/a>Russ McReeRecommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
2016-08-28/a>Guy BruneauSpam with Obfuscated Javascript
2016-08-25/a>Xavier MertensOut-of-Band iOS Patch Fixes 0-Day Vulnerabilities
2016-08-24/a>Tom WebbStay on Track During IR
2016-08-24/a>Xavier MertensExample of Targeted Attack Through a Proxy PAC File
2016-08-23/a>Xavier MertensVoice Message Notifications Deliver Ransomware
2016-08-22/a>Russ McReeRed Team Tools Updates: hashcat and SpiderFoot
2016-08-21/a>Rick WannerCisco ASA SNMP Remote Code Execution Vulnerability
2016-08-19/a>Xavier MertensData Classification For the Masses
2016-08-14/a>Guy BruneauvRealize Log Insight directory traversal vulnerability - http://www.vmware.com/security/advisories/VMSA-2016-0011.html
2016-08-11/a>Pasquale StirparoLooking for the insider: Forensic Artifacts on iOS Messaging App
2016-08-02/a>Tom WebbWindows 10 Anniversary Update Available
2016-08-01/a>Daniel WesemannAre you getting I-CANNED ?
2016-07-31/a>Pasquale StirparoSharing (intel) is caring... or not?
2016-07-28/a>Bojan ZdrnjaVerifying SSL/TLS certificates manually
2016-07-27/a>Xavier MertensAnalyze of a Linux botnet client source code
2016-07-27/a>Xavier MertensCritical Xen PV guests vulnerabilities
2016-07-26/a>Johannes UllrichCommand and Control Channels Using "AAAA" DNS Records
2016-07-23/a>Russell EubanksIt Is Our Policy
2016-07-22/a>Deborah HaleThe life of an IT Manager
2016-07-21/a>Didier StevensPractice ntds.dit File
2016-07-19/a>Didier StevensOffice Maldoc: Let's Focus on the VBA Macros Later...
2016-07-15/a>Xavier MertensName All the Things!
2016-07-13/a>Xavier MertensDrupal: Patch released today to fix a highly critical RCE in contributed modules
2016-07-12/a>Xavier MertensHunting for Malicious Files with MISP + OSSEC
2016-07-12/a>Johannes UllrichMicrosoft Patch Tuesday Summary for July 2016
2016-07-10/a>Kevin ListonLessons Learned from Industrial Control Systems
2016-07-07/a>Johannes UllrichPatchwork: Is it still "Advanced" if all you have to do is Copy/Paste?
2016-07-03/a>Guy BruneauIs Data Privacy part of your Company's Culture?
2016-06-29/a>Xavier MertensPhishing Campaign with Blurred Images
2016-06-23/a>Russell EubanksAn Approach to Vulnerability Management
2016-06-22/a>Bojan ZdrnjaSecurity through obscurity never works
2016-06-20/a>Xavier MertensOngoing Spam Campaign Related to Swift
2016-06-18/a>Rob VandenBrinkControlling JavaScript Malware Before it Runs
2016-06-12/a>Guy BruneauDNS Sinkhole ISO Version 2.0
2016-06-09/a>Xavier MertensOffensive or Defensive Security? Both!
2016-06-03/a>Tom ListonMySQL is YourSQL
2016-06-01/a>Xavier MertensDocker Containers Logging
2016-05-29/a>Guy BruneauAnalysis of a Distributed Denial of Service (DDoS)
2016-05-26/a>Xavier MertensKeeping an Eye on Tor Traffic
2016-05-22/a>Pasquale StirparoThe strange case of WinZip MRU Registry key
2016-05-21/a>Didier StevensPython Malware - Part 2
2016-05-18/a>Russ McReeResources: Windows Auditing & Monitoring, Linux 2FA
2016-05-14/a>Guy BruneauINetSim as a Basic Honeypot
2016-05-13/a>Xavier MertensMISP - Malware Information Sharing Platform
2016-05-12/a>Xavier MertensAnother Day, Another Wave of Phishing Emails
2016-05-12/a>Xavier MertensAdobe Released Updates to Fix Critical Vulnerability
2016-05-08/a>Jim ClausingGuest Diary: Linux Capabilities - A friend and foe
2016-05-05/a>Xavier MertensMicrosoft BITS Used to Download Payloads
2016-05-02/a>Rick WannerFake Chrome update for Android
2016-05-02/a>Rick WannerLean Threat Intelligence
2016-04-29/a>Rob VandenBrinkSysinternals Updated today - Updates to Sysmon, Procdump and Sigcheck. https://blogs.technet.microsoft.com/sysinternals/2016/04/28/update-sysmon-v4-procdump-v8-sigcheck-v2-51/
2016-04-29/a>Mark HofmanNew release of PCI DSS (version 3.2) is available
2016-04-27/a>Tom WebbKippos Cousin Cowrie
2016-04-21/a>Daniel WesemannDecoding Pseudo-Darkleech (#1)
2016-04-21/a>Daniel WesemannDecoding Pseudo-Darkleech (Part #2)
2016-04-15/a>Xavier MertensWindows Command Line Persistence?
2016-04-02/a>Russell EubanksWhy Can't We Be Friends?
2016-03-30/a>Xavier MertensWhat to watch with your FIM?
2016-03-28/a>Xavier MertensImproving Bash Forensics Capabilities
2016-03-23/a>Bojan ZdrnjaAbusing Oracles
2016-03-21/a>Xavier MertensIP Addresses Triage
2016-03-15/a>Xavier MertensDockerized DShield SSH Honeypot
2016-03-13/a>Xavier MertensSSH Honeypots (Ab)used as Proxy
2016-03-13/a>Guy BruneauA Look at the Mandiant M-Trends 2016 Report
2016-03-11/a>Jim ClausingForensicating Docker, Part 1
2016-03-07/a>Xavier MertensAnother Malicious Document, Another Way to Deliver Malicious Code
2016-03-07/a>Xavier MertensOSX Ransomware Spread via a Rogue BitTorrent Client Installer
2016-03-06/a>Jim ClausingNovel method for slowing down Locky on Samba server using fail2ban
2016-02-27/a>Guy BruneauWireshark Fixes Several Bugs and Vulnerabilities
2016-02-27/a>Guy BruneauOpenSSL Security Update Planned for 1 March Release
2016-02-26/a>Xavier MertensQuick Audit of *NIX Systems
2016-02-24/a>Xavier MertensAnalyzis of a Malicious .lnk File with an Embedded Payload
2016-02-23/a>Xavier MertensVMware VMSA-2016-0002
2016-02-22/a>Xavier MertensReducing False Positives with Open Data Sources
2016-02-20/a>Didier StevensLocky: JavaScript Deobfuscation
2016-02-18/a>Xavier MertensHunting for Executable Code in Windows Environments
2016-02-15/a>Bojan ZdrnjaExploiting (pretty) blind SQL injections
2016-02-13/a>Guy BruneauVMware VMSA-2015-0007.3 has been Re-released
2016-02-11/a>Tom WebbTomcat IR with XOR.DDoS
2016-02-09/a>Johannes UllrichMicrosoft February 2016 Patch Tuesday
2016-02-07/a>Xavier MertensMore Malicious JavaScript Obfuscation
2016-02-06/a>Jim ClausingMore updates to kippo-log2db
2016-02-03/a>Xavier MertensAutomating Vulnerability Scans
2016-02-03/a>Xavier MertensEMET 5.5 Released
2016-02-02/a>Johannes UllrichTargeted IPv6 Scans Using pool.ntp.org .
2016-01-31/a>Guy BruneauWindows 10 and System Protection for DATA Default is OFF
2016-01-30/a>Xavier MertensAll CVE Details at Your Fingertips
2016-01-29/a>Xavier MertensScripting Web Categorization
2016-01-26/a>Rob VandenBrinkPentest Time Machine: NMAP + Powershell + whatever tool is next
2016-01-25/a>Rob VandenBrinkAssessing Remote Certificates with Powershell
2016-01-24/a>Didier StevensObfuscated MIME Files
2016-01-23/a>Didier StevensSigcheck and VirusTotal for Offline Machine
2016-01-21/a>Jim ClausingScanning for Fortinet ssh backdoor
2016-01-20/a>Xavier Mertens/tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters!
2016-01-15/a>Xavier MertensJavaScript Deobfuscation Tool
2016-01-13/a>Alex StanfordYou Have Got a New Audio Message - Guest Diary by Pasquale Stirparo
2016-01-10/a>Jim ClausingVMware security update
2016-01-09/a>Xavier MertensVirtual Bitlocker Containers
2016-01-06/a>Russ McReetoolsmith #112: Red vs Blue - PowerSploit vs PowerForensics
2016-01-05/a>Guy BruneauWhat are you Concerned the Most in 2016?
2016-01-01/a>Didier StevensFailure Is An Option
2015-12-29/a>Daniel WesemannNew Years Resolutions
2015-12-28/a>Rick WannerAdobe Flash and Adobe AIR Updates - https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
2015-12-24/a>Xavier MertensUnity Makes Strength
2015-12-23/a>Rob VandenBrinkLibraries and Dependencies - It Really is Turtles All The Way Down!
2015-12-22/a>Rick WannerThe other Juniper vulnerability - CVE-2015-7756
2015-12-21/a>Daniel WesemannCritical Security Controls: Getting to know the unknown
2015-12-19/a>Russell EubanksVMWare Security Advisory
2015-12-14/a>Russ McReeAD Security's Unofficial Guide to Mimikatz & Command Reference
2015-12-13/a>Didier StevensUse The Privilege
2015-12-12/a>Russell EubanksWhat Signs Are You Missing?
2015-12-10/a>Rob VandenBrinkUninstalling Problem Applications using Powershell
2015-12-10/a>Rob VandenBrinkNew Burp Feature - ClickBandit
2015-12-09/a>Xavier MertensEnforcing USB Storage Policy with PowerShell
2015-12-05/a>Guy BruneauAre you looking to setup your own Malware Sandbox?
2015-12-04/a>Tom WebbAutomating Phishing Analysis using BRO
2015-11-21/a>Didier StevensMaldoc Social Engineering Trick
2015-11-09/a>John BambenekICYMI: Widespread Unserialize Vulnerability in Java
2015-11-09/a>John BambenekProtecting Users and Enterprises from the Mobile Malware Threat
2015-11-04/a>Richard PorterApplication Aware and Critical Control 2
2015-11-01/a>Guy BruneauCisco Products Affected by Multiple Vulnerabilities in ntpd - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-ntp
2015-10-20/a>Bojan ZdrnjaWhen encoding saves the day
2015-10-18/a>Russell EubanksSecurity Awareness for Security Professionals
2015-10-17/a>Russell EubanksCIS Critical Security Controls - Version 6.0
2015-10-12/a>Guy BruneauData Visualization,What is your Tool of Choice?
2015-10-12/a>Guy BruneauCritical Vulnerability in Multiple Cisco Products - Apache Struts 2 Command Execution http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2
2015-10-09/a>Guy BruneauAdobe Acrobat and Reader Pre-Announcement
2015-09-29/a>Pedro BuenoTricks for DLL analysis
2015-09-28/a>Johannes Ullrich"Transport of London" Malicious E-Mail
2015-09-23/a>Daniel WesemannMaking our users unlearn what we taught them
2015-09-21/a>Xavier MertensDetecting XCodeGhost Activity
2015-09-08/a>Lenny ZeltserA Close Look at PayPal Overpayment Scams That Target Craigslist Sellers
2015-09-03/a>Xavier MertensQuerying the DShield API from RTIR
2015-09-01/a>Daniel WesemannEncryption of "data at rest" in servers
2015-08-31/a>Xavier MertensDetecting file changes on Microsoft systems with FCIV
2015-08-29/a>Tom WebbAutomating Metrics using RTIR REST API
2015-08-28/a>Didier StevensTest File: PDF With Embedded DOC Dropping EICAR
2015-08-19/a>Bojan ZdrnjaOutsourcing critical infrastructure (such as DNS)
2015-08-18/a>Russ McReeMicrosoft Security Bulletin MS15-093 - Critical OOB - Internet Explorer RCE
2015-08-17/a>Russ McReeTool Tip: Kansa Stafford released, PowerShell for DFIR
2015-08-16/a>Guy BruneauAre you a "Hunter"?
2015-08-12/a>Rob VandenBrinkWindows Service Accounts - Why They're Evil and Why Pentesters Love them!
2015-08-12/a>Rob VandenBrinkWireshark 1.12.7 is released, multiple fixes. Find the release notes at: https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html and the binaries at: https://www.wireshark.org/download.html
2015-08-07/a>Tony CarothersCritical Firefox Update Today
2015-08-06/a>Didier StevensSigcheck and virustotal-search
2015-08-02/a>Russell EubanksYour Security Policy Is So Lame
2015-07-31/a>Russ McReeTech tip: Invoke a system command in R
2015-07-31/a>Russ McReeCisco Security Advisory: Cisco ASR 1000 (Aggregation Services Routers) Fragmented Packet DOS Vuln: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150730-asr1k
2015-07-31/a>Russ McReeTech tip follow-up: Using the data Invoked with R's system command
2015-07-28/a>Rick WannerAndroid Stagefright multimedia viewer prone to remote exploitation
2015-07-27/a>Daniel WesemannAngler's best friends
2015-07-23/a>Mark HofmanSome more 0-days from ZDI
2015-07-21/a>Didier StevensSearching Through the VirusTotal Database
2015-07-17/a>Didier StevensProcess Explorer and VirusTotal
2015-07-17/a>Didier StevensAutoruns and VirusTotal
2015-07-17/a>Didier StevensSigcheck and VirusTotal
2015-07-14/a>Johannes UllrichJuly 2015 Microsoft Patch Tuesday
2015-07-12/a>Didier StevensJump List Files Are OLE Files
2015-07-03/a>Didier StevensAnalyzing Quarantine Files
2015-06-29/a>Rob VandenBrinkThe Powershell Diaries 2 - Software Inventory
2015-06-28/a>Didier StevensThe EICAR Test File
2015-06-27/a>Guy BruneauIs Windows XP still around in your Network a year after Support Ended?
2015-06-26/a>Daniel WesemannCisco default credentials - again!
2015-06-24/a>Rob VandenBrinkThe Powershell Diaries - Finding Problem User Accounts in AD
2015-06-22/a>Johannes UllrichSMTP Brute Forcing
2015-06-18/a>Johannes UllrichOS X and iOS Unauthorized Cross Application Resource Access (XARA)
2015-06-02/a>Alex StanfordGuest Diary: Xavier Mertens - Playing with IP Reputation with Dshield & OSSEC
2015-06-01/a>Tom WebbSubmit Dshield ASA Logs
2015-05-30/a>Russell EubanksWeekend Learning - Spoofer Project
2015-05-29/a>Russell EubanksTrust But Verify
2015-05-27/a>Tom WebbSYSINTERNALS Update(AccessChk v6.0, Autoruns v13.4, Process Monitor v3.2, VMMap v3.2)
2015-05-23/a>Guy BruneauBusiness Value in "Big Data"
2015-05-20/a>Brad DuncanLogjam - vulnerabilities in Diffie-Hellman key exchange affect browsers and servers using TLS
2015-05-15/a>Didier StevensAnother Maldoc? I'm Afraid So...
2015-05-14/a>Daniel WesemannOh Bloat!
2015-05-10/a>Didier StevensWireshark TCP Flags: How To Install On Windows Video
2015-05-09/a>Didier StevensMalicious Word Document: This Time The Maldoc Is A MIME File
2015-05-03/a>Russ McReeVolDiff, for memory image differential analysis
2015-04-30/a>Brad DuncanDalexis/CTB-Locker malspam campaign
2015-04-28/a>Daniel WesemannScammy Nepal earthquake donation requests
2015-04-27/a>Richard PorterWhen Prevention Fails, Incident Response Begins
2015-04-24/a>Basil Alawi S.TaherFileless Malware
2015-04-23/a>Bojan ZdrnjaWhen automation does not help
2015-04-19/a>Didier StevensHandling Special PDF Compression Methods
2015-04-17/a>Didier StevensMemory Forensics Of Network Devices
2015-04-15/a>Johannes UllrichMS15-034: HTTP.sys (IIS) DoS And Possible Remote Code Execution. PATCH NOW
2015-04-10/a>Didier StevensThe Kill Chain: Now With Pastebin
2015-04-08/a>Tom WebbIs it a breach or not?
2015-04-06/a>Guy Bruneau'Dead Drops' Hidden USB Sticks Around the World
2015-04-05/a>Didier StevensWireshark TCP Flags
2015-04-03/a>Didier StevensSSH Fingerprints Are Important
2015-04-01/a>Brad DuncanRig Exploit Kit Changes Traffic Patterns
2015-03-26/a>Daniel WesemannPin-up on your Smartphone!
2015-03-21/a>Russell EubanksHave you seen my personal information? It has been lost. Again.
2015-03-18/a>Daniel WesemannNew SANS memory forensics poster
2015-03-18/a>Daniel WesemannPass the hash!
2015-03-17/a>Didier StevensFrom PEiD To YARA
2015-03-17/a>Didier StevensImproperly issued SSL certificate for domain "live.fi" could be used in attempts to spoof content. https://technet.microsoft.com/library/security/3046310
2015-03-16/a>Johannes UllrichAutomatically Documenting Network Connections From New Devices Connected to Home Networks
2015-03-12/a>Johannes UllrichWho got the bad SSL Certificate? Using tshark to analyze the SSL handshake.
2015-03-11/a>Rob VandenBrinkSyslog Skeet Shooting - Targetting Real Problems in Event Logs
2015-03-10/a>Brad DuncanThreatglass has pcap files with exploit kit activity
2015-03-07/a>Guy BruneauShould it be Mandatory to have an Independent Security Audit after a Breach?
2015-03-02/a>Johannes UllrichHow Do You Control the Internet of Things Inside Your Network?
2015-02-27/a>Rick WannerTails 1.3 released - https://tails.boum.org/news/version_1.3/index.en.html
2015-02-27/a>Rick WannerLet's Encrypt!
2015-02-26/a>Johannes UllrichNew Feature: Subnet Report
2015-02-23/a>Richard PorterSubscribing to the DShield Top 20 on a Palo Alto Networks Firewall
2015-02-20/a>Tom WebbFast analysis of a Tax Scam
2015-02-19/a>Daniel WesemannMacros? Really?!
2015-02-19/a>Daniel WesemannDNS-based DDoS
2015-02-17/a>Rob VandenBrinkA Different Kind of Equation
2015-02-13/a>Johannes UllrichMicrosoft February Patch Failures Continue: KB3023607 vs. Cisco AnyConnect Client
2015-02-12/a>Johannes UllrichDid You Remove That Debug Code? Netatmo Weather Station Sending WPA Passphrase in the Clear
2015-02-11/a>Johannes UllrichMicrosoft Hardens GPO by Fixing Two Serious Vulnerabilities.
2015-02-11/a>Johannes UllrichDid PCI Just Kill E-Commerce By Saying SSL is Not Sufficient For Payment Info ? (spoiler: TLS!=SSL)
2015-02-10/a>Mark BaggettDetecting Mimikatz Use On Your Network
2015-02-09/a>Chris MohanBackups are part of the overall business continuity and disaster recovery plan
2015-02-07/a>Jim ClausingUpdate to kippo-log2db.pl
2015-02-06/a>Johannes UllrichAnthem, TurboTax and How Things "Fit Together" Sometimes
2015-02-04/a>Alex StanfordExploit Kit Evolution - Neutrino
2015-02-03/a>Johannes UllrichWhat is using this library?
2015-02-03/a>Johannes UllrichAnother Network Forensic Tool for the Toolbox - Dshell
2015-01-31/a>Guy BruneauBeware of Phishing and Spam Super Bowl Fans!
2015-01-29/a>Bojan ZdrnjaBlindly confirming XXE
2015-01-27/a>Johannes UllrichNew Critical GLibc Vulnerability CVE-2015-0235 (aka GHOST)
2015-01-23/a>Adrien de BeaupreInfocon change to yellow for Adobe Flash issues
2014-12-24/a>Rick WannerIncident Response at Sony
2014-12-23/a>John BambenekHow I learned to stop worrying and love malware DGAs....
2014-11-27/a>Russ McReeSyrian Electronic Army attack leads to malvertising
2014-11-25/a>Adrien de BeaupreLess is, umm, less?
2014-11-24/a>Richard PorterSomeone is using this? PoS: Compressor
2014-11-10/a>Chris MohanLessons Learn from attacks on Kippo honeypots
2014-11-05/a>Russ McReeTool Tip: vFeed
2014-11-04/a>Daniel WesemannWhois someone else?
2014-10-23/a>Russ McReeDigest: 23 OCT 2014
2014-10-17/a>Johannes UllrichApple Updates (not just Yosemite)
2014-10-14/a>Johannes UllrichUpdates for Firefox and Thunderbird. http://www.mozilla.org/firefox/new/
2014-10-13/a>Lorna HutchesonFor or Against: Port Security for Network Access Control
2014-10-09/a>Johannes UllrichCSAM: My servers started speaking IRC, and that is when I started to listen!
2014-10-03/a>Johannes UllrichCSAM: The Power of Virustotal to Turn Harmless Binaries Malicious
2014-10-01/a>Russ McReeVMware security advisory: VMSA-2014-0010 http://www.vmware.com/security/advisories/VMSA-2014-0010.html
2014-10-01/a>Russ McReeSecurity Onion news: Updated ShellShock detection scripts for Bro
2014-09-27/a>Guy BruneauWhat has Bash and Heartbleed Taught Us?
2014-09-26/a>Richard PorterWhy We Have Moved to InfoCon:Yellow
2014-09-22/a>Johannes UllrichFake LogMeIn Certificate Update with Bad AV Detection Rate
2014-09-19/a>Guy BruneauCipherShed Fork from TrueCrypt Project, Support Windows, Mac OS and Linux - https://ciphershed.org
2014-09-19/a>Guy BruneauPHP Fixes Several Bugs in Version 5.4 and 5.5
2014-09-19/a>Guy BruneauWeb Scan looking for /info/whitelist.pac
2014-09-16/a>Daniel Wesemannhttps://yourfakebank.support -- TLD confusion starts!
2014-09-16/a>Mark HofmanFreeBSD Denial of Service advisory (CVE-2004-0230)
2014-09-12/a>Chris MohanVMware NSX and vCNS product updates address a critical information disclosure vulnerability http://www.vmware.com/security/advisories/VMSA-2014-0009.html
2014-09-12/a>Chris MohanAre credential dumps worth reviewing?
2014-09-07/a>Johannes UllrichOdd Persistent Password Bruteforcing
2014-09-03/a>Johannes UllrichF5 BigIP Unauthenticated rsync Vulnerability
2014-08-29/a>Johannes UllrichFalse Positive or Not? Difficult to Analyze Javascript
2014-08-27/a>Rob VandenBrinkOne More Day of Trolling in POS Memory
2014-08-25/a>Jim ClausingUnusual CRL traffic?
2014-08-25/a>Jim ClausingUDP port 1900 DDoS traffic
2014-08-23/a>Guy BruneauNSS Labs Cyber Resilience Report
2014-08-20/a>Kevin ShorttSocial Engineering Alive and Well
2014-08-17/a>Rick WannerPart 1: Is your home network unwittingly contributing to NTP DDOS attacks?
2014-08-16/a>Lenny ZeltserWeb Server Attack Investigation - Installing a Bot and Reverse Shell via a PHP Vulnerability
2014-08-15/a>Tom WebbAppLocker Event Logs with OSSEC 2.8
2014-08-14/a>Basil Alawi S.TaherThreats to virtual environments
2014-08-13/a>Johannes UllrichUpdates for Apple Safari
2014-08-12/a>Adrien de BeaupreSysinternals updates Sysmon v1.0; Updates: Autoruns v12.01, Coreinfo v3.3, Procexp v16.03 http://blogs.technet.com/b/sysinternals/
2014-08-12/a>Adrien de BeaupreHost discovery with nmap
2014-08-12/a>Adrien de BeaupreAdobe updates for 2014/08
2014-08-10/a>Basil Alawi S.TaherIncident Response with Triage-ir
2014-08-09/a>Adrien de BeaupreComplete application ownage via Multi-POST XSRF
2014-08-05/a>Johannes UllrichCenter for Internet Security Releases Benchmark for VMWare ESXi 5.5 https://benchmarks.cisecurity.org/downloads/form/index.cfm?download=esxi55.100
2014-08-04/a>Russ McReeThreats & Indicators: A Security Intelligence Lifecycle
2014-08-01/a>Chris MohanWireShark 1.10.9 and 1.12.0 has been released
2014-07-30/a>Rick WannerSymantec Endpoint Protection Privilege Escalation Zero Day
2014-07-28/a>Guy BruneauManagement and Control of Mobile Device Security
2014-07-26/a>Chris Mohan"Internet scanning project" scans
2014-07-23/a>Johannes UllrichNew Feature: "Live" SSH Brute Force Logs and New Kippo Client
2014-07-22/a>Daniel WesemannIvan's Order of Magnitude
2014-07-22/a>Daniel WesemannApp "telemetry"
2014-07-19/a>Russ McReeKeeping the RATs out: the trap is sprung - Part 3
2014-07-18/a>Russ McReeKeeping the RATs out: **it happens - Part 2
2014-07-17/a>Russ McReeCisco Wireless Residential Gateway Remote Code Execution Vulnerability - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ciscosa-20140716-cm
2014-07-16/a>Russ McReeKeeping the RATs out: an exercise in building IOCs - Part 1
2014-07-15/a>Daniel WesemannAOC Cloud
2014-07-15/a>Daniel WesemannOracle July 2014 CPU (patch bundle)
2014-07-14/a>Johannes UllrichThe Internet of Things: How do you "on-board" devices?
2014-07-14/a>Daniel WesemannE-ZPass phishing scam
2014-07-11/a>Rob VandenBrinkEgress Filtering? What - do we have a bird problem?
2014-07-11/a>Rob VandenBrinkMetasploit Update Alert
2014-07-10/a>Rob VandenBrinkCertificate Errors in Office 365 Today
2014-07-09/a>Daniel WesemannWho owns your typo?
2014-07-07/a>Johannes UllrichMulti Platform *Coin Miner Attacking Routers on Port 32764
2014-07-06/a>Richard PorterPhysical Access, Point of Sale, Vegas
2014-07-05/a>Guy BruneauJava Support ends for Windows XP
2014-07-05/a>Guy BruneauMalware Analysis with pedump
2014-07-03/a>Johannes UllrichCredit Card Processing in 700 Words or Less
2014-07-02/a>Johannes UllrichJuly Ouch! Security Awareness Newsletter Released. E-mail Do's and Don'ts http://www.securingthehuman.org/resources/newsletters/ouch/2014#july2014
2014-07-02/a>Johannes UllrichCisco Unified Communications Domain Manager Update
2014-07-02/a>Johannes UllrichSimple Javascript Extortion Scheme Advertised via Bing
2014-07-01/a>Johannes UllrichApple Releases Patches for All Products
2014-07-01/a>Johannes UllrichMicrosoft No-IP Takedown
2014-06-30/a>Johannes UllrichShould I setup a Honeypot? [SANSFIRE]
2014-06-28/a>Mark HofmanNo more Microsoft advisory email notifications?
2014-06-24/a>Kevin ShorttNTP DDoS Counts Have Dropped
2014-06-23/a>Russ McReeMicrosoft Interflow announced today at 26th FIRST conference
2014-06-22/a>Russ McReeOfficeMalScanner helps identify the source of a compromise
2014-06-19/a>Tony CarothersWordPress and Security
2014-06-19/a>Tony CarothersNew Supermicro IPMI/BMC Vulnerability
2014-06-17/a>Rob VandenBrinkNew Security Advisories / Updates from Microsoft - Heads up for Next Patch Tuesday!
2014-06-13/a>Richard PorterA welcomed response, PF Chang's
2014-06-12/a>Daniel WesemannMade any new friends lately?
2014-06-12/a>Guy BruneauBIND Security Update for CVE-2014-3859
2014-06-12/a>Johannes UllrichMetasploit now includes module to exploit CVE-2014-0195 (OpenSSL DTLS Fragment Vuln.)
2014-06-11/a>Daniel WesemannGimme your keys!
2014-06-11/a>Daniel WesemannHelp your pilot fly!
2014-06-06/a>Johannes UllrichMicrosoft June Patch Tuesday Advance Notification
2014-06-03/a>Basil Alawi S.TaherAn Introduction to RSA Netwitness Investigator
2014-05-30/a>Johannes UllrichFake Australian Electric Bill Leads to Cryptolocker
2014-05-28/a>Rob VandenBrinkAssessing SOAP APIs with Burp
2014-05-27/a>Kevin ShorttAvast forums hacked
2014-05-26/a>Tony CarothersNIST 800 Series Publications - New and Improved
2014-05-23/a>Richard PorterHighlights from Cisco Live 2014 - The Internet of Everything
2014-05-22/a>Johannes UllrichDiscontinuing Support for ISC Alert Task Bar Icon
2014-05-21/a>John BambenekNew, Unpatched IE 0 Day published at ZDI
2014-05-18/a>Russ McReesed and awk will always rock
2014-05-07/a>Johannes UllrichDe-Clouding your Life: Things that should not go into the cloud.
2014-05-01/a>Johannes UllrichMicrosoft Announces Special Patch for IE 0-day (Win XP included!)
2014-05-01/a>Johannes UllrichBusybox Honeypot Fingerprinting and a new DVR scanner
2014-04-29/a>Russ McReeFirefox 29.0 & Thunderbird 24.5 released: http://www.mozilla.org/security/known-vulnerabilities/
2014-04-26/a>Guy BruneauAndroid Users - Beware of Bitcoin Mining Malware
2014-04-26/a>Guy BruneauNew Project by Linux Foundation - Core Infrastructure Initiative
2014-04-24/a>Rob VandenBrinkApple IOS updates to 7.1.1, OSX Security update 2014-002, Airport Updates - http://support.apple.com/kb/HT1222, http://support.apple.com/kb/HT6208, http://support.apple.com/kb/HT6207, http://support.apple.com/kb/HT6203
2014-04-23/a>Johannes UllrichDHCPv6 and DUID Confusion
2014-04-21/a>Daniel WesemannFinding the bleeders
2014-04-21/a>Daniel WesemannAllow us to leave!
2014-04-14/a>Kevin ShorttINFOCon Green: Heartbleed - on the mend
2014-04-12/a>Guy BruneauCritical Security Update for JetPack WordPress Plugin. Bug has existed since Jetpack 1.9, released in October 2012. - http://jetpack.me/2014/04/10/jetpack-security-update/
2014-04-11/a>Rob VandenBrinkThe Other Side of Heartbleed - Client Vulnerabilities
2014-04-11/a>Rob VandenBrinkVMware Security Advisories / Patches released for 2 issues (NOT Heartbleed) - http://www.vmware.com/security/advisories/VMSA-2014-0003.html and http://www.vmware.com/security/advisories/VMSA-2014-0002.html
2014-04-11/a>Guy BruneauHeartbleed Fix Available for Download for Cisco Products
2014-04-06/a>Basil Alawi S.Taher"Power Worm" PowerShell based Malware
2014-04-05/a>Jim ClausingThose strange e-mails with URLs in them can lead to Android malware
2014-04-04/a>Rob VandenBrinkWindows 8.1 Released
2014-04-04/a>Rob VandenBrinkDealing with Disaster - A Short Malware Incident Response
2014-04-03/a>Bojan ZdrnjaWatching the watchers
2014-04-02/a>Kevin ShorttApple Security Update for Safari 6.1.3/7.0.3: http://support.apple.com/kb/HT6181
2014-04-01/a>Johannes Ullrichcmd.so Synology Scanner Also Found on Routers
2014-04-01/a>Basil Alawi S.TaherUpgrading Your Android, Elevating My Malware
2014-03-27/a>Alex StanfordApple Credential Phishing via appleidconfirm.net
2014-03-26/a>Johannes UllrichFull Disclosure Mailing List is back: http://insecure.org/news/fulldisclosure/
2014-03-26/a>Johannes UllrichCisco Semiannual IOS Security Advisory http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html
2014-03-25/a>Johannes UllrichA few updates on "The Moon" worm
2014-03-24/a>Johannes UllrichIntegrating Physical Security Sensors
2014-03-24/a>Johannes UllrichNew Microsoft Advisory: Unpatched Word Flaw used in Targeted Attacks
2014-03-22/a>Guy BruneauHow the Compromise of a User Account Lead to a Spam Incident
2014-03-21/a>Johannes UllrichCisco AsyncOS Patch
2014-03-20/a>Johannes UllrichNormalizing IPv6 Addresses
2014-03-19/a>Mark HofmanMozilla released updates for Firefox ( v 28.0), Thunderbird (v 24.4) and Firefox Extended Support Release (ESR) updates to 24.4.0 (Fixes include the issues highlighted at the pwn2own contest.)
2014-03-17/a>Johannes UllrichScans for FCKEditor File Manager
2014-03-14/a>Richard PorterWord Press Shenanigans? Anyone seeing strange activity today?
2014-03-13/a>Daniel WesemannWeb server logs containing RS=^ ?
2014-03-13/a>Daniel WesemannIdentification and authentication are hard ... finding out intention is even harder
2014-03-12/a>Johannes UllrichWordpress "Pingback" DDoS Attacks
2014-03-11/a>Johannes UllrichMicrosoft Patch Tuesday March 2014
2014-03-11/a>Basil Alawi S.TaherIntroduction to Memory Analysis with Mandiant Redline
2014-03-10/a>Basil Alawi S.TaherSysinternals Process Explorer v16.02, Process Monitor v3.1, PSExec v2.1 and Sigcheck v2.03 update
2014-03-10/a>Basil Alawi S.TaherApple iOS 7.1
2014-03-08/a>Guy BruneauMicrosoft March Patch Pre-Announcement
2014-03-07/a>Tom WebbLinux Memory Dump with Rekall
2014-03-04/a>Daniel WesemannXPired!
2014-03-04/a>Daniel WesemannTriple Handshake Cookie Cutter
2014-03-02/a>Stephen HallSymantec goes yellow
2014-03-02/a>Stephen HallSunday Reading
2014-02-28/a>Daniel WesemannOversharing
2014-02-28/a>Daniel WesemannFiesta!
2014-02-27/a>Richard PorterCisco Prime Infrastructure Command Execution Vulnerability http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140226-pi
2014-02-26/a>Russ McReeOngoing NTP Amplification Attacks
2014-02-24/a>Russ McReeExplicit Trusted Proxy in HTTP/2.0 or...not so much
2014-02-22/a>Tony CarothersCisco UCS Director Vulnerability and Update
2014-02-21/a>Jim ClausingApple updates iOS and Apple TV
2014-02-19/a>Russ McReeThreat modeling in the name of security
2014-02-19/a>Russ McReeSeven Cisco Security Advisories now available: http://tools.cisco.com/security/center/publicationListing.x
2014-02-18/a>Johannes UllrichMore Details About "TheMoon" Linksys Worm
2014-02-17/a>Chris MohanNTP reflection attacks continue
2014-02-15/a>Rob VandenBrinkMore on HNAP - What is it, How to Use it, How to Find it
2014-02-14/a>Chris MohanScanning activity for /siemens/bootstrapping/JnlpBrowser/Development/
2014-02-14/a>Chris MohanFireEye reports IE 10 zero-day being used in watering hole attack
2014-02-14/a>Chris MohanSYM14-004 Symantec Endpoint Protection Management Vulnerabilities - http://www.symantec.com/business/support/index?page=content&id=TECH214866
2014-02-13/a>Johannes UllrichLinksys Worm ("TheMoon") Captured
2014-02-12/a>Johannes UllrichSuspected Mass Exploit Against Linksys E1000 / E1200 Routers
2014-02-11/a>Johannes UllrichFebruary 2014 Microsoft Patch Tuesday
2014-02-10/a>Rob VandenBrinkIsn't it About Time to Get Moving on Chip and PIN?
2014-02-09/a>Basil Alawi S.TaherMandiant Highlighter 2
2014-02-07/a>Johannes UllrichMicrosoft Advance Notification for February 2014
2014-02-07/a>Rob VandenBrinkHello Virustotal? It's Microsoft Calling.
2014-02-07/a>Rob VandenBrinkNew ISO Standards on Vulnerability Handling and Disclosure
2014-02-05/a>Johannes UllrichTo Merrillville or Sochi: How Dangerous is it to travel?
2014-02-05/a>Johannes UllrichSANS Ouch Security Awareness Newsletter What is Malware http://www.securingthehuman.org/ouch
2014-02-04/a>Johannes UllrichOdd ICMP Echo Request Payload
2014-02-04/a>Johannes UllrichFirefox 27 Available http://www.mozilla.org/en-US/firefox/27.0/releasenotes/
2014-02-03/a>Johannes UllrichWhen an Attack isn't an Attack
2014-01-31/a>Chris MohanAttack on Yahoo mail accounts
2014-01-31/a>Chris MohanLooking for packets from three particular subnets
2014-01-30/a>Johannes UllrichIPv6 and isc.sans.edu (Update)
2014-01-30/a>Johannes UllrichNew gTLDs appearing in the root zone
2014-01-28/a>Kevin ShorttSendmail v8.14.8 released - http://www.sendmail.com/sm/open_source/download/8.14.8/?show_rs=1#RS
2014-01-25/a>Guy BruneauFinding in Cisco's Annual Security Report
2014-01-24/a>Johannes UllrichHow to send mass e-mail the right way
2014-01-24/a>Chris MohanPhishing via Social Media
2014-01-24/a>Chris MohanSecurity Update for OS X for CVE-2014-1252 http://support.apple.com/kb/HT6117
2014-01-23/a>Chris MohanLearning from the breaches that happens to others Part 2
2014-01-22/a>Chris MohanLearning from the breaches that happens to others
2014-01-22/a>Chris MohaniTunes 11.1.4 is now available - addressing numerous CVEs
2014-01-20/a>Rob VandenBrinkYou Can Run, but You Can't Hide (SSH and other open services)
2014-01-17/a>Russ McReeMassive RFI scans likely a free web app vuln scanner rather than bots
2014-01-16/a>Kevin ShorttPort 4028 - Interesting Activity
2014-01-14/a>Chris MohanSpamming and scanning botnets - is there something I can do to block them from my site?
2014-01-14/a>Johannes UllrichMicrosoft Patch Tuesday January 2014
2014-01-13/a>Johannes UllrichGot an IPv6 Firewall?
2014-01-11/a>Guy Bruneautcpflow 1.4.4 and some of its most Interesting Features
2014-01-10/a>Basil Alawi S.TaherWindows Autorun-3
2014-01-10/a>Basil Alawi S.TaherCisco Small Business Devices backdoor fix
2014-01-09/a>Bojan ZdrnjaMassive PHP RFI scans
2014-01-09/a>Johannes UllrichMicrosoft Security Bulletin Advance Notification for January 2014 http://technet.microsoft.com/en-us/security/bulletin/ms14-jan
2014-01-08/a>Kevin ShorttIntercepted Email Attempts to Steal Payments
2014-01-04/a>Tom WebbMonitoring Windows Networks Using Syslog (Part One)
2014-01-02/a>John BambenekOpenSSL.org Defaced by Attackers Gaining Access to Hypervisor
2014-01-02/a>Johannes UllrichScans Increase for New Linksys Backdoor (32764/TCP)
2014-01-01/a>Russ McReeSix degrees of celebration: Juniper, ANT, Shodan, Maltego, Cisco, and Tails
2014-01-01/a>Russ McReeHappy New Year from the Syrian Electronic Army - Skype’s Social Media Accounts Hacked
2013-12-28/a>Russ McReeWeekend Reading List 27 DEC
2013-12-24/a>Daniel WesemannUnfriendly crontab additions
2013-12-23/a>Rob VandenBrinkHow-To's for the Holidays - Java Whitelisting using AD Group Policy
2013-12-23/a>Scott FendleyVMWare ESX/ESXi Security Advisory
2013-12-21/a>Daniel WesemannAdobe phishing underway
2013-12-21/a>Guy BruneauStrange DNS Queries - Request for Packets
2013-12-20/a>Daniel Wesemannauthorized key lime pie
2013-12-19/a>Rob VandenBrinkPassive Scanning Two Ways - How-Tos for the Holidays
2013-12-19/a>Rob VandenBrinkTarget US - Credit Card Data Breach
2013-12-18/a>Adrien de BeaupreWireshark 1.10.4 and 1.8.12 are available
2013-12-17/a>Adrien de BeaupreApple security updates Mac OS X and Safari
2013-12-16/a>Tom WebbThe case of Minerd
2013-12-12/a>Basil Alawi S.TaherAcquiring Memory Images with Dumpit
2013-12-11/a>Johannes UllrichFacebook Phishing and Malware via Tumblr Redirects
2013-12-10/a>Rob VandenBrinkThose Look Just Like Hashes!
2013-12-09/a>Rob VandenBrinkScanning without Scanning
2013-12-07/a>Guy BruneauSuspected Active Rovnix Botnet Controller
2013-12-07/a>Guy BruneauMicrosoft December Patch Pre-Announcement
2013-12-06/a>Guy BruneauVMware ESX 4.x Security Advisory
2013-12-05/a>Mark HofmanUpdated Standards Part 1 - ISO 27001
2013-12-04/a>Adrien de BeaupreVMware Security Advisory VMSA-2013-0014
2013-12-02/a>Richard PorterReports of higher than normal SSH Attacks
2013-12-01/a>Richard PorterBPF, PCAP, Binary, hex, why they matter?
2013-11-30/a>Russ McReeA review of Tubes, A Journey to the Center of the Internet
2013-11-29/a>Russ McReeMS Exchange update, includes failed backup fix: http://support.microsoft.com/kb/2892464
2013-11-28/a>Rob VandenBrinkMicrosoft Security Advisory (2914486): Vulnerability in Microsoft Windows Kernel 0 day exploit in wild
2013-11-27/a>Rob VandenBrinkATM Traffic + TCPDump + Video = Good or Evil?
2013-11-22/a>Rick WannerPort 0 DDOS
2013-11-22/a>Rick WannerTales of Password Reuse
2013-11-21/a>Mark Baggett"In the end it is all PEEKS and POKES."
2013-11-21/a>Mark BaggettAre large scale Man in The Middle attacks underway?
2013-11-20/a>Mark BaggettSearching live memory on a running machine with winpmem
2013-11-19/a>Jim ClausingUpdated dumpdns.pl
2013-11-19/a>Mark BaggettWinpmem - Mild mannered memory aquisition tool??
2013-11-19/a>Johannes UllrichvBulletin.com Compromise - Possible 0-day
2013-11-18/a>Johannes UllrichAm I Sending Traffic to a "Sinkhole"?
2013-11-16/a>Guy BruneauSagan as a Log Normalizer
2013-11-15/a>Johannes UllrichThe Security Impact of HTTP Caching Headers
2013-11-14/a>Johannes UllrichiOS 7.0.4 released. Fixes issue with unauthorized in App purchases http://lists.apple.com/archives/security-announce/2013/Nov/msg00000.html
2013-11-12/a>Johannes UllrichNovember 2013 Microsoft Patch Tuesday
2013-11-11/a>Johannes UllrichWhat Happened to the SANS Ads?
2013-11-10/a>Rick WannerMicrosoft and Facebook announce bug bounty
2013-11-09/a>Guy BruneauIE Zero-Day Vulnerability Exploiting msvcrt.dll
2013-11-08/a>Johannes UllrichMicrosoft Patch Tuesday Preview
2013-11-06/a>Johannes UllrichRapid7 Discloses IPMI Vulnerabilities
2013-11-05/a>Daniel WesemannIs your vacuum cleaner sending spam?
2013-11-05/a>Daniel WesemannTIFF images in MS-Office documents used in targeted attacks
2013-11-04/a>Manuel Humberto Santander PelaezWhen attackers use your DNS to check for the sites you are visiting
2013-11-03/a>Jim ClausingWhat were you doing 25 years ago (yesterday)?
2013-11-02/a>Rick WannerProtecting Your Family's Computers
2013-11-01/a>Russ McReeSecunia's PSI Country Report - Q3 2013
2013-10-31/a>Russ McReeHappy Halloween: The Ghost Really May Be In The Machine
2013-10-30/a>Russ McReeSIR v15: Five good reasons to leave Windows XP behind
2013-10-28/a>Daniel WesemannExploit cocktail (Struts, Java, Windows) going after 3-month old vulnerabilities
2013-10-25/a>Johannes UllrichPHP.net compromise aftermath: Why Code Signing Beats Hashes
2013-10-25/a>Rob VandenBrinkKaspersky flags TCPIP.SYS as Malware
2013-10-24/a>Johannes UllrichFalse Positive: php.net Malware Alert
2013-10-22/a>Richard PorterGreenbone and OpenVAS Scanner
2013-10-21/a>Johannes UllrichNew tricks that may bring DNS spoofing back or: "Why you should enable DNSSEC even if it is a pain to do"
2013-10-19/a>Johannes UllrichYet Another WHMCS SQL Injection Exploit
2013-10-18/a>Guy BruneauVMware Release Multiple Security Updates
2013-10-18/a>Rob VandenBrinkCSAM - Why am I seeing DNS Requests to IANA.ORG in my Firewall Logs?
2013-10-17/a>Adrien de BeaupreInternet wide DNS scanning
2013-10-17/a>Adrien de BeaupreMicrosoft phish
2013-10-16/a>Adrien de BeaupreAccess denied and blockliss
2013-10-15/a>Rob VandenBrinkWireshark 1.11.0 Development Version Released ==> http://www.wireshark.org/download.html (1.10.2 remains the Stable version)
2013-10-12/a>Richard PorterReported Spike in tcp/5901 and tcp/5900
2013-10-10/a>Johannes Ullrichgoogle.com.my DNS hijack
2013-10-08/a>Johannes UllrichAnti-Virus Company Avira Homepage Defaced
2013-10-05/a>Richard PorterAdobe Breach Notification, Notifications?
2013-10-04/a>Johannes UllrichThe Adobe Breach FAQ
2013-10-04/a>Pedro BuenoCSAM: WebHosting BruteForce logs
2013-10-03/a>Johannes UllrichOctober Patch Tuesday Preview (CVE-2013-3893 patch coming!)
2013-10-01/a>Johannes UllrichiOS 7 Adds Multipath TCP
2013-10-01/a>Adrien de BeaupreCSAM! Send us your logs!
2013-10-01/a>John Bambenek*Metaspoit Releases Module to Exploit Unpatched IE Vuln CVE-2013-3893
2013-09-30/a>Adrien de BeaupreTwitter DM spam/malware
2013-09-27/a>Rick WannerIOS 7.0.2 released
2013-09-24/a>Tom WebbIDS, NSM, and Log Management with Security Onion 12.04.3
2013-09-20/a>Russ McReeThreat Level Yellow: Protection recommendations regarding Internet Explorer exploits in the wild
2013-09-18/a>Rob VandenBrinkApple IOS 7 - Brace for Impact!
2013-09-18/a>Rob VandenBrinkiTunes 11.1 released, fixes CVE-2013-1035 remote code execution vulnerability. (Look for specifics at http://support.apple.com/kb/HT1222 sometime soon)
2013-09-18/a>Rob VandenBrinkCisco DCNM Update Released
2013-09-17/a>John BambenekMicrosoft Releases Out-of-Band Advisory for all Versions of Internet Explorer
2013-09-13/a>Rob VandenBrinkUpdate for Safari to version 5.1.10 is out - http://support.apple.com/kb/HT5921
2013-09-11/a>Johannes UllrichReboot Wednesday: Yesterday's Patch Tuesday Aftermath
2013-09-10/a>Swa FrantzenAdobe September 2013 Black Tuesday Overview
2013-09-10/a>Swa FrantzenMicrosoft September 2013 Black Tuesday Overview
2013-09-10/a>Swa FrantzenMore Black Tuesday workload
2013-09-09/a>Johannes UllrichSSL is broken. So what?
2013-09-05/a>Rob VandenBrinkBuilding Your Own GPU Enabled Private Cloud
2013-09-05/a>Rob VandenBrinkWhat's Next for IPS?
2013-09-03/a>Rob VandenBrinkIs "Reputation Backscatter" a Thing?
2013-09-02/a>Guy BruneauSnort IDS Sensor with Sguil New ISO Released
2013-09-02/a>Guy BruneauMultiple Cisco Security Notice
2013-08-29/a>Russ McReeSuspect Sendori software
2013-08-26/a>Alex StanfordStop, Drop and File Carve
2013-08-22/a>Russ McReeRead of the Week: A Fuzzy Future in Malware Research
2013-08-21/a>Alex StanfordPsst. Your Browser Knows All Your Secrets.
2013-08-21/a>Rob VandenBrinkFibre Channel Reconnaissance - Reloaded
2013-08-19/a>Johannes UllrichRunning Snort on ESXi using the Distributed Switch
2013-08-19/a>Guy Bruneau Business Risks and Cyber Attacks
2013-08-19/a>Rob VandenBrinkZMAP 1.02 released
2013-08-19/a>Johannes UllrichMicrosoft re-releases MS13-066: https://technet.microsoft.com/security/bulletin/MS13-066
2013-08-15/a>Johannes UllrichMicrosoft Pulls MS013-061 due to problems with Exchange Server 2013 http://blogs.technet.com/b/exchange/archive/2013/08/14/exchange-2013-security-update-ms13-061-status-update.aspx
2013-08-14/a>Johannes UllrichImaging LUKS Encrypted Drives
2013-08-13/a>Swa FrantzenMicrosoft August 2013 Black Tuesday Overview
2013-08-13/a>Swa FrantzenMicrosoft security advisories: RDP and MD5 deprecation in Microsoft root certificates
2013-08-09/a>Kevin ShorttCopy Machines - Changing Scanned Content
2013-08-07/a>Johannes UllrichFirefox 23 and Mixed Active Content
2013-08-07/a>Mark HofmanDNS servers hijacked in the Netherlands
2013-08-05/a>Chris MohanDMARC: another step forward in the fight against phishing?
2013-08-03/a>Deborah HaleWhat Anti-virus Program Is Right For You?
2013-08-02/a>Chris MohanVMware Security Advisory VMSA-2013-0009 - http://www.vmware.com/security/advisories/VMSA-2013-0009.html
2013-08-02/a>Chris MohanCisco Security Advisory: OSPF LSA Manipulation Vulnerability in Multiple Cisco Products http://tools.cisco.com/security/center/viewAlert.x?alertId=30210
2013-08-02/a>Johannes UllrichScans for Open File Uploads into CKEditor
2013-08-02/a>Johannes UllrichFake American Express Alerts
2013-07-31/a>Johannes UllrichPOP3 Server Brute Forcing Attempts Using Polycom Credentials
2013-07-29/a>Adrien de BeaupreBGP multiple banking addresses hijacked
2013-07-28/a>Guy BruneauWireshark 1.8.9 and 1.10.1 Security Update
2013-07-27/a>Scott FendleyDefending Against Web Server Denial of Service Attacks
2013-07-26/a>Scott FendleyISC BIND DoS
2013-07-25/a>Johannes UllrichA couple Site Updates
2013-07-25/a>Johannes UllrichA Couple of SSH Brute Force Compromises
2013-07-23/a>Bojan ZdrnjaSessions with(out) cookies
2013-07-21/a>Guy BruneauWhy use Regular Expressions?
2013-07-20/a>Manuel Humberto Santander PelaezDo you have rogue Internet gateways in your network? Check it with nmap
2013-07-19/a>Stephen HallCyber Intelligence Tsunami
2013-07-18/a>Chris MohanBlog Spam - annoying junk or a source of intelligence?
2013-07-17/a>Johannes UllrichNetwork Solutions Outage
2013-07-16/a>Johannes UllrichWhy don't we see more examples of web app attacks via POST?
2013-07-15/a>Johannes UllrichProblems with MS13-057
2013-07-13/a>Lenny ZeltserDecoy Personas for Safeguarding Online Identity Using Deception
2013-07-12/a>Johannes UllrichDNS resolution is failing for Microsofts Teredo server (teredo.ipv6.microsoft.com)
2013-07-12/a>Johannes UllrichMicrosoft Teredo Server "Sunset"
2013-07-12/a>Rob VandenBrinkHmm - where did I save those files?
2013-07-10/a>Johannes Ullrich.NL Registrar Compromisse
2013-07-09/a>Swa FrantzenMicrosoft July 2013 Black Tuesday Overview
2013-07-08/a>Richard PorterWhy do we Click?
2013-07-06/a>Guy BruneauMicrosoft July Patch Pre-Announcement
2013-07-06/a>Guy BruneauIs Metadata the Magic in Modern Network Security?
2013-07-04/a>Russ McReeCelebrating 4th of July With a Malware PCAP Visualization
2013-07-03/a>Kevin ShorttApple Security Update 2013-003
2013-07-01/a>Manuel Humberto Santander PelaezUsing nmap scripts to enhance vulnerability asessment results
2013-06-29/a>Johannes UllrichInstagram "Fruit" Spam
2013-06-27/a>Tony CarothersPhysical Security in the Cyber World
2013-06-27/a>Tony CarothersRuby Update for SSL Vulnerability
2013-06-26/a>Adrien de BeaupreMultiple Cisco security advisories
2013-06-25/a>Bojan ZdrnjaMozilla Firefox 22 released, fixes 14 security vulnerabilities, more info at http://www.mozilla.org/en-US/firefox/22.0/releasenotes/
2013-06-22/a>Guy Bruneau.biz DNSSEC DNSKEY is Invalid
2013-06-21/a>Guy BruneauSysinternals Updates for Autoruns, Strings & ZoomIt http://blogs.technet.com/b/sysinternals/archive/2013/06/20/updates-autoruns-v11-61-strings-v2-52-zoomit-v4-5.aspx
2013-06-20/a>Guy BruneauHP iLO3/iLO4 Remote Unauthorized Access with Single-Sign-On
2013-06-20/a>Johannes UllrichLinkedin DNS Hijack
2013-06-19/a>Kevin ListonWinLink Check-In
2013-06-18/a>Russ McReeEMET 4.0 is now available for download
2013-06-18/a>Russ McReeVolatility rules...any questions?
2013-06-17/a>Daniel WesemannSANSFIRE 2013
2013-06-12/a>Johannes UllrichStupid Little IPv6 Tricks
2013-06-11/a>Swa FrantzenMicrosoft June 2013 Black Tuesday Overview
2013-06-11/a>Swa FrantzenOther Microsoft Black Tuesday News
2013-06-07/a>Daniel Wesemann100% Compliant (for 65% of the systems)
2013-06-05/a>Richard PorterWindows Sysinternals Updated http://technet.microsoft.com/en-us/sysinternals/default.aspx
2013-06-05/a>Richard PorterWireshark 1.10.0 Stable Released http://www.wireshark.org/download.html
2013-06-05/a>Richard PorterBIND 9 Update fixing CVE-2013-3919
2013-05-31/a>Chris MohanVMware releases new and updated security advisories
2013-05-27/a>Johannes UllrichNuclear Scientists, Pandas and EMET Keeping Me Honest
2013-05-23/a>Adrien de BeaupreWireshark 1.10.0rc2 is now available http://www.wireshark.org/download.html
2013-05-23/a>Adrien de BeaupreMoVP II
2013-05-22/a>Adrien de BeauprePrivilege escalation, why should I care?
2013-05-22/a>Adrien de BeaupreWireshark 1.8.7 and 1.6.15 Released http://www.wireshark.org/news/20130517.html
2013-05-22/a>Adrien de BeaupreApple QuickTime 7.7.4 for Windows updated, MANY security vulnerabilities: http://support.apple.com/kb/HT1222
2013-05-21/a>Adrien de BeaupreMoore, Oklahoma tornado charitable organization scams, malware, and phishing
2013-05-20/a>Guy BruneauSysinternals Updates for Accesschk, Procdump, RAMMap and Strings http://blogs.technet.com/b/sysinternals/archive/2013/05/17/updates-accesschk-v5-11-procdump-v6-0-rammap-v1-22-strings-v2-51.aspx
2013-05-20/a>Johannes UllrichUbuntu Package available to submit firewall logs to DShield
2013-05-20/a>Guy BruneauSafe - Tools, Tactics and Techniques
2013-05-17/a>Johannes UllrichSSL: Another reason not to ignore IPv6
2013-05-16/a>Daniel WesemannExtracting signatures from Apple .apps
2013-05-14/a>Swa FrantzenMicrosoft May 2013 Black Tuesday Overview
2013-05-14/a>Swa FrantzenFirefox & Thunderbird released
2013-05-14/a>Swa FrantzenAdobe May 2013 Black Tuesday Overview
2013-05-14/a>Swa FrantzenMicrosoft Security Advisory 2846338
2013-05-14/a>Swa FrantzenCVE-2013-2094: Linux privilege escalation
2013-05-11/a>Lenny ZeltserExtracting Digital Signatures from Signed Malware
2013-05-10/a>Johannes UllrichMicrosoft and Adobe Patch Tuesday Pre-Release
2013-05-09/a>Johannes UllrichMicrosoft released a Fix-it for the Internet Explorer 8 Vulnerability http://support.microsoft.com/kb/2847140
2013-05-09/a>John BambenekAdobe Releases 0-day Security Advisory for Coldfusion, Exploit Code Available. Advisory here: http://www.adobe.com/support/security/advisories/apsa13-03.html
2013-05-08/a>Chris MohanSyria drops from Internet 7th May 2013
2013-05-07/a>Jim ClausingIs there an epidemic of typo squatting?
2013-05-07/a>Jim ClausingNGINX updates address buffer overflow (CVE-2013-2028) see http://nginx.org/en/CHANGES-1.4
2013-05-04/a>Kevin ShorttThe Zero-Day Pendulum Swings
2013-05-01/a>Daniel WesemannThe cost of cleaning up
2013-04-30/a>Russ McReeApache binary backdoor adds malicious redirect to Blackhole
2013-04-28/a>Russ McReeSANS's Alan Paller discusses the threat of cyberterrorism on CNN
2013-04-26/a>Russ McReeWhat is "up to date anti-virus software"?
2013-04-25/a>Adam SwangerSANS 2013 Forensics Survey - https://www.surveymonkey.com/s/2013SANSForensicsSurvey
2013-04-25/a>Adam SwangerGuest Diary: Dylan Johnson - A week in the life of some Perimeter Firewalls
2013-04-23/a>Russ McReeMicrosoft's Security Intelligence Report (SIRv14) released
2013-04-21/a>John BambenekA Chargen-based DDoS? Chargen is still a thing?
2013-04-19/a>Russ McReeJava 8 release schedule delayed for renewed focus on security
2013-04-17/a>John BambenekUPDATEDx1: Boston-Related Malware Campaigns Have Begun - Now with Waco Plant Explosion Fun
2013-04-16/a>John BambenekFake Boston Marathon Scams Update
2013-04-15/a>Rob VandenBrinkOops - You Mean That Deleted Server was a Certificate Authority?
2013-04-15/a>John BambenekPlease send any spam (full headers), URLs or other suspicious content scamming off Boston Marathon explosions to handlers@sans.org
2013-04-09/a>Swa FrantzenMicrosoft April 2013 Black Tuesday Overview
2013-04-04/a>Johannes UllrichMicrosoft April Patch Tuesday Advance Notification
2013-04-03/a>Mark HofmanFirefox 20 and Thunderbird 17.0.5 updates
2013-03-29/a>Chris MohanDoes your breach email notification look like a phish?
2013-03-29/a>Chris MohanFake Link removal requests
2013-03-28/a>John BambenekWhere Were You During the Great DDoS Cybergeddon of 2013?
2013-03-27/a>Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - IPv6 moving target defense
2013-03-27/a>Rob VandenBrinkSeveral Cisco IOS DOS Issues Resolved
2013-03-27/a>Rob VandenBrinkSourcefire VRT Community ruleset is live
2013-03-25/a>Johannes UllrichIPv6 Focus Month: IPv6 over IPv4 Preference
2013-03-23/a>Guy BruneauApple ID Two-step Verification Now Available in some Countries
2013-03-21/a>Jim ClausingIPv6 Focus Month: Guest Diary: Matthew Newton - IPv6 Cat Feeder - Turning those extra bits into bytes, literally
2013-03-19/a>Johannes UllrichIPv6 Focus Month: The warm and fuzzy side of IPv6
2013-03-19/a>Johannes UllrichWindows 7 SP1 and Windows Server 2008 R2 SP1 Being "pushed" today
2013-03-18/a>Johannes UllrichIPv6 Focus Month: What is changing with DHCP
2013-03-18/a>Kevin ShorttCisco IOS Type 4 Password Issue: http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20130318-type4
2013-03-13/a>Johannes UllrichIPv6 Focus Month: Kaspersky Firewall IPv6 Vulnerability
2013-03-12/a>Swa FrantzenIPv6 Focus Month: How to say no!
2013-03-12/a>Swa FrantzenMicrosoft March 2013 Black Tuesday Overview
2013-03-11/a>Richard PorterIPv6 Focus Month: Traffic Testing, Firewalls, ACLs, pt 1
2013-03-09/a>Guy BruneauIPv6 Focus Month: IPv6 Encapsulation - Protocol 41
2013-03-08/a>Johannes UllrichIPv6 Focus Month: Filtering ICMPv6 at the Border
2013-03-07/a>Guy BruneauWireshark Security Updates
2013-03-07/a>Guy BruneauApple Blocking Java Web plug-in
2013-03-07/a>Rob VandenBrinkIPv6 Focus Month: Barriers to Implementing IPv6
2013-03-06/a>Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - Geolocation Using IPv6 Addresses
2013-03-05/a>Mark HofmanIPv6 Focus Month: Device Defaults
2013-03-04/a>Johannes UllrichIPv6 Focus Month: Addresses
2013-03-03/a>Richard PorterUptick in MSSQL Activity
2013-03-02/a>Scott FendleyEvernote Security Issue
2013-03-02/a>Scott FendleyApple Blocks Older Insecure Versions of Flash Player
2013-03-01/a>Jim ClausingIPv6 Focus Month at the Internet Storm Center
2013-02-28/a>Daniel WesemannParsing Windows Eventlogs in Powershell
2013-02-27/a>Adam SwangerGuest Diary: Dylan Johnson - There's value in them there logs!
2013-02-25/a>Johannes UllrichMass-Customized Malware Lures: Don't trust your cat!
2013-02-25/a>Johannes UllrichPunkspider enumerates web application vulnerabilities
2013-02-25/a>Rob VandenBrinkSilent Traitors - Embedded Devices in your Datacenter
2013-02-22/a>Chris MohanVMware releases new and updated security advisories
2013-02-22/a>Johannes UllrichZendesk breach affects Tumblr/Pinterest/Twitter
2013-02-22/a>Johannes UllrichWhen web sites go bad: bible . org compromise
2013-02-22/a>Johannes UllrichWhat has Iran been up to lately?
2013-02-21/a>Pedro BuenoNBC site redirecting to Exploit kit
2013-02-21/a>Bojan ZdrnjaSSHD rootkit in the wild
2013-02-20/a>Manuel Humberto Santander PelaezSANS SCADA Summit at Orlando - Bigger problems and so far from getting them solved
2013-02-20/a>Johannes UllrichUpdate Palooza
2013-02-19/a>Johannes UllrichAPT1, Unit 61398 and are state sponsored attacks real
2013-02-19/a>Johannes UllrichFirefox 19 Release with various security fixes.
2013-02-17/a>Guy BruneauHP ArcSight Connector Appliance and Logger Vulnerabilities
2013-02-17/a>Guy BruneauAdobe Acrobat and Reader Security Update Planned this Week
2013-02-16/a>Lorna HutchesonFedora RedHat Vulnerabilty Released
2013-02-14/a>Bojan ZdrnjaAuditd is your friend
2013-02-13/a>Swa FrantzenMore adobe reader and acrobat (PDF) trouble
2013-02-12/a>Adam SwangerMicrosoft February 2013 Black Tuesday Update - Overview
2013-02-11/a>John BambenekIs This Chinese Registrar Really Trying to XSS Me?
2013-02-08/a>Kevin ShorttIs it Spam or Is it Malware?
2013-02-08/a>Johannes UllrichMicrosoft February Patch Tuesday Advance Notification
2013-02-06/a>Adam SwangerSysinternals in particular Process Explorer update https://blogs.technet.com/b/sysinternals/?Redirected=true
2013-02-06/a>Kevin ShorttFirefox updated to 18.02 -> https://www.mozilla.org/en-US/firefox/18.0.2/releasenotes/
2013-02-06/a>Johannes UllrichAre you losing system logging information (and don't know it)?
2013-02-06/a>Johannes UllrichIntel Network Card (82574L) Packet of Death
2013-02-04/a>Adam SwangerSAN Securing The Human Monthly Awareness Video - Advanced Persistent Threat (APT) http://www.securingthehuman.org/resources/ncsam
2013-02-04/a>Russ McReeAn expose of a recent SANS GIAC XSS vulnerability
2013-02-03/a>Lorna HutchesonIs it Really an Attack?
2013-02-02/a>Kevin ListonTwitter Confirms Compromise of Approximately 250,000 Users
2013-02-01/a>Jim ClausingVMware vSphere security updates for the authentication service and third party libraries (see http://www.vmware.com/security/advisories/VMSA-2013-0001.html)
2013-02-01/a>Jim ClausingOracle quitely releases Java 7u13 early
2013-01-31/a>Johannes UllrichIPv6 Focus Month
2013-01-30/a>Richard PorterGetting Involved with the Local Community
2013-01-28/a>Johannes UllrichiOS 6.1 Released
2013-01-27/a>Tony CarothersHP JetDirect Vulnerabilities Discussed
2013-01-25/a>Johannes UllrichVulnerability Scans via Search Engines (Request for Logs)
2013-01-22/a>Richard PorterUsing Metasploit for Patch Sanity Checks
2013-01-19/a>Guy BruneauJava 7 Update 11 Still has a Flaw
2013-01-18/a>Russ McReeInteresting reads for Friday 18 JAN 2013
2013-01-15/a>Rob VandenBrinkWhen Disabling IE6 (or Java, or whatever) is not an Option...
2013-01-15/a>Russ McReeCisco introducing Cisco Security Notices 16 JAN 2013
2013-01-14/a>Richard PorterJanuary 2013 Microsoft Out of Cycle Patch
2013-01-14/a>Richard PorterMicrosoft Out of Cycle Patch: IE http://technet.microsoft.com/en-us/security/bulletin/ms13-jan
2013-01-13/a>Stephen HallSysinternals Updates
2013-01-10/a>Rob VandenBrinkWhat Else runs Telnets? Or, Pentesters Love Video Conferencing Units Too!
2013-01-09/a>Rob VandenBrinkSQL Injection Flaw in Ruby on Rails
2013-01-09/a>Richard PorterThe 80's called - They Want Their Mainframe Back!
2013-01-09/a>Rob VandenBrinkHotmail seeing some temporary access issues
2013-01-09/a>Rob VandenBrinkFirefox and Thunderbird Updates
2013-01-09/a>Rob VandenBrinkSecurity Update - Cisco Prime LMS (cisco-sa-20130109-lms - remote execution as root vulnerability) - advisory at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-lms
2013-01-09/a>Rob VandenBrinkSecurity Update - Cisco 7900 Phones - cisco-sa-20130109-uipphone privilege escallation issue - advisory at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone
2013-01-08/a>Jim ClausingCuckoo 0.5 is out and the world didn't end
2013-01-08/a>Richard PorterA picture worth a 1000 barcodes?
2013-01-08/a>Richard PorterMicrosoft January 2013 Black Tuesday Update - Overview
2013-01-08/a>Richard PorterFirefox 18 Released, Security Fixes http://www.mozilla.org/security/known-vulnerabilities/firefox.html
2013-01-06/a>Kevin ListonA Bit About the NVIDIA Vulnerability
2013-01-05/a>Guy BruneauAdobe ColdFusion Security Advisory
2013-01-05/a>Guy BruneauD-link Wireless-G Router Year Issue (Y2K-plus-13)
2013-01-04/a>Daniel WesemannPatch pre-notification from Adobe and Microsoft
2013-01-04/a>Guy Bruneau"FixIt" Patch for CVE-2012-4792 Bypassed
2013-01-03/a>Bojan ZdrnjaMemory acquisition traps
2013-01-03/a>Manuel Humberto Santander PelaezNew year and new CA compromised
2013-01-02/a>Russ McReeEMET 3.5: The Value of Looking Through an Attacker's Eyes
2013-01-01/a>Johannes UllrichFixIt Available for Internet Explorer Vulnerability
2012-12-27/a>John BambenekIt's 3pm 2 days after Christmas, do you know where your unmanaged SSH keys are?
2012-12-22/a>Guy BruneauNew Poll - Which of the following issues impacted the most your business in 2012? - https://isc.sans.edu/poll.html
2012-12-20/a>Daniel WesemannWhite House strategy on security information sharing and safeguarding
2012-12-18/a>Dan GoldbergMitigating the impact of organizational change: a risk assessment
2012-12-18/a>Rob VandenBrinkAll I Want for Christmas is to Not Get Hacked !
2012-12-14/a>Adam SwangerISC Feature of the Week: Webhoneypot: Web Server Log Project
2012-12-13/a>Johannes UllrichWhat if Tomorrow Was the Day?
2012-12-11/a>John BambenekMicrosoft December 2012 Black Tuesday Update - Overview
2012-12-10/a>Johannes UllrichYour CPA License has not been revoked
2012-12-07/a>Adam SwangerISC Feature of the Week: Glossary Additions
2012-12-06/a>Johannes UllrichHow to identify if you are behind a "Transparent Proxy"
2012-12-06/a>Daniel WesemannFake tech support calls - revisited
2012-12-06/a>Daniel WesemannRich Quick Make Money!
2012-12-04/a>Johannes UllrichWhere do your backup tapes go to die?
2012-12-03/a>Kevin ListonMobile Malware: Request for Field Reports
2012-12-03/a>John BambenekJohn McAfee Exposes His Location in Photo About His Being on Run
2012-12-03/a>Kevin ListonRecent SSH vulnerabilities
2012-12-02/a>Guy BruneauZero Day MySQL Buffer Overflow
2012-12-02/a>Guy BruneauCollecting Logs from Security Devices at Home
2012-12-01/a>Guy BruneauFirefox 17.0.1 Bug Fixes - http://www.mozilla.org/en-US/firefox/17.0.1/releasenotes/
2012-11-30/a>Daniel WesemannSnipping Leaks
2012-11-30/a>Daniel WesemannNmap 6.25 released - lots of new goodies, see http://nmap.org/changelog.html
2012-11-29/a>Adam SwangerISC Feature of the Week: SSH Scan Reports
2012-11-29/a>Kevin ShorttNew Apple Security Update: APPLE-SA-2012-11-29-1 Apple TV 5.1.1
2012-11-28/a>Mark HofmanMcAfee releases extraDAT for W32/Autorun.worm.aaeb-h
2012-11-28/a>Mark HofmanNew version of wireshark is available (1.8.4), some security fixes included.
2012-11-27/a>Chris MohanCan users' phish emails be a security admin's catch of the day?
2012-11-26/a>John BambenekOnline Shopping for the Holidays? Tips, News and a Fair Warning
2012-11-23/a>Rob VandenBrinkRisk Assessment Reloaded (thanks PCI ! )
2012-11-23/a>Rob VandenBrinkWhat's in Your Change Control Form?
2012-11-20/a>John BambenekBehind the Random NTP Bizarreness of Incorrect Year Being Set
2012-11-20/a>John BambenekFirefox v 17.0 just released, more here: http://www.mozilla.org/en-US/firefox/17.0/releasenotes/
2012-11-19/a>John BambenekMoneyGram fined $100 million for aiding wire fraud - http://krebsonsecurity.com/2012/11/moneygram-fined-100-million-for-wire-fraud/
2012-11-19/a>John BambenekNew Poll: Top 5 Unresolved Security Problems of 2012
2012-11-17/a>Manuel Humberto Santander PelaezNew Sysinternal Updates: AdExplorer v1.44, Contig v1.7, Coreinfo v3.2, Procdump v5.1. See http://blogs.technet.com/b/sysinternals/archive/2012/11/16/updates-adexplorer-v1-44-contig-v1-7-coreinfo-v3-2-procdump-v5-1.aspx?Redirected=true
2012-11-16/a>Guy BruneauVMware security updates for vSphere API and ESX Service Console - http://www.vmware.com/security/advisories/VMSA-2012-0016.html
2012-11-16/a>Manuel Humberto Santander PelaezInformation Security Incidents are now a concern for colombian government
2012-11-15/a>Jim ClausingAnother month another password disclosure breach
2012-11-14/a>Jim ClausingSkype account hijack vulnerability fixed
2012-11-13/a>Jim ClausingMicrosoft November 2012 Black Tuesday Update - Overview
2012-11-12/a>John BambenekRequest for info: Robocall Phishing Against Local/Regional Banks
2012-11-09/a>Mark BaggettFresh batch of Microsoft patches next week
2012-11-09/a>Mark BaggettRemote Diagnostics with PSR
2012-11-08/a>Daniel WesemannGet a 40% discount on your hotel room!
2012-11-07/a>Mark BaggettHelp eliminate unquoted path vulnerabilities
2012-11-07/a>Mark BaggettMultiple 0-Days Reported!
2012-11-07/a>Mark BaggettCisco TACACS+ Authentication Bypass
2012-11-06/a>Johannes UllrichWhat to watch out For on Election Day
2012-11-05/a>Johannes UllrichReminder: Ongoing SMTP Brute Forcing Attacks
2012-11-05/a>Johannes UllrichPossible Fake-AV Ads from Doubleclick Servers
2012-11-04/a>Lorna HutchesonWhat's important on your network?
2012-11-02/a>Daniel WesemannThe shortcomings of anti-virus software
2012-11-02/a>Daniel WesemannLamiabiocasa
2012-10-31/a>Johannes UllrichCyber Security Awareness Month - Day 31 - Business Continuity and Disaster Recovery
2012-10-30/a>Johannes UllrichHurricane Sandy Update
2012-10-30/a>Richard PorterSplunk 5.0 SP-CAAAHB4 http://www.splunk.com/view/SP-CAAAHB4
2012-10-30/a>Mark HofmanCyber Security Awareness Month - Day 30 - DSD 35 mitigating controls
2012-10-29/a>Kevin ShorttCyber Security Awareness Month - Day 29 - Clear Desk: The Unacquainted Standard
2012-10-28/a>Tony CarothersFirefox 16.02 Released
2012-10-26/a>Adam SwangerSecuring the Human Special Webcast - October 30, 2012
2012-10-26/a>Russ McReeCyber Security Awareness Month - Day 26 - Attackers use trusted domain to propagate Citadel Zeus variant
2012-10-25/a>Richard PorterCyber Security Awareness Month - Day 25 - Pro Audio & Video Packets on the Wire
2012-10-24/a>Rob VandenBrinkTime to run Windows Update - - Microsoft Updates KB2755801 for Windows RT / IE10 / Flash Player - http://technet.microsoft.com/en-us/security/advisory/2755801
2012-10-24/a>Russ McReeCyber Security Awareness Month - Day 24 - A Standard for Information Security Incident Management - ISO 27035
2012-10-24/a>Russ McReeOngoing Windstream outage in the midwest - https://twitter.com/search?q=windstream
2012-10-23/a>Rob VandenBrinkCyber Security Awareness Month - Day 23: Character Encoding Standards - ASCII and Successors
2012-10-21/a>Johannes UllrichCyber Security Awareness Month - Day 22: Connectors
2012-10-21/a>Lorna HutchesonPotential Phish for Regular Webmail Accounts
2012-10-19/a>Johannes UllrichCyber Security Awareness Month - Day 19: Standard log formats and CEE.
2012-10-18/a>Rob VandenBrinkCyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide
2012-10-17/a>Mark HofmanOracle Critical Patch Update October
2012-10-17/a>Mark HofmanNew Acrobat release (including reader) available. Version 11. Some security improvements more here -->http://blogs.adobe.com/adobereader/
2012-10-17/a>Rob VandenBrinkCyber Security Awareness Month - Day 17 - A Standard for Risk Management - ISO 27005
2012-10-16/a>Richard PorterCyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook.
2012-10-16/a>Johannes UllrichCyber Security Awareness Month - Day 16: W3C and HTML
2012-10-14/a>Pedro BuenoCyber Security Awareness Month - Day 14 - Poor Man's File Analysis System - Part 1
2012-10-13/a>Guy BruneauNew Poll - Cyber Security Awareness Month Activities 2012 - https://isc.sans.edu/poll.html
2012-10-12/a>Mark HofmanCyber Security Awareness Month - Day 12 PCI DSS
2012-10-11/a>Rob VandenBrinkFirefox 16 / Thunderbird 16 updates
2012-10-11/a>Rob VandenBrinkCyber Security Awareness Month - Day 11 - Vendor Agnostic Standards (Center for Internet Security)
2012-10-10/a>Kevin ShorttCyber Security Awareness Month - Day 10 - Standard Sudo - Part Two
2012-10-09/a>Johannes UllrichCyber Security Awreness Month - Day 9 - Request for Comment (RFC)
2012-10-09/a>Johannes UllrichMicrosoft October 2012 Black Tuesday Update - Overview
2012-10-08/a>Mark HofmanCyber Security Awareness Month - Day 8 ISO 27001
2012-10-07/a>Tony CarothersCyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1
2012-10-06/a>Manuel Humberto Santander PelaezCyber Security Awareness Month - Day 6 - NERC: The standard that enforces security on power SCADA
2012-10-05/a>Johannes UllrichCyber Security Awareness Month - Day 5: Standards Body Soup, So many Flavors in the bowl.
2012-10-05/a>Richard PorterVMWare Security Advisory: VMSA-2012-0014 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html
2012-10-05/a>Adam SwangerISC Feature of the Week: Report Fake Tech Support Call Statistics
2012-10-05/a>Richard PorterReports of a Distributed Injection Scan
2012-10-04/a>Mark HofmanAnd the SHA-3 title goes to .....Keccak
2012-10-04/a>Johannes UllrichCyber Security Awareness Month - Day 4: Crypto Standards
2012-10-04/a>Johannes UllrichMicrosoft October Patch Pre-Announcement
2012-10-03/a>Kevin ShorttFake Support Calls Reported
2012-10-03/a>Kevin ShorttCyber Security Awareness Month - Day 3 - Standard Sudo - Part One
2012-10-02/a>Russ McReeCyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines
2012-10-01/a>Johannes UllrichCyber Security Awareness Month
2012-09-28/a>Joel EslerAdobe certification revocation for October 4th
2012-09-27/a>Kevin ShorttCisco IOS Security Advisory Bundle - http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep12.html
2012-09-27/a>Adam SwangerISC Feature of the Week: Glossary
2012-09-26/a>Johannes UllrichSome Android phones can be reset to factory default by clicking on links
2012-09-26/a>Johannes UllrichMore Java Woes
2012-09-21/a>Johannes UllrichiOS 6 Security Roundup
2012-09-21/a>Guy BruneauIE Cumulative Updates MS12-063 - KB2744842
2012-09-21/a>Guy BruneauUpdate for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 (2755801)
2012-09-21/a>Guy BruneauStoring your Collection of Malware Samples with Malwarehouse
2012-09-20/a>Russ McReeFlash Player update but no announcement, check your version http://www.adobe.com/software/flash/about/
2012-09-20/a>Russ McReeApple and Cisco Security Advisories 19 SEP 2012
2012-09-20/a>Russ McReeFinancial sector advisory: attacks and threats against financial institutions
2012-09-19/a>Russ McReeScript kiddie scavenging with Shellbot.S
2012-09-19/a>Kevin ListonVolatility: 2.2 is Coming Soon
2012-09-17/a>Rob VandenBrinkIE Zero Day is "For Real"
2012-09-17/a>Rob VandenBrinkWhat's on your iPad?
2012-09-14/a>Lenny ZeltserAnalyzing Malicious RTF Files Using OfficeMalScanner's RTFScan
2012-09-14/a>Lenny ZeltserScam Report - Fake Voice Mail Email Notification Redirects to Malicious Site
2012-09-14/a>Adam SwangerISC Feature of the Week: Privacy Policy
2012-09-13/a>Mark BaggettTCP Fuzzing with Scapy
2012-09-13/a>Mark BaggettMicrosoft disrupts traffic associated with the Nitol botnet
2012-09-13/a>Mark BaggettMore SSL trouble
2012-09-11/a>Adam SwangerMicrosoft September 2012 Black Tuesday Update - Overview
2012-09-10/a>Johannes UllrichGodaddy DDoS Attack
2012-09-10/a>donald smithBlue Toad publishing co compromise lead to UDID release. http://redtape.nbcnews.com/_news/2012/09/10/13781440-exclusive-the-real-source-of-apple-device-ids-leaked-by-anonymous-last-week?lite
2012-09-10/a>Johannes UllrichMicrosoft Patch Tuesday Pre-Release
2012-09-09/a>Guy BruneauPhishing/Spam Pretending to be from BBB
2012-09-08/a>Guy BruneauWebmin Input Validation Vulnerabilities
2012-09-07/a>Chris MohanKeeping an eye on those BYODs with DHCP
2012-09-06/a>Johannes UllrichSSL Requests sent to port 80 (request for help/input)
2012-09-05/a>Rob VandenBrinkAuditing a Network for VOIP Call Quality Metrics
2012-09-04/a>Johannes UllrichAnother round of "Spot the Exploit E-Mail"
2012-09-02/a>Lorna HutchesonDemonstrating the value of your Intrusion Detection Program and Analysts
2012-09-01/a>Russ McReeBlackhole targeting Java vulnerability via fake Microsoft Services Agreement email phish
2012-08-31/a>Johannes UllrichVMware Updates
2012-08-31/a>Russ McReeNot so fast: Java 7 Update 7 critical vulnerability discovered in less than 24 hours
2012-08-30/a>Bojan ZdrnjaAnalyzing outgoing network traffic (part 2)
2012-08-30/a>Johannes UllrichEditorial: The Slumlord Approach to Network Security http://isc.sans.edu/j/editorial
2012-08-29/a>Johannes Ullrich"Data" URLs used for in-URL phishing
2012-08-28/a>Johannes UllrichFirefox 15 Released (includes silent future updates) http://www.mozilla.org/en-US/firefox/15.0/releasenotes/buglist.html
2012-08-27/a>Johannes UllrichMalware Spam harvesting Facebook Information
2012-08-27/a>Johannes UllrichThe Good, Bad and Ugly about Assigning IPv6 Addresses
2012-08-26/a>Lorna HutchesonWho ya gonna contact?
2012-08-23/a>Bojan ZdrnjaAnalyzing outgoing network traffic
2012-08-23/a>Adam SwangerISC Feature of the Week: Contact Us
2012-08-22/a>Adrien de BeaupreApple Remote Desktop update fixes no encryption issue
2012-08-22/a>Adrien de BeauprePhishing/spam via SMS
2012-08-21/a>Adrien de BeaupreYYABCAFU - Yes Yet Another Bleeping Critical Adobe Flash Update
2012-08-21/a>Adrien de BeaupreRuggedCom fails key management 101 on Rugged Operating System (ROS)
2012-08-20/a>Manuel Humberto Santander PelaezDo we need test procedures in our companies before implementing Antivirus signatures?
2012-08-19/a>Manuel Humberto Santander PelaezAuthentication Issues between entities during protocol message exchange in SCADA Systems
2012-08-17/a>Guy BruneauSuspicious eFax Spear Phishing Messages
2012-08-16/a>Johannes UllrichA Poor Man's DNS Anomaly Detection Script
2012-08-15/a>Guy BruneauWireshark Security Update
2012-08-15/a>Guy BruneauCisco IOS XR Software Route Processor DoS Vulnerability - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120530-iosxr
2012-08-14/a>Rick WannerBacktrack 5 r3 released - http://www.backtrack-linux.org/downloads/
2012-08-14/a>Rick WannerMicrosoft August 2012 Black Tuesday Update - Overview
2012-08-13/a>Rick WannerInteresting scan for medical certification information...
2012-08-12/a>Tony CarothersLayers of the Defense-in-Depth Onion
2012-08-12/a>Tony CarothersOracle Security Alert for CVE-2012-3132
2012-08-10/a>Adam SwangerISC Feature of the Week: Report Fake Tech Support Calls
2012-08-09/a>Mark HofmanZeus/Citadel variant causing issues in the Netherlands
2012-08-09/a>Mark HofmanSQL Injection Lilupophilupop style, Part 2
2012-08-08/a>Adrien de Beaupresnort updated to 2.9.3.1 Changelog: http://www.snort.org/downloads/1837
2012-08-07/a>Adrien de BeaupreWho protects small business?
2012-08-05/a>Daniel WesemannPhishing for Payroll with unpatched Java
2012-08-04/a>Adam SwangerISC Feature of the Week: Handler Select News Feed
2012-08-04/a>Kevin ListonVendors: More Patch-Release Options Please
2012-08-02/a>Guy BruneauOpera Security Update
2012-07-31/a>Daniel WesemannSQL injection, lilupophilupop-style
2012-07-30/a>Guy BruneauBIND 9 Security Updates
2012-07-27/a>Daniel WesemannCuckoo 0.4 is out - cool new features for malware analysis http://www.cuckoosandbox.org/
2012-07-26/a>Adam SwangerISC Feature of the Week: The 404Project - now with IP Mask
2012-07-25/a>Johannes UllrichApple OS X 10.8 (Mountain Lion) released
2012-07-25/a>Johannes UllrichApple Releases Safari 6
2012-07-25/a>Johannes UllrichMicrosoft Exchange/Sharepoint and others: Oracle Outside In Vulnerability
2012-07-24/a>Richard PorterWireshark 1.8.1 Released http://www.wireshark.org/
2012-07-24/a>Richard PorterReport of spike in DNS Queries gd21.net
2012-07-23/a>Johannes UllrichMost Anti-Privacy Web Browsing Tool Ever?
2012-07-21/a>Rick WannerTippingPoint DNS Version Request increase
2012-07-20/a>Mark BaggettSyria Internet connection cut?
2012-07-19/a>Mark BaggettDiagnosing Malware with Resource Monitor
2012-07-19/a>Mark BaggettA Heap of Overflows?
2012-07-18/a>Rob VandenBrinkSnort Updated today
2012-07-18/a>Rob VandenBrinkVote NO to Weak Keys!
2012-07-18/a>Rob VandenBrinkVote NO to Weak Encryption!
2012-07-17/a>Jim ClausingFirefox 14.0.1, Thunderbird 14.0 out - both claim security fixes, but release notes not updated yet with security details
2012-07-16/a>Richard PorterSysinternals Update @ http://blogs.technet.com/b/sysinternals/archive/2012/07/16/updates-handle-v3-5-process-explorer-v15-22-process-monitor-v3-03-rammap-v1-21-zoomit-v4-3.aspx
2012-07-16/a>Jim ClausingAn analysis of the Yahoo! passwords
2012-07-15/a>Guy BruneauNew ISC Poll - Are you currently using a Security Information and Event Management (SIEM) solution to collect security logs?
2012-07-14/a>Tony CarothersUser Awareness and Education
2012-07-13/a>Richard PorterYesterday (not as on the ball as Rob) at SANSFire
2012-07-13/a>Russ McRee2 for 1: SANSFIRE & MSRA presentations
2012-07-13/a>Russ McReeVMWare Security Advisory 12 JUL 2012
2012-07-13/a>Russ McReeYahoo service SQL injection vuln leads to account exposure
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Recording Server - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Manager - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman
2012-07-12/a>Rob VandenBrinkToday at SANSFIRE - Dude Your Car is PWND !
2012-07-12/a>Adam SwangerISC Feature of the Week: Internet Storm Center Events
2012-07-11/a>Rick WannerExcellent Security Education Resources
2012-07-10/a>Rob VandenBrinkToday at SANSFIRE (09 July 2012) - ISC Panel Discussion on the State of the Internet
2012-07-10/a>Swa FrantzenMicrosoft revoking trust in Microsoft certificates - SA 2728973
2012-07-10/a>Swa FrantzenMicrosoft fix-it to disable gadgets - SA 2719662
2012-07-10/a>Swa FrantzenMicrosoft July 2012 Black Tuesday Update - Overview
2012-07-09/a>Johannes UllrichThe FBI will turn off the Internet on Monday (or not)
2012-07-09/a>Manuel Humberto Santander PelaezInternet Storm Center panel tonight at SANSFIRE 2012!
2012-07-05/a>Adrien de BeaupreNew OS X trojan backdoor MaControl variant reported
2012-07-05/a>Adrien de BeaupreMicrosoft advanced notification for July 2012 patch Tuesday
2012-07-02/a>Joel EslerA rough guide to keeping your website up
2012-07-02/a>Dan GoldbergStorms of June 29th 2012 in Mid Atlantic region of the USA
2012-07-02/a>Joel EslerLinux & Java leap second bug
2012-06-29/a>Jim ClausingUpdated SysInternals tools - Autoruns, Process Explorer, Process Monitor, PSKill -- http://blogs.technet.com/b/sysinternals/archive/2012/06/28/updates-autoruns-v11-32-process-explorer-v15-21-process-monitor-v3-02-pskill-v1-15-rammap-v1-2.aspx
2012-06-29/a>Bojan ZdrnjaDShield for Splunk
2012-06-28/a>Chris MohanMassive spike in BGP traffic - Possible BGP poisoning?
2012-06-28/a>Adam SwangerISC Feature of the Week: About the Internet Storm Center
2012-06-27/a>Daniel WesemannWhat's up with port 79 ?
2012-06-26/a>Daniel WesemannRun, Forest! (Update)
2012-06-25/a>Guy BruneauIssues with Windows Update Agent
2012-06-25/a>Guy BruneauUsing JSDetox to Analyze and Deobfuscate Javascript
2012-06-25/a>Rick WannerTargeted Malware for Industrial Espionage?
2012-06-22/a>Kevin ListonUpdated Poll: Which Patch Delivery Schedule Works the Best for You?
2012-06-22/a>Adam SwangerISC Feature of the Week: Tools->ISC At-A-Glance
2012-06-22/a>Kevin ListonInvestigator's Tool-kit: Timeline
2012-06-21/a>Russ McReeCisco Security Advisories 20 JUN 2012
2012-06-21/a>Raul SilesPrint Bomb? (Take 2)
2012-06-21/a>Russ McReeAnalysis of drive-by attack sample set
2012-06-21/a>Russ McReeWireshark 1.8.0 released 21 JUN 2012 http://www.wireshark.org/download.html
2012-06-20/a>Raul SilesFirefox 13.0.1 Update
2012-06-20/a>Raul SilesCVE-2012-0217 (from MS12-042) applies to other environments too
2012-06-19/a>Daniel Wesemann Vulnerabilityqueerprocessbrittleness
2012-06-18/a>Guy BruneauCVE-2012-1875 exploit is now available
2012-06-15/a>Johannes UllrichAuthenticating E-Mail
2012-06-14/a>Johannes UllrichVMWare Security Advisories
2012-06-14/a>Johannes UllrichSpot the Phish: Verizon Wireless
2012-06-13/a>Johannes UllrichMicrosoft Certificate Updater
2012-06-13/a>Johannes UllrichICANN "Reveal Day" Lists new TLD Applications
2012-06-12/a>Scott FendleyApple iTunes Security Update
2012-06-12/a>Swa FrantzenAdobe June 2012 Black Tuesday patches
2012-06-12/a>Swa FrantzenMicrosoft June 2012 Black Tuesday Update - Overview
2012-06-12/a>Swa FrantzenMicrosoft Security Advisory 2719615 - MSXML - CVE-2012-1889
2012-06-11/a>Johannes UllrichMicrosoft Update Security
2012-06-10/a>Scott FendleyPreying on Users After Major Security Incidents
2012-06-07/a>Johannes UllrichIPMI: Hacking servers that are turned "off"
2012-06-07/a>Johannes UllrichMicrosoft June Security Bulletin Advance Notification
2012-06-06/a>Jim ClausingFirefox, Thunderbird, and Seamonkey Security Updates
2012-06-06/a>Jim ClausingBIND 9 Update - DoS or information disclosure vulnerability
2012-06-06/a>Jim ClausingPotential leak of 6.5+ million LinkedIn password hashes
2012-06-05/a>Adam SwangerISC Feature of the Week: IPv6 Preparedness and Tools
2012-06-04/a>Lenny ZeltserDecoding Common XOR Obfuscation in Malicious Code
2012-06-04/a>Rob VandenBrinkvSphere 5.0 Hardening Guide Officially Released
2012-06-04/a>Johannes UllrichMicrosoft Emergency Bulletin: Unauthorized Certificate used in "Flame"
2012-06-01/a>Johannes UllrichApple Releases iOS Security Specs
2012-06-01/a>Johannes UllrichWhat Does "IPv6 Day" mean to you?
2012-06-01/a>Adam SwangerISC Feature of the Week: Country and Region Report
2012-05-31/a>Johannes UllrichSCADA@Home: Your health is no secret no more!
2012-05-30/a>Rob VandenBrinkToo Big to Fail / Too Big to Learn?
2012-05-30/a>Rob VandenBrinkIt's Phishing Season! In fact, it's ALWAYS Phishing Season!
2012-05-25/a>Guy BruneauGoogle Publish Transparency Report
2012-05-25/a>Guy BruneauVMware vMA Security Advisory VMSA-2012-0010 - http://www.vmware.com/security/advisories/VMSA-2012-0010.html
2012-05-24/a>Adam SwangerISC Feature of the Week: Country Report
2012-05-23/a>Mark BaggettIP Fragmentation Attacks
2012-05-23/a>Mark BaggettProblems with MS12-035 affecting XP, SBS and Windows 2003?
2012-05-22/a>Johannes Ullrichnmap 6 released
2012-05-22/a>Johannes UllrichThe "Do Not Track" header
2012-05-21/a>Kevin ShorttDNS ANY Request Cannon - Need More Packets
2012-05-18/a>Johannes UllrichZTE Score M Android Phone backdoor
2012-05-17/a>Adam SwangerISC Feature of the Week: Tools->Information Gathering
2012-05-17/a>Johannes UllrichDo Firewalls make sense?
2012-05-17/a>Johannes UllrichNew IPv6 Video: IPv6 Router Advertisements https://isc.sans.edu/ipv6videos
2012-05-16/a>Johannes UllrichMicrosoft released an update for its Enhanced Mitigation Experience Tool (EMET) http://blogs.technet.com/b/srd/archive/2012/05/15/introducing-emet-v3.aspx
2012-05-16/a>Johannes UllrichAvira Antivirus false positives http://forum.avira.com/wbb/index.php?page=Thread&threadID=144875
2012-05-14/a>Chris MohanLaptops at Security Conferences
2012-05-11/a>Adam SwangerISC Feature of the Week: Link List
2012-05-10/a>Kevin ShorttSafari 5.1.7 - an interesting feature
2012-05-08/a>Bojan ZdrnjaWindows Firewall Bypass Vulnerability and NetBIOS NS
2012-05-07/a>Guy BruneauiOS 5.1.1 Software Update for iPod, iPhone, iPad
2012-05-06/a>Jim ClausingTool updates and Win 8
2012-05-05/a>Tony CarothersVulnerability Assessment Program - Discussions
2012-05-05/a>Tony CarothersVulnerability Exploit for Snow Leopard
2012-05-04/a>Adam SwangerISC Feature of the Week: Data/Reports
2012-05-04/a>Guy BruneauAdobe Security Flash Update
2012-05-03/a>Guy BruneauVMware Critical Security Issues Advisory - http://www.vmware.com/security/advisories/VMSA-2012-0009.html
2012-05-01/a>Rob VandenBrinkAre Open SSIDs in decline?
2012-04-30/a>Rob VandenBrinkFCC posts Enquiry Documents on Google Wardriving
2012-04-30/a>Rob VandenBrinkPatch for Oracle TNS Listener issue released !
2012-04-27/a>Adam SwangerISC Feature of the Week: Handler Created Tools
2012-04-26/a>Richard PorterPacketstorm Security and Metasploit have Exploit code for MS12-027
2012-04-26/a>Richard PorterDefine Irony: A medical device with a Virus?
2012-04-25/a>Daniel WesemannBlacole's obfuscated JavaScript
2012-04-25/a>Daniel WesemannBlacole's shell code
2012-04-23/a>Russ McReeEmergency Operations Centers & Security Incident Management: A Correlation
2012-04-21/a>Guy BruneauWordPress Release Security Update
2012-04-18/a>Kevin ShorttSysinternals Updates - 2012 Apr 17
2012-04-18/a>Adam SwangerISC Feature of the Week: Suspicious Domains
2012-04-15/a>Rick Wanner.Net update affects printing from some applications
2012-04-13/a>Adam SwangerISC Feature of the Week: Get to know the Handlers
2012-04-13/a>Daniel WesemannAnti-virus scanning exclusions
2012-04-12/a>Guy Bruneauwicd Privilege Escalation 0day exploit for Backtrack 5 R2
2012-04-10/a>Swa FrantzenWindows Vista RIP
2012-04-09/a>Johannes UllrichNot your Parent's Wireless Threat
2012-04-06/a>Johannes UllrichSocial Share Privacy
2012-04-06/a>Johannes UllrichMicrosoft April Patch Tuesday Pre-Announcement (6 Patches): http://technet.microsoft.com/en-us/security/bulletin/ms12-apr
2012-04-04/a>Adam SwangerISC Feature of the Week: Diary/Infocon/Event Notifications
2012-03-27/a>Johannes UllrichFirefox 3.6 EOL
2012-03-27/a>Adam SwangerISC Feature of the Week: ISC Poll
2012-03-27/a>Guy BruneauWireshark 1.6.6 and 1.4.2 Released
2012-03-27/a>Guy BruneauOpera 11.62 for Windows patch several bugs and vulnerabilities - http://www.opera.com/docs/changelogs/windows/1162/
2012-03-21/a>Adam SwangerISC Feature of the Week: Presentations and Papers
2012-03-20/a>Johannes UllrichA Reminder: Private Key Security
2012-03-16/a>Guy BruneauVMware New and Updated Security Advisories
2012-03-16/a>Swa FrantzenINFOCON Yellow - Microsoft RDP - MS12-020
2012-03-16/a>Russ McReeMS12-020 RDP vulnerabilities: Patch, Mitigate, Detect
2012-03-15/a>Adam SwangerISC Feature of the Week: Infocon
2012-03-13/a>Lenny ZeltserPlease transfer this email to your CEO or appropriate person, thanks
2012-03-12/a>Guy BruneauOpenSSL Security Update
2012-03-12/a>Johannes UllrichApple Released Safari 5.1.4
2012-03-11/a>Johannes UllrichAn Analysis of Jester's QR Code Attack. (Guest Diary)
2012-03-09/a>Guy BruneauVMware New and Updated Advisories
2012-03-08/a>Johannes UllrichMicrosoft March Patch Tuesday Pre-Anouncement out. 6 patches, 1 critical: http://technet.microsoft.com/en-us/security/bulletin/ms12-mar
2012-03-07/a>Johannes UllrichWhat happened to RFI attacks?
2012-03-06/a>Adam SwangerISC Feature of the Week: Follow us on Twitter
2012-03-05/a>Johannes UllrichFlashback Malware now with Twitter C&C
2012-03-03/a>Jim ClausingNew automated sandbox for Android malware
2012-02-29/a>Adam SwangerISC Feature of the Week: 404Project Reports
2012-02-29/a>Russ McReeCisco Security Advisories - 29FEB2011
2012-02-24/a>Guy BruneauCisco Small Business SRP 500 Series Multiple Vulnerabilities - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120223-srp500
2012-02-23/a>donald smithDNS-Changer "clean DNS" extension requested
2012-02-22/a>Johannes UllrichHow to test OS X Mountain Lion's Gatekeeper in Lion
2012-02-22/a>Adam SwangerISC Feature of the Week: Handler Diaries
2012-02-20/a>Pedro BuenoSimple Malware Research Tools
2012-02-20/a>Rick WannerDNSChanger resolver shutdown deadline is March 8th
2012-02-20/a>Johannes UllrichThe Ultimate OS X Hardening Guide Collection
2012-02-17/a>Mark HofmanIntersting Facebook SPAM
2012-02-15/a>Adam SwangerISC Feature of the Week: XML Feeds
2012-02-11/a>Mark HofmanYet another version of Firefox has been released. One security fix. More info can be found here: https://www.mozilla.org/en-US/firefox/10.0.1/releasenotes/
2012-02-09/a>Richard PorterDNS Ghost Domains, How I loath you so!
2012-02-08/a>Jim ClausingChrome to stop checking Certificate Revocation List (CRL)?
2012-02-07/a>Jim ClausingBook Review: Practical Packet Analysis, 2nd ed
2012-02-07/a>Johannes UllrichSecure E-Mail Access
2012-02-07/a>Adam SwangerISC Feature of the Week: Security Dashboard
2012-02-05/a>Tony CarothersCybersecurity Legislation Components
2012-02-04/a>Scott FendleyApple Security Advisory 2012-001 v1.1
2012-02-03/a>Guy BruneauNew Poll - What security issue concerns you the most this year?
2012-02-01/a>Adam SwangerISC Feature of the Week: ISC Search
2012-02-01/a>Russ McReeOracle Security Alert: http://www.oracle.com/technetwork/topics/security/alert-cve-2011-5035-1506603.html
2012-01-31/a>Russ McReeOSINT tactics: parsing from FOCA for Maltego
2012-01-31/a>Russ McReeFirefox 10 and VMWare advisories and updates
2012-01-27/a>Mark HofmanCISCO Ironport C & M Series telnet vulnerability
2012-01-25/a>Adam SwangerISC Feature of the Week: ISC Link Back
2012-01-24/a>Bojan ZdrnjaIs it time to get rid of NetBIOS?
2012-01-22/a>Johannes UllrichJavascript DDoS Tool Analysis
2012-01-22/a>Lorna HutchesonMailbag - "Attacks"
2012-01-21/a>Guy BruneauDNS Sinkhole Scripts Fixes/Update
2012-01-19/a>Chris MohanWHOIS contacts are your friends
2012-01-18/a>Adam SwangerISC Feature of the Week: The 404Project
2012-01-13/a>Guy BruneauSysinternals Updates - http://blogs.technet.com/b/sysinternals/archive/2012/01/13/updates-autoruns-v11-21-coreinfo-v3-03-portmon-v-3-03-process-explorer-v15-12-mark-s-blog-and-mark-at-rsa-2012.aspx
2012-01-12/a>Rob VandenBrinkStuff I Learned Scripting - Fun with STDERR
2012-01-11/a>Adrien de BeaupreNew wireshark released - 1.6.5 and 1.4.11 - www.wireshark.org/download.html
2012-01-11/a>Adam SwangerISC Feature of the Week: Internet Storm Center / DShield API
2012-01-10/a>Adrien de BeaupreJanuary 2012 Microsoft Black Tuesday Summary
2012-01-06/a>Guy BruneauJanuary 2012 Patch Tuesday Pre-release
2012-01-05/a>Russ McReeOpenSSL vulnerability fixes
2012-01-03/a>Adam SwangerISC Feature of the Week: How to Submit Firewall Logs
2012-01-03/a>Rick WannerAnalysis of the Stratfor Password List
2012-01-03/a>Bojan ZdrnjaThe tale of obfuscated JavaScript continues
2011-12-30/a>Raul SilesWi-Fi Protected Setup (WPS) PIN Brute Force Vulnerability
2011-12-29/a>Richard PorterASP.Net Vulnerability
2011-12-28/a>Daniel WesemannHash collisions vulnerability in web servers
2011-12-25/a>Deborah HaleMerry Christmas, Happy Holidays
2011-12-23/a>Daniel WesemannPrinter Pranks
2011-12-22/a>Johannes UllrichFirefox 9 Security Fixes
2011-12-21/a>Johannes UllrichNew Vulnerability in Windows 7 64 bit
2011-12-21/a>Chris MohanFirefox 9 has been released patching known vulnerabilities http://www.mozilla.org/security/known-vulnerabilities/firefox.html#firefox9
2011-12-21/a>Chris MohanThe off switch
2011-12-13/a>Johannes UllrichDecember 2011 Microsoft Black Tuesday Summary
2011-12-13/a>Johannes UllrichDecember 2011 Adobe Black Tuesday
2011-12-12/a>Daniel WesemannYou won 100$ or a free iPad!
2011-12-08/a>Adrien de BeaupreNewest Adobe Flash 11.1.102.55 and Previous 0 Day Exploit
2011-12-08/a>Adrien de BeaupreMicrosoft Security Bulletin Advance Notification for December 2011
2011-12-07/a>Lenny ZeltserV8 as an Alternative to SpiderMonkey for JavaScript Deobfuscation
2011-12-06/a>Pedro BuenoThe RedRet connection...
2011-12-06/a>Kevin ShorttCain & Abel v4.9.43 Released - http://www.oxid.it/
2011-12-05/a>Stephen HallISC describe DNS crash bug analysis
2011-12-01/a>Mark HofmanSQL Injection Attack happening ATM
2011-11-29/a>John BambenekHacking HP Printers for Fun and Profit
2011-11-28/a>Tom ListonA Puzzlement...
2011-11-24/a>Russ McReeQuick Tip: Pastebin Monitoring & Recon
2011-11-23/a>Johannes UllrichSCADA hacks published on Pastebin
2011-11-22/a>Pedro BuenoUpdates on ZeroAccess and BlackHole front...
2011-11-18/a>Kevin ListonRecent VMWare security advisories
2011-11-16/a>Adrien de BeaupreGET BACK TO ME ASAP
2011-11-16/a>Jason LamPotential 0-day on Bind 9
2011-11-15/a>Adrien de Beauprewww.disa.mil down?
2011-11-11/a>Rick WannerAdobe Air updated to 3.1.0.4880
2011-11-11/a>Rick WannerYay! More Sysinternals updates! http://technet.microsoft.com/en-us/sysinternals
2011-11-11/a>Rick WannerAPPLE-SA-2011-11-10-2 Time Capsule and AirPort Base Station (802.11n) Firmware 7.6 update
2011-11-11/a>Rick WannerWhat's up with fbi.gov DNS?
2011-11-10/a>Rob VandenBrinkStuff I Learned Scripting - - Parsing XML in a One-Liner
2011-11-08/a>Swa FrantzenFirefox 8.0 released
2011-11-07/a>Rob VandenBrinkStuff I Learned Scripting - Evaluating a Remote SSL Certificate
2011-11-07/a>Rob VandenBrinkJuniper BGP issues causing locallized Internet Problems
2011-11-04/a>Guy BruneauNew Poll: In the coming 12 months, what is your deployment plan or status with IPv6?
2011-11-03/a>Richard PorterAn Apple, Inc. Sandbox to play in.
2011-11-03/a>Guy BruneauNovember 2011 Patch Tuesday Pre-release
2011-11-02/a>Russ McReeWireshark updates: 1.6.3 and 1.4.10 released
2011-11-01/a>Russ McReeHoneynet Project: Android Reverse Engineering (A.R.E.) Virtual Machine released
2011-11-01/a>Russ McReeSecure languages & frameworks
2011-10-29/a>Richard PorterThe Sub Critical Control? Evidence Collection
2011-10-28/a>Russ McReeCritical Control 19: Data Recovery Capability
2011-10-28/a>Daniel WesemannCritical Control 20: Security Skills Assessment and Training to fill Gaps
2011-10-27/a>Mark BaggettCritical Control 18: Incident Response Capabilities
2011-10-26/a>Rick WannerCritical Control 17:Penetration Tests and Red Team Exercises
2011-10-26/a>Rob VandenBrinkThe Theoretical "SSL Renegotiation" Issue gets a Whole Lot More Real !
2011-10-25/a>Chris MohanRecurring reporting made easy?
2011-10-23/a>Guy Bruneautcpdump and IPv6
2011-10-21/a>Johannes UllrichNew Flash Click Jacking Exploit
2011-10-17/a>Rob VandenBrinkCritical Control 11: Account Monitoring and Control
2011-10-15/a>Guy BruneauDNS Sinkhole Parser Script Update
2011-10-13/a>Johannes UllrichCritical OS X Vulnerability Patched
2011-10-13/a>Kevin ShorttDennis M. Ritchie (1941 - 2011)
2011-10-13/a>Guy BruneauCritical Control 10: Continuous Vulnerability Assessment and Remediation
2011-10-12/a>Adam SwangerWe are experiencing technical issues with the webcast. The webcast will start as soon as these issues are resolved.
2011-10-12/a>Kevin ShorttCritical Control 8 - Controlled Use of Administrative Privileges
2011-10-11/a>Swa FrantzenCritical Control 7 - Application Software Security
2011-10-11/a>Swa FrantzenApple iTunes 10.5
2011-10-11/a>Swa FrantzenMicrosoft Security Intelligence Report (SIR) - Volume 11
2011-10-10/a>Tom ListonWhat's In A Name?
2011-10-10/a>Jim ClausingCritical Control 6 - Maintenance, Monitoring, and Analysis of Security Audit Logs
2011-10-07/a>Mark HofmanCritical Control 5 - Boundary Defence
2011-10-05/a>Jim ClausingCisco Advisories - FWSM, ASA, and NAC
2011-10-05/a>Jim ClausingVMware Advisory - UDF file system handling
2011-10-04/a>Rob VandenBrinkCritical Control 2 - Inventory of Authorized and Unauthorized Software
2011-10-04/a>Johannes UllrichCritical Control 3 - Secure Configurations for Hardware and Software on Laptops, Workstations and Servers
2011-10-03/a>Mark HofmanCritical Control 1 - Inventory of Authorized and Unauthorized Devices
2011-10-03/a>Mark BaggettWhat are the 20 Critical Controls?
2011-10-03/a>Tom ListonSecurity 101 : Security Basics in 140 Characters Or Less
2011-10-02/a>Mark HofmanCyber Security Awareness Month Day 1/2 - Schedule
2011-10-02/a>Mark HofmanCyber Security Awareness Month Day 1/2 - Introduction to the controls
2011-10-01/a>Mark HofmanHot on the heels fo FF, Thunderbird v 7.0.1 and SeaMonkey v 2.4.1 have been updated.
2011-09-30/a>Tony CarothersFirefox v. 7.0.1 Is Live
2011-09-29/a>Daniel WesemannThe SSD dilemma
2011-09-28/a>Richard PorterAll Along the ARP Tower!
2011-09-27/a>Jason LamFirefox 3.6.23 security update is out and so is version 7 (time to break some add-on)
2011-09-26/a>Jason LamMySQL.com compromised spreading malware
2011-09-21/a>Mark HofmanOctober 2011 Cyber Security Awareness Month
2011-09-20/a>Swa FrantzenDiginotar declared bankrupt
2011-09-19/a>Guy BruneauMS Security Advisory Update - Fraudulent DigiNotar Certificates
2011-09-15/a>Swa FrantzenDigiNotar looses their accreditation for qualified certificates
2011-09-13/a>Swa FrantzenGlobalSign back in operation
2011-09-13/a>Swa FrantzenMore DigiNotar intermediate certificates blocklisted at Microsoft
2011-09-09/a>Rob VandenBrinkWireshark 1.62 (Newest Stable Release) is out !! ==> http://www.wireshark.org/download.html
2011-09-09/a>Guy BruneauIPv6 and DNS Sinkhole
2011-09-09/a>Johannes UllrichEarly Patch Tuesday Today: Microsoft September 2011 Patches
2011-09-09/a>Guy BruneauApple Certificate Trust Policy Update
2011-09-09/a>Guy BruneauAdobe Publish its List of Trusted Root Certificate - http://www.adobe.com/security/approved-trust-list.html
2011-09-08/a>Rob VandenBrinkWhen Good CA's go Bad: Other Things to Check in Your Datacenter
2011-09-08/a>Mark HofmanMicrosoft has released their advanced notification for patch Tuesday. 15 Vulnerabilities to be addressed. more here --> http://blogs.technet.com/b/msrc/archive/2011/09/08/advanced-notification-for-the-september-2011-bulletin-release.aspx
2011-09-07/a>Lenny ZeltserAnalyzing Mobile Device Malware - Honeynet Forensic Challenge 9 and Some Tools
2011-09-07/a>Lenny ZeltserGlobalSign Temporarily Stops Issuing Certificates to Investigate a Potential Breach
2011-09-06/a>Swa FrantzenDigiNotar audit - intermediate report available
2011-09-06/a>Johannes UllrichMicrosoft Releases Diginotar Related Patch and Advisory
2011-09-06/a>Guy BruneauFirefox 6.0.2 released to removed trust to DigiNotar certificate authority http://www.mozilla.org/en-US/firefox/6.0.2/releasenotes/
2011-09-05/a>Bojan ZdrnjaBitcoin – crypto currency of future or heaven for criminals?
2011-09-01/a>Swa FrantzenDigiNotar breach - the story so far
2011-08-31/a>Johannes UllrichFirefox/Thunderbird 6.0.1 released to blocklist bad DigiNotar SSL certificates
2011-08-31/a>Johannes UllrichPhishing e-mail to custom e-mail addresses
2011-08-31/a>Johannes UllrichKernel.org Compromise
2011-08-30/a>Scott FendleyCisco Security Advisory - Apache HTTPd DoS
2011-08-30/a>Johannes UllrichApache patch out for "byte range" DoS vulnerability http://www.apache.org/dist/httpd/Announcement2.2.html
2011-08-26/a>Daniel WesemannUser Agent 007
2011-08-26/a>Johannes UllrichSANS Virginia Beach Conference Canceled. Details: http://www.sans.org/virginia-beach-2011/
2011-08-26/a>Johannes UllrichSome Hurricane Technology Tips
2011-08-25/a>Kevin ShorttRevival of an Unpatched Apache HTTPD DoS
2011-08-25/a>Kevin ShorttIncreased Traffic on Port 3389
2011-08-24/a>Rob VandenBrinkCitrix Access Gateway Cross Site Scripting vulnerability and fix ==> http://support.citrix.com/article/CTX129971
2011-08-22/a>Jim ClausingAre your tools ready for IPv6? (part 2)
2011-08-17/a>Rob VandenBrinkPutting all of Your Eggs in One Basket - or How NOT to do Layoffs
2011-08-17/a>Rob VandenBrinkSysinternal updates for ProcDump v4.0, Process Monitor v2.96, Process Explorer v15.02 ==> http://blogs.technet.com/b/sysinternals/
2011-08-16/a>Johannes UllrichWhat are the most dangerous web applications and how to secure them?
2011-08-16/a>Scott FendleyPhishing Scam Victim Response
2011-08-16/a>Scott FendleyFirefox 3.6.20 Corrects Several Critical Vulnerabilities
2011-08-15/a>Mark HofmanHow to find unwanted files on workstations
2011-08-15/a>Rob VandenBrink8 Years since the Eastern Seaboard Blackout - Has it Been that Long?
2011-08-14/a>Guy BruneauFireCAT 2.0 Released
2011-08-13/a>Rick Wanner30th Anniversary of the IBM PC - What was your first?
2011-08-13/a>Rick WannerMoonSols Dumpit released...for free!
2011-08-11/a>Johannes UllrichAs part of this weeks patch tuesday, microsoft also re-release MS11-043 to address stability issues.
2011-08-11/a>Guy BruneauBlackBerry Enterprise Server Critical Update
2011-08-09/a>Swa FrantzenMicrosoft August 2011 Black Tuesday Overview
2011-08-08/a>Rob VandenBrinkPing is Bad (Sometimes)
2011-08-05/a>Johannes UllrichMicrosoft Patch Tuesday Advance Notification: 13 Bulletins coming http://www.microsoft.com/technet/security/Bulletin/MS11-aug.mspx
2011-08-05/a>Johannes UllrichForensics: SIFT Kit 2.1 now available for download http://computer-forensics.sans.org/community/downloads
2011-08-04/a>Jim ClausingApple release Quicktime 7.7 fixes 14 CVEs, see http://support.apple.com/kb/HT1222
2011-08-04/a>Johannes UllrichIRC traffic on non standard ports
2011-08-04/a>Jim ClausingAre your tools ready for IPv6? (part 1)
2011-08-03/a>Johannes UllrichCisco shipping malicious warranty CD
2011-08-03/a>Johannes UllrichMalicious Images: What's a QR Code
2011-08-02/a>Mark HofmanMetsploit 4 hits the downloads
2011-07-31/a>Daniel WesemannAnatomy of a Unix breach
2011-07-30/a>Deborah HaleData Encryption Ban? Really?
2011-07-29/a>Richard PorterApple Lion talking on TCP 5223
2011-07-28/a>Guy BruneauXenApp and XenDesktop could result in Arbitrary Code Execution
2011-07-28/a>Johannes UllrichAnnouncing: The "404 Project"
2011-07-27/a>Johannes UllrichInternet Storm Center iPhone App now available. Feedback/Feature Requests welcome. Search App Store for "ISC Reader"
2011-07-25/a>Johannes UllrichApple released patch for iWork security issue http://support.apple.com/kb/HT1222
2011-07-25/a>Bojan ZdrnjaWhen the FakeAV coder(s) fail
2011-07-25/a>Johannes UllrichiOS 4.3.5 released fixing an SSL certificate verification flaw. http://support.apple.com/kb/HT1222
2011-07-25/a>Chris MohanMonday morning incident handler practice
2011-07-21/a>Mark HofmanLion Released
2011-07-21/a>Johannes UllrichLion: What is new in Security
2011-07-19/a>Richard PorterSMS Phishing at the SANSFire 2011 Handler Dinner
2011-07-17/a>Mark HofmanSSH Brute Force
2011-07-15/a>Deborah HaleWhat's in a Firewall?
2011-07-13/a>Kevin ShorttFirefox Update 5.0.1 Available - http://www.mozilla.com/en-US/firefox/new/
2011-07-13/a>Guy BruneauNew Sguil HTTPRY Agent
2011-07-13/a>Guy BruneauAre Mobile Devices taking over your Corporate Network?
2011-07-11/a>John BambenekAnother Defense Contractor Hacked in AntiSec Hacktivism Spree
2011-07-10/a>Raul SilesSecurity Testing SSL/TLS (HTTPS) Implementations
2011-07-10/a>Raul SilesJailbreakme Takes Advantage of 0-day PDF Vuln in Apple iOS Devices
2011-07-09/a>Chris MohanSafer Windows Incident Response
2011-07-09/a>Tony CarothersCopyright Alert System - What say you?
2011-07-07/a>Rob VandenBrink"There's a Patch for that" (or maybe not)
2011-07-06/a>Rob VandenBrink"Too Important to Patch" - Wait? What?
2011-07-05/a>Raul SilesHelping Developers Understand Security - Spot the Vuln
2011-07-05/a>Raul SilesTwo DoS remotely exploitable vulnerabilities affect BIND 9: http://www.isc.org/advisories/bind Updgrade to 9.8.0-P4.
2011-07-03/a>Deborah HaleBusiness Continuation in the Face of Disaster
2011-07-02/a>Pedro BuenoBootkits, they are back at full speed...
2011-06-30/a>Guy BruneauSymantec Report - Spam Surge against Social Networks
2011-06-30/a>Rob VandenBrinkUpdate for RSA Authentication Manager
2011-06-29/a>Johannes UllrichRandom SSL Tips and Tricks
2011-06-28/a>Johannes UllrichDNSSEC Tips
2011-06-28/a>Johannes UllrichUpdate: Thunderbird 5.0 released. https://www.mozilla.org/en-US/thunderbird/
2011-06-28/a>Johannes UllrichDeja-Vu: Cisco VPN Windows Client Privilege Escalation
2011-06-27/a>Kevin ShorttPhishy Spam
2011-06-26/a>Rick WannerNagios script for ISC threat level http://www.aj-services.com/?p=275
2011-06-23/a>Jim ClausingApple Security Updates 2011-004
2011-06-22/a>Guy BruneauHow Good is your Employee Termination Policy?
2011-06-21/a>Guy BruneauFirefox 5.0 is out with support Do Not Track on Multiple Platform - http://www.mozilla.com/en-US/firefox/new/
2011-06-21/a>Chris MohanStartSSL, a web authentication authority, suspend services after a security breach
2011-06-19/a>Guy BruneauSega Pass Compromised - 1.29 Million Customers Data Leaked
2011-06-17/a>Richard PorterWhen do you stop owning Technology?
2011-06-14/a>Swa FrantzenMicrosoft June 2011 Black Tuesday Overview
2011-06-12/a>Mark HofmanCloud thoughts
2011-06-09/a>Richard PorterChrome Version 12.0.742.91 Released
2011-06-09/a>Richard PorterOne Browser to Rule them All?
2011-06-09/a>Johannes UllrichIPv6 Day Summary
2011-06-08/a>Johannes UllrichIPv6 Day Started
2011-06-08/a>Johannes UllrichSpam from compromised Hotmail accounts
2011-06-06/a>Manuel Humberto Santander PelaezPhishing: Same goal, same techniques and people still falling for such scams
2011-06-06/a>Johannes UllrichThe Havij SQL Injection Tool
2011-06-04/a>Rick WannerDo you have a personal disaster recovery plan?
2011-06-03/a>Guy BruneauRelease of Wireshark 1.6.0rc2
2011-06-03/a>Guy BruneauSonyPictures Site Compromised
2011-06-02/a>Johannes UllrichSome Insight into Apple's Anti-Virus Signatures
2011-06-02/a>Johannes UllrichIPv6 RA-Guard: How it works and how to defeat it
2011-06-02/a>Johannes UllrichISC Site Redesign
2011-06-01/a>Adrien de BeaupreWireshark 1.4.7 and 1.2.17 Released - http://www.wireshark.org/news/20110531.html
2011-06-01/a>Adrien de BeaupreCisco Security Advisory: Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series - http://www.cisco.com/warp/public/707/cisco-sa-20110601-phone.shtml
2011-06-01/a>Adrien de BeaupreCisco Security Advisory: Default Credentials Vulnerability in Cisco Network Registrar - http://www.cisco.com/warp/public/707/cisco-sa-20110601-cnr.shtml
2011-06-01/a>Adrien de BeaupreCisco Security Advisory: Default Credentials for root Account on the Cisco Media Experience Engine 5600 - http://www.cisco.com/warp/public/707/cisco-sa-20110601-mxe.shtml
2011-06-01/a>Johannes UllrichEnabling Privacy Enhanced Addresses for IPv6
2011-06-01/a>Adrien de BeaupreCisco Security Advisory: Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client - http://www.cisco.com/warp/public/707/cisco-sa-20110601-ac.shtml
2011-05-31/a>Johannes UllrichSkype EasyBits Add-on
2011-05-31/a>Chris MohanGetting the IT security word out there to the rest of the world
2011-05-31/a>Johannes UllrichApple Improving OS X Anti-Malware Feature
2011-05-30/a>Johannes UllrichAllied Telesis Passwords Leaked
2011-05-30/a>Johannes UllrichLockheed Martin and RSA Tokens
2011-05-25/a>Lenny ZeltserMonitoring Social Media for Security References to Your Organization
2011-05-25/a>Daniel WesemannFive new Cisco security advisories released. See http://www.cisco.com/go/psirt
2011-05-23/a>Mark HofmanMicrosoft Support Scam (again)
2011-05-20/a>Guy BruneauDistributed Denial of Service Cheat Sheet
2011-05-20/a>Guy BruneauSysinternals Updates, Analyzing Stuxnet Infection with Sysinternals Tools Part 3
2011-05-19/a>Daniel WesemannFake AV Bingo
2011-05-18/a>Bojan ZdrnjaAndroid, HTTP and authentication tokens
2011-05-16/a>Jason LamFirefox 3.5 forced upgrade coming soon
2011-05-14/a>Guy BruneauWebsense Study Claims Canada Next Hotbed for Cybercrime Web Hosting Activity
2011-05-13/a>Jason LamMicrosoft Security Intelligence Report volume 10
2011-05-12/a>Johannes UllrichActiveX Flaw Affecting SCADA systems
2011-05-10/a>Swa FrantzenMay 2011 Microsoft Black Tuesday Overview
2011-05-10/a>Swa FrantzenChanging MO in scamming our users ?
2011-05-10/a>Swa FrantzenTime to change your facebook password?
2011-05-09/a>Johannes UllrichPatch for BIND 9.8.0 DoS Vulnerability
2011-05-09/a>Rick WannerSerious flaw in OpenID
2011-05-08/a>Lorna HutchesonMonitoring Virtual Machines
2011-05-07/a>Rick WannerBelated May 2: Metasploit 3.7.0 released. http://blog.metasploit.com/2011/05/metasploit-framework-370-released.html
2011-05-06/a>Richard PorterUnpatched Exploit: Skype for MAC
2011-05-06/a>Richard PorterUpdated Exploit Index for Microsoft
2011-05-04/a>Richard PorterMicrosoft Sysinterals Update
2011-05-03/a>Johannes UllrichAnalyzing Teredo with tshark and Wireshark
2011-05-03/a>Johannes UllrichUpdate on Osama Bin Laden themed Malware
2011-05-02/a>Johannes UllrichBin Laden Death Related Malware
2011-05-01/a>Deborah HaleAnother Potentially Malicious Email Making The Rounds
2011-05-01/a>Deborah HaleDroid MarketPlace Has a New App
2011-04-29/a>Guy BruneauFirefox, Thunderbird and SeaMonkey Security Updates
2011-04-29/a>Guy BruneauIncident Response Methodologies Worm Infection Cheat Sheet
2011-04-28/a>Chris MohanCisco Security Advisories
2011-04-28/a>Chris MohanGathering and use of location information fears - or is it all a bit too late
2011-04-28/a>Guy BruneauVMware ESXi 4.1 Security and Firmware Updates
2011-04-28/a>Chris MohanDSL Reports advise 9,000 accounts were compromised
2011-04-26/a>John BambenekIs the Insider Threat Really Over?
2011-04-25/a>Rob VandenBrinkWhat's Your (IP) Address Worth?
2011-04-25/a>Rob VandenBrinkSony PlayStation Network Outage - Day 5
2011-04-23/a>Manuel Humberto Santander PelaezImage search can lead to malware download
2011-04-22/a>Manuel Humberto Santander PelaezIn-house developed applications: The constant headache for the information security officer
2011-04-22/a>Manuel Humberto Santander PelaeziPhoneMap: iPhoneTracker port to Linux
2011-04-21/a>Guy BruneauSilverlight Update Available
2011-04-20/a>Daniel WesemannData Breach Investigations Report published by Verizon
2011-04-20/a>Johannes UllrichiPhone GPS Data Storage
2011-04-20/a>Daniel WesemannVirustotal.com hiccup
2011-04-19/a>Bojan ZdrnjaSQL injection: why can’t we learn?
2011-04-18/a>John BambenekWordpress.com Security Breach
2011-04-16/a>Scott FendleyNew Versions of Wireshark released
2011-04-14/a>Johannes Ullrichdshield.org now DNSSEC signed via .org
2011-04-14/a>Johannes UllrichApple Security Patches for OS X and iOS
2011-04-14/a>Adrien de BeaupreSysinternals updates, a new blog post, and webcast
2011-04-11/a>Johannes UllrichGMail User Using 2FA Warned of Access From China
2011-04-11/a>Johannes UllrichLayer 2 DoS and other IPv6 Tricks
2011-04-11/a>Jim ClausingApril 2011 Microsoft Black Tuesday Summary
2011-04-10/a>Raul SilesPros and Cons of "Secure" Wi-Fi Access
2011-04-10/a>Raul SilesRecent security enhancements in web browsers (e.g. Google Chrome)
2011-04-08/a>Johannes UllrichDark Black Tuesday Coming Up: 17 Microsoft Bulletins
2011-04-07/a>Chris MohanBeing a good internet neighbour
2011-04-05/a>Johannes UllrichIPv6 MITM via fake router advertisements
2011-04-04/a>Mark HofmanWhen your service provider has a breach
2011-04-03/a>Richard PorterExtreme Disclosure? Not yet but a great trend!
2011-04-02/a>Rick WannerRSA/EMC: Anatomy of a compromise
2011-04-01/a>John BambenekLizaMoon Mass SQL-Injection Attack Infected at least 500k Websites
2011-03-30/a>Adrien de BeaupreTwo Cisco advisories: cisco-sa-20110330-nac and cisco-sa-20110330-acs
2011-03-29/a>Daniel WesemannRequesting deletion of "free" email and chat accounts
2011-03-29/a>Daniel WesemannMalware emails with fake cellphone invoice
2011-03-27/a>Guy BruneauStrange Shockwave File with Surprising Attachments
2011-03-25/a>Kevin ListonAPT Tabletop Exercise
2011-03-23/a>Johannes UllrichFirefox 4 Security Features
2011-03-23/a>Johannes UllrichFirefox 3 Updates and SSL Blocklist extension
2011-03-22/a>Chris MohanRead only USB stick trick
2011-03-21/a>Kevin ShorttAPPLE-SA-2011-03-21-1 Mac OS X v10.6.7 and Security Update 2011-001
2011-03-18/a>Chris MohanDeferral Announcement for the March 2011 Cisco IOS Software Security Advisories - http://seclists.org/bugtraq/2011/Mar/170
2011-03-17/a>Kevin ListonSo You Got an AV Alert. Now What?
2011-03-15/a>Lenny ZeltserLimiting Exploit Capabilities by Using Windows Integrity Levels
2011-03-12/a>Chris MohanApple releases iTunes 10.2.1 - http://support.apple.com/kb/DL1103
2011-03-11/a>Guy BruneauSnort IDS Sensor with Sguil Framework ISO
2011-03-09/a>Kevin ShorttAVG Anti-Virus 2011 False Positives - Luhe.Exploit.PDF.B
2011-03-09/a>Chris MohanPossible Issue with Forefront Update KB2508823
2011-03-08/a>Jim ClausingMarch 2011 Microsoft Black Tuesday Summary
2011-03-07/a>Bojan ZdrnjaOracle padding attacks (Codegate crypto 400 writeup)
2011-03-07/a>Lorna HutchesonCall for Packets - Unassigned TCP Options
2011-03-05/a>Mark HofmanNot surprisingly Thunderbird was also updated. Details here --> http://www.mozillamessaging.com/en-US/thunderbird/3.1.9/releasenotes/
2011-03-04/a>Mark HofmanAnd a new version of Firefox (thx all) hits the road, Version 3.6.15 more details here http://www.mozilla.com/en-US/firefox/3.6.15/releasenotes/ (and I agree it was a bit quick after 3.6.14)
2011-03-03/a>Manuel Humberto Santander PelaezPoor man's DLP solution
2011-03-03/a>Manuel Humberto Santander PelaezRogue apps inside Android Marketplace
2011-03-02/a>Chris MohanMicrosoft’s Autorun update v2.1 now automatically deployed from Windows Update
2011-03-02/a>Chris MohanUpdates: Firefox 3.6.14/3.5.17, Thunderbird 3.1.8, Adobe Flash v10.2.152.32 & WireShark 1.4.4
2011-03-02/a>Chris MohaniTunes 10.2 now out
2011-03-01/a>Daniel WesemannAV software and "sharing samples"
2011-02-28/a>Deborah HalePossible Botnet Scanning
2011-02-26/a>Rick WannerFirefox 4 Beta 12 released
2011-02-25/a>Johannes UllrichThunderbolt Security Speculations
2011-02-24/a>Johannes UllrichWindows 7 / 2008 R2 Service Pack 1 Problems
2011-02-23/a>Johannes UllrichWindows 7 Service Pack 1 out
2011-02-23/a>Manuel Humberto Santander PelaezBind DOS vulnerability (CVE-2011-0414)
2011-02-22/a>Johannes UllrichISC/DShield Website Update
2011-02-21/a>Adrien de BeaupreWinamp forums compromised
2011-02-16/a>Jason LamWindows 0-day SMB mrxsmb.dll vulnerability
2011-02-15/a>Jason LamHTTP headers fun
2011-02-14/a>Lorna HutchesonNetwork Visualization
2011-02-14/a>Richard PorterAnonymous Damage Control Anybody?
2011-02-10/a>Chris MohanLinksys WAP610N has Unauthenticated Root Console issue
2011-02-10/a>Chris MohanBefriending Windows Security Log Events
2011-02-09/a>Mark HofmanAdobe Patches (shockwave, Flash, Reader & Coldfusion)
2011-02-08/a>Chris MohanVMWare Security Advisory
2011-02-08/a>Johannes UllrichTippingpoint Releases Details on Unpatched Bugs
2011-02-07/a>Pedro BuenoThe Good , the Bad and the Unknown Online Scanners
2011-02-07/a>Richard PorterCrime is still Crime! Pt 2
2011-02-05/a>Guy BruneauOpenSSH Legacy Certificate Information Disclosure Vulnerability
2011-02-04/a>Daniel WesemannOh, just click "yes"
2011-02-02/a>Johannes UllrichHaving Phish on Friday
2011-02-02/a>Chris MohanDefault Credentials for Root Account on Cisco Personal Video units
2011-02-01/a>Lenny ZeltserThe Importance of HTTP Headers When Investigating Malicious Sites
2011-02-01/a>Johannes UllrichThe End Of IP As We Know It
2011-01-30/a>Richard PorterThe Modern Dark Ages?
2011-01-28/a>Guy BruneauOpenOffice Security Fixes
2011-01-27/a>Robert DanfordMicrosoft Security Advisory for MHTML via Internet Explorer (MS2501696/CVE-2011-0096)
2011-01-25/a>Chris MohanReviewing our preconceptions
2011-01-24/a>Rob VandenBrinkWhere have all the COM Ports Gone? - How enumerating COM ports led to me finding a “misplaced” Microsoft tool
2011-01-23/a>Richard PorterCrime is still Crime!
2011-01-20/a>Manuel Humberto Santander PelaezPossible new Twitter worm
2011-01-19/a>Johannes UllrichMicrosoft's Secure Developer Tools
2011-01-18/a>Daniel WesemannYet another rogue anti-virus
2011-01-15/a>Jim ClausingWhat's up with port 8881?
2011-01-13/a>Rob VandenBrinkIs Infosec seeing "Death by a Thousand Budget Cuts"?
2011-01-12/a>Richard PorterHow Many Loyalty Cards do you Carry?
2011-01-12/a>Richard PorterHas Big Brother gone Global?
2011-01-12/a>Richard PorterYet Another Data Broker? AOL Lifestream.
2011-01-11/a>Kevin ShorttSpam Cannons on Holiday
2011-01-10/a>Manuel Humberto Santander PelaezFacebook virus spreads via photo album chat messages
2011-01-10/a>Manuel Humberto Santander PelaezVirusTotal VTzilla firefox/chrome plugin
2011-01-08/a>Guy BruneauJanuary 2011 Patch Tuesday Pre-release
2011-01-05/a>Johannes UllrichCurrently Unpatched Windows / Internet Explorer Vulnerabilities
2011-01-05/a>Johannes UllrichSurvey: Software Security Awareness Training
2011-01-05/a>Johannes Ullrichipv6finder : How ready are you for IPv6?
2011-01-04/a>Johannes UllrichMicrosoft Advisory: Vulnerability in Graphics Rendering Engine
2011-01-03/a>Johannes UllrichWhat Will Matter in 2011
2010-12-31/a>Bojan ZdrnjaAndroid malware enters 2011
2010-12-30/a>Rick WannerSamuraiWTF Review over at ISSA Toolsmith
2010-12-29/a>Daniel WesemannBeware of strange web sites bearing gifts ...
2010-12-28/a>Johannes UllrichNew annual survey: Please help us improve. http://isc.sans.edu/survey (redirect to surveymonkey)
2010-12-28/a>John BambenekMozilla Notifies of Relatively Minor Security Breach
2010-12-27/a>Johannes UllrichVarious sites "Owned and Exposed"
2010-12-26/a>Manuel Humberto Santander PelaezISC infocon monitor app for OS X
2010-12-25/a>Manuel Humberto Santander PelaezAn interesting vulnerability playground to learn application vulnerabilities
2010-12-24/a>Daniel WesemannA question of class
2010-12-23/a>Mark HofmanSkoudis' Annual Xmas Hacking Challenge - The Nightmare Before Charlie Brown's Christmas
2010-12-23/a>Mark HofmanIE 0 Day, just in time for Christmas
2010-12-22/a>John BambenekIIS 7.5 0-Day DoS (processing FTP requests)
2010-12-21/a>Rob VandenBrinkNetwork Reliability, Part 2 - HSRP Attacks and Defenses
2010-12-20/a>Guy BruneauPatch Issues with Outlook 2007
2010-12-19/a>Raul SilesIntel's new processors have a remote kill switch (Anti-Theft 3.0)
2010-12-18/a>Raul SilesWhere are the Wi-Fi Driver Vulnerabilities?
2010-12-17/a>Johannes UllrichReports of Attacks against EXIM vulnerability
2010-12-15/a>Manuel Humberto Santander PelaezVulnerability in the PDF distiller of the BlackBerry Attachment Service
2010-12-15/a>Johannes UllrichOpenBSD IPSec "Backdoor"
2010-12-14/a>Manuel Humberto Santander PelaezDecember 2010 Microsoft Black Tuesday Summary
2010-12-13/a>Deborah HaleGawker Media Breach of Security
2010-12-13/a>Deborah HaleThe Week to Top All Weeks
2010-12-12/a>Raul SilesNew trend regarding web application vulnerabilities?
2010-12-12/a>Raul SilesApple Quickime 7.6.9 was released a few days ago (just in case you missed it): http://support.apple.com/kb/HT1222. Update all your web browser plugins!
2010-12-10/a>Mark HofmanEXIM MTA vulnerability
2010-12-10/a>Mark HofmanMicrosoft patches
2010-12-09/a>Mark HofmanFirefox version 3.6.13 is being pushed out, time to update (thanks Vincent). Thunderbird 3.1.7 and 3.0.11 can also be added to the list as well as SeaMonkey 2.0.11. - M
2010-12-08/a>Rob VandenBrinkInteresting DDOS activity around Wikileaks
2010-12-08/a>Rob VandenBrinkHow a Tablet Changed My Life
2010-12-05/a>Jim ClausingUpdates to a couple of Sysinternals tools
2010-12-02/a>Kevin JohnsonRobert Hansen and our happiness
2010-12-02/a>Kevin JohnsonSQL Injection: Wordpress 3.0.2 released
2010-12-02/a>Kevin JohnsonProFTPD distribution servers compromised
2010-12-01/a>Deborah HaleA Gentle Reminder - It is that time of year again
2010-11-29/a>Stephen HalliPhone phishing - What you see, isn't what you get
2010-11-29/a>Stephen HallSun security updates
2010-11-26/a>Mark HofmanUsing password cracking as metric/indicator for the organisation's security posture
2010-11-25/a>Bojan ZdrnjaSecunia's DNS/domain hijacked?
2010-11-24/a>Bojan ZdrnjaPrivilege escalation 0-day in almost all Windows versions
2010-11-22/a>Lenny ZeltserBrand Impersonations On-Line: Brandjacking and Social Networks
2010-11-21/a>Marcus SachsA Day In The Life Of A DShield Sensor
2010-11-19/a>Jason LamExchanging and sharing of assessment results
2010-11-18/a>Chris CarboniStopping the ZeroAccess Rootkit
2010-11-18/a>Chris CarboniAll of your pages are belonging to us
2010-11-17/a>Guy BruneauReference on Open Source Digital Forensics
2010-11-17/a>Guy BruneauConficker B++ Activated on Nov 15
2010-11-17/a>Guy BruneauCisco Unified Videoconferencing Affected by Multiple Vulnerabilities
2010-11-16/a>Guy BruneauMac OS X Server v10.6.5 (10H575) Security Update: http://support.apple.com/kb/HT4452
2010-11-15/a>Stephen HallMozilla Firefox 3.6.12 Remote Denial Of Service
2010-11-15/a>Stephen HallMinibis hits beta with Version 2.1
2010-11-12/a>Guy BruneauScripting with Unix Date
2010-11-12/a>Guy BruneauHoneynet Forensic Challenge - Analyzing Malicious Portable Destructive Files
2010-11-11/a>Daniel WesemannFake AV scams via Skype Chat
2010-11-08/a>Manuel Humberto Santander PelaezNetwork Security Perimeter: How to choose the correct firewall and IPS for your environment?
2010-11-07/a>Adrien de BeaupreChange your clocks?
2010-11-04/a>Johannes UllrichMicrosoft Patches Pre-Announcement
2010-11-04/a>Johannes UllrichMicrosoft Smart Screen False Positivies
2010-11-02/a>Johannes UllrichLimited Malicious Search Engine Poisoning for Election
2010-11-01/a>Manuel Humberto Santander PelaezCVE-2010-3654 exploit in the wild
2010-11-01/a>Manuel Humberto Santander PelaezCheckpoint UTM-1 edge VPN boxes worldwide did an unscheduled reboot
2010-10-31/a>Marcus SachsCyber Security Awareness Month - Day 31 - Tying it all together
2010-10-30/a>Guy BruneauCyber Security Awareness Month - Day 30 - Role of the network team
2010-10-29/a>Manuel Humberto Santander PelaezCyber Security Awareness Month - Day 29- Role of the office geek
2010-10-28/a>Rick WannerCyber Security Awareness Month - Day 27 - Social Media use in the office
2010-10-28/a>Rick WannerFirefox 3.6.12 available - http://www.mozilla.com/en-US/firefox/personal.html
2010-10-28/a>Tony CarothersCyber Security Awareness Month - Day 28 - Role of the employee
2010-10-26/a>Pedro BuenoBe (even more) careful with public hotspots. Firesheep released yesterday. Brilliant and scary.
2010-10-26/a>Pedro BuenoFirefox news
2010-10-26/a>Pedro BuenoCyber Security Awareness Month - Day 26 - Sharing Office Files
2010-10-25/a>Kevin ShorttCyber Security Awareness Month - Day 25 - Using Home Computers for Work
2010-10-24/a>Swa FrantzenCyber Security Awarenes Month - Day 24 - Using work computers at home
2010-10-23/a>Mark HofmanCyber Security Awareness Month - Day 23 - The Importance of compliance
2010-10-22/a>Daniel WesemannCyber Security Awareness Month - Day 22 - Security of removable media
2010-10-22/a>Manuel Humberto Santander PelaezIntypedia project
2010-10-21/a>Chris CarboniCyber Security Awareness Month - Day 21 - Impossible Requests from the Boss
2010-10-20/a>Jim ClausingTools updates - Oct 2010
2010-10-20/a>Jim ClausingFirefox 3.6.11 and 3.5.14 released, includes security updates ( http://www.mozilla.com/firefox/3.6.11/releasenotes/ )
2010-10-20/a>Jim ClausingThunderbird 3.1.4 and 3.0.9 released, includes security patches ( http://www.mozillamessaging.com/thunderbird/3.1.5/releasenotes/ )
2010-10-20/a>Jim ClausingCyber Security Awareness Month - Day 20 - Securing Mobile Devices
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - Remote Access Tools
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - Remote User VPN Tunnels - to Split or not to Split?
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - VPN Architectures – SSL or IPSec?
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - Remote User VPN Access – Are things getting too easy, or too hard?
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - VPN and Remote Access Tools
2010-10-18/a>Manuel Humberto Santander PelaezCyber Security Awareness Month - Day 18 - What you should tell your boss when there's a crisis
2010-10-17/a>Stephen HallCyber Security Awareness Month - Day 17 - What a boss should and should not have access to
2010-10-15/a>Marcus SachsCyber Security Awareness Month - Day 15 - What Teachers Need to Know About Their Students
2010-10-15/a>Guy BruneauCyber Security Awareness Month - Day 16 - Securing a donated computer
2010-10-14/a>Johannes UllrichCyber Security Awareness Month - Day 14 - Securing a public computer
2010-10-13/a>Deborah HaleCyber Security Awareness Month - Day 13 - Online Bullying
2010-10-12/a>Scott FendleyCyber Security Awareness Month - Day 12 - Protecting and Managing Your Digital Identity On Social Media Sites
2010-10-12/a>Adrien de BeaupreOctober 2010 Microsoft Black Tuesday Summary
2010-10-11/a>Rick WannerCyber Security Awareness Month - Day 11 - Safe Browsing for Teens
2010-10-11/a>Adrien de BeaupreOT: Happy Thanksgiving Day Canada
2010-10-11/a>Rick WannerNew version of Wireshark available for download - 1.4.1 - http://www.wireshark.org/download.html
2010-10-10/a>Kevin ListonCyber Security Awareness Month - Day 10 - Safe browsing for pre-teens
2010-10-09/a>Kevin ShorttCyber Security Awareness Month - Day 9 - Disposal of an Old Computer
2010-10-08/a>Rick WannerCyber Security Awareness Month - Day 8 - Patch Management and System Updates
2010-10-08/a>Rick WannerPatch Tuesday Pre-release -- 16 updates
2010-10-06/a>Rob VandenBrinkCyber Security Awareness Month - Day 7 - Remote Access and Monitoring Tools
2010-10-06/a>Marcus SachsCyber Security Awareness Month - Day 6 - Computer Monitoring Tools
2010-10-05/a>Rick WannerCyber Security Awareness Month - Day 5 - Sites you should stay away from
2010-10-04/a>Daniel WesemannCyber Security Awareness Month - Day 4 - Managing EMail
2010-10-04/a>Mark HofmanOnline Voting
2010-10-03/a>Adrien de Beaupre Cyber Security Awareness Month - Day 3 - Recognizing phishing and online scams
2010-10-03/a>Adrien de BeaupreH went down.
2010-10-03/a>Adrien de BeaupreCanada's Cyber Security Strategy released today
2010-10-02/a>Mark HofmanCyber Security Awareness Month - Day 2 - Securing the Family Network
2010-10-01/a>Marcus SachsCyber Security Awareness Month - 2010
2010-10-01/a>Marcus SachsCyber Security Awareness Month - Day 1 - Securing the Family PC
2010-09-28/a>Daniel WesemannMS10-070 OOB Patch for ASP.NET vulnerability
2010-09-27/a>Adrien de BeaupreMS OOB patch tomorrow for Security Advisory 2416728
2010-09-26/a>Daniel WesemannEgosurfing, the corporate way
2010-09-26/a>Daniel WesemannThe wireless wiretap
2010-09-26/a>Daniel WesemannPDF analysis paper
2010-09-25/a>Rick WannerGuest Diary: Andrew Hunt - Visualizing the Hosting Patterns of Modern Cybercriminals
2010-09-21/a>Johannes UllrichImplementing two Factor Authentication on the Cheap
2010-09-18/a>Rick WannerMicrosoft Security Advisory for ASP.NET
2010-09-17/a>Robert DanfordCirca 2007 Linux Kernel Vulnerability Resurfaces (Was CVE-2007-4573, Now CVE-2010-3301)
2010-09-16/a>Johannes UllrichFacebook "Like Pages"
2010-09-14/a>Adrien de BeaupreAdobe Flash v10.1.82.76 and earlier vulnerability in-the-wild
2010-09-14/a>Adrien de BeaupreSeptember 2010 Microsoft Black Tuesday Summary
2010-09-13/a>Manuel Humberto Santander Pelaez Enhanced Mitigation Experience Toolkit can block Adobe 0-day exploit
2010-09-13/a>Manuel Humberto Santander PelaezAdobe SING table parsing exploit (CVE-2010-2883) in the wild
2010-09-09/a>Marcus Sachs'Here You Have' Email
2010-09-08/a>John BambenekAdobe Acrobat/Reader 0-day in Wild, Adobe Issues Advisory
2010-09-04/a>Kevin ListonInvestigating Malicious Website Reports
2010-09-02/a>Daniel WesemannSDF, please!
2010-09-02/a>Daniel WesemannMicrosoft EMETv2 released
2010-08-30/a>Adrien de BeaupreApple QuickTime potential vulnerability/backdoor
2010-08-29/a>Swa FrantzenAbandoned free email accounts
2010-08-27/a>Mark HofmanFTP Brute Password guessing attacks
2010-08-25/a>Pedro BuenoAdobe released security update for Shockwave player that fix several CVEs: APSB1020
2010-08-23/a>Manuel Humberto Santander PelaezFirefox plugins to perform penetration testing activities
2010-08-23/a>Bojan ZdrnjaDLL hijacking vulnerabilities
2010-08-22/a>Manuel Humberto Santander PelaezSCADA: A big challenge for information security professionals
2010-08-22/a>Manuel Humberto Santander PelaezAnatomy of a PDF exploit
2010-08-16/a>Raul SilesThe Seven Deadly Sins of Security Vulnerability Reporting
2010-08-16/a>Raul SilesDDOS: State of the Art
2010-08-16/a>Raul SilesBlind Elephant: A New Web Application Fingerprinting Tool
2010-08-15/a>Manuel Humberto Santander PelaezObfuscated SQL Injection attacks
2010-08-15/a>Manuel Humberto Santander PelaezOpensolaris project cancelled, replaced by Solaris 11 express
2010-08-15/a>Manuel Humberto Santander PelaezPython to test web application security
2010-08-14/a>Tony CarothersFreedom of Information
2010-08-13/a>Guy BruneauQuickTime Security Updates
2010-08-13/a>Guy BruneauCisco IOS Software 15.1(2)T TCP DoS
2010-08-13/a>Tom ListonThe Strange Case of Doctor Jekyll and Mr. ED
2010-08-13/a>Guy BruneauShadowserver Binary Whitelisting Service
2010-08-10/a>Jim ClausingAugust 2010 Micrsoft Black Tuesday Summary
2010-08-10/a>Daniel WesemannSSH - new brute force tool?
2010-08-09/a>Jim ClausingVirtualbox update available - looks like a few stability fixes http://www.virtualbox.org/wiki/Changelog
2010-08-09/a>Jim ClausingFree/inexpensive tools for monitoring systems/networks
2010-08-08/a>Marcus SachsThinking about Cyber Security Awareness Month in October
2010-08-07/a>Stephen HallCountdown to Tuesday...
2010-08-06/a>Rob VandenBrinkFOXIT PDF Reader update to resolve iPhone/iPad Jailbreak issue ==> http://www.foxitsoftware.com/announcements/2010861227.html
2010-08-05/a>Rob VandenBrinkAccess Controls for Network Infrastructure
2010-08-05/a>Manuel Humberto Santander PelaezAdobe Acrobat Font Parsing Integer Overflow Vulnerability
2010-08-04/a>Tom ListonIncident Reporting - Liston's "How-To" Guide
2010-08-04/a>Adrien de BeaupreMultiple Cisco Advisories
2010-08-03/a>Johannes UllrichWhen Lightning Strikes
2010-08-02/a>Johannes UllrichMicrosoft Out-of-Band bulletin addresses LNK/Shortcut vulnerability
2010-08-02/a>Manuel Humberto Santander PelaezSecuring Windows Internet Kiosk
2010-08-01/a>Manuel Humberto Santander PelaezEvation because IPS fails to validate TCP checksums?
2010-07-30/a>Guy BruneauWireshark 1.2.10 released
2010-07-30/a>Guy BruneauCisco Internet Streamer: Web Server Directory Traversal Vulnerability http://www.cisco.com/warp/public/707/cisco-sa-20100721-spcdn.shtml
2010-07-30/a>Johannes UllrichMicrosoft LNK vulnerability fix coming on Monday
2010-07-29/a>Rob VandenBrinkThe 2010 Verizon Data Breach Report is Out
2010-07-29/a>Rob VandenBrinkNoScript 2.0 released
2010-07-29/a>Rob VandenBrinkSnort 2.8.6.1 and Snort 2.9 Beta Released
2010-07-29/a>Rob VandenBrinkFBI, Slovenian and Spanish Police announce more arrests of Mariposa Botnet Creator, Operators
2010-07-26/a>Guy BruneauSophosLabs Released Free Tool to Validate Microsoft Shortcut
2010-07-25/a>Rick WannerUpdated version of Mandiant's Web Historian
2010-07-25/a>Rick WannerNew Firefox Version, 3.6.8
2010-07-25/a>Rick WannerMozilla advisory for Firefox...Upgrade to 3.6.8. http://www.mozilla.org/security/announce/2010/mfsa2010-48.html
2010-07-24/a>Manuel Humberto Santander PelaezTypes of diary: One liners vs full diary
2010-07-24/a>Manuel Humberto Santander PelaezTransmiting logon information unsecured in the network
2010-07-23/a>Mark HofmanA bit old, however CISCO has updated the November 2009 TLS renegotiation vulnerability with additional vulnerable products and patch information. More details here http://www.cisco.com/warp/public/707/cisco-sa-20091109-tls.shtml
2010-07-23/a>Mark HofmanvBulletin vB 3.8.6 vulnerability
2010-07-23/a>Mark HofmanFirefox 3.6.8 is out. Yes it only seems like yesterday when you installed FF 3.6.7 (it was for me). The release notes say a stability issue has been fixed in this release.
2010-07-23/a>Mark HofmanSome of our favourite sysinternals tools have been updated. TCPview, Autoruns, ProcDump and Disk2vhd have changed. More here http://blogs.technet.com/b/sysinternals/archive/2010/07/22/updates-tcpview-v3-0-autoruns-v10-02-procdump-v1-81-disk2vhd-v1-61.aspx
2010-07-21/a>Adrien de BeaupreUpdate on .LNK vulnerability
2010-07-21/a>Adrien de BeaupreDell PowerEdge R410 replacement motherboard firmware contains malware
2010-07-21/a>Adrien de Beaupreautorun.inf and .lnk Malware (NOT 'Vulnerability in Windows Shell Could Allow Remote Code Execution' 2286198)
2010-07-20/a>Manuel Humberto Santander PelaezLNK vulnerability now with Metasploit module implementing the WebDAV method
2010-07-20/a>Manuel Humberto Santander PelaeziTunes buffer overflow vulnerability
2010-07-20/a>Manuel Humberto Santander PelaezLowering infocon back to green
2010-07-18/a>Manuel Humberto Santander PelaezSAGAN: An open-source event correlation system - Part 1: Installation
2010-07-18/a>Manuel Humberto Santander PelaezNew metasploit GUI written in Java
2010-07-14/a>Deborah HaleSecunia Half Year Report for 2010 shows interesting trends
2010-07-13/a>Jim ClausingForensic challenge results
2010-07-13/a>Jim ClausingJuly 2010 Microsoft Black Tuesday Summary
2010-07-13/a>Jim ClausingVMware Studio Security Update
2010-07-10/a>Tony CarothersSoftware Update for Cisco IE 3000 Series Switches
2010-07-08/a>Kyle HaugsnessPirate Bay account database compromised
2010-07-07/a>Kevin ShorttFacebook, Facebook, What Do YOU See?
2010-07-06/a>Rob VandenBrinkBogus Support Organizations use Live Operators to Install Malware
2010-07-05/a>Manuel Humberto Santander PelaezApple ITunes account security compromised
2010-07-04/a>Manuel Humberto Santander PelaezNew Winpcap Version
2010-07-04/a>Manuel Humberto Santander PelaezMalware inside PDF Files
2010-07-04/a>Manuel Humberto Santander PelaezInteresting analysis of the PHP SplObjectStorage Vulnerability
2010-07-02/a>Johannes UllrichOISF released version 1.0.0 of Suricata, the open source IDS/IPS engine http://www.openinfosecfoundation.org
2010-06-29/a>Johannes UllrichHow to be a better spy: Cyber security lessons from the recent russian spy arrests
2010-06-27/a>Jim ClausingFirefox 3.6.6 out - fixes issues with "crash protection"
2010-06-27/a>Manuel Humberto Santander PelaezStudy of clickjacking vulerabilities on popular sites
2010-06-24/a>Jason LamHelp your competitor - Advise them of vulnerability
2010-06-23/a>Scott FendleyMozilla Firefox Updates
2010-06-23/a>Johannes UllrichIPv6 Support in iOS 4
2010-06-21/a>Adrien de BeaupreGoDaddy Scam/Phish/Spam
2010-06-19/a>Guy BruneauDNS Sinkhole ISO Available for Download
2010-06-18/a>Adrien de BeaupreEnd of the road for Cisco CSA
2010-06-18/a>Adrien de BeaupreThunderbird 3.05 released
2010-06-18/a>Adrien de BeaupreDistributed SSH Brute Force Attempts on the rise again
2010-06-18/a>Tom ListonIMPORTANT INFORMATION: Distributed SSH Brute Force Attacks
2010-06-17/a>Deborah HaleDigital Copy Machines - Security Risk?
2010-06-17/a>Deborah HaleInternet Fraud Alert Kicks Off Today
2010-06-17/a>Deborah HaleFYI - Another bogus site
2010-06-15/a>Manuel Humberto Santander PelaezMastercard delivering cards with OTP device included
2010-06-15/a>Manuel Humberto Santander PelaezMicrosoft Windows Help and Support Center vulnerability (CVE 2010-1885) exploit in the wild
2010-06-15/a>Manuel Humberto Santander PelaezApple releases advisory for Mac OS X - Multiple vulnerabilities discovered
2010-06-15/a>Manuel Humberto Santander PelaeziPhone 4 Order Security Breach Exposes Private Information
2010-06-15/a>Manuel Humberto Santander PelaezTCP evasions for IDS/IPS
2010-06-14/a>Manuel Humberto Santander PelaezNew way of social engineering on IRC
2010-06-14/a>Manuel Humberto Santander PelaezAnother way to get protection for application-level attacks
2010-06-14/a>Manuel Humberto Santander PelaezMetasploit 101
2010-06-14/a>Manuel Humberto Santander PelaezPython on a microcontroller?
2010-06-14/a>Manuel Humberto Santander PelaezSmall lot of Olympus Stylus Tough 6010 shipped with malware
2010-06-14/a>Manuel Humberto Santander PelaezRogue facebook application acting like a worm
2010-06-10/a>Deborah HaleiPad Owners Exposed
2010-06-10/a>Deborah HaleAnother Morning of Fun
2010-06-10/a>Deborah HaleTop 5 Social Networking Media Risks
2010-06-10/a>Deborah HaleWireshark 1.2.9 Now Available
2010-06-10/a>Deborah HaleMicrosoft Help Centre Handling of Escape Sequences May Lead to Exploit
2010-06-10/a>Deborah HaleMicrosoft Security Advisory 2219475
2010-06-09/a>Deborah HaleMass Infection of IIS/ASP Sites
2010-06-09/a>Deborah HaleBest Practice to Prevent PDF Attacks
2010-06-08/a>Manuel Humberto Santander PelaezJune 2010 Microsoft Black Tuesday Summary
2010-06-08/a>Mark HofmanSafari 5.0 is available for all platforms. Addresses some security issues, more here http://support.apple.com/kb/HT4196
2010-06-07/a>Manuel Humberto Santander PelaezSoftware Restriction Policy to keep malware away
2010-06-07/a>Manuel Humberto Santander PelaezInternet Storm Center panel tonight at SANSFIRE
2010-06-06/a>Manuel Humberto Santander PelaezNice OS X exploit tutorial
2010-06-05/a>Guy BruneauOpenOffice.org 3.2.1 Fixes Bugs and Vulnerabilities
2010-06-05/a>Guy BruneauSecurity Advisory for Flash Player, Adobe Reader and Acrobat
2010-06-04/a>Johannes UllrichChanges to Internet Storm Center Host Name
2010-06-04/a>Rick WannerNew Honeynet Project Forensic Challenge
2010-06-03/a>Guy BruneauMicrosoft Patch Tuesday June 2010 Pre-Release
2010-06-02/a>Mark HofmanOpenSSL version 1.0.0a released. This fixes a number of security issues. Don't forget a number of commercial appliances will be using this, so look for vendor updates soon.
2010-06-02/a>Rob VandenBrinkSPAM pretending to be from Habitat for Humanity
2010-06-02/a>Rob VandenBrinkNew Mac malware - OSX/Onionspy
2010-06-02/a>Bojan ZdrnjaClickjacking attacks on Facebook's Like plugin
2010-06-01/a>Mark HofmanSPF how useful is it?
2010-05-30/a>Kevin ListonVMware ESX/ESXi Updates
2010-05-28/a>Jim ClausingWireshark SMB file extraction plug-in
2010-05-27/a>Kevin ListonSasfis Propagation
2010-05-26/a>Bojan ZdrnjaMalware modularization and AV detection evasion
2010-05-25/a>donald smithFace book “joke” leads to firing.
2010-05-23/a>Manuel Humberto Santander Pelaeze-mail scam announcing Fidel Castro's funeral ... and nasty malware to your computer.
2010-05-23/a>Manuel Humberto Santander PelaezOracle Java SE and Java for Business 'MixerSequencer' Remote Code Execution Vulnerability
2010-05-22/a>Rick WannerSANS 2010 Digital Forensics Summit - APT Based Forensic Challenge
2010-05-21/a>Rick WannerIBM distributes malware at AusCERT!
2010-05-21/a>Rick Wanner2010 Digital Forensics and Incident Response Summit
2010-05-21/a>Rick WannerFoxit Reader update http://www.foxitsoftware.com/pdf/reader/whatsnew331.htm
2010-05-19/a>Jason LamEFF paper about browser tracking
2010-05-19/a>Kyle HaugsnessMetasploit 3.4.0 released
2010-05-18/a>Johannes UllrichCanonical Display Driver Vulnerability
2010-05-15/a>Deborah HaleGoogle Acknowledges Grabbing Personal Data
2010-05-15/a>Deborah HaleOnboard Computers Subject to Attack?
2010-05-12/a>Rob VandenBrinkAdobe Shockwave Update
2010-05-12/a>Rob VandenBrinkLayer 2 Security - Private VLANs (the Story Continues ...)
2010-05-11/a>Scott FendleyMay 2010 Microsoft Patches
2010-05-08/a>Guy BruneauMicrosoft Patch Tuesday May 2010 Pre-Release
2010-05-08/a>Guy BruneauWireshark DOCSIS Dissector DoS Vulnerability
2010-05-07/a>Rob VandenBrinkSecurity Awareness – Many Audiences, Many Messages (Part 2)
2010-05-07/a>Johannes UllrichStock market "wipe out" may be due to computer error
2010-05-04/a>Rick WannerSIFT review in the ISSA Toolsmith
2010-05-02/a>Mari NicholsZbot Social Engineering
2010-04-30/a>Johannes UllrichSharepoint XSS Vulnerability
2010-04-30/a>Kevin ListonCVE-2010-0817 SharePoint XSS Scorecard
2010-04-30/a>Kevin ListonThe Importance of Small Files
2010-04-29/a>Bojan ZdrnjaWho needs exploits when you have social engineering?
2010-04-27/a>Rob VandenBrinkLayer 2 Security - L2TPv3 for Disaster Recovery Sites
2010-04-26/a>Raul SilesVulnerable Sites Database
2010-04-22/a>Deborah HaleHow McAfee turned a Disaster Exercise Into a REAL Learning Experience for Our Community Disaster Team
2010-04-22/a>Deborah HaleDon't Be Fooled by Twitter Spam in Your Inbox
2010-04-22/a>John BambenekData Redaction: You're Doing it Wrong
2010-04-21/a>Guy BruneauMcAfee DAT 5958 Update Issues
2010-04-21/a>Guy BruneauGoogle Chrome Security Update v4.1.249.1059 Released: http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html
2010-04-20/a>Raul SilesAre You Ready for a Transportation Collapse...?
2010-04-19/a>Daniel WesemannLinked into scams?
2010-04-18/a>Guy BruneauSome NetSol hosted sites breached
2010-04-15/a>Mark HofmanSIP Attacks on internet connected port5060 targeting Asterix servers
2010-04-14/a>Mark HofmanAnd let the patching games continue
2010-04-13/a>Adrien de BeaupreWeb App Testing Tools
2010-04-13/a>Johannes UllrichMore Legal Threat Malware E-Mail
2010-04-13/a>Johannes UllrichMicrosoft April 2010 Patch Tuesday
2010-04-11/a>Marcus SachsNetwork and process forensics toolset
2010-04-10/a>Andre LudwigNew bug/exploit for javaws
2010-04-08/a>Bojan ZdrnjaJavaScript obfuscation in PDF: Sky is the limit
2010-04-08/a>Guy BruneauMicrosoft Patch Tuesday April 2010 Pre-Release
2010-04-07/a>Rob VandenBrinkThe Many Paths to Security Awareness
2010-04-06/a>Daniel WesemannApplication Logs
2010-04-04/a>Mari NicholsFinancial Management of Cyber Risk
2010-04-02/a>Guy BruneauFirefox 3.6.3 fix for CVE-2010-1121 http://www.mozilla.org/security/announce/2010/mfsa2010-25.html
2010-04-02/a>Guy BruneauSecurity Advisory for ESX Service Console
2010-04-02/a>Guy BruneauApple QuickTime and iTunes Security Update
2010-04-02/a>Guy BruneauFoxit Reader Security Update
2010-04-02/a>Guy BruneauOracle Java SE and Java for Business Critical Patch Update Advisory
2010-04-01/a>Jim ClausingWireshark 1.2.7 released, bug fixes, doesn't look like any security issues (http://www.wireshark.org/)
2010-03-31/a>Johannes UllrichPDF Arbitrary Code Execution - vulnerable by design.
2010-03-30/a>Pedro BuenoVMWare Security Advisories Out
2010-03-30/a>Marcus SachsZigbee Analysis Tools
2010-03-30/a>Pedro BuenoSharing the Tools
2010-03-29/a>Adrien de BeaupreAPPLE-SA-2010-03-29-1 Security Update 2010-002 / Mac OS X v10.6.3
2010-03-29/a>Pedro BuenoMicrosoft to release out-of-band security bulletin tomorrow for IE6/IE7 with cumulative fix.
2010-03-29/a>Adrien de BeaupreOOB Update for Internet Explorer MS10-018
2010-03-28/a>Rick WannerHoneynet Project: 2010 Forensic Challenge #3
2010-03-27/a>Guy BruneauCreate a Summary of IP Addresses from PCAP Files using Unix Tools
2010-03-27/a>Guy BruneauHP-UX Running NFS/ONCplus, Inadvertently Enabled NFS
2010-03-26/a>Daniel WesemannGetting the EXE out of the RTF again
2010-03-26/a>Daniel WesemannSIFT2.0 SANS Investigative Forensics Toolkit released
2010-03-24/a>Johannes Ullrich".sys" Directories Delivering Driveby Downloads
2010-03-24/a>Kyle HaugsnessCisco security updates
2010-03-24/a>Kyle HaugsnessWikipedia outage
2010-03-23/a>John BambenekThe Top 10 Riskiest US Cities for Cybercrime
2010-03-22/a>Guy BruneauNew Opera 10.51 available with security fixes. More information available at: http://www.opera.com/docs/changelogs/windows/1051/
2010-03-21/a>Scott FendleySkipfish - Web Application Security Tool
2010-03-21/a>Chris CarboniResponding To The Unexpected
2010-03-20/a>Scott FendleyFirefox 3.6.2 to be released March 30
2010-03-20/a>Scott FendleyBitDefender 2010 Update Problem
2010-03-18/a>Bojan ZdrnjaDangers of copy&paste
2010-03-17/a>Deborah HaleSpam was killing us! Here is what we did to help!
2010-03-15/a>Adrien de BeaupreSpamassassin Milter Plugin Remote Root Attack
2010-03-12/a>Mark HofmanFirefox 3.6 is being pushed out to users. http://www.mozilla.com/en-US/firefox/3.6/releasenotes/
2010-03-11/a>donald smithCert write up on Skype IMBot Logic and Functionality.
2010-03-11/a>donald smithNew version of foxit pdf reader available. http://www.foxitsoftware.com/downloads/index.php
2010-03-11/a>Mark HofmanA new version of Safari is out. Looks like for Mac and Windows. Plenty of security fixes (mostly for Windows Safari users http://support.apple.com/kb/HT4070 )
2010-03-10/a>Rob VandenBrinkWhat's My Firewall Telling Me? (Part 4)
2010-03-10/a>Rob VandenBrinkMicrosoft Security Advisory 981374 - Remote Code Execution Vulnerability for IE6 and IE7
2010-03-10/a>Rob VandenBrinkMicrosoft re-release of KB973811 - attacks on Extended Protection for Authentication
2010-03-09/a>John BambenekMarch 2010 - Microsoft Patch Tuesday Diary
2010-03-08/a>Raul SilesSamurai WTF 0.8
2010-03-08/a>Raul SilesMicrosoft announced two important bulletins (fixing multiple vulns. affecting Windows and Office) for tomorrow: http://www.microsoft.com/technet/security/Bulletin/MS10-mar.mspx
2010-03-07/a>Mari NicholsDHS issues Cybersecurity challenge
2010-03-06/a>Tony CarothersIntegration and the Security of New Technologies
2010-03-05/a>Kyle HaugsnessJavascript obfuscators used in the wild
2010-03-05/a>Kyle HaugsnessWhat is your firewall log telling you - responses
2010-03-05/a>Kyle HaugsnessFalse scare email proclaiming North Korea nuclear launch against Japan
2010-03-03/a>Mark HofmanMS10-015 re-released
2010-03-03/a>Daniel WesemannWhat is your firewall log telling you - Part #2
2010-03-01/a>Mark HofmanMicrosoft will drop support for Vista (without any Service Packs) on April 13 and support for XP SP2 ends July 13. (i.e. no more security updates). If you are still running these, it it time to update.
2010-03-01/a>Mark HofmanIE 0-day using .hlp files
2010-02-28/a>Mari NicholsDisasters take practice
2010-02-26/a>Rick WannerNIST Guidelines for Secure Deployment of IPv6 - http://csrc.nist.gov/publications/drafts/800-119/draft-sp800-119_feb2010.pdf
2010-02-26/a>Rick WannerNew version of FireBug Firefox plug-in - http://getfirebug.com/
2010-02-25/a>Andre LudwigMicrosoft, restraining orders, and how a big botnet (waledec) ate curb.
2010-02-23/a>Mark HofmanWhat is your firewall telling you and what is TCP249?
2010-02-22/a>Rob VandenBrinkMultiple Security Updates for OpenOffice ==> http://www.openoffice.org/security/bulletin.html
2010-02-22/a>Rob VandenBrinkNew Risks in Penetration Testing
2010-02-22/a>Rob VandenBrinkNot Every Cloud has a Silver Lining
2010-02-21/a>Patrick Nolan Looking for "more useful" malware information? Help develop the format.
2010-02-20/a>Mari NicholsIs "Green IT" Defeating Security?
2010-02-19/a>Mark HofmanMS10-015 may cause Windows XP to blue screen (but only if you have malware on it)
2010-02-17/a>Rob VandenBrinkMultiple Security Updates for ESX 3.x and ESXi 3.x
2010-02-17/a>Rob VandenBrinkCisco ASA5500 Security Updates - cisco-sa-20100217-asa
2010-02-17/a>Rob VandenBrinkCisco Security Agent Security Updates: cisco-sa-20100217-csa
2010-02-17/a>Rob VandenBrinkDefining Clouds - " A Cloud by any Other Name Would be a Lot Less Confusing"
2010-02-16/a>Jim ClausingTeredo request for packets
2010-02-16/a>Johannes UllrichTeredo "stray packet" analysis
2010-02-15/a>Johannes UllrichNew ISC Tool: Whitelist Hash Database
2010-02-15/a>Johannes UllrichVarious Olympics Related Dangerous Google Searches
2010-02-13/a>Lorna HutchesonNetwork Traffic Analysis in Reverse
2010-02-12/a>G. N. WhiteTime to update those IP Bogon Filters (again)
2010-02-11/a>Johannes UllrichMS10-015 may cause Windows XP to blue screen
2010-02-11/a>Deborah HaleThe Mysterious Blue Screen
2010-02-11/a>Deborah HaleCritical Update for AD RMS
2010-02-10/a>Marcus SachsVulnerability in TLS/SSL Could Allow Spoofing
2010-02-10/a>Johannes UllrichTwitpic, EXIF and GPS: I Know Where You Did it Last Summer
2010-02-09/a>Adrien de BeaupreWhen is a 0day not a 0day? Samba symlink bad default config
2010-02-09/a>Johannes UllrichFebruary 2010 Black Tuesday Overview
2010-02-08/a>Adrien de BeaupreWhen is a 0day not a 0day? Fake OpenSSh exploit, again.
2010-02-07/a>Rick WannerMandiant Mtrends Report
2010-02-06/a>Guy BruneauOracle WebLogic Server Security Alert
2010-02-06/a>Guy BruneauLANDesk Management Gateway Vulnerability
2010-02-05/a>Jim ClausingWordPress iframe injection?
2010-02-04/a>Johannes UllrichMicrosoft Patch Tuesday Pre-Release
2010-02-03/a>Rob VandenBrinkAPPLE-SA-2010-02-02-1 iPhone OS 3.1.3 and iPhone OS 3.1.3 for iPod touch
2010-02-03/a>Johannes UllrichInformation Disclosure Vulnerability in Internet Explorer
2010-02-02/a>Guy BruneauAdobe ColdFusion Information Disclosure
2010-02-02/a>Johannes UllrichNew IPv6 Screencast Videos: http://isc.sans.org/ipv6videos (Today: blocking and detecting IPv6 in Linux)
2010-02-02/a>Johannes UllrichTwitter Mass Password Reset due to Phishing
2010-02-02/a>Guy BruneauCisco Secure Desktop Remote XSS Vulnerability
2010-02-01/a>Rob VandenBrinkNMAP 5.21 - Is UDP Protocol Specific Scanning Important? Why Should I Care?
2010-01-29/a>Johannes UllrichAnalyzing isc.sans.org weblogs, part 2, RFI attacks
2010-01-29/a>Adrien de BeaupreNeo-legacy applications
2010-01-27/a>Raul SilesEuropean Union Security Challenge (Campus Party 2010)
2010-01-27/a>Raul SilesCommand Line Kung Fu
2010-01-26/a>Jason Lame107 CMS system website compromised
2010-01-26/a>Rob VandenBrinkVMware vSphere Hardening Guide Draft posted for public review
2010-01-25/a>William Salusky"Bots and Spiders and Crawlers, be gone!" - or - "New Open Source WebAppSec tools, Huzzah!"
2010-01-24/a>Pedro BuenoOutdated client applications
2010-01-23/a>Lorna HutchesonThe necessary evils: Policies, Processes and Procedures
2010-01-22/a>Mari NicholsPass-down for a Successful Incident Response
2010-01-21/a>Johannes UllrichNew Microsoft Advisory: Vulnerability in Windows Kernel Privilege Escalation (CVE-2010-0232)
2010-01-21/a>Chris Carboni* Microsoft Out Of Band Patch Release
2010-01-21/a>Johannes UllrichMicrosoft January Out of Band Patch
2010-01-21/a>Chris CarboniFirefox Upgrade Available
2010-01-20/a>Johannes UllrichWeathering the Storm Part 1: An analysis of our SANS ISC weblogs http://appsecstreetfighter.com
2010-01-19/a>Jim ClausingForensic challenges
2010-01-19/a>Jim ClausingThe IE saga continues, out-of-cycle patch coming soon
2010-01-19/a>Jim Clausing49Gbps DDoS, IPv4 exhaustion, and DNSSEC, oh my!
2010-01-19/a>Johannes UllrichUnpatched Microsoft Windows (all versions) Privilege Escalation Vulnerability Released
2010-01-18/a>Stephen HallUplift in SSH brute forcing attacks
2010-01-17/a>Rick WannerBuffer overflow in Quicktime
2010-01-17/a>Mark HofmanWhy not Yellow?
2010-01-14/a>Bojan ZdrnjaPDF Babushka
2010-01-14/a>Bojan ZdrnjaRogue AV exploiting Haiti earthquake
2010-01-14/a>Bojan ZdrnjaDRG (Dragon Research Group) Distro available for general release
2010-01-14/a>Bojan Zdrnja0-day vulnerability in Internet Explorer 6, 7 and 8
2010-01-13/a>Johannes UllrichSMS Donations Advertised via Twitter
2010-01-12/a>Adrien de BeauprePoC for CVE-2009-0689 MacOS X 10.5/10.6 vulnerability
2010-01-12/a>Johannes UllrichMicrosoft Patch Tuesday - Preannouncement
2010-01-12/a>Johannes UllrichIPv6 and isc.sans.org
2010-01-12/a>Johannes UllrichBaidu defaced - Domain Registrar Tampering
2010-01-12/a>Johannes UllrichMicrosoft Security Bulletin: January 2010
2010-01-12/a>Johannes UllrichMicrosoft Advices XP Users to Uninstall Flash Player 6
2010-01-12/a>Johannes UllrichHaiti Earthquake: Possible scams / malware
2010-01-11/a>Johannes UllrichFake Android Application
2010-01-10/a>Guy BruneauEasy DNS BIND Sinkhole Setup
2010-01-09/a>G. N. WhiteWhat's Up With All The Port Scanning Using TCP/6000 As A Source Port?
2010-01-08/a>Rob VandenBrinkMicrosoft OfficeOnline, Searching for Trust and Malware
2010-01-07/a>Daniel WesemannStatic analysis of malicious PDFs
2010-01-07/a>Daniel WesemannStatic analysis of malicous PDFs (Part #2)
2010-01-06/a>Guy BruneauFirefox security and stability update for version 3.5.7 and 3.0.17 available for download
2010-01-06/a>Johannes UllrichDenial of Service Attack Aftermath (and what did Iran have to do with it?)
2010-01-06/a>Johannes UllrichNew Tool: IPv6 conversions http://isc.sans.org/tools/ipv6.html
2010-01-06/a>Guy BruneauSecure USB Flaw Exposed
2009-12-30/a>Guy BruneauReady to use IDS Sensor with Sguil
2009-12-29/a>Rick WannerMicrosoft responds to possible IIS 6 0-day
2009-12-28/a>Johannes Ullrich8 Basic Rules to Implement Secure File Uploads http://jbu.me/48 (inspired by IIS ; bug)
2009-12-27/a>Patrick NolanPressure increasing for Microsoft to patch IIS 0 day
2009-12-24/a>Guy BruneauMicrosoft IIS File Parsing Extension Vulnerability
2009-12-23/a>Johannes UllrichTell us about your Christmas Family Emergency Kit
2009-12-21/a>Marcus SachsiPhone Botnet Analysis
2009-12-19/a>Deborah HaleFrustrations of ISP Abuse Handling
2009-12-19/a>Deborah HaleEducationing Our Communities
2009-12-18/a>Stephen HallTwitter outage via DNS hijacking
2009-12-18/a>Stephen HallWireshark 1.2.5 released - including three security fixes
2009-12-17/a>Daniel Wesemannoverlay.xul is back
2009-12-16/a>Mark HofmanFirefox 3.5.6 is available, time to update.
2009-12-16/a>Rob VandenBrinkBeware the Attack of the Christmas Greeting Cards !
2009-12-15/a>Johannes UllrichImportant BIND name server updates - DNSSEC
2009-12-14/a>Adrien de BeaupreAnti-forensics, COFEE vs. DECAF
2009-12-09/a>Swa FrantzenFacebook announces privacy improvements
2009-12-08/a>Deborah HaleDecember 2009 Black Tuesday Overview
2009-12-07/a>Rob VandenBrinkLayer 2 Network Protections – reloaded!
2009-12-05/a>Guy BruneauJava JRE Buffer and Integer Overflow
2009-12-04/a>Daniel WesemannThe economics of security advice (MSFT research paper)
2009-12-03/a>Mark HofmanAvast false positives
2009-12-02/a>Rob VandenBrinkSPAM and Malware taking advantage of H1N1 concerns
2009-12-02/a>Rob VandenBrinkMicrosoft Black Screen of Death - Fact of Fiction?
2009-11-29/a>Patrick Nolan A Cloudy Weekend
2009-11-25/a>Jim ClausingTool updates
2009-11-25/a>Jim ClausingMicrosoft Updates requiring reboot
2009-11-25/a>Jim ClausingUpdates to my GREM Gold scripts and a new script
2009-11-24/a>Rick WannerMicrosoft Security Advisory 977981 - IE 6 and IE 7
2009-11-24/a>John BambenekBIND Security Advisory (DNSSEC only)
2009-11-22/a>Marcus SachsIE6 and IE7 0-Day Reported
2009-11-18/a>Rob VandenBrinkUsing a Cisco Router as a “Remote Collector” for tcpdump or Wireshark
2009-11-17/a>Guy BruneauMetasploit Framework 3.3 Released
2009-11-16/a>G. N. WhiteReports of a successful exploit of the SSL Renegotiation Vulnerability?
2009-11-14/a>Adrien de BeaupreMicrosoft advisory for Windows 7 / Windows Server 2008 R2 Remote SMB DoS Exploit released
2009-11-13/a>Deborah HaleIt's Never Too Early To Start Teaching Them
2009-11-13/a>Adrien de BeaupreTLS & SSLv3 renegotiation vulnerability explained
2009-11-13/a>Adrien de BeaupreFlash Origin Policy Attack
2009-11-13/a>Adrien de BeaupreConficker patch via email?
2009-11-13/a>Deborah HalePushdo/Cutwail Spambot - A Little Known BIG Problem
2009-11-12/a>Rob VandenBrinkWindows 7 / Windows Server 2008 Remote SMB Exploit
2009-11-11/a>Rob VandenBrinkLayer 2 Network Protections against Man in the Middle Attacks
2009-11-11/a>Rob VandenBrinkApple Safari 4.0.4 Released
2009-11-10/a>Swa FrantzenMicrosoft November Black Tuesday Overview
2009-11-09/a>Chris Carboni80's Flashback on Jailbroken iPhones
2009-11-09/a>Guy BruneauApple Security Update 2009-006 for Mac OS X v10.6.2
2009-11-08/a>Bojan ZdrnjaiPhone worm in the wild
2009-11-07/a>Marcus SachsMore Thoughts on Legacy Systems
2009-11-06/a>Mark HofmanA new version of Firefox (3.5.5) just became available. According to the release notes they are stability improvements.
2009-11-05/a>Swa FrantzenInsider threat: The snapnames case
2009-11-05/a>Swa FrantzenTLS Man-in-the-middle on renegotiation vulnerability made public
2009-11-05/a>Swa FrantzenRIM fixes random code execution vulnerability
2009-11-03/a>Andre LudwigSURBL now posting abuse statistics for TLD's
2009-11-03/a>Bojan ZdrnjaOpachki, from (and to) Russia with love
2009-11-02/a>Rob VandenBrinkMicrosoft releases v1.02 of Enhanced Mitigation Evaluation Toolkit (EMET)
2009-11-02/a>Daniel WesemannIDN ccTLDs
2009-10-31/a>Rick WannerCyber Security Awareness Month - Day 31, ident
2009-10-30/a>Rob VandenBrinkICANN Strategic Planning (2010-2013) Consultation
2009-10-30/a>Rob VandenBrinkNew version of NIST 800-41, Firewalls and Firewall Policy Guidelines
2009-10-29/a>Kyle HaugsnessCyber Security Awareness Month - Day 29 - dns port 53
2009-10-28/a>Johannes UllrichSniffing SSL: RFC 4366 and TLS Extensions
2009-10-28/a>Johannes UllrichCyber Security Awareness Month - Day 28 - ntp (123/udp)
2009-10-28/a>Johannes UllrichFirefox 3.5.4 released. Lots of security bug fixes. (thanks Gilbert!)
2009-10-27/a>Rob VandenBrinkNew VMware Desktop Products Released (Workstation, Fusion, ACE)
2009-10-26/a>Johannes UllrichWeb honeypot Update
2009-10-26/a>Johannes UllrichToday: ISC Login bugfix day. If you have issues logging in using OpenID, please email a copy of your OpenID URL to jullrich\at\sans.edu
2009-10-25/a>Lorna HutchesonCyber Security Awareness Month - Day 25 - Port 80 and 443
2009-10-24/a>Marcus SachsWindows 7 - How is it doing?
2009-10-22/a>Adrien de BeaupreCyber Security Awareness Month - Day 22 port 502 TCP - Modbus
2009-10-22/a>Adrien de BeaupreSysinternals updates: Disk2vhd v1.1, ZoomIt v4.1, Coreinfo v2.0, VMMap v2.4
2009-10-21/a>Pedro BuenoCyber Security Awareness Month - Day 21 - Port 135
2009-10-21/a>Pedro BuenoWordPress Hardening
2009-10-20/a>Raul SilesCyber Security Awareness Month - Day 20 - Ports 5060 & 5061 - SIP (VoIP)
2009-10-20/a>Raul SilesWASC 2008 Statistics
2009-10-19/a>Daniel WesemannCyber Security Awareness Month - Day 19 - ICMP
2009-10-19/a>Daniel WesemannScam Email
2009-10-18/a>Mari NicholsComputer Security Awareness Month - Day 18 - Telnet an oldie but a goodie
2009-10-17/a>Rick WannerMozilla disables Microsoft plug-ins?
2009-10-16/a>Adrien de BeaupreCyber Security Awareness Month - Day 16 - Port 1521 - Oracle TNS Listener
2009-10-16/a>Adrien de BeaupreMultiple Vulnerabilities in Cisco Wireless LAN Controllers
2009-10-16/a>Adrien de BeaupreDisable MS09-054 patch, or Firefox Plugin?
2009-10-15/a>Deborah HaleYet another round of Viral Spam
2009-10-15/a>Deborah HaleCyber Security Awareness Month - Day 15 - Ports 995, 465, and 993 - Secure Email
2009-10-14/a>Johannes UllrichOdd Apache/MSIE issue with downloads from ISC
2009-10-13/a>Johannes UllrichMicrosoft October 2009 Black Tuesday Overview
2009-10-13/a>Daniel WesemannAdobe Reader and Acrobat - Black Tuesday continues
2009-10-11/a>Mark HofmanCyber Security Awareness Month - Day 12 Ports 161/162 Simple Network Management Protocol (SNMP)
2009-10-09/a>Rob VandenBrinkCyber Security Awareness Month - Day 9 - Port 3389/tcp (RDP)
2009-10-09/a>Rob VandenBrinkTHAWTE to discontinue free Email Certificate Services and Web of Trust Service
2009-10-09/a>Rob VandenBrinkAT&T Cell Phone Phish
2009-10-08/a>Johannes UllrichFirefox Plugin Collections
2009-10-08/a>Johannes UllrichCyber Security Awareness Month - Day 8 - Port 25 - SMTP
2009-10-08/a>Johannes UllrichNew Adobe Vulnerability Exploited in Targeted Attacks
2009-10-06/a>Adrien de BeaupreCyber Security Awareness Month - Day 6 ports 67&68 udp - bootp and dhcp
2009-10-05/a>Adrien de BeaupreCyber Security Awareness Month - Day 5 port 31337
2009-10-05/a>Adrien de BeaupreTime to change your hotmail/gmail/yahoo password
2009-10-04/a>Guy BruneauSamba Security Information Disclosure and DoS
2009-10-02/a>Stephen HallCyber Security Awareness Month - Day 2 - Port 0
2009-10-02/a>Stephen HallNew SysInternal fun for the weekend
2009-10-02/a>Stephen HallVMware Fusion updates to fixes a couple of bugs
2009-10-02/a>Stephen HallVerizon New York area issues
2009-09-27/a>Stephen HallUse Emerging Threats signatures? READ THIS!
2009-09-26/a>Kyle HaugsnessConficker detection hints
2009-09-25/a>Lenny ZeltserCategories of Common Malware Traits
2009-09-25/a>Deborah HaleConficker Continues to Impact Networks
2009-09-23/a>Marcus SachsAddendum to SRI's Conficker C Analysis Published
2009-09-20/a>Mari NicholsInsider Threat and Security Awareness
2009-09-19/a>Rick WannerSysinternals Tools Updates
2009-09-17/a>Bojan ZdrnjaWhy is Rogue/Fake AV so successful?
2009-09-16/a>Raul SilesWireshark 1.2.2 (and 1.0.9) is out!
2009-09-16/a>Raul SilesReview the security controls of your Web Applications... all them!
2009-09-16/a>Raul SilesIETF Draft for Remediation of Bots in ISP Networks
2009-09-16/a>Bojan ZdrnjaSMB2 remote exploit released
2009-09-15/a>Johannes UllrichSANS releases new Cyber Security Risk Report
2009-09-12/a>Jim ClausingApple Updates
2009-09-10/a>Johannes UllrichHealthcare Spam
2009-09-10/a>Guy BruneauFirefox 3.5.3 and 3.0.14 has been released
2009-09-08/a>Adrien de BeaupreMicrosoft Security Advisory 975191 Revised
2009-09-08/a>Guy BruneauCisco Security Advisory TCP DoS
2009-09-08/a>Guy BruneauVista/2008/Windows 7 SMB2 BSOD 0Day
2009-09-07/a>Jim ClausingSeclists.org is finally back
2009-09-07/a>Lorna HutchesonEncrypting Data
2009-09-07/a>Jim ClausingRequest for packets
2009-09-05/a>Mark HofmanCritical Infrastructure and dependencies
2009-09-04/a>Adrien de BeaupreVulnerabilities (plural) in MS IIS FTP Service 5.0, 5.1. 6.0, 7.0
2009-09-04/a>Adrien de BeaupreFake anti-virus
2009-09-01/a>Guy BruneauGmail Down
2009-08-31/a>Pedro BuenoMicrosoft IIS 5/6 FTP 0Day released
2009-08-29/a>Guy BruneauImmunet Protect - Cloud and Community Malware Protection
2009-08-28/a>Adrien de BeaupreWPA with TKIP done
2009-08-28/a>Adrien de Beaupreapache.org compromised
2009-08-26/a>Johannes UllrichWSUS 3.0 SP2 released
2009-08-26/a>Johannes UllrichCisco over-the-air-provisioning skyjacking exploit
2009-08-21/a>Rick WannerTime to update...New Thunderbird version!
2009-08-21/a>Rick WannerInteresting malware...affecting the Delphi Compiler?
2009-08-19/a>Daniel WesemannChecking your protection
2009-08-18/a>Bojan ZdrnjaMS09-039 exploit in the wild?
2009-08-18/a>Deborah HaleDomain tcpdump.org unavailable
2009-08-18/a>Deborah HaleWebsite compromises - what's happening?
2009-08-18/a>Deborah HaleSecurity Bulletin for ColdFusion and JRun
2009-08-18/a>Deborah HaleSysinternals Procdump Updated
2009-08-18/a>Daniel WesemannForensics: Mounting partitions from full-disk 'dd' images
2009-08-16/a>Mari NicholsSurviving a third party onsite audit
2009-08-13/a>Johannes UllrichCA eTrust update crashes systems
2009-08-13/a>Jim ClausingNew and updated cheat sheets
2009-08-13/a>Jim ClausingTools for extracting files from pcaps
2009-08-11/a>Swa FrantzenMicrosoft August 2009 Black Tuesday Overview
2009-08-11/a>Swa FrantzenSafari 4.0.3
2009-08-08/a>Kevin ListonSun OpenSSO Enterprise/Sun Access Manager XML Vulnerabilities
2009-08-08/a>Guy BruneauXML Libraries Data Parsing Vulnerabilities
2009-08-04/a>donald smithJava Security Update
2009-08-04/a>Mark HofmanFirefox Updates
2009-08-03/a>Mark HofmanSwitch hardening on your network
2009-08-01/a>Deborah HaleWebsite Warnings
2009-07-31/a>Deborah HaleDon't forget to tell your SysAdmin Thanks
2009-07-31/a>Deborah HaleGoogle Safe Browsing
2009-07-31/a>Deborah HaleThe iPhone patch is out
2009-07-30/a>Deborah HaleiPhone Hijack
2009-07-29/a>Bojan ZdrnjaIncreasing number of attacks on security sites
2009-07-29/a>Bojan ZdrnjaBIND 9 DoS attacks in the wild
2009-07-28/a>Adrien de BeaupreYYAMCCBA
2009-07-28/a>Adrien de BeaupreMS released two OOB bulletins and an advisory
2009-07-28/a>Adrien de BeaupreTwitter spam/phish
2009-07-27/a>Raul SilesFilemon and Regmon are dead, long life to Procmon!
2009-07-27/a>Raul SilesNew Hacker Challenge: Prison Break - Breaking, Entering & Decoding
2009-07-26/a>Jim ClausingNew Volatility plugins
2009-07-24/a>Rick WannerMicrosoft Out of Band Patch
2009-07-23/a>John BambenekMissouri Passes Breach Notification Law: Gap Still Exists for Banking Account Information
2009-07-22/a>Chris CarboniFirefox 3.0.12 is Available
2009-07-20/a>Stephen HallWireshark Release 1.2.1
2009-07-19/a>Marcus SachsMozilla Comments on Firefox 3.5.1 issue
2009-07-18/a>Patrick NolanChrome update contains Security fixes
2009-07-17/a>Stephen HallFirefox 3.5.1 has been released
2009-07-17/a>Bojan ZdrnjaA new fascinating Linux kernel vulnerability
2009-07-17/a>John BambenekCross-Platform, Cross-Browser DoS Vulnerability
2009-07-16/a>Guy BruneauChanges in Windows Security Center
2009-07-16/a>Bojan ZdrnjaOWC exploits used in SQL injection attacks
2009-07-15/a>Bojan ZdrnjaMake sure you update that Java
2009-07-14/a>Swa FrantzenMicrosoft July Black Tuesday Overview
2009-07-14/a>Swa FrantzenFirefox new exploit
2009-07-13/a>Adrien de BeaupreVulnerability in Microsoft Office Web Components Control Could Allow Remote Code Execution
2009-07-13/a>Adrien de Beaupre* Infocon raised to yellow for Excel Web Components ActiveX vulnerability
2009-07-13/a>Adrien de BeaupreSecurity Update available for Wyse Device Manager
2009-07-12/a>Mari NicholsCA Apologizes for False Positive
2009-07-11/a>Marcus SachsImageshack
2009-07-10/a>Guy BruneauWordPress Fixes Multiple vulnerabilities
2009-07-09/a>John BambenekLatest Updates on Ongoing DDoS on Governmental/Commercial Websites in USA and S. Korea
2009-07-09/a>Bojan ZdrnjaOpenSSH 0day FUD
2009-07-08/a>Marcus SachsMilw0rm offline
2009-07-08/a>Andre LudwigSafari 4.0.2 update published
2009-07-07/a>Marcus Sachs* INFOCON Status - staying green
2009-07-06/a>Stephen Hall0-day in Microsoft DirectShow (msvidctl.dll) used in drive-by attacks
2009-07-05/a>Bojan ZdrnjaMore on ColdFusion hacks
2009-07-03/a>Adrien de BeaupreAuthorize.net down
2009-07-03/a>Adrien de BeaupreBCP/DRP
2009-07-03/a>Adrien de BeaupreFCKEditor advisory
2009-07-03/a>Adrien de BeaupreHappy 4th of July!
2009-07-02/a>Daniel WesemannUnpatched Bloatware on new PCs
2009-07-02/a>Bojan ZdrnjaCold Fusion web sites getting compromised
2009-07-02/a>Daniel WesemannGetting the EXE out of the RTF
2009-07-02/a>Daniel WesemannTime to update updating on PCs for 3rd party apps
2009-07-01/a>Bojan ZdrnjaMobile phone trojans
2009-06-30/a>Chris CarboniObfuscated Code
2009-06-30/a>Chris CarboniDe-Obfuscation Submissions
2009-06-30/a>Chris CarboniFirefox 3.5 is available
2009-06-28/a>Guy BruneauIP Address Range Search with libpcap
2009-06-27/a>Tony CarothersNew NIAP Strategy on the Horizon
2009-06-26/a>Mark HofmanPHPMYADMIN scans
2009-06-24/a>Kyle HaugsnessExploit tools are publicly available for phpMyAdmin
2009-06-24/a>Kyle HaugsnessTCP scanning increase for 4899
2009-06-23/a>Bojan ZdrnjaSlowloris and Iranian DDoS attacks
2009-06-23/a>Bojan ZdrnjaNew Thunderbird out, patches couple of vulnerabilities
2009-06-21/a>Scott FendleyphpMyAdmin Scans
2009-06-21/a>Bojan ZdrnjaApache HTTP DoS tool mitigation
2009-06-20/a>Scott FendleySituational Awareness: Spam Crisis and China
2009-06-20/a>Mark HofmanG'day from Sansfire2009
2009-06-17/a>Guy BruneauWireshark 1.2.0 released
2009-06-16/a>Bojan ZdrnjaIranian hacktivism
2009-06-16/a>John BambenekIran Internet Blackout: Using Twitter for Operational Intelligence
2009-06-16/a>John BambenekURL Shortening Service Cligs Hacked
2009-06-15/a>Daniel WesemannDrive-by Blackouting ?
2009-06-14/a>Guy BruneauSANSFIRE 2009 Starts Tomorrow
2009-06-12/a>Adrien de BeaupreGoogle updates for Chrome
2009-06-12/a>Adrien de BeaupreGreen Dam
2009-06-11/a>Rick WannerMIR-ROR Motile Incident Response - Respond Objectively Remediate
2009-06-11/a>Rick WannerWHO Declares Flu A(H1N1) a Pandemic
2009-06-11/a>Jason LamDshield Web Honeypot going beta
2009-06-11/a>Rick WannerFirefox 3.0.11 is available
2009-06-10/a>Rick WannerSysInternals Survey
2009-06-09/a>Swa FrantzenSafari 4.0 released - contains security fixes
2009-06-09/a>Swa FrantzenMicrosoft June Black Tuesday Overview
2009-06-08/a>Chris CarboniKloxo (formerly Lxadmin) Vulnerability Exploited
2009-06-06/a>Patrick NolanARRA/HIPAA Breach Reporting Dates Approaching
2009-06-04/a>Raul SilesTargeted e-mail attacks asking to verify wire transfer details
2009-06-02/a>Deborah HaleAnother Quicktime Update
2009-06-01/a>G. N. WhiteYet another "Digital Certificate" malware campaign
2009-05-31/a>Tony CarothersL0phtcrack is Back!
2009-05-30/a>John BambenekEmbedded Devices: An Avenue for Cyberterrorism?
2009-05-29/a>Lorna HutchesonBlackberry Server Vulnerability
2009-05-29/a>Lorna HutchesonVMWare Patches Released
2009-05-28/a>Jim ClausingMore new volatility plugins
2009-05-28/a>Stephen HallMicrosoft DirectShow vulnerability
2009-05-27/a>donald smithHost file black lists
2009-05-27/a>donald smithWebDAV write-up
2009-05-26/a>Jason LamA new Web application security blog
2009-05-26/a>Jason LamVista & Win2K8 SP2 available
2009-05-25/a>Jim ClausingWireshark-1.0.8 released
2009-05-25/a>Jim ClausingMore tools for (US) Memorial Day
2009-05-24/a>Raul SilesIIS admins, help finding WebDAV remotely using nmap
2009-05-24/a>Raul SilesFacebook phising using Belgium (.be) domains
2009-05-22/a>Mark HofmanPatching and Adobe
2009-05-22/a>Mark HofmanPatching and Apple - Java issue
2009-05-21/a>Adrien de BeaupreIIS admins, help finding WebDAV
2009-05-20/a>Tom ListonWeb Toolz
2009-05-20/a>Pedro BuenoCyber Warfare and Kylin thoughts
2009-05-19/a>Rick WannerNew Version of Mandiant Highlighter
2009-05-19/a>Bojan ZdrnjaAdvanced blind SQL injection (with Oracle examples)
2009-05-18/a>Rick WannerCisco SAFE Security Reference Guide Updated
2009-05-18/a>Rick WannerJSRedir-R/Gumblar badness
2009-05-15/a>Daniel WesemannWarranty void if seal shredded?
2009-05-15/a>Daniel WesemannIIS6.0 WebDav Remote Auth Bypass
2009-05-12/a>Swa FrantzenMSFT's version of responsible disclosure
2009-05-12/a>Swa FrantzenMay Black Tuesday Overview
2009-05-11/a>Mari NicholsSysinternals Updates 3 Applications
2009-05-10/a>Mari NicholsIs your Symantec Antivirus Alerting working correctly?
2009-05-09/a>Patrick NolanUnusable, Unreadable, or Indecipherable? No Breach reporting required
2009-05-09/a>Patrick NolanShared SQL Injection Lessons Learned blog item
2009-05-06/a>Tom ListonFollow The Bouncing Malware: Gone With the WINS
2009-05-05/a>Bojan ZdrnjaEvery dot matters
2009-05-04/a>Tom ListonFacebook phishing malware
2009-05-04/a>Tom ListonAdobe Reader/Acrobat Critical Vulnerability
2009-05-02/a>Rick WannerMore Swine/Mexican/H1N1 related domains
2009-05-01/a>Adrien de BeaupreIncident Management
2009-05-01/a>Adrien de BeauprePassword != secure
2009-04-30/a>Marcus SachsMicrosoft Revises 08-069, 08-076, and 09-012
2009-04-30/a>Marcus SachsARIN Notification Concerning IPv6
2009-04-28/a>Deborah HaleUpdated List of Domains - Swineflu related
2009-04-27/a>Johannes UllrichSwine Flu (Mexican Flu) related domains
2009-04-26/a>Johannes UllrichPandemic Preparation - Swine Flu
2009-04-24/a>John BambenekData Leak Prevention: Proactive Security Requirements of Breach Notification Laws
2009-04-24/a>Pedro BuenoDid you check your conference goodies?
2009-04-21/a>Bojan ZdrnjaWeb application vulnerabilities
2009-04-20/a>Jason LamDigital Content on TV
2009-04-19/a>Mari NicholsProviding Accurate Risk Assessments
2009-04-18/a>Johannes UllrichTwitter Packet Challenge Solution
2009-04-16/a>Adrien de BeaupreIncident Response vs. Incident Handling
2009-04-16/a>Adrien de BeaupreStrange Windows Event Log entry
2009-04-16/a>Adrien de BeaupreSome conficker lessons learned
2009-04-15/a>Marcus Sachs2009 Data Breach Investigation Report
2009-04-14/a>Swa FrantzenVMware exploits - just how bad is it ?
2009-04-14/a>Swa FrantzenApril Black Tuesday Overview
2009-04-13/a>Bojan ZdrnjaTwitter worm copycats
2009-04-12/a>Patrick NolanTwitter Worm(s)
2009-04-09/a>Jim ClausingWireshark 1.0.7 released
2009-04-09/a>Jim ClausingConficker Working Group site down
2009-04-09/a>Johannes UllrichConficker update with payload
2009-04-07/a>Bojan ZdrnjaAdvanced JavaScript obfuscation (or why signature scanning is a failure)
2009-04-07/a>Johannes UllrichTax Season Scams
2009-04-07/a>Johannes UllrichSSH scanning from compromised mail servers
2009-04-06/a>Adrien de BeaupreAbuse addresses
2009-04-05/a>Marcus SachsOpen Source Conficker-C Scanner/Detector Released
2009-04-03/a>Johannes UllrichCyber Security Act of 2009
2009-04-02/a>Bojan ZdrnjaJavaScript insertion and log deletion attack tools
2009-04-02/a>Handlers A view from the CWG Trenches
2009-03-30/a>Daniel WesemannLocate Conficker infected hosts with a network scan!
2009-03-30/a>Daniel WesemannWatch your Internet routers!
2009-03-29/a>Chris CarboniApril 1st - What Will Really Happen?
2009-03-27/a>Mark HofmanThere is some SMiShing going on in the EU
2009-03-27/a>David GoldsmithFirefox 3.0.8 Released
2009-03-26/a>Mark HofmanWebhoneypot fun
2009-03-26/a>Mark HofmanSanitising media
2009-03-25/a>Mari NicholsCisco Releases IOS Bundle of Vulnerabilities
2009-03-24/a>G. N. WhiteCanSecWest Pwn2Own: Would IE8 have been exploitable had the event waited one more day?
2009-03-24/a>G. N. WhitePSYB0T: A MIPS-device (mipsel) IRC Bot
2009-03-22/a>Mari NicholsDealing with Security Challenges
2009-03-21/a>Stephen HallUpdates to ISC BIND
2009-03-20/a>Stephen HallMaking the most of your runbooks
2009-03-19/a>Mark HofmanBrace yourselves - IE8 reported to be released
2009-03-19/a>Mark HofmanBrowsers Tumble at CanSecWest
2009-03-18/a>Adrien de BeaupreAdobe Security Bulletin Adobe Reader and Acrobat
2009-03-13/a>Bojan ZdrnjaWhen web application security, Microsoft and the AV vendors all fail
2009-03-11/a>Bojan ZdrnjaMassive ARP spoofing attacks on web sites
2009-03-10/a>Swa FrantzenTinyURL and security
2009-03-10/a>Swa FrantzenBrowser plug-ins, transparent proxies and same origin policies
2009-03-10/a>Swa Frantzenconspiracy fodder: pifts.exe
2009-03-10/a>Swa FrantzenMarch black Tuesday overview
2009-03-08/a>Marcus SachsBehind the Estonia Cyber Attacks
2009-03-04/a>Deborah HaleWireshark 1.0.6 Released
2009-03-04/a>Deborah HaleFirefox Releases version 3.0.7
2009-03-02/a>Swa FrantzenObama's leaked chopper blueprints: anything we can learn?
2009-03-01/a>Jim ClausingCool combination of tools
2009-02-25/a>Andre LudwigAdobe Acrobat pdf 0-day exploit, No JavaScript needed!
2009-02-25/a>Andre LudwigPreview/Iphone/Linux pdf issues
2009-02-25/a>Swa FrantzenTargeted link diversion attempts
2009-02-24/a>G. N. WhiteGmail Access Issues Early This AM
2009-02-22/a>Mari NicholsThe Internet Safety Act of 2009
2009-02-20/a>Mark HofmanPhishing with a small twist
2009-02-17/a>Jason LamDShield Web Honeypot - Alpha Preview Release
2009-02-14/a>Deborah HaleMicrosoft Time Sync Appears to Down
2009-02-14/a>Deborah HaleDebit Card Compromise Letter
2009-02-13/a>Andre LudwigThird party information on conficker
2009-02-13/a>Kevin ListonCanada Calling
2009-02-12/a>Mark HofmanAustralian Bushfires
2009-02-11/a>Robert DanfordProFTPd SQL Authentication Vulnerability exploit activity
2009-02-10/a>Swa FrantzenFebruary Black Tuesday Overview
2009-02-10/a>Bojan ZdrnjaMore tricks from Conficker and VM detection
2009-02-09/a>Bojan ZdrnjaSome tricks from Conficker's bag
2009-02-09/a>Johannes UllrichNew ISC Feature: Micro Podcasts
2009-02-08/a>Mari NicholsAre we becoming desensitized to data breaches?
2009-02-06/a>Adrien de BeaupreTime to patch your HP printers
2009-02-06/a>Adrien de BeaupreFake stimulus payments
2009-02-05/a>Rick WannerMandiant Memoryze review, Hilighter, other Mandiant tools!
2009-02-04/a>Daniel WesemannFirefox 3.0.6
2009-02-03/a>Swa FrantzenOn the importance of patching fast
2009-02-02/a>Stephen HallHow do you audit your production code?
2009-02-01/a>Chris CarboniScanning for Trixbox vulnerabilities
2009-01-31/a>Swa FrantzenDNS DDoS - let's use a long term solution
2009-01-31/a>Swa FrantzenVMware updates
2009-01-31/a>John BambenekGoogle Search Engine's Malware Detection Broken
2009-01-31/a>Swa FrantzenWindows 7 - not so secure ?
2009-01-28/a>Robert DanfordEmbedded device security assessment
2009-01-25/a>Rick WannerTwam?? Twammers?
2009-01-21/a>Raul SilesTraffic increase for port UDP/8247
2009-01-21/a>Raul SilesVulnerabilities on Cisco and Apple products
2009-01-20/a>Adrien de BeaupreObamamania
2009-01-18/a>Maarten Van HorenbeeckTargeted social engineering
2009-01-18/a>Daniel Wesemann3322. org
2009-01-16/a>G. N. WhiteConficker.B/Downadup.B/Kido: F-Secure publishes details pertaining to their counting methodology of compromised machines
2009-01-15/a>Bojan ZdrnjaConficker's autorun and social engineering
2009-01-13/a>Johannes UllrichJanuary Black Tuesday Overview
2009-01-12/a>William SaluskyDownadup / Conficker - MS08-067 exploit and Windows domain account lockout
2009-01-12/a>William SaluskyWeb Application Firewalls (WAF) - Have you deployed WAF technology?
2009-01-11/a>Deborah HaleThe Frustration of Phishing Attacks
2009-01-08/a>Kyle HaugsnessBIND OpenSSL follow-up
2009-01-07/a>William SaluskyBIND 9.x security patch - resolves potentially new DNS poisoning vector
2009-01-07/a>Bojan ZdrnjaAn Israeli patriot program or a trojan
2009-01-04/a>Rick WannerTwitter/Facebook Phishing Attempt
2009-01-03/a>Rick WannerRAID != Backup
2009-01-02/a>Rick WannerTools on my Christmas list.
2009-01-02/a>Mark HofmanBlocking access to MD5 signed certs
2008-12-31/a>David GoldsmithThunderbird 2.0.0.19 Released
2008-12-28/a>Raul SilesLevel3 Outage?
2008-12-28/a>Raul SilesAT&T Wireless Outage
2008-12-25/a>Maarten Van HorenbeeckChristmas Ecard Malware
2008-12-23/a>Patrick NolanMS ACK's Vulnerability in SQL Server which Could Allow Remote Code Execution
2008-12-21/a>Mari Nichols Proving Security ROI in Tough Economic Times
2008-12-17/a>donald smithFirefox 3.0.5 fixes several security issues.
2008-12-17/a>donald smithOpera 9.6.3 released with security fixes
2008-12-17/a>donald smithInternet Explorer 960714 is released
2008-12-16/a>donald smithMicrosoft announces an out of band patch for IE zero day
2008-12-16/a>donald smithCisco's Annual Security report has been released.
2008-12-13/a>Jim ClausingThe continuing IE saga - workarounds
2008-12-13/a>Jim ClausingFollowup from last shift and some research to do.
2008-12-12/a>Johannes UllrichMSIE 0-day Spreading Via SQL Injection
2008-12-12/a>Kevin ListonIE7 0day expanded to include IE6 and IE8(beta)
2008-12-12/a>Swa FrantzenBrowser Security Handbook
2008-12-10/a>Bojan Zdrnja0-day exploit for Internet Explorer in the wild
2008-12-10/a>Mark HofmanMicrosoft wordpad text converter issue
2008-12-09/a>Swa FrantzenDecember Black Tuesday Overview
2008-12-04/a>Bojan ZdrnjaFinjan blocking access to isc.sans.org
2008-12-03/a>Andre LudwigNew ISC Poll! Has your organization suffered a DDoS (Distributed Denial of Service) attack in the last year?
2008-12-02/a>Deborah HaleSonicwall License Manager Failure
2008-12-01/a>Jason LamInput filtering and escaping in SQL injection mitigation
2008-11-30/a>Mari NicholsRejected Email Issues
2008-11-29/a>Pedro BuenoPossible Mumbai Scams?
2008-11-29/a>Pedro BuenoUbuntu users: Time to update!
2008-11-25/a>Andre LudwigThe beginnings of a collaborative approach to IDS
2008-11-25/a>Andre LudwigTmobile G1 handsets having DNS problems?
2008-11-20/a>Jason LamLarge quantity SQL Injection mitigation
2008-11-17/a>Marcus SachsNew Tool: NetWitness Investigator
2008-11-17/a>Jim ClausingFinding stealth injected DLLs
2008-11-17/a>Jim ClausingHow are you coming with that IPv6 migration?
2008-11-17/a>Jim ClausingCritical update to Adobe AIR
2008-11-16/a>Maarten Van HorenbeeckDetection of Trojan control channels
2008-11-14/a>Stephen HallMore updated tools
2008-11-13/a>Jim ClausingNew Firefoxen out
2008-11-12/a>John BambenekThoughts on Security Intelligence (McColo Corp alleged spam/malware host knocked offline)
2008-11-11/a>Swa FrantzenPhishing for Google adwords
2008-11-11/a>Swa FrantzenNovember Black Tuesday Overview
2008-11-10/a>Stephen HallApple breathing iLife into 10.4
2008-11-08/a>Raul SilesWPA Cracked - additional details
2008-11-06/a>Joel EslerWPA Wi-fi Cracked (but it's not as bad as you think... yet)
2008-11-06/a>Joel EslerWireless Poll
2008-11-02/a>Adrien de BeaupreDaylight saving time
2008-10-31/a>Rick WannerSprint-Cogent Peering Issue
2008-10-30/a>Kevin ListonMaking Intelligence Actionable: Part 2
2008-10-29/a>Deborah HaleDay 29 - Should I Switch Software Vendors?
2008-10-29/a>Deborah HaleEnom Phishing - Caution Enom Registrars
2008-10-23/a>Mark HofmanMicrosoft out-of-band patch - Severity Critical
2008-10-22/a>Mari NicholsF-Secure and Trend Micro Release Critical Patches
2008-10-21/a>Johannes UllrichWireshark 1.0.4 released
2008-10-20/a>Johannes UllrichFraudulent ATM Reactivation Phone Calls.
2008-10-18/a>Rick WannerUpdates to SysInternals tools!
2008-10-17/a>Patrick NolanDay 17 - Containing a DNS Hijacking
2008-10-17/a>Rick WannerDay 18 - Containing Other Incidents
2008-10-15/a>Rick WannerDay 15 - Containing the Damage From a Lost or Stolen Laptop
2008-10-14/a>Swa FrantzenOctober Black Tuesday Overview
2008-10-12/a>Mari NicholsDay 12 Containment: Gathering Evidence That Can be Used in Court
2008-10-10/a>Marcus SachsFake Microsoft Update Email
2008-10-08/a>Johannes UllrichDomaincontrol (GoDaddy) Nameservers DNS Poisoning
2008-10-07/a>Kyle HaugsnessCogent peering problems
2008-10-06/a>Jim ClausingDay 6 - Network-based Intrusion Detection Systems
2008-10-06/a>Jim ClausingNovell eDirectory advisory
2008-10-02/a>Kyle HaugsnessLow, slow, distributed SSH username brute forcing
2008-10-01/a>Rick WannerHandler Mailbag
2008-09-29/a>Daniel WesemannASPROX mutant
2008-09-29/a>Daniel WesemannPatchbag: WinZip / MPlayer / RealWin SCADA vuln
2008-09-26/a>Patrick NolanFirefox v2.0.0.17 and Thunderbird v2.0.0.17 release fixes vulnerabilities
2008-09-25/a>Jim ClausingFirefox 3.0.3 will be out probably tomorrow
2008-09-24/a>Deborah HaleFlurry of Security Advisories from CISCO
2008-09-22/a>Maarten Van HorenbeeckData exfiltration and the use of anonymity providers
2008-09-22/a>Jim ClausingLessons learned from the Palin (and other) account hijacks
2008-09-21/a>Mari NicholsYou still have time!
2008-09-20/a>Rick WannerNew (to me) nmap Features
2008-09-18/a>Bojan ZdrnjaMonitoring HTTP User-Agent fields
2008-09-16/a>donald smithDon't open that invoice.zip file its not from UPS
2008-09-15/a>donald smithFake antivirus 2009 and search engine results
2008-09-11/a>David GoldsmithCookieMonster is coming to Pown (err, Town)
2008-09-10/a>Adrien de BeaupreMailbag: OSSEC 1.6 released, NMAP 4.75 released
2008-09-10/a>Adrien de BeaupreApple updates iPod Touch + Bonjour for Windows
2008-09-09/a>Swa FrantzenSeptember 2008 Black Tuesday Overview
2008-09-09/a>Swa Frantzenwordpress upgrade
2008-09-09/a>Swa FrantzenApple updates iTunes+QuickTime
2008-09-08/a>Raul SilesVoIP Attacks: Reverse Vhising, SEO and Phone Number Authentication
2008-09-08/a>Raul SilesCitectSCADA ODBC service exploit published
2008-09-08/a>Raul SilesQuick Analysis of the 2007 Web Application Security Statistics
2008-09-07/a>Daniel WesemannStaying current, but not too current
2008-09-04/a>Chris CarboniCisco Vulnerabilities
2008-09-04/a>Chris CarboniWireshark 1.0.3 released
2008-09-03/a>Daniel WesemannStatic analysis of Shellcode - Part 2
2008-09-03/a>donald smithNew bgp hijack isn't very new.
2008-09-03/a>Daniel WesemannStatic analysis of Shellcode
2008-09-01/a>John BambenekThe Number of Machines Controlled by Botnets Has Jumped 4x in Last 3 Months
2008-08-26/a>John BambenekActive attacks using stolen SSH keys (UPDATED)
2008-08-25/a>John BambenekThoughts on the Best Western Compromise
2008-08-23/a>Mark HofmanSQL injections - an update
2008-08-17/a>Kevin ListonVolatility 1.3 Released
2008-08-15/a>Jim ClausingOMFW 2008 reflections
2008-08-15/a>Jim ClausingAnother MS update that may have escaped notice
2008-08-15/a>Jim ClausingWebEx ActiveX buffer overflow
2008-08-14/a>Johannes UllrichDNSSEC for DShield.org
2008-08-12/a>Johannes UllrichUpcoming Infocon Test and new Color
2008-08-12/a>Stephen HallAugust 2008 Black Tuesday Overview
2008-08-10/a>Stephen HallFake IE 7 update spam doing the rounds
2008-08-10/a>Stephen HallFrom lolly pops to afterglow
2008-08-09/a>Deborah HaleA Few Tips to Help You Protect Your Home Computer
2008-08-08/a>Mark HofmanMore SQL Injections - very active right now
2008-08-03/a>Deborah HaleSecuring A Network - Lessons Learned
2008-08-02/a>Maarten Van HorenbeeckA little of that human touch
2008-08-02/a>Swa FrantzenBIND: -P2 patches are released
2008-08-02/a>Maarten Van HorenbeeckIssues affecting sites using Sitemeter [resolved]
2008-08-01/a>Robert DanfordMicrosoft Malicious Software Removal Tool users double check it's running
2008-07-31/a>Swa FrantzenLinus - Linux and Security - follow-up
2008-07-30/a>David GoldsmithSerious 0-Day Flaw in Oracle -- Patch Released
2008-07-29/a>Swa FrantzenLinus - Linux and Security
2008-07-24/a>Bojan ZdrnjaWhat's brewing in Danmec's pot?
2008-07-24/a>Bojan ZdrnjaMozilla releases Thunderbrid 2.0.0.16, fixes security vulnerabilities
2008-07-24/a>Kyle HaugsnessDNS cache poisoning vulnerability details confirmed
2008-07-22/a>Mari Nichols‘Cold Boot’ Attack Utility Tools
2008-07-17/a>Mari NicholsFirefox Releases 3.0.1 and fixes 3 security vulnerabilities
2008-07-17/a>Mari NicholsAdobe Reader 9 Released
2008-07-17/a>Mari NicholsMicrosoft Updates 2 DirectX Bulletins
2008-07-16/a>Maarten Van HorenbeeckFirefox 2.0.0.16 fixes two security vulnerabilities
2008-07-15/a>Maarten Van HorenbeeckExtracting scripts and data from suspect PDF files
2008-07-15/a>Maarten Van HorenbeeckOracle (and BEA, Hyperion and TimesTen) critical patch update July 15th, 2008
2008-07-15/a>Maarten Van HorenbeeckBlackBerry PDF parsing vulnerability
2008-07-15/a>Maarten Van HorenbeeckBot controller mimicry
2008-07-14/a>Daniel WesemannObfuscated JavaScript Redux
2008-07-14/a>Daniel WesemannDR/BCM lessons from the Vancouver fire
2008-07-11/a>Jim ClausingHandling the load
2008-07-11/a>Jim ClausingAnd you thought the DNS issue was an old one...
2008-07-09/a>Johannes UllrichUnpatched Word Vulnerability
2008-07-08/a>Swa FrantzenSecurity implications in HVAC equipment
2008-07-08/a>Swa FrantzenJuly 2008 black tuesday overview
2008-07-08/a>Johannes UllrichMulitple Vendors DNS Spoofing Vulnerability
2008-07-07/a>Scott FendleyMicrosoft Snapshot Viewer Security Advisory
2008-07-07/a>Pedro BuenoBad url classification
2008-07-02/a>Jim ClausingThe scoop on the spike in UDP port 7 traffic
2008-07-02/a>Jim ClausingAnother little script I threw together
2008-07-02/a>Jim ClausingFirefox 2.0.0.15 is out
2008-06-30/a>Marcus SachsMore SQL Injection with Fast Flux hosting
2008-06-26/a>Daniel WesemannAutomatic wireless connections
2008-06-25/a>Deborah HaleReport of Coreflood.dr Infection
2008-06-24/a>Jason LamSQL Injection mitigation in ASP
2008-06-24/a>Jason LamMicrosoft SQL Injection Prevention Strategy
2008-06-23/a>donald smithPreventing SQL injection
2008-06-19/a>William StearnsFirefox vunerability
2008-06-18/a>Marcus SachsOlympics Part II
2008-06-18/a>Chris CarboniCisco Security Advisory
2008-06-17/a>Kyle HaugsnessWhy go high-tech?
2008-06-16/a>Marcus SachsFirefox 3.0 to be Released on Tuesday
2008-06-13/a>Johannes UllrichSQL Injection: More of the same
2008-06-13/a>Johannes UllrichFloods: More of the same (2)
2008-06-12/a>Bojan ZdrnjaSafari on Windows - not looking good
2008-06-11/a>John BambenekCitectSCADA Buffer Overflow Vulnerability
2008-06-10/a>Swa FrantzenUpgrade to QuickTime 7.5
2008-06-10/a>Swa FrantzenJune 2008 Black Tuesday Overview
2008-06-10/a>Swa FrantzenLinux ASN.1 BER kernel buffer overflow
2008-06-07/a>Jim ClausingFollowup to 'How do you monitor your website?'
2008-06-06/a>Kevin ListonMicrosoft Security Bulletin Advance Notification for June 2008
2008-06-02/a>Jim ClausingEmergingthreats.net and ThePlanet
2008-06-01/a>Mark HofmanFree Yahoo email account! Sign me up, Ok well maybe not.
2008-06-01/a>Mari NicholsUpdates to VMware resolve critical security issues
2008-05-30/a>Johannes UllrichISC Flyer is ready
2008-05-29/a>Joel EslerCreative Software AutoUpdate Engine ActiveX stack buffer overflow
2008-05-28/a>Johannes UllrichReminder: Proper use of DShield data
2008-05-27/a>Johannes UllrichSuggestions wanted for ISC
2008-05-27/a>Adrien de BeaupreAdobe flash player vuln
2008-05-26/a>Marcus SachsPredictable Response
2008-05-25/a>Stephen HallCisco's Response to Rootkit presentation
2008-05-23/a>Mike PoorCisco IOS Rootkit thoughts
2008-05-22/a>Chris CarboniFrom the mailbag
2008-05-20/a>Raul SilesList of malicious domains inserted through SQL injection
2008-05-19/a>Maarten Van HorenbeeckText message and telephone aid scams
2008-05-17/a>Jim ClausingDisaster donation scams continue
2008-05-17/a>Lorna HutchesonXP SP3 Issues
2008-05-16/a>Daniel WesemannINFOcon back to green
2008-05-15/a>Bojan ZdrnjaINFOCon yellow: update your Debian generated keys/certs ASAP
2008-05-13/a>Swa FrantzenMay 2008 black tuesday overview
2008-05-13/a>Swa FrantzenOpenSSH: Predictable PRNG in debian and ubuntu Linux
2008-05-13/a>Swa FrantzenMicrosoft office file block & MOICE
2008-05-09/a>Joel EslerThunderbird 2.0.0.14 is out!
2008-05-08/a>Joel EslerCOMPROMISED FILE IN VIETNAMESE LANGUAGE PACK FOR FIREFOX 2
2008-05-07/a>Jim ClausingMore on automated exploit generation
2008-05-07/a>Jim ClausingOSSEC 1.5 released
2008-05-06/a>John BambenekWindows XP Service Pack 3 Released
2008-05-06/a>Marcus SachsIndustrial Control Systems Vulnerability
2008-05-05/a>John BambenekDefenses Against Automated Patch-Based Exploit Generation
2008-05-03/a>Deborah HaleWindows Vista Update Causing Loss of Audio on Some Systems
2008-05-01/a>Adrien de BeaupreWindows XP SteadyState
2008-05-01/a>Adrien de BeaupreWindows Detours
2008-04-29/a>Bojan ZdrnjaScripts in ASF files
2008-04-29/a>Bojan ZdrnjaWindows Service Pack blocker tool
2008-04-27/a>Marcus SachsWhat's With Port 20329?
2008-04-24/a>Maarten Van HorenbeeckTargeted attacks using malicious PDF files
2008-04-24/a>donald smithHundreds of thousands of SQL injections
2008-04-22/a>donald smithMaximus root kit downloads via MySpace social engineering trick.
2008-04-18/a>John BambenekIIS Vulnerability Documented by Microsoft - Includes Workarounds
2008-04-18/a>John BambenekEV SSL Certificates - Just once, why can't one of our poorly considered quick fixes work?
2008-04-18/a>John BambenekThe Patch Window is Gone: Automated Patch-Based Exploit Generation
2008-04-17/a>Chris CarboniFirefox Update
2008-04-17/a>Chris CarboniSafari 3.1.1 Released
2008-04-16/a>William StearnsPasser, a aassive machine and service sniffer
2008-04-16/a>Bojan ZdrnjaThe 10.000 web sites infection mystery solved
2008-04-16/a>William StearnsWindows XP Service Pack 3 - unofficial schedule: Apr 21-28
2008-04-15/a>Johannes UllrichSRI Malware Threat Center
2008-04-15/a>Johannes UllrichIt's Tax Day
2008-04-14/a>John BambenekA Federal Subpoena or Just Some More Spam & Malware?
2008-04-11/a>John BambenekADSL Router / Cable Modem / Home Wireless AP Hardening in 5 Steps
2008-04-10/a>Deborah HaleSymantec Threatcon Level 2
2008-04-09/a>Joel EslerISC Podcast Episode Number 2
2008-04-08/a>Swa FrantzenApril 2008 - Black Tuesday Overview
2008-04-08/a>Swa FrantzenNotes file viewer vulnerabilities
2008-04-07/a>John BambenekHP USB Keys Shipped with Malware for your Proliant Server
2008-04-07/a>John BambenekNetwork Solutions Technical Difficulties? Enom too
2008-04-06/a>Tony CarothersHappenings in the Northeast US
2008-04-06/a>Daniel WesemannAdvanced obfuscated JavaScript analysis
2008-04-04/a>Daniel WesemannTax day scams
2008-04-03/a>Bojan ZdrnjaOpera fixes vulnerabilities and Microsoft announces April's fixes
2008-04-03/a>Bojan ZdrnjaMixed (VBScript and JavaScript) obfuscation
2008-04-03/a>Bojan ZdrnjaA bag of vulnerabilities (and fixes) in QuickTime
2008-04-02/a>Adrien de BeaupreWhen is a DMG file not a DMG file
2008-04-01/a>Joel EslerSecurity in everyday life -- A true April Fools story
2008-03-30/a>Mark HofmanMail Anyone?
2008-03-29/a>Patrick NolanTwo ITIL v3 Resources
2008-03-27/a>Pedro BuenoFreedom of Speech...or not?
2008-03-27/a>Maarten Van HorenbeeckGuarding the guardians: a story of PGP key ring theft
2008-03-26/a>Raul SilesFirefox 2.0.0.13 is out
2008-03-26/a>Swa FrantzenCisco security advisory overview
2008-03-25/a>Raul SilesMicrosoft Jet Database Engine Advisory Update (950627)
2008-03-24/a>Maarten Van HorenbeeckOverview of cyber attacks against Tibetan communities
2008-03-24/a>Raul SilesNext-generation Web browsers?
2008-03-22/a>Koon Yaw TanMicrosoft Security Advisory Released (950627)
2008-03-21/a>donald smithD-Link router based worm?
2008-03-21/a>Maarten Van HorenbeeckCyber attacks against Tibetan communities
2008-03-20/a>Joel EslerAPPLE-SA-2008-03-19 AirPort Extreme Base Station Firmware 7.3.1
2008-03-20/a>Joel EslerPotential Vulnerability in Flash CS3 Professional, Flash Professional 8 and Flash Basic 8?
2008-03-14/a>Kevin Liston2117966.net-- mass iframe injection
2008-03-14/a>Kevin ListonTemporal Search: Detecting Hidden Malware Timebombs with Virtual Machines
2008-03-13/a>Jason LamRemote File Include spoof!?
2008-03-12/a>Joel EslerDon't use G-Archiver
2008-03-12/a>Joel EslerAdobe security updates
2008-01-09/a>Bojan ZdrnjaMass exploits with SQL Injection
2007-02-24/a>Jason LamPrepared Statements and SQL injections
2007-01-03/a>Toby KohlenbergVLC Media Player udp URL handler Format String Vulnerability
2006-12-26/a>Swa FrantzenVista: better security [Y/N] ?
2006-12-18/a>Toby KohlenbergORDB Shutting down
2006-12-18/a>Toby KohlenbergSkype worm
2006-12-12/a>Swa FrantzenMicrosoft Office 2004 - Mac OS X updated
2006-12-12/a>Swa FrantzenOffline Microsoft Patching
2006-12-12/a>Swa FrantzenThe missing Microsoft patches
2006-12-12/a>Swa FrantzenMicrosoft Black Tuesday - December 2006 overview
2006-12-12/a>Jim ClausingMS06-075: csrss local privilege escalation (CVE-2006-5585)
2006-12-12/a>Lorna HutchesonMS06-072: Cumulative Security Update for Internet Explorer (925454)
2006-12-12/a>Robert DanfordMS06-078: 2 Windows Media Format Vulnerabilities (CVE-2006-4702, CVE-2006-6134)
2006-11-29/a>Toby KohlenbergNew Vulnerability Announcement and patches from Apple
2006-11-20/a>Joel EslerMS06-070 Remote Exploit
2006-11-14/a>Jim ClausingMS06-069: Adobe Flash Player
2006-11-14/a>Jim ClausingMS06-071: MSXML Core Services
2006-11-10/a>Tony CarothersA busy Black Tuesday coming up.....
2006-10-30/a>William SaluskyToD - Configuration Management - maintaining security awareness
2006-10-09/a>Swa FrantzenMicrosoft black tuesday - October 2006 STATUS
2006-10-05/a>Swa FrantzenMS06-053 revisited ?
2006-10-05/a>John BambenekThere are no more Passive Exploits
2006-10-02/a>Jim ClausingBack to green, but the exploits are still running wild
2006-10-02/a>Jim ClausingReader's tip of the day: ratios vs. raw counts
2006-09-30/a>Robert Danford*WebViewFolderIcon ActiveX control exploit(s) in the wild
2006-09-30/a>Swa FrantzenYellow: WebViewFolderIcon setslice exploit spreading
2006-09-29/a>Kevin ListonA Report from the Field
2006-09-28/a>Swa FrantzenPowerpoint, yet another new vulnerability
2006-09-28/a>Swa FrantzenMSIE: One patched, one pops up again (setslice)
2006-09-28/a>Tom ListonSetslice Killbit Apps
2006-09-26/a>Jim ClausingMS06-049 re-release
2006-09-22/a>Swa FrantzenYellow: MSIE VML exploit spreading
2006-09-21/a>Johannes UllrichApple updates Airport Drivers
2006-09-19/a>Swa FrantzenYet another MSIE 0-day: VML
2006-09-18/a>Jim ClausingLog analysis follow up
2006-09-15/a>Swa FrantzenMSIE DirectAnimation ActiveX 0-day update
2006-09-13/a>Swa FrantzenPHP - shared hosters, take note.
2006-09-12/a>Swa FrantzenApple Quicktime 7.1.3 released
2006-09-12/a>Michael HaisleyMicrosoft Security Bulletin MS06-054
2006-09-12/a>Swa FrantzenMicrosoft security patches for September 2006
2006-09-12/a>Michael HaisleyMicrosoft Security Bulletin MS06-052
2006-09-10/a>Lenny ZeltserEarly Discussions of Computer Security in the Media
2006-09-09/a>Jim ClausingLog Analysis tips?
2006-09-09/a>Jim ClausingA few preliminary log analysis thoughts
2006-09-06/a>Johannes UllrichUpdated Packet Attack flash animation
2006-08-31/a>Swa FrantzenMailbag grab
2006-08-17/a>Swa FrantzenMicrosoft August 2006 Patches: STATUS
2000-01-02/a>Deborah Hale2010 A Look Back - 2011 A Look Ahead

LEARNED

2020-02-08/a>Russell EubanksAfter Action Review
2017-05-06/a>Russell EubanksWhat Can You Learn On Your Own?
2016-08-20/a>Russell EubanksWhat are YOU doing to give back to the security community?
2016-05-28/a>Russell EubanksApplied Lessons Learned
2015-07-18/a>Russell EubanksThe Value a "Fresh Set Of Eyes" (FSOE)
2015-02-22/a>Russell EubanksLeave Things Better Than When You Found Them
2011-11-10/a>Rob VandenBrinkStuff I Learned Scripting - - Parsing XML in a One-Liner
2009-04-16/a>Adrien de BeaupreSome conficker lessons learned
2008-11-02/a>Mari NicholsDay 33 - Working with Management to Improve Processes

SCRIPTING

2013-07-01/a>Manuel Humberto Santander PelaezUsing nmap scripts to enhance vulnerability asessment results
2013-02-11/a>John BambenekIs This Chinese Registrar Really Trying to XSS Me?
2013-02-04/a>Russ McReeAn expose of a recent SANS GIAC XSS vulnerability
2013-01-25/a>Johannes UllrichVulnerability Scans via Search Engines (Request for Logs)
2012-01-12/a>Rob VandenBrinkStuff I Learned Scripting - Fun with STDERR
2011-11-10/a>Rob VandenBrinkStuff I Learned Scripting - - Parsing XML in a One-Liner
2011-08-24/a>Rob VandenBrinkCitrix Access Gateway Cross Site Scripting vulnerability and fix ==> http://support.citrix.com/article/CTX129971