Date Author Title
2024-08-23Jesse La GrewPandas Errors: What encoding are my logs in?
2024-08-16Jesse La Grew[Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools
2023-08-25Xavier MertensPython Malware Using Postgresql for C2 Communications
2023-07-23Guy BruneauInstall & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-05-24Jesse La GrewMore Data Enrichment for Cowrie Logs
2023-05-09Russ McReeExploratory Data Analysis with CISSM Cyber Attacks Database - Part 2
2022-06-10Russ McReeEPSScall: An Exploit Prediction Scoring System App
2021-12-28Russ McReeLotL Classifier tests for shells, exfil, and miners
2021-10-20Xavier MertensThanks to COVID-19, New Types of Documents are Lost in The Wild
2021-08-29Guy BruneauFilter JSON Data by Value with Linux jq
2021-07-04Didier StevensDIY CD/DVD Destruction - Follow Up
2021-06-27Didier StevensDIY CD/DVD Destruction
2021-02-01Rob VandenBrinkTaking a Shot at Reverse Shell Attacks, CNC Phone Home and Data Exfil from Servers
2021-01-29Xavier MertensSensitive Data Shared with Cloud Services
2020-07-04Russ McReeHappy FouRth of July from the Internet Storm Center
2020-03-14Didier StevensPhishing PDF With Incremental Updates.
2020-02-28Xavier MertensShow me Your Clipboard Data!
2019-05-19Guy BruneauIs Metadata Only Approach, Good Enough for Network Traffic Analysis?
2018-07-04Didier StevensXPS Metadata
2018-06-16Russ McReeAnomaly Detection & Threat Hunting with Anomalize
2017-12-16Xavier MertensMicrosoft Office VBA Macro Obfuscation via Metadata
2017-08-07Xavier MertensIncrease of phpMyAdmin scans
2017-05-28Guy BruneauCyberChef a Must Have Tool in your Tool bag!
2017-02-01Xavier MertensQuick Analysis of Data Left Available by Attackers
2017-01-06John BambenekGreat Misadventures of Security Vendors: Absurd Sandboxing Edition
2016-09-22Rick WannerYAHDD! (Yet another HUGE data Breach!)
2016-08-31Deborah HaleDropbox Breach
2016-08-19Xavier MertensData Classification For the Masses
2016-07-03Guy BruneauIs Data Privacy part of your Company's Culture?
2016-06-20Xavier MertensUsing Your Password Manager to Monitor Data Leaks
2016-02-22Xavier MertensReducing False Positives with Open Data Sources
2016-01-30Xavier MertensAll CVE Details at Your Fingertips
2015-09-01Daniel WesemannEncryption of "data at rest" in servers
2015-07-31Russ McReeTech tip follow-up: Using the data Invoked with R's system command
2015-07-31Russ McReeTech tip: Invoke a system command in R
2015-05-23Guy BruneauBusiness Value in "Big Data"
2015-03-21Russell EubanksHave you seen my personal information? It has been lost. Again.
2014-12-01Guy BruneauDo you have a Data Breach Response Plan?
2014-02-04Johannes UllrichOdd ICMP Echo Request Payload
2013-10-16Adrien de BeaupreAccess denied and blockliss
2013-07-06Guy BruneauIs Metadata the Magic in Modern Network Security?
2012-12-03John BambenekJohn McAfee Exposes His Location in Photo About His Being on Run
2012-11-30Daniel WesemannSnipping Leaks
2012-11-22Kevin ListonGreek National Arrested on Suspicion of Theft of 9M Records on Fellow Greeks
2012-01-16Kevin ShorttZappos Breached
2011-04-20Daniel WesemannData Breach Investigations Report published by Verizon
2011-01-12Richard PorterHow Many Loyalty Cards do you Carry?
2011-01-12Richard PorterYet Another Data Broker? AOL Lifestream.
2010-09-26Daniel WesemannEgosurfing, the corporate way
2010-07-29Rob VandenBrinkThe 2010 Verizon Data Breach Report is Out
2010-04-27Rob VandenBrinkLayer 2 Security - L2TPv3 for Disaster Recovery Sites
2010-04-22John BambenekData Redaction: You're Doing it Wrong
2010-02-10Marcus SachsDatacenters and Directory Traversals
2009-10-19Daniel WesemannBacked up, lately ?
2009-09-07Lorna HutchesonEncrypting Data
2009-07-28Adrien de BeaupreYYAMCCBA
2009-04-24John BambenekData Leak Prevention: Proactive Security Requirements of Breach Notification Laws
2009-04-15Marcus Sachs2009 Data Breach Investigation Report
2009-03-02Swa FrantzenObama's leaked chopper blueprints: anything we can learn?
2009-01-30Mark HofmanWe all "Love" USB drives
2008-12-17donald smithTeam CYMRU's Malware Hash Registry
2008-08-25John BambenekThoughts on the Best Western Compromise