Internet Storm Center
Sign In
Sign Up
Handler on Duty:
Didier Stevens
Threat Level:
green
Date
Author
Title
IE 8
2013-11-09
Guy Bruneau
IE Zero-Day Vulnerability Exploiting msvcrt.dll
2013-05-04
Kevin Shortt
The Zero-Day Pendulum Swings
IE
2024-11-06/a>
Jesse La Grew
[Guest Diary] Insights from August Web Traffic Surge
2024-10-31/a>
Guy Bruneau
October 2024 Activity with Username chenzilong
2024-10-17/a>
Guy Bruneau
Scanning Activity from Subnet 15.184.0.0/16
2024-10-03/a>
Guy Bruneau
Kickstart Your DShield Honeypot [Guest Diary]
2024-09-18/a>
Guy Bruneau
Time-to-Live Analysis of DShield Data with Vega-Lite
2024-09-13/a>
Jesse La Grew
Finding Honeypot Data Clusters Using DBSCAN: Part 2
2024-09-11/a>
Xavier Mertens
Python Libraries Used for Malicious Purposes
2024-09-11/a>
Guy Bruneau
Hygiene, Hygiene, Hygiene! [Guest Diary]
2024-09-06/a>
Jesse La Grew
Enrichment Data: Keeping it Fresh
2024-08-27/a>
Guy Bruneau
Vega-Lite with Kibana to Parse and Display IP Activity over Time
2024-08-16/a>
Jesse La Grew
[Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools
2024-07-10/a>
Jesse La Grew
Finding Honeypot Data Clusters Using DBSCAN: Part 1
2024-05-28/a>
Guy Bruneau
Is that It? Finding the Unknown: Correlations Between Honeypot Logs & PCAPs [Guest Diary]
2024-04-25/a>
Jesse La Grew
Does it matter if iptables isn't running on my honeypot?
2024-03-07/a>
Jesse La Grew
[Guest Diary] AWS Deployment Risks - Configuration and Credential File Targeting
2024-03-03/a>
Guy Bruneau
Capturing DShield Packets with a LAN Tap [Guest Diary]
2024-02-25/a>
Guy Bruneau
Utilizing the VirusTotal API to Query Files Uploaded to DShield Honeypot [Guest Diary]
2024-02-18/a>
Guy Bruneau
Mirai-Mirai On The Wall... [Guest Diary]
2024-02-15/a>
Jesse La Grew
[Guest Diary] Learning by doing: Iterative adventures in troubleshooting
2024-02-03/a>
Guy Bruneau
DShield Sensor Log Collection with Elasticsearch
2024-01-30/a>
Johannes Ullrich
What did I say to make you stop talking to me?
2024-01-25/a>
Xavier Mertens
Facebook AdsManager Targeted by a Python Infostealer
2024-01-17/a>
Jesse La Grew
Number Usage in Passwords
2023-12-27/a>
Guy Bruneau
Unveiling the Mirai: Insights into Recent DShield Honeypot Activity [Guest Diary]
2023-12-13/a>
Guy Bruneau
T-shooting Terraform for DShield Honeypot in Azure [Guest Diary]
2023-12-10/a>
Guy Bruneau
Honeypots: From the Skeptical Beginner to the Tactical Enthusiast
2023-11-27/a>
Guy Bruneau
Decoding the Patterns: Analyzing DShield Honeypot Activity [Guest Diary]
2023-11-20/a>
Jesse La Grew
Overflowing Web Honeypot Logs
2023-10-15/a>
Guy Bruneau
Domain Name Used as Password Captured by DShield Sensor
2023-09-26/a>
Johannes Ullrich
Apple Releases MacOS Sonoma Including Numerous Security Patches
2023-09-14/a>
Jesse La Grew
DShield and qemu Sitting in a Tree: L-O-G-G-I-N-G
2023-09-09/a>
Guy Bruneau
?Anyone get the ASN of the Truck that Hit Me?!?: Creating a PowerShell Function to Make 3rd Party API Calls for Extending Honeypot Information [Guest Diary]
2023-09-05/a>
Jesse La Grew
Common usernames submitted to honeypots
2023-09-02/a>
Jesse La Grew
What is the origin of passwords submitted to honeypots?
2023-08-31/a>
Guy Bruneau
Potential Weaponizing of Honeypot Logs [Guest Diary]
2023-08-12/a>
Guy Bruneau
DShield Sensor Monitoring with a Docker ELK Stack [Guest Diary]
2023-07-23/a>
Guy Bruneau
Install & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-07-13/a>
Jesse La Grew
DShield Honeypot Maintenance and Data Retention
2023-07-07/a>
Xavier Mertens
DSSuite (Didier's Toolbox) Docker Image Update
2023-07-06/a>
Jesse La Grew
IDS Comparisons with DShield Honeypot Data
2023-06-30/a>
Yee Ching Tok
DShield pfSense Client Update
2023-06-11/a>
Guy Bruneau
DShield Honeypot Activity for May 2023
2023-05-24/a>
Jesse La Grew
More Data Enrichment for Cowrie Logs
2023-05-14/a>
Guy Bruneau
DShield Sensor Update
2023-05-09/a>
Russ McRee
Exploratory Data Analysis with CISSM Cyber Attacks Database - Part 2
2023-04-05/a>
Jesse La Grew
Exploration of DShield Cowrie Data with jq
2023-03-07/a>
Johannes Ullrich
Hackers Love This VSCode Extension: What You Can Do to Stay Safe
2023-01-31/a>
Jesse La Grew
DShield Honeypot Setup with pfSense
2023-01-21/a>
Guy Bruneau
DShield Sensor JSON Log to Elasticsearch
2023-01-08/a>
Guy Bruneau
DShield Sensor JSON Log Analysis
2022-12-29/a>
Jesse La Grew
Opening the Door for a Knock: Creating a Custom DShield Listener
2022-12-21/a>
Guy Bruneau
DShield Sensor Setup in Azure
2022-09-23/a>
Xavier Mertens
Kids Like Cookies, Malware Too!
2022-07-06/a>
Johannes Ullrich
How Many SANs are Insane?
2022-06-10/a>
Russ McRee
EPSScall: An Exploit Prediction Scoring System App
2022-05-23/a>
Johannes Ullrich
Attacker Scanning for jQuery-File-Upload
2022-05-03/a>
Johannes Ullrich
Some Honeypot Updates
2022-03-15/a>
Xavier Mertens
Clean Binaries with Suspicious Behaviour
2022-02-14/a>
Johannes Ullrich
Reminder: Decoding TLS Client Hellos to non TLS servers
2022-01-29/a>
Guy Bruneau
SIEM In this Decade, Are They Better than the Last?
2021-12-28/a>
Russ McRee
LotL Classifier tests for shells, exfil, and miners
2021-11-01/a>
Yee Ching Tok
Revisiting BrakTooth: Two Months Later
2021-10-18/a>
Xavier Mertens
Malicious PowerShell Using Client Certificate Authentication
2021-08-31/a>
Yee Ching Tok
BrakTooth: Impacts, Implications and Next Steps
2021-06-24/a>
Xavier Mertens
Do you Like Cookies? Some are for sale!
2021-05-30/a>
Didier Stevens
Sysinternals: Procmon, Sysmon, TcpView and Process Explorer update
2021-05-20/a>
Johannes Ullrich
Are Cookie Banners a Waste of Time or a Complete Waste of Time?
2021-02-13/a>
Guy Bruneau
Using Logstash to Parse IPtables Firewall Logs
2021-01-15/a>
Guy Bruneau
Obfuscated DNS Queries
2021-01-02/a>
Guy Bruneau
Protecting Home Office and Enterprise in 2021
2020-12-04/a>
Guy Bruneau
Detecting Actors Activity with Threat Intel
2020-11-05/a>
Xavier Mertens
Did You Spot "Invoke-Expression"?
2020-08-25/a>
Xavier Mertens
Keep An Eye on LOLBins
2020-08-04/a>
Johannes Ullrich
Internet Choke Points: Concentration of Authoritative Name Servers
2020-07-04/a>
Russ McRee
Happy FouRth of July from the Internet Storm Center
2020-07-01/a>
Jim Clausing
Setting up the Dshield honeypot and tcp-honeypot.py
2020-06-20/a>
Tom Webb
Pi Zero HoneyPot
2020-06-19/a>
Remco Verhoef
Sigma rules! The generic signature format for SIEM systems.
2020-04-02/a>
Tom Webb
TPOT's Cowrie to ISC Logs
2019-12-12/a>
Xavier Mertens
Code & Data Reuse in the Malware Ecosystem
2019-11-18/a>
Johannes Ullrich
SMS and 2FA: Another Reason to Move away from It.
2019-07-20/a>
Guy Bruneau
Re-evaluating Network Security - It is Increasingly More Complex
2019-07-09/a>
John Bambenek
Solving the WHOIS and Privacy Problem: A Draft of Implementing WHOIS in DNS
2019-05-10/a>
Xavier Mertens
DSSuite - A Docker Container with Didier's Tools
2019-04-04/a>
Xavier Mertens
New Waves of Scans Detected by an Old Rule
2019-01-10/a>
Brad Duncan
Heartbreaking Emails: "Love You" Malspam
2018-10-18/a>
Russ McRee
Cisco Security Advisories 17 OCT 2018
2018-06-21/a>
Xavier Mertens
Are Your Hunting Rules Still Working?
2018-06-16/a>
Russ McRee
Anomaly Detection & Threat Hunting with Anomalize
2018-06-07/a>
Remco Verhoef
Automated twitter loot collection
2018-05-25/a>
Xavier Mertens
Antivirus Evasion? Easy as 1,2,3
2017-12-30/a>
Xavier Mertens
2017, The Flood of CVEs
2017-11-28/a>
Xavier Mertens
Apple High Sierra Uses a Passwordless Root Account
2017-06-17/a>
Guy Bruneau
Mapping Use Cases to Logs. Which Logs are the Most Important to Collect?
2017-05-28/a>
Guy Bruneau
CyberChef a Must Have Tool in your Tool bag!
2017-03-31/a>
Xavier Mertens
Pro & Con of Outsourcing your SOC
2017-02-09/a>
Brad Duncan
CryptoShield Ransomware from Rig EK
2017-02-03/a>
Lorna Hutcheson
Cisco - Issue with Clock Signal Component
2016-11-25/a>
Xavier Mertens
Free Software Quick Security Checklist
2016-05-08/a>
Jim Clausing
Guest Diary: Linux Capabilities - A friend and foe
2016-04-27/a>
Tom Webb
Kippos Cousin Cowrie
2016-03-21/a>
Xavier Mertens
IP Addresses Triage
2016-03-15/a>
Xavier Mertens
Dockerized DShield SSH Honeypot
2016-03-13/a>
Xavier Mertens
SSH Honeypots (Ab)used as Proxy
2016-01-30/a>
Xavier Mertens
All CVE Details at Your Fingertips
2015-12-24/a>
Xavier Mertens
Unity Makes Strength
2015-12-23/a>
Rob VandenBrink
Libraries and Dependencies - It Really is Turtles All The Way Down!
2015-10-17/a>
Russell Eubanks
CIS Critical Security Controls - Version 6.0
2015-09-03/a>
Xavier Mertens
Querying the DShield API from RTIR
2015-08-18/a>
Russ McRee
Microsoft Security Bulletin MS15-093 - Critical OOB - Internet Explorer RCE
2015-07-31/a>
Russ McRee
Tech tip: Invoke a system command in R
2015-07-31/a>
Russ McRee
Tech tip follow-up: Using the data Invoked with R's system command
2015-06-02/a>
Alex Stanford
Guest Diary: Xavier Mertens - Playing with IP Reputation with Dshield & OSSEC
2015-06-01/a>
Tom Webb
Submit Dshield ASA Logs
2015-05-20/a>
Brad Duncan
Logjam - vulnerabilities in Diffie-Hellman key exchange affect browsers and servers using TLS
2015-03-11/a>
Rob VandenBrink
Syslog Skeet Shooting - Targetting Real Problems in Event Logs
2015-02-26/a>
Johannes Ullrich
New Feature: Subnet Report
2015-02-19/a>
Daniel Wesemann
DNS-based DDoS
2015-02-03/a>
Johannes Ullrich
What is using this library?
2014-08-23/a>
Guy Bruneau
NSS Labs Cyber Resilience Report
2014-07-28/a>
Guy Bruneau
Management and Control of Mobile Device Security
2014-06-17/a>
Rob VandenBrink
New Security Advisories / Updates from Microsoft - Heads up for Next Patch Tuesday!
2014-05-21/a>
John Bambenek
New, Unpatched IE 0 Day published at ZDI
2014-04-11/a>
Rob VandenBrink
The Other Side of Heartbleed - Client Vulnerabilities
2014-02-24/a>
Russ McRee
Explicit Trusted Proxy in HTTP/2.0 or...not so much
2014-02-14/a>
Chris Mohan
FireEye reports IE 10 zero-day being used in watering hole attack
2014-02-14/a>
Chris Mohan
SYM14-004 Symantec Endpoint Protection Management Vulnerabilities - http://www.symantec.com/business/support/index?page=content&id=TECH214866
2014-01-17/a>
Russ McRee
Massive RFI scans likely a free web app vuln scanner rather than bots
2013-12-21/a>
Guy Bruneau
Strange DNS Queries - Request for Packets
2013-12-10/a>
Rob VandenBrink
Those Look Just Like Hashes!
2013-11-09/a>
Guy Bruneau
IE Zero-Day Vulnerability Exploiting msvcrt.dll
2013-10-16/a>
Adrien de Beaupre
Access denied and blockliss
2013-10-03/a>
Johannes Ullrich
October Patch Tuesday Preview (CVE-2013-3893 patch coming!)
2013-09-10/a>
Swa Frantzen
Adobe September 2013 Black Tuesday Overview
2013-09-10/a>
Swa Frantzen
Microsoft September 2013 Black Tuesday Overview
2013-08-13/a>
Swa Frantzen
Microsoft August 2013 Black Tuesday Overview
2013-08-02/a>
Chris Mohan
Cisco Security Advisory: OSPF LSA Manipulation Vulnerability in Multiple Cisco Products http://tools.cisco.com/security/center/viewAlert.x?alertId=30210
2013-07-23/a>
Bojan Zdrnja
Sessions with(out) cookies
2013-07-09/a>
Swa Frantzen
Microsoft July 2013 Black Tuesday Overview
2013-07-06/a>
Guy Bruneau
Is Metadata the Magic in Modern Network Security?
2013-06-11/a>
Swa Frantzen
Microsoft June 2013 Black Tuesday Overview
2013-05-20/a>
Johannes Ullrich
Ubuntu Package available to submit firewall logs to DShield
2013-05-14/a>
Swa Frantzen
Microsoft May 2013 Black Tuesday Overview
2013-05-14/a>
Swa Frantzen
Firefox & Thunderbird released
2013-05-14/a>
Swa Frantzen
Adobe May 2013 Black Tuesday Overview
2013-05-09/a>
Johannes Ullrich
Microsoft released a Fix-it for the Internet Explorer 8 Vulnerability http://support.microsoft.com/kb/2847140
2013-05-04/a>
Kevin Shortt
The Zero-Day Pendulum Swings
2013-04-16/a>
John Bambenek
Fake Boston Marathon Scams Update
2013-04-09/a>
Swa Frantzen
Microsoft April 2013 Black Tuesday Overview
2013-03-12/a>
Swa Frantzen
Microsoft March 2013 Black Tuesday Overview
2013-03-07/a>
Guy Bruneau
Apple Blocking Java Web plug-in
2013-01-15/a>
Rob VandenBrink
When Disabling IE6 (or Java, or whatever) is not an Option...
2013-01-14/a>
Richard Porter
Microsoft Out of Cycle Patch: IE http://technet.microsoft.com/en-us/security/bulletin/ms13-jan
2013-01-09/a>
Richard Porter
The 80's called - They Want Their Mainframe Back!
2012-12-03/a>
Kevin Liston
Recent SSH vulnerabilities
2012-10-30/a>
Mark Hofman
Cyber Security Awareness Month - Day 30 - DSD 35 mitigating controls
2012-10-24/a>
Rob VandenBrink
Time to run Windows Update - - Microsoft Updates KB2755801 for Windows RT / IE10 / Flash Player - http://technet.microsoft.com/en-us/security/advisory/2755801
2012-09-21/a>
Guy Bruneau
IE Cumulative Updates MS12-063 - KB2744842
2012-09-21/a>
Guy Bruneau
Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 (2755801)
2012-09-17/a>
Rob VandenBrink
IE Zero Day is "For Real"
2012-07-23/a>
Johannes Ullrich
Most Anti-Privacy Web Browsing Tool Ever?
2012-06-29/a>
Bojan Zdrnja
DShield for Splunk
2012-05-25/a>
Guy Bruneau
VMware vMA Security Advisory VMSA-2012-0010 - http://www.vmware.com/security/advisories/VMSA-2012-0010.html
2012-05-22/a>
Johannes Ullrich
nmap 6 released
2012-05-03/a>
Guy Bruneau
VMware Critical Security Issues Advisory - http://www.vmware.com/security/advisories/VMSA-2012-0009.html
2012-03-16/a>
Guy Bruneau
VMware New and Updated Security Advisories
2012-03-09/a>
Guy Bruneau
VMware New and Updated Advisories
2012-02-20/a>
Pedro Bueno
Simple Malware Research Tools
2012-02-07/a>
Jim Clausing
Book Review: Practical Packet Analysis, 2nd ed
2012-01-31/a>
Russ McRee
Firefox 10 and VMWare advisories and updates
2012-01-05/a>
Russ McRee
OpenSSL vulnerability fixes
2011-10-29/a>
Richard Porter
The Sub Critical Control? Evidence Collection
2011-10-13/a>
Kevin Shortt
Dennis M. Ritchie (1941 - 2011)
2011-08-30/a>
Scott Fendley
Cisco Security Advisory - Apache HTTPd DoS
2011-05-30/a>
Johannes Ullrich
Allied Telesis Passwords Leaked
2011-05-25/a>
Daniel Wesemann
Five new Cisco security advisories released. See http://www.cisco.com/go/psirt
2011-04-28/a>
Chris Mohan
Cisco Security Advisories
2011-04-22/a>
Manuel Humberto Santander Pelaez
In-house developed applications: The constant headache for the information security officer
2011-04-14/a>
Johannes Ullrich
dshield.org now DNSSEC signed via .org
2011-02-02/a>
Chris Mohan
Default Credentials for Root Account on Cisco Personal Video units
2011-01-05/a>
Johannes Ullrich
Currently Unpatched Windows / Internet Explorer Vulnerabilities
2010-12-25/a>
Manuel Humberto Santander Pelaez
An interesting vulnerability playground to learn application vulnerabilities
2010-12-23/a>
Mark Hofman
IE 0 Day, just in time for Christmas
2010-12-18/a>
Raul Siles
Where are the Wi-Fi Driver Vulnerabilities?
2010-12-12/a>
Raul Siles
New trend regarding web application vulnerabilities?
2010-11-21/a>
Marcus Sachs
A Day In The Life Of A DShield Sensor
2010-11-17/a>
Guy Bruneau
Cisco Unified Videoconferencing Affected by Multiple Vulnerabilities
2010-08-16/a>
Raul Siles
The Seven Deadly Sins of Security Vulnerability Reporting
2010-08-04/a>
Adrien de Beaupre
Multiple Cisco Advisories
2010-07-24/a>
Manuel Humberto Santander Pelaez
Types of diary: One liners vs full diary
2010-06-29/a>
Johannes Ullrich
How to be a better spy: Cyber security lessons from the recent russian spy arrests
2010-06-09/a>
Deborah Hale
Best Practice to Prevent PDF Attacks
2010-04-26/a>
Raul Siles
Vulnerable Sites Database
2010-03-30/a>
Pedro Bueno
VMWare Security Advisories Out
2010-03-29/a>
Adrien de Beaupre
OOB Update for Internet Explorer MS10-018
2010-03-10/a>
Rob VandenBrink
Microsoft Security Advisory 981374 - Remote Code Execution Vulnerability for IE6 and IE7
2010-03-09/a>
John Bambenek
March 2010 - Microsoft Patch Tuesday Diary
2010-03-01/a>
Mark Hofman
IE 0-day using .hlp files
2010-02-09/a>
Adrien de Beaupre
When is a 0day not a 0day? Samba symlink bad default config
2010-01-24/a>
Pedro Bueno
Outdated client applications
2010-01-19/a>
Jim Clausing
The IE saga continues, out-of-cycle patch coming soon
2010-01-18/a>
Stephen Hall
Uplift in SSH brute forcing attacks
2009-12-05/a>
Guy Bruneau
Java JRE Buffer and Integer Overflow
2009-11-22/a>
Marcus Sachs
IE6 and IE7 0-Day Reported
2009-11-07/a>
Marcus Sachs
More Thoughts on Legacy Systems
2009-10-26/a>
Johannes Ullrich
Web honeypot Update
2009-10-14/a>
Johannes Ullrich
Odd Apache/MSIE issue with downloads from ISC
2009-10-02/a>
Stephen Hall
Cyber Security Awareness Month - Day 2 - Port 0
2009-09-16/a>
Raul Siles
IETF Draft for Remediation of Bots in ISP Networks
2009-09-10/a>
Guy Bruneau
Firefox 3.5.3 and 3.0.14 has been released
2009-06-11/a>
Jason Lam
Dshield Web Honeypot going beta
2009-05-27/a>
donald smith
WebDAV write-up
2009-04-20/a>
Jason Lam
Digital Content on TV
2009-04-14/a>
Swa Frantzen
April Black Tuesday Overview
2009-03-26/a>
Mark Hofman
Webhoneypot fun
2009-03-24/a>
G. N. White
CanSecWest Pwn2Own: Would IE8 have been exploitable had the event waited one more day?
2009-03-19/a>
Mark Hofman
Brace yourselves - IE8 reported to be released
2009-03-19/a>
Mark Hofman
Browsers Tumble at CanSecWest
2009-03-10/a>
Swa Frantzen
TinyURL and security
2009-03-10/a>
Swa Frantzen
March black Tuesday overview
2009-02-25/a>
Andre Ludwig
Preview/Iphone/Linux pdf issues
2009-02-17/a>
Jason Lam
DShield Web Honeypot - Alpha Preview Release
2009-02-10/a>
Swa Frantzen
February Black Tuesday Overview
2009-02-02/a>
Stephen Hall
How do you audit your production code?
2009-01-25/a>
Rick Wanner
Twam?? Twammers?
2008-12-16/a>
donald smith
Microsoft announces an out of band patch for IE zero day
2008-12-13/a>
Jim Clausing
The continuing IE saga - workarounds
2008-12-12/a>
Kevin Liston
IE7 0day expanded to include IE6 and IE8(beta)
2008-12-12/a>
Johannes Ullrich
MSIE 0-day Spreading Via SQL Injection
2008-11-11/a>
Swa Frantzen
November Black Tuesday Overview
2008-10-12/a>
Mari Nichols
Day 12 Containment: Gathering Evidence That Can be Used in Court
2008-09-21/a>
Mari Nichols
You still have time!
2008-09-11/a>
David Goldsmith
CookieMonster is coming to Pown (err, Town)
2008-08-10/a>
Stephen Hall
Fake IE 7 update spam doing the rounds
2008-08-02/a>
Maarten Van Horenbeeck
Issues affecting sites using Sitemeter [resolved]
2008-05-28/a>
Johannes Ullrich
Reminder: Proper use of DShield data
2008-04-27/a>
Marcus Sachs
What's With Port 20329?
2008-03-30/a>
Mark Hofman
Mail Anyone?
2008-03-14/a>
Kevin Liston
Temporal Search: Detecting Hidden Malware Timebombs with Virtual Machines
2006-12-18/a>
Toby Kohlenberg
ORDB Shutting down
2006-10-05/a>
Swa Frantzen
MS06-053 revisited ?
2006-10-02/a>
Jim Clausing
Back to green, but the exploits are still running wild
2006-09-30/a>
Swa Frantzen
Yellow: WebViewFolderIcon setslice exploit spreading
2006-09-28/a>
Swa Frantzen
MSIE: One patched, one pops up again (setslice)
2006-09-22/a>
Swa Frantzen
Yellow: MSIE VML exploit spreading
2006-09-19/a>
Swa Frantzen
Yet another MSIE 0-day: VML
2006-09-15/a>
Swa Frantzen
MSIE DirectAnimation ActiveX 0-day update
8
2024-08-20/a>
Johannes Ullrich
Where are we with CVE-2024-38063: Microsoft IPv6 Vulnerability
2023-11-30/a>
John Bambenek
Prophetic Post by Intern on CVE-2023-1389 Foreshadows Mirai Botnet Expansion Today
2023-11-22/a>
Guy Bruneau
CVE-2023-1389: A New Means to Expand Botnets
2023-11-06/a>
Johannes Ullrich
Exploit Activity for CVE-2023-22518, Atlassian Confluence Data Center and Server
2023-08-28/a>
Didier Stevens
Analysis of RAR Exploit Files (CVE-2023-38831)
2023-07-12/a>
Brad Duncan
Loader activity for Formbook "QM18"
2023-06-17/a>
Brad Duncan
Formbook from Possible ModiLoader (DBatLoader)
2023-05-14/a>
Guy Bruneau
VMware Aria Operations addresses multiple Local Privilege Escalations and a Deserialization issue
2023-03-25/a>
Guy Bruneau
Microsoft Released an Update for Windows Snipping Tool Vulnerability
2023-02-22/a>
Johannes Ullrich
Internet Wide Scan Fingerprinting Confluence Servers
2022-12-22/a>
Guy Bruneau
Exchange OWASSRF Exploited for Remote Code Execution
2022-09-06/a>
Didier Stevens
Analysis of an Encoded Cobalt Strike Beacon
2022-08-28/a>
Didier Stevens
Dealing With False Positives when Scanning Memory Dumps for Cobalt Strike Beacons
2022-05-13/a>
Johannes Ullrich
From 0-Day to Mirai: 7 days of BIG-IP Exploits
2022-05-11/a>
Brad Duncan
TA578 using thread-hijacked emails to push ISO files for Bumblebee malware
2022-04-28/a>
Johannes Ullrich
A Day of SMB: What does our SMB/RPC Honeypot see? CVE-2022-26809
2022-04-14/a>
Johannes Ullrich
An Update on CVE-2022-26809 - MSRPC Vulnerabliity - PATCH NOW
2021-12-14/a>
Johannes Ullrich
Log4j: Getting ready for the long haul (CVE-2021-44228)
2021-07-18/a>
Didier Stevens
Video: CyberChef BASE85 Decoding
2021-07-17/a>
Didier Stevens
BASE85 Decoding With base64dump.py
2021-07-16/a>
Xavier Mertens
Multiple BaseXX Obfuscations
2021-02-24/a>
Brad Duncan
Malspam pushes GuLoader for Remcos RAT
2020-12-18/a>
Jan Kopriva
A slightly optimistic tale of how patching went for CVE-2019-19781
2020-10-29/a>
Johannes Ullrich
PATCH NOW: CVE-2020-14882 Weblogic Actively Exploited Against Honeypots
2020-08-08/a>
Guy Bruneau
Scanning Activity Include Netcat Listener
2020-05-14/a>
Rob VandenBrink
Patch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe
2020-01-13/a>
Didier Stevens
Citrix ADC Exploits: Overview of Observed Payloads
2020-01-11/a>
Johannes Ullrich
Citrix ADC Exploits are Public and Heavily Used. Attempts to Install Backdoor
2020-01-07/a>
Johannes Ullrich
A Quick Update on Scanning for CVE-2019-19781 (Citrix ADC / Gateway Vulnerability)
2019-11-06/a>
Brad Duncan
More malspam pushing Formbook
2019-07-18/a>
Rob VandenBrink
The Other Side of Critical Control 1: 802.1x Wired Network Access Controls
2019-05-22/a>
Johannes Ullrich
An Update on the Microsoft Windows RDP "Bluekeep" Vulnerability (CVE-2019-0708) [now with pcaps]
2019-03-09/a>
Guy Bruneau
A Comparison Study of SSH Port Activity - TCP 22 & 2222
2018-08-20/a>
Didier Stevens
OpenSSH user enumeration (CVE-2018-15473)
2018-05-22/a>
Guy Bruneau
VMware updates enable Hypervisor-Assisted Guest Mitigations for Speculative Store Bypass issue - https://www.vmware.com/security/advisories/VMSA-2018-0012.html
2017-12-27/a>
Guy Bruneau
What are your Security Challenges for 2018?
2017-04-22/a>
Jim Clausing
WTF tcp port 81
2017-03-03/a>
Lorna Hutcheson
BitTorrent or Something Else?
2017-01-28/a>
Guy Bruneau
Request for Packets and Logs - TCP 5358
2016-10-22/a>
Guy Bruneau
Request for Packets TCP 4786 - CVE-2016-6385
2016-07-17/a>
Guy Bruneau
Juniper -> Junos: Self-signed certificate with spoofed trusted Issuer CN accepted as valid - https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10755&actp=search
2016-02-28/a>
Guy Bruneau
RFC 6598 - Carrier Grade NAT
2014-05-26/a>
Tony Carothers
NIST 800 Series Publications - New and Improved
2014-04-04/a>
Rob VandenBrink
Windows 8.1 Released
2014-02-27/a>
Richard Porter
DDoS and BCP 38
2013-11-09/a>
Guy Bruneau
IE Zero-Day Vulnerability Exploiting msvcrt.dll
2013-10-01/a>
John Bambenek
*Metaspoit Releases Module to Exploit Unpatched IE Vuln CVE-2013-3893
2013-09-20/a>
Russ McRee
Threat Level Yellow: Protection recommendations regarding Internet Explorer exploits in the wild
2013-09-18/a>
Rob VandenBrink
Cisco DCNM Update Released
2013-09-17/a>
John Bambenek
Microsoft Releases Out-of-Band Advisory for all Versions of Internet Explorer
2013-06-01/a>
Guy Bruneau
Exploit Sample for Win32/CVE-2012-0158
2013-05-20/a>
Guy Bruneau
Safe - Tools, Tactics and Techniques
2013-05-04/a>
Kevin Shortt
The Zero-Day Pendulum Swings
2013-04-21/a>
John Bambenek
A Chargen-based DDoS? Chargen is still a thing?
2013-02-19/a>
Johannes Ullrich
APT1, Unit 61398 and are state sponsored attacks real
2012-09-21/a>
Guy Bruneau
IE Cumulative Updates MS12-063 - KB2744842
2012-09-21/a>
Guy Bruneau
Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 (2755801)
2012-09-17/a>
Rob VandenBrink
IE Zero Day is "For Real"
2012-07-25/a>
Johannes Ullrich
Apple OS X 10.8 (Mountain Lion) released
2012-06-18/a>
Guy Bruneau
CVE-2012-1875 exploit is now available
2012-05-16/a>
Johannes Ullrich
Got Packets? Odd duplicate DNS replies from 10.x IP Addresses
2012-05-16/a>
Johannes Ullrich
Reserved IP Address Space Reminder
2012-05-06/a>
Jim Clausing
Tool updates and Win 8
2012-01-12/a>
Rob VandenBrink
PHP 5.39 was release on the 10th, amongst other things, it addresses CVE-2011-4885 (prevents attacks based on hash collisions) and CVE-2011-4566 (integer overflow when parsing invalid exif header)
2011-10-06/a>
Rob VandenBrink
Apache HTTP Server mod_proxy reverse proxy issue
2011-08-29/a>
Kevin Shortt
Internet Worm in the Wild
2011-08-25/a>
Kevin Shortt
Increased Traffic on Port 3389
2011-08-03/a>
Johannes Ullrich
Port 3389 / terminal services scans
2011-06-30/a>
Rob VandenBrink
Update for RSA Authentication Manager
2011-04-28/a>
Guy Bruneau
VMware ESXi 4.1 Security and Firmware Updates
2011-01-15/a>
Jim Clausing
What's up with port 8881?
2010-11-16/a>
Guy Bruneau
OpenSSL TLS Extension Parsing Race Condition
2010-09-13/a>
Manuel Humberto Santander Pelaez
Adobe SING table parsing exploit (CVE-2010-2883) in the wild
2010-09-08/a>
John Bambenek
Adobe Acrobat/Reader 0-day in Wild, Adobe Issues Advisory
2010-07-29/a>
Rob VandenBrink
Snort 2.8.6.1 and Snort 2.9 Beta Released
2010-07-26/a>
Guy Bruneau
SophosLabs Released Free Tool to Validate Microsoft Shortcut
2010-07-20/a>
Manuel Humberto Santander Pelaez
LNK vulnerability now with Metasploit module implementing the WebDAV method
2010-06-15/a>
Manuel Humberto Santander Pelaez
Microsoft Windows Help and Support Center vulnerability (CVE 2010-1885) exploit in the wild
2010-03-10/a>
Rob VandenBrink
Microsoft re-release of KB973811 - attacks on Extended Protection for Authentication
2010-01-12/a>
Adrien de Beaupre
PoC for CVE-2009-0689 MacOS X 10.5/10.6 vulnerability
2009-11-14/a>
Adrien de Beaupre
Microsoft advisory for Windows 7 / Windows Server 2008 R2 Remote SMB DoS Exploit released
2009-11-12/a>
Rob VandenBrink
Windows 7 / Windows Server 2008 Remote SMB Exploit
2009-10-30/a>
Rob VandenBrink
New version of NIST 800-41, Firewalls and Firewall Policy Guidelines
2009-10-25/a>
Lorna Hutcheson
Cyber Security Awareness Month - Day 25 - Port 80 and 443
2009-10-09/a>
Rob VandenBrink
Cyber Security Awareness Month - Day 9 - Port 3389/tcp (RDP)
2009-10-06/a>
Adrien de Beaupre
Cyber Security Awareness Month - Day 6 ports 67&68 udp - bootp and dhcp
2009-08-28/a>
Adrien de Beaupre
WPA with TKIP done
2009-03-28/a>
Rick Wanner
New Beta release of Nmap
2009-03-27/a>
David Goldsmith
Firefox 3.0.8 Released
2009-03-24/a>
G. N. White
CanSecWest Pwn2Own: Would IE8 have been exploitable had the event waited one more day?
2009-03-19/a>
Mark Hofman
Brace yourselves - IE8 reported to be released
2009-03-19/a>
Mark Hofman
Browsers Tumble at CanSecWest
2009-02-13/a>
Andre Ludwig
Third party information on conficker
2009-01-12/a>
William Salusky
Downadup / Conficker - MS08-067 exploit and Windows domain account lockout
2008-11-04/a>
Marcus Sachs
Cyber Security Awareness Month 2008 - Summary and Links
2008-11-03/a>
Joel Esler
Day 34 -- Feeding The Lessons Learned Back to the Preparation Phase
2008-11-02/a>
Mari Nichols
Day 33 - Working with Management to Improve Processes
2008-11-01/a>
Koon Yaw Tan
Day 32 - What Should I Make Public?
2008-10-31/a>
Rick Wanner
Day 31 - Legal Awareness
2008-10-30/a>
Kevin Liston
Day 30 - Applying Patches and Updates
2008-10-29/a>
Deborah Hale
Day 29 - Should I Switch Software Vendors?
2008-10-28/a>
Jason Lam
Day 28 - Avoiding Finger Pointing and the Blame Game
2008-10-27/a>
Johannes Ullrich
Day 27 - Validation via Vulnerability Scanning
2008-10-25/a>
Koon Yaw Tan
Day 25 - Finding and Removing Hidden Files and Directories
2008-10-25/a>
Rick Wanner
Day 26 - Restoring Systems from Backup
2008-10-24/a>
Stephen Hall
Day 24 - Cleaning Email Servers and Clients
2008-10-22/a>
Johannes Ullrich
Day 22 - Wiping Disks and Media
2008-10-22/a>
Chris Carboni
Day 23 - Turning off Unused Services
2008-10-21/a>
Johannes Ullrich
Day 21 - Removing Bots, Keyloggers, and Spyware
2008-10-20/a>
Raul Siles
Day 20 - Eradicating a Rootkit
2008-10-19/a>
Lorna Hutcheson
Day 19 - Eradication: Forensic Analysis Tools - What Happened?
2008-10-17/a>
Patrick Nolan
Day 17 - Containing a DNS Hijacking
2008-10-17/a>
Rick Wanner
Day 18 - Containing Other Incidents
2008-10-16/a>
Mark Hofman
Day 16 - Containing a Malware Outbreak
2008-10-15/a>
Rick Wanner
Day 15 - Containing the Damage From a Lost or Stolen Laptop
2008-10-14/a>
Swa Frantzen
Day 14 - Containment: a Personal IdentityTheft Incident
2008-10-13/a>
Adrien de Beaupre
Day 13 - Containment: Containing on Production Systems Such as a Web Server
2008-10-12/a>
Mari Nichols
Day 12 Containment: Gathering Evidence That Can be Used in Court
2008-10-11/a>
Stephen Hall
Day 11 - Identification: Other Methods of Identifying an Incident
2008-10-10/a>
Marcus Sachs
Day 10 - Identification: Using Your Help Desk to Identify Security Incidents
2008-10-09/a>
Marcus Sachs
Day 9 - Identification: Log and Audit Analysis
2008-10-08/a>
Johannes Ullrich
Day 8 - Global Incident Awareness
2008-10-07/a>
Kyle Haugsness
Day 7 - Identification: Host-based Intrusion Detection Systems
2008-10-06/a>
Jim Clausing
Day 6 - Network-based Intrusion Detection Systems
2008-10-05/a>
Stephen Hall
Day 5 - Identification: Events versus Incidents
2008-10-04/a>
Marcus Sachs
Day 4 - Preparation: What Goes Into a Response Kit
2008-10-03/a>
Jason Lam
Day 3 - Preparation: Building Checklists
2008-10-02/a>
Marcus Sachs
Day 2 - Preparation: Building a Response Team
2008-10-01/a>
Marcus Sachs
Day 1 - Preparation: Policies, Management Support, and User Awareness
2008-09-30/a>
Marcus Sachs
Cyber Security Awareness Month - Daily Topics
2008-08-22/a>
Patrick Nolan
MS08-051 V2.0 Patch issued August 20, 2008
2008-08-15/a>
Jim Clausing
Another MS update that may have escaped notice
2008-04-10/a>
Deborah Hale
Symantec Threatcon Level 2
2006-09-19/a>
Swa Frantzen
Yet another MSIE 0-day: VML
Homepage
Diaries
Podcasts
Jobs
Data
TCP/UDP Port Activity
Port Trends
SSH/Telnet Scanning Activity
Weblogs
Threat Feeds Activity
Threat Feeds Map
Useful InfoSec Links
Presentations & Papers
Research Papers
API
Tools
DShield Sensor
DNS Looking Glass
Honeypot (RPi/AWS)
InfoSec Glossary
Contact Us
Contact Us
About Us
Handlers
About Us
Slack Channel
Mastodon
Bluesky
X
Subscribe to the daily podcast via
RSS
or
iTunes