Date Author Title

PHISH SPAM

2010-06-10Deborah HaleAnother Morning of Fun

PHISH

2024-10-14/a>Xavier MertensPhishing Page Delivered Through a Blob URL
2024-07-16/a>Jan Kopriva"Reply-chain phishing" with a twist
2024-03-14/a>Jan KoprivaIncrease in the number of phishing messages pointing to IPFS and to R2 buckets
2024-02-21/a>Jan KoprivaPhishing pages hosted on archive.org
2023-11-17/a>Jan KoprivaPhishing page with trivial anti-analysis features
2023-11-08/a>Xavier MertensExample of Phishing Campaign Project File
2023-10-29/a>Guy BruneauSpam or Phishing? Looking for Credentials & Passwords
2023-10-16/a>Jan KoprivaAre typos still relevant as an indicator of phishing?
2023-09-26/a>Jan KoprivaA new spin on the ZeroFont phishing technique
2023-09-03/a>Didier StevensAnalysis of a Defective Phishing PDF
2023-08-31/a>Jan KoprivaThe low, low cost of (committing) cybercrime
2023-08-18/a>Xavier MertensFrom a Zalando Phishing to a RAT
2023-06-21/a>Yee Ching TokAnalyzing a YouTube Sponsorship Phishing Mail and Malware Targeting Content Creators
2023-06-16/a>Xavier MertensAnother RAT Delivered Through VBS
2023-05-20/a>Xavier MertensPhishing Kit Collecting Victim's IP Address
2023-05-15/a>Jan KoprivaOngoing Facebook phishing campaign without a sender and (almost) without links
2023-05-01/a>Jan Kopriva"Passive" analysis of a phishing attachment
2023-04-26/a>Yee Ching TokStrolling through Cyberspace and Hunting for Phishing Sites
2023-04-03/a>Johannes UllrichTax Season Risks
2023-03-31/a>Jan KoprivaUse of X-Frame-Options and CSP frame-ancestors security headers on 1 million most popular domains
2023-03-20/a>Xavier MertensFrom Phishing Kit To Telegram... or Not!
2023-03-15/a>Jan KoprivaIPFS phishing and the need for correctly set HTTP security headers
2023-03-12/a>Guy BruneauAsynRAT Trojan - Bill Payment (Pago de la factura)
2023-02-27/a>Xavier MertensPhishing Again and Again
2023-02-21/a>Xavier MertensPhishing Page Branded with Your Corporate Website
2023-02-18/a>Guy BruneauSpear Phishing Handlers for Username/Password
2023-02-16/a>Jan KoprivaHTML phishing attachment with browser-in-the-browser technique
2022-11-24/a>Xavier MertensAttackers Keep Phishing Victims Under Stress
2022-11-19/a>Guy BruneauMcAfee Fake Antivirus Phishing Campaign is Back!
2022-10-27/a>Tom WebbSupersizing your DUO and 365 Integration
2022-10-04/a>Johannes UllrichCredential Harvesting with Telegram API
2022-09-21/a>Xavier MertensPhishing Campaigns Use Free Online Resources
2022-09-10/a>Guy BruneauPhishing Word Documents with Suspicious URL
2022-08-26/a>Xavier MertensPaypal Phishing/Coinbase in One Image
2022-08-13/a>Guy BruneauPhishing HTML Attachment as Voicemail Audio Transcription
2022-07-22/a>Yee Ching TokAn Analysis of a Discerning Phishing Website
2022-07-13/a>Xavier MertensUsing Referers to Detect Phishing Attacks
2022-06-01/a>Jan KoprivaHTML phishing attachments - now with anti-analysis features
2022-05-18/a>Jan KoprivaDo you want 30 BTC? Nothing is easier (or cheaper) in this phishing campaign...
2022-05-14/a>Didier StevensQuick Analysis Of Phishing MSG
2022-05-07/a>Guy BruneauPhishing PDF Received in my ISC Mailbox
2022-04-24/a>Didier StevensAnalyzing a Phishing Word Document
2022-04-07/a>Johannes UllrichWhat is BIMI and how is it supposed to help with Phishing.
2022-04-04/a>Johannes UllrichEmptying the Phishtank: Are WordPress sites the Mosquitoes of the Internet?
2022-02-13/a>Guy BruneauDHL Spear Phishing to Capture Username/Password
2022-02-07/a>Johannes Ullrichweb3 phishing via self-customizing landing pages
2022-01-31/a>Xavier MertensBe careful with RPMSG files
2022-01-28/a>Xavier MertensMalicious ISO Embedded in an HTML Page
2022-01-18/a>Jan KoprivaPhishing e-mail with...an advertisement?
2022-01-03/a>Xavier MertensMcAfee Phishing Campaign with a Nice Fake Scan
2021-12-23/a>Xavier MertensNicely Crafted indeed.com Login Page
2021-12-09/a>Yee Ching TokPhishing Direct Messages via Discord
2021-12-04/a>Guy BruneauA Review of Year 2021
2021-11-24/a>Jan KoprivaPhishing page hiding itself using dynamically adjusted IP-based allow list
2021-11-10/a>Xavier MertensShadow IT Makes People More Vulnerable to Phishing
2021-10-31/a>Didier StevensVideo: Phishing ZIP With Malformed Filename
2021-10-26/a>Yee Ching TokHunting for Phishing Sites Masquerading as Outlook Web Access
2021-10-24/a>Didier StevensPhishing ZIP With Malformed Filename
2021-09-16/a>Jan KoprivaPhishing 101: why depend on one suspicious message subject when you can use many?
2021-09-02/a>Xavier MertensAttackers Will Always Abuse Major Events in our Lifes
2021-08-03/a>Johannes UllrichIs this the Weirdest Phishing (SMishing?) Attempt Ever?
2021-07-28/a>Jan KoprivaA sextortion e-mail from...IT support?!
2021-07-14/a>Jan KoprivaOne way to fail at malspam - give recipients the wrong password for an encrypted attachment
2021-07-13/a>Johannes UllrichUSPS Phishing Using Telegram to Collect Data
2021-06-22/a>Jan KoprivaPhishing asking recipients not to report abuse
2021-05-29/a>Guy BruneauSpear-phishing Email Targeting Outlook Mail Clients
2021-05-22/a>Xavier Mertens"Serverless" Phishing Campaign
2021-04-19/a>Jan KoprivaHunting phishing websites with favicon hashes
2021-03-11/a>Johannes UllrichPiktochart - Phishing with Infographics
2021-02-26/a>Guy BruneauPretending to be an Outlook Version Update
2021-02-10/a>Brad DuncanPhishing message to the ISC handlers email distro
2020-10-22/a>Jan KoprivaBazarLoader phishing lures: plan a Halloween party, get a bonus and be fired in the same afternoon
2020-10-09/a>Jan KoprivaPhishing kits as far as the eye can see
2020-10-02/a>Xavier MertensAnalysis of a Phishing Kit
2020-09-21/a>Jan KoprivaSlightly broken overlay phishing
2020-09-20/a>Guy BruneauAnalysis of a Salesforce Phishing Emails
2020-06-18/a>Jan KoprivaBroken phishing accidentally exploiting Outlook zero-day
2020-06-15/a>Rick WannerHTML based Phishing Run
2020-05-27/a>Jan KoprivaFrankenstein's phishing using Google Cloud Storage
2020-05-02/a>Guy BruneauPhishing PDF with Unusual Hostname
2020-04-28/a>Jan KoprivaAgent Tesla delivered by the same phishing campaign for over a year
2020-04-18/a>Guy BruneauMaldoc Falsely Represented as DOCX Invoice Redirecting to Fake Apple Store
2020-04-13/a>Jan KoprivaLook at the same phishing campaign 3 months apart
2020-04-03/a>Xavier MertensObfuscated with a Simple 0x0A
2020-03-14/a>Didier StevensPhishing PDF With Incremental Updates.
2020-03-05/a>Xavier MertensWill You Put Your Password in a Survey?
2020-02-10/a>Jan KoprivaCurrent PayPal phishing campaign or "give me all your personal information"
2020-02-03/a>Jan KoprivaAnalysis of a triple-encrypted AZORult downloader
2020-01-24/a>Xavier MertensWhy Phishing Remains So Popular?
2020-01-16/a>Jan KoprivaPicks of 2019 malware - the large, the small and the one full of null bytes
2019-12-06/a>Jan KoprivaPhishing with a self-contained credentials-stealing webpage
2019-12-05/a>Jan KoprivaE-mail from Agent Tesla
2019-12-04/a>Jan KoprivaAnalysis of a strangely poetic malware
2019-11-26/a>Jan KoprivaLessons learned from playing a willing phish
2019-10-31/a>Jan KoprivaEML attachments in O365 - a recipe for phishing
2019-10-17/a>Jan KoprivaPhishing e-mail spoofing SPF-enabled domain
2019-08-15/a>Didier StevensAnalysis of a Spearphishing Maldoc
2019-08-09/a>Xavier Mertens100% JavaScript Phishing Page
2019-05-13/a>Xavier MertensFrom Phishing To Ransomware?
2019-04-17/a>Xavier MertensMalware Sample Delivered Through UDF Image
2019-02-28/a>Tom WebbPhishing impersonations
2019-02-07/a>Xavier Mertens Phishing Kit with JavaScript Keylogger
2019-02-03/a>Didier StevensVideo: Analyzing a Simple HTML Phishing Attachment
2019-01-29/a>Johannes UllrichA Not So Well Done Phish (Why Attackers need to Implement IPv6 Now! ;-) )
2019-01-02/a>Lorna HutchesonGift Card Scams on the rise
2018-12-27/a>Didier StevensMatryoshka Phish
2018-12-21/a>Lorna HutchesonPhishing Attempts That Bypass 2FA
2018-12-13/a>Xavier MertensPhishing Attack Through Non-Delivery Notification
2018-08-23/a>Xavier MertensSimple Phishing Through formcrafts.com
2018-08-12/a>Didier StevensA URL shortener handy for phishers
2018-07-01/a>Didier StevensVideo: Analyzing XPS Files
2018-06-30/a>Didier StevensXPS samples
2018-06-26/a>Didier StevensAnalyzing XPS files
2018-06-22/a>Lorna HutchesonXPS Attachment Used for Phishing
2018-05-24/a>Xavier Mertens"Blocked" Does Not Mean "Forget It"
2018-05-09/a>Xavier MertensNice Phishing Sample Delivering Trickbot
2018-03-12/a>Xavier MertensPayload delivery via SMB
2018-03-02/a>Xavier MertensCommon Patterns Used in Phishing Campaigns Files
2018-02-01/a>Xavier MertensAdaptive Phishing Kit
2018-01-31/a>Tom WebbTax Phishing Time
2018-01-20/a>Didier StevensAn RTF phish
2018-01-03/a>John BambenekPhishing to Rural America Leads to Six-figure Wire Fraud Losses
2018-01-02/a>Didier StevensPDF documents & URLs: video
2017-12-18/a>Didier StevensPhish or scam? - Part 2
2017-12-17/a>Didier StevensPhish or scam? - Part 1
2017-12-01/a>Xavier MertensPhishing Kit (Ab)Using Cloud Services
2017-11-23/a>Xavier MertensProactive Malicious Domain Search
2017-11-10/a>Bojan ZdrnjaBattling e-mail phishing
2017-11-05/a>Didier StevensExtracting the text from PDF documents
2017-11-04/a>Didier StevensPDF documents & URLs
2017-08-16/a>Xavier MertensAnalysis of a Paypal phishing kit
2017-08-13/a>Didier StevensThe Good Phishing Email
2017-07-16/a>Renato MarinhoSMS Phishing induces victims to photograph its own token card
2017-06-27/a>Brad DuncanA Tale of Two Phishies
2017-06-15/a>Bojan ZdrnjaUberscammers
2017-06-02/a>Xavier MertensPhishing Campaigns Follow Trends
2017-05-20/a>Xavier MertensTyposquatting: Awareness and Hunting
2017-05-03/a>Bojan ZdrnjaOAUTH phishing against Google Docs ? beware!
2017-04-18/a>Johannes UllrichYet Another Apple Phish and Some DNS Lessons Learned From It
2017-04-16/a>Johannes UllrichTool to Detect Active Phishing Attacks Using Unicode Look-Alike Domains
2017-03-28/a>Xavier MertensLogical & Physical Security Correlation
2017-03-24/a>Xavier MertensNicely Obfuscated JavaScript Sample
2017-03-06/a>Renato MarinhoA very convincing Typosquatting + Social Engineering campaign is targeting Santander corporate customers in Brazil
2017-02-27/a>Tom WebbDynamite Phishing
2017-02-01/a>Xavier MertensQuick Analysis of Data Left Available by Attackers
2017-01-10/a>Johannes UllrichRealtors Be Aware: You Are a Target
2017-01-04/a>John BambenekMixed Messages : Novel Phishing Attempts Trying to Steal Your E-mail Password Goes Wrong
2016-11-16/a>Xavier MertensExample of Getting Analysts & Researchers Away
2016-10-07/a>Rick WannerFirst Hurricane Matthew related Phish
2016-08-23/a>Xavier MertensVoice Message Notifications Deliver Ransomware
2016-06-29/a>Xavier MertensPhishing Campaign with Blurred Images
2016-05-12/a>Xavier MertensAnother Day, Another Wave of Phishing Emails
2016-02-07/a>Xavier MertensMore Malicious JavaScript Obfuscation
2016-01-13/a>Alex StanfordYou Have Got a New Audio Message - Guest Diary by Pasquale Stirparo
2015-12-04/a>Tom WebbAutomating Phishing Analysis using BRO
2015-02-20/a>Tom WebbFast analysis of a Tax Scam
2015-01-31/a>Guy BruneauBeware of Phishing and Spam Super Bowl Fans!
2014-09-16/a>Daniel Wesemannhttps://yourfakebank.support -- TLD confusion starts!
2014-03-27/a>Alex StanfordApple Credential Phishing via appleidconfirm.net
2014-01-24/a>Johannes UllrichHow to send mass e-mail the right way
2014-01-24/a>Chris MohanPhishing via Social Media
2013-12-21/a>Daniel WesemannAdobe phishing underway
2013-12-11/a>Johannes UllrichFacebook Phishing and Malware via Tumblr Redirects
2013-10-17/a>Adrien de BeaupreMicrosoft phish
2013-08-05/a>Chris MohanDMARC: another step forward in the fight against phishing?
2013-05-21/a>Adrien de BeaupreMoore, Oklahoma tornado charitable organization scams, malware, and phishing
2013-03-29/a>Chris MohanDoes your breach email notification look like a phish?
2012-12-06/a>Daniel WesemannFake tech support calls - revisited
2012-12-03/a>John BambenekJohn McAfee Exposes His Location in Photo About His Being on Run
2012-11-29/a>Kevin ShorttNew Apple Security Update: APPLE-SA-2012-11-29-1 Apple TV 5.1.1
2012-11-28/a>Mark HofmanMcAfee releases extraDAT for W32/Autorun.worm.aaeb-h
2012-11-28/a>Mark HofmanNew version of wireshark is available (1.8.4), some security fixes included.
2012-11-27/a>Chris MohanCan users' phish emails be a security admin's catch of the day?
2012-11-26/a>John BambenekOnline Shopping for the Holidays? Tips, News and a Fair Warning
2012-11-20/a>John BambenekBehind the Random NTP Bizarreness of Incorrect Year Being Set
2012-11-20/a>John BambenekFirefox v 17.0 just released, more here: http://www.mozilla.org/en-US/firefox/17.0/releasenotes/
2012-11-19/a>John BambenekMoneyGram fined $100 million for aiding wire fraud - http://krebsonsecurity.com/2012/11/moneygram-fined-100-million-for-wire-fraud/
2012-11-19/a>John BambenekNew Poll: Top 5 Unresolved Security Problems of 2012
2012-11-17/a>Manuel Humberto Santander PelaezNew Sysinternal Updates: AdExplorer v1.44, Contig v1.7, Coreinfo v3.2, Procdump v5.1. See http://blogs.technet.com/b/sysinternals/archive/2012/11/16/updates-adexplorer-v1-44-contig-v1-7-coreinfo-v3-2-procdump-v5-1.aspx?Redirected=true
2012-11-12/a>John BambenekRequest for info: Robocall Phishing Against Local/Regional Banks
2012-11-09/a>Mark BaggettRemote Diagnostics with PSR
2012-11-09/a>Mark BaggettFresh batch of Microsoft patches next week
2012-11-08/a>Daniel WesemannGet a 40% discount on your hotel room!
2012-11-07/a>Mark BaggettCisco TACACS+ Authentication Bypass
2012-11-07/a>Mark BaggettHelp eliminate unquoted path vulnerabilities
2012-11-07/a>Mark BaggettMultiple 0-Days Reported!
2012-11-05/a>Johannes UllrichReminder: Ongoing SMTP Brute Forcing Attacks
2012-11-05/a>Johannes UllrichPossible Fake-AV Ads from Doubleclick Servers
2012-11-04/a>Lorna HutchesonWhat's important on your network?
2012-10-31/a>Johannes UllrichCyber Security Awareness Month - Day 31 - Business Continuity and Disaster Recovery
2012-10-30/a>Johannes UllrichHurricane Sandy Update
2012-10-30/a>Richard PorterSplunk 5.0 SP-CAAAHB4 http://www.splunk.com/view/SP-CAAAHB4
2012-10-28/a>Tony CarothersFirefox 16.02 Released
2012-10-26/a>Russ McReeCyber Security Awareness Month - Day 26 - Attackers use trusted domain to propagate Citadel Zeus variant
2012-10-25/a>Richard PorterCyber Security Awareness Month - Day 25 - Pro Audio & Video Packets on the Wire
2012-10-24/a>Russ McReeOngoing Windstream outage in the midwest - https://twitter.com/search?q=windstream
2012-10-21/a>Johannes UllrichCyber Security Awareness Month - Day 22: Connectors
2012-10-21/a>Lorna HutchesonPotential Phish for Regular Webmail Accounts
2012-10-19/a>Johannes UllrichCyber Security Awareness Month - Day 19: Standard log formats and CEE.
2012-10-18/a>Rob VandenBrinkCyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide
2012-10-17/a>Mark HofmanNew Acrobat release (including reader) available. Version 11. Some security improvements more here -->http://blogs.adobe.com/adobereader/
2012-10-16/a>Richard PorterCyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook.
2012-10-16/a>Johannes UllrichCyber Security Awareness Month - Day 16: W3C and HTML
2012-10-14/a>Pedro BuenoCyber Security Awareness Month - Day 14 - Poor Man's File Analysis System - Part 1
2012-10-09/a>Johannes UllrichMicrosoft October 2012 Black Tuesday Update - Overview
2012-10-07/a>Tony CarothersCyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1
2012-10-05/a>Johannes UllrichCyber Security Awareness Month - Day 5: Standards Body Soup, So many Flavors in the bowl.
2012-10-05/a>Richard PorterVMWare Security Advisory: VMSA-2012-0014 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html
2012-10-05/a>Richard PorterReports of a Distributed Injection Scan
2012-10-04/a>Mark HofmanAnd the SHA-3 title goes to .....Keccak
2012-10-03/a>Kevin ShorttFake Support Calls Reported
2012-10-02/a>Russ McReeCyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines
2012-10-01/a>Johannes UllrichCyber Security Awareness Month
2012-09-28/a>Joel EslerAdobe certification revocation for October 4th
2012-09-26/a>Johannes UllrichSome Android phones can be reset to factory default by clicking on links
2012-09-26/a>Johannes UllrichMore Java Woes
2012-09-21/a>Johannes UllrichiOS 6 Security Roundup
2012-09-20/a>Russ McReeFinancial sector advisory: attacks and threats against financial institutions
2012-09-19/a>Russ McReeScript kiddie scavenging with Shellbot.S
2012-09-17/a>Rob VandenBrinkWhat's on your iPad?
2012-09-14/a>Lenny ZeltserScam Report - Fake Voice Mail Email Notification Redirects to Malicious Site
2012-09-13/a>Mark BaggettTCP Fuzzing with Scapy
2012-09-13/a>Mark BaggettMicrosoft disrupts traffic associated with the Nitol botnet
2012-09-13/a>Mark BaggettMore SSL trouble
2012-09-10/a>Johannes UllrichMicrosoft Patch Tuesday Pre-Release
2012-09-10/a>Johannes UllrichGodaddy DDoS Attack
2012-09-09/a>Guy BruneauPhishing/Spam Pretending to be from BBB
2012-09-06/a>Johannes UllrichSSL Requests sent to port 80 (request for help/input)
2012-09-04/a>Johannes UllrichAnother round of "Spot the Exploit E-Mail"
2012-09-01/a>Russ McReeBlackhole targeting Java vulnerability via fake Microsoft Services Agreement email phish
2012-08-30/a>Johannes UllrichEditorial: The Slumlord Approach to Network Security http://isc.sans.edu/j/editorial
2012-08-29/a>Johannes Ullrich"Data" URLs used for in-URL phishing
2012-08-27/a>Johannes UllrichThe Good, Bad and Ugly about Assigning IPv6 Addresses
2012-08-27/a>Johannes UllrichMalware Spam harvesting Facebook Information
2012-08-26/a>Lorna HutchesonWho ya gonna contact?
2012-08-22/a>Adrien de BeaupreApple Remote Desktop update fixes no encryption issue
2012-08-22/a>Adrien de BeauprePhishing/spam via SMS
2012-08-21/a>Adrien de BeaupreYYABCAFU - Yes Yet Another Bleeping Critical Adobe Flash Update
2012-08-21/a>Adrien de BeaupreRuggedCom fails key management 101 on Rugged Operating System (ROS)
2012-08-20/a>Manuel Humberto Santander PelaezDo we need test procedures in our companies before implementing Antivirus signatures?
2012-08-19/a>Manuel Humberto Santander PelaezAuthentication Issues between entities during protocol message exchange in SCADA Systems
2012-08-17/a>Guy BruneauSuspicious eFax Spear Phishing Messages
2012-08-12/a>Tony CarothersLayers of the Defense-in-Depth Onion
2012-08-12/a>Tony CarothersOracle Security Alert for CVE-2012-3132
2012-08-09/a>Mark HofmanZeus/Citadel variant causing issues in the Netherlands
2012-08-09/a>Mark HofmanSQL Injection Lilupophilupop style, Part 2
2012-08-07/a>Adrien de BeaupreWho protects small business?
2012-08-04/a>Kevin ListonVendors: More Patch-Release Options Please
2012-07-27/a>Daniel WesemannCuckoo 0.4 is out - cool new features for malware analysis http://www.cuckoosandbox.org/
2012-07-24/a>Richard PorterWireshark 1.8.1 Released http://www.wireshark.org/
2012-07-24/a>Richard PorterReport of spike in DNS Queries gd21.net
2012-07-20/a>Mark BaggettSyria Internet connection cut?
2012-07-19/a>Mark BaggettDiagnosing Malware with Resource Monitor
2012-07-19/a>Mark BaggettA Heap of Overflows?
2012-07-16/a>Richard PorterSysinternals Update @ http://blogs.technet.com/b/sysinternals/archive/2012/07/16/updates-handle-v3-5-process-explorer-v15-22-process-monitor-v3-03-rammap-v1-21-zoomit-v4-3.aspx
2012-07-13/a>Richard PorterYesterday (not as on the ball as Rob) at SANSFire
2012-07-13/a>Russ McRee2 for 1: SANSFIRE & MSRA presentations
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Recording Server - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Manager - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman
2012-07-09/a>Johannes UllrichThe FBI will turn off the Internet on Monday (or not)
2012-07-09/a>Manuel Humberto Santander PelaezInternet Storm Center panel tonight at SANSFIRE 2012!
2012-07-05/a>Adrien de BeaupreNew OS X trojan backdoor MaControl variant reported
2012-07-02/a>Joel EslerA rough guide to keeping your website up
2012-07-02/a>Joel EslerLinux & Java leap second bug
2012-06-29/a>Jim ClausingUpdated SysInternals tools - Autoruns, Process Explorer, Process Monitor, PSKill -- http://blogs.technet.com/b/sysinternals/archive/2012/06/28/updates-autoruns-v11-32-process-explorer-v15-21-process-monitor-v3-02-pskill-v1-15-rammap-v1-2.aspx
2012-06-21/a>Russ McReeWireshark 1.8.0 released 21 JUN 2012 http://www.wireshark.org/download.html
2012-06-19/a>Daniel Wesemann Vulnerabilityqueerprocessbrittleness
2012-06-14/a>Johannes UllrichSpot the Phish: Verizon Wireless
2012-06-10/a>Scott FendleyPreying on Users After Major Security Incidents
2012-05-30/a>Rob VandenBrinkIt's Phishing Season! In fact, it's ALWAYS Phishing Season!
2012-02-17/a>Mark HofmanIntersting Facebook SPAM
2011-08-31/a>Johannes UllrichPhishing e-mail to custom e-mail addresses
2011-08-16/a>Scott FendleyPhishing Scam Victim Response
2011-07-19/a>Richard PorterSMS Phishing at the SANSFire 2011 Handler Dinner
2011-06-27/a>Kevin ShorttPhishy Spam
2011-06-08/a>Johannes UllrichSpam from compromised Hotmail accounts
2011-06-06/a>Manuel Humberto Santander PelaezPhishing: Same goal, same techniques and people still falling for such scams
2011-02-02/a>Johannes UllrichHaving Phish on Friday
2010-11-29/a>Stephen HalliPhone phishing - What you see, isn't what you get
2010-11-22/a>Lenny ZeltserBrand Impersonations On-Line: Brandjacking and Social Networks
2010-06-21/a>Adrien de BeaupreGoDaddy Scam/Phish/Spam
2010-06-10/a>Deborah HaleAnother Morning of Fun
2010-04-19/a>Daniel WesemannLinked into scams?
2010-02-02/a>Johannes UllrichTwitter Mass Password Reset due to Phishing
2009-12-16/a>Rob VandenBrinkBeware the Attack of the Christmas Greeting Cards !
2009-10-19/a>Daniel WesemannScam Email
2009-10-09/a>Rob VandenBrinkAT&T Cell Phone Phish
2009-09-10/a>Johannes UllrichHealthcare Spam
2009-07-28/a>Adrien de BeaupreTwitter spam/phish
2009-05-24/a>Raul SilesFacebook phising using Belgium (.be) domains
2009-05-04/a>Tom ListonFacebook phishing malware
2009-01-11/a>Deborah HaleThe Frustration of Phishing Attacks
2009-01-04/a>Rick WannerTwitter/Facebook Phishing Attempt
2008-11-11/a>Swa FrantzenPhishing for Google adwords
2008-10-29/a>Deborah HaleEnom Phishing - Caution Enom Registrars
2008-10-10/a>Marcus SachsFake Microsoft Update Email
2008-06-17/a>Kyle HaugsnessWhy go high-tech?
2008-05-26/a>Marcus SachsPredictable Response
2008-05-19/a>Maarten Van HorenbeeckText message and telephone aid scams
2008-04-14/a>John BambenekA Federal Subpoena or Just Some More Spam & Malware?

SPAM

2024-05-27/a>Jan KoprivaFiles with TXZ extension used as malspam attachments
2024-02-05/a>Jesse La GrewPublic Information and Email Spam
2024-01-03/a>Jan KoprivaInteresting large and small malspam attachments from 2023
2023-11-08/a>Xavier MertensExample of Phishing Campaign Project File
2023-10-29/a>Guy BruneauSpam or Phishing? Looking for Credentials & Passwords
2023-06-29/a>Brad DuncanGuLoader- or DBatLoader/ModiLoader-style infection for Remcos RAT
2023-05-30/a>Brad DuncanMalspam pushes ModiLoader (DBatLoader) infection for Remcos RAT
2023-04-12/a>Brad DuncanRecent IcedID (Bokbot) activity
2023-01-19/a>Jan KoprivaSPF and DMARC use on 100k most popular domains
2023-01-05/a>Brad DuncanMore Brazil malspam pushing Astaroth (Guildma) in January 2023
2022-12-02/a>Brad Duncanobama224 distribution Qakbot tries .vhd (virtual hard disk) images
2022-11-19/a>Guy BruneauMcAfee Fake Antivirus Phishing Campaign is Back!
2022-10-15/a>Guy BruneauMalware - Covid Vaccination Supplier Declaration
2022-08-19/a>Brad DuncanBrazil malspam pushes Astaroth (Guildma) malware
2022-07-07/a>Brad DuncanEmotet infection with Cobalt Strike
2022-06-17/a>Brad DuncanMalspam pushes Matanbuchus malware, leads to Cobalt Strike
2022-04-06/a>Brad DuncanWindows MetaStealer Malware
2022-03-16/a>Brad DuncanQakbot infection with Cobalt Strike and VNC activity
2022-02-09/a>Brad DuncanExample of Cobalt Strike from Emotet infection
2022-01-25/a>Brad DuncanEmotet Stops Using 0.0.0.0 in Spambot Traffic
2021-12-31/a>Jan KoprivaDo you want your Agent Tesla in the 300 MB or 8 kB package?
2021-12-22/a>Brad DuncanDecember 2021 Forensic Contest: Answers and Analysis
2021-12-20/a>Jan KoprivaPowerPoint attachments, Agent Tesla and code reuse in malware
2021-11-16/a>Brad DuncanEmotet Returns
2021-10-22/a>Brad DuncanOctober 2021 Contest: Forensic Challenge
2021-09-17/a>Xavier MertensMalicious Calendar Subscriptions Are Back?
2021-09-02/a>Xavier MertensAttackers Will Always Abuse Major Events in our Lifes
2021-08-13/a>Brad DuncanExample of Danabot distributed through malspam
2021-07-26/a>Didier StevensFailed Malspam: Recovering The Password
2021-07-14/a>Jan KoprivaOne way to fail at malspam - give recipients the wrong password for an encrypted attachment
2021-05-29/a>Guy BruneauSpear-phishing Email Targeting Outlook Mail Clients
2021-04-16/a>Rick WannerQuerying Spamhaus for IP reputation
2021-04-06/a>Jan KoprivaMalspam with Lokibot vs. Outlook and RFCs
2021-03-05/a>Xavier MertensSpam Farm Spotted in the Wild
2021-02-24/a>Brad DuncanMalspam pushes GuLoader for Remcos RAT
2021-02-17/a>Brad DuncanMalspam pushing Trickbot gtag rob13
2021-01-20/a>Brad DuncanQakbot activity resumes after holiday break
2021-01-13/a>Brad DuncanHancitor activity resumes after a hoilday break
2020-12-09/a>Brad DuncanRecent Qakbot (Qbot) activity
2020-10-31/a>Didier StevensMore File Selection Gaffes
2020-10-14/a>Brad DuncanMore TA551 (Shathak) Word docs push IcedID (Bokbot)
2020-08-07/a>Brad DuncanTA551 (Shathak) Word docs push IcedID (Bokbot)
2020-07-10/a>Brad DuncanExcel spreasheet macro kicks off Formbook infection
2020-06-16/a>Johannes UllrichOdd "Protest" Spam (Scam?) Targeting Atlanta Police Foundation
2020-06-10/a>Brad DuncanJob application-themed malspam pushes ZLoader
2020-05-13/a>Brad DuncanMalspam with links to zip archives pushes Dridex malware
2020-04-08/a>Brad DuncanGerman malspam pushes ZLoader malware
2020-04-01/a>Brad DuncanQakbot malspam sent from an infected Windows host
2020-03-25/a>Brad DuncanRecent Dridex activity
2020-03-05/a>Xavier MertensWill You Put Your Password in a Survey?
2020-02-12/a>Brad DuncanMalpsam pushes Ursnif through Italian language Word docs
2020-02-03/a>Jan KoprivaAnalysis of a triple-encrypted AZORult downloader
2020-01-22/a>Brad DuncanGerman language malspam pushes Ursnif
2020-01-16/a>Jan KoprivaPicks of 2019 malware - the large, the small and the one full of null bytes
2019-12-18/a>Brad DuncanEmotet infection with spambot activity
2019-12-11/a>Brad DuncanGerman language malspam pushes yet another wave of Trickbot
2019-12-03/a>Brad DuncanUrsnif infection with Dridex
2019-11-20/a>Brad DuncanHancitor infection with Pony, Evil Pony, Ursnif, and Cobalt Strike
2019-11-13/a>Brad DuncanAn example of malspam pushing Lokibot malware, November 2019
2019-11-09/a>Guy BruneauFake Netflix Update Request by Text
2019-11-06/a>Brad DuncanMore malspam pushing Formbook
2019-10-02/a>Brad DuncanA recent example of Emotet malspam
2019-10-01/a>Johannes UllrichA Quick Look at Some Current Comment Spam
2019-09-25/a>Brad DuncanMalspam pushing Quasar RAT
2019-09-18/a>Brad DuncanEmotet malspam is back
2019-06-18/a>Brad DuncanMalspam with password-protected Word docs pushing Dridex
2019-04-07/a>Guy BruneauFake Office 365 Payment Information Update
2019-03-21/a>Xavier MertensNew Wave of Extortion Emails: Central Intelligence Agency Case
2019-03-13/a>Brad DuncanMalspam pushes Emotet with Qakbot as the follow-up malware
2019-03-06/a>Brad DuncanMalspam with password-protected word docs still pushing IcedID (Bokbot) with Trickbot
2019-02-20/a>Brad DuncanMore Russian language malspam pushing Shade (Troldesh) ransomware
2019-02-06/a>Brad DuncanHancitor malspam and infection traffic from Tuesday 2019-02-05
2019-01-24/a>Brad DuncanMalspam with Word docs uses macro to run Powershell script and steal system data
2019-01-16/a>Brad DuncanEmotet infections and follow-up malware
2019-01-10/a>Brad DuncanHeartbreaking Emails: "Love You" Malspam
2018-12-18/a>Brad DuncanMalspam links to password-protected Word docs that push IcedID (Bokbot)
2018-12-05/a>Brad DuncanCampaign evolution: Hancitor changes its Word macros
2018-12-04/a>Brad DuncanMalspam pushing Lokibot malware
2018-11-29/a>Brad DuncanRussian language malspam pushing Shade (Troldesh) ransomware
2018-11-15/a>Brad DuncanEmotet infection with IcedID banking Trojan
2018-11-14/a>Brad DuncanDay in the life of a researcher: Finding a wave of Trickbot malspam
2018-10-31/a>Brad DuncanMore malspam using password-protected Word docs
2018-10-30/a>Brad DuncanCampaign evolution: Hancitor malspam starts pushing Ursnif this week
2018-10-05/a>Jim ClausingA strange spam
2018-09-26/a>Brad DuncanOne Emotet infection leads to three follow-up malware infections
2018-08-15/a>Brad DuncanMore malspam pushing password-protected Word docs for AZORult and Hermes Ransomware
2018-08-02/a>Brad DuncanDHL-themed malspam reveals embedded malware in animated gif
2018-07-27/a>Brad DuncanMalspam with password-protected Word docs pushes Hermes ransomware
2018-07-24/a>Brad DuncanRecent Emotet activity
2018-06-18/a>Xavier MertensMalicious JavaScript Targeting Mobile Browsers
2018-06-13/a>Xavier MertensA Bunch of Compromized Wordpress Sites
2018-03-02/a>Xavier MertensCommon Patterns Used in Phishing Campaigns Files
2018-02-01/a>Xavier MertensAdaptive Phishing Kit
2017-12-18/a>Didier StevensPhish or scam? - Part 2
2017-12-17/a>Didier StevensPhish or scam? - Part 1
2017-11-30/a>Brad DuncanMore Malspam pushing Emotet malware
2017-10-19/a>Brad DuncanHSBC-themed malspam uses ISO attachments to push Loki Bot malware
2017-10-17/a>Brad DuncanHancitor malspam uses DDE attack
2017-09-18/a>Xavier MertensGetting some intelligence from malspam
2017-09-01/a>Brad DuncanMalspam pushing Locky ransomware tries HoeflerText notifications for Chrome and FireFox
2017-08-14/a>Didier StevensSometimes it's just SPAM
2017-07-26/a>Brad DuncanMalspam pushing Emotet malware
2017-07-14/a>Brad DuncanNemucodAES and the malspam that distributes it
2017-06-28/a>Brad DuncanCatching up with Blank Slate: a malspam campaign still going strong
2017-05-24/a>Brad DuncanJaff ransomware gets a makeover
2017-04-11/a>Brad DuncanDridex malspam seen on Monday 2017-04-10
2017-03-28/a>Xavier MertensLogical & Physical Security Correlation
2017-02-10/a>Brad DuncanHancitor/Pony malspam
2016-10-25/a>Xavier MertensAnother Day, Another Spam...
2016-10-19/a>Xavier MertensSpam Delivered via .ICS Files
2016-06-20/a>Xavier MertensOngoing Spam Campaign Related to Swift
2016-05-12/a>Xavier MertensAnother Day, Another Wave of Phishing Emails
2015-12-06/a>Mark HofmanMalware SPAM a new run has started.
2015-09-01/a>Daniel WesemannGift card from Marriott?
2015-06-22/a>Johannes UllrichSMTP Brute Forcing
2015-04-09/a>Brad DuncanAn example of the malicious emails sometimes sent to the ISC handler addresses
2015-03-23/a>Rick WannerInteresting Home Depot Spam
2015-01-31/a>Guy BruneauBeware of Phishing and Spam Super Bowl Fans!
2014-09-17/a>Daniel WesemannYour online background check is now public!
2014-08-05/a>Johannes UllrichLegal Threat Spam: Sometimes it Gets Personal
2014-06-17/a>Rob VandenBrinkCanada's Anti-Spam Legislation (CASL) 2014
2014-06-08/a>Guy Bruneauefax Spam Containing Malware
2014-04-05/a>Jim ClausingThose strange e-mails with URLs in them can lead to Android malware
2014-03-22/a>Guy BruneauHow the Compromise of a User Account Lead to a Spam Incident
2014-02-21/a>Johannes UllrichUPS Malware Spam Using Fake SPF Headers
2014-01-24/a>Johannes UllrichHow to send mass e-mail the right way
2013-12-24/a>Daniel WesemannMr Jones wants you to appear in court!
2013-10-17/a>Adrien de BeaupreNew spamming technique - onmicrosoft.com
2013-09-30/a>Adrien de BeaupreTwitter DM spam/malware
2013-09-03/a>Rob VandenBrinkIs "Reputation Backscatter" a Thing?
2013-07-18/a>Chris MohanBlog Spam - annoying junk or a source of intelligence?
2013-03-28/a>John BambenekWhere Were You During the Great DDoS Cybergeddon of 2013?
2013-03-26/a>Daniel WesemannHow your Webhosting Account is Getting Abused
2013-03-18/a>Kevin ShorttSpamhaus DDOS
2013-02-08/a>Kevin ShorttIs it Spam or Is it Malware?
2012-12-06/a>Daniel WesemannRich Quick Make Money!
2012-10-10/a>Kevin ShorttFacebook Scam Spam
2012-09-09/a>Guy BruneauPhishing/Spam Pretending to be from BBB
2012-08-22/a>Adrien de BeauprePhishing/spam via SMS
2012-03-21/a>Johannes UllrichVirus Bulletin Spam Filter Test
2012-02-17/a>Mark HofmanIntersting Facebook SPAM
2011-11-28/a>Rob VandenBrinkIt's Cyber Monday - Click Here!
2011-11-16/a>Adrien de BeaupreGET BACK TO ME ASAP
2011-10-20/a>Johannes UllrichEvil Printers Sending Mail
2011-08-31/a>Johannes UllrichPhishing e-mail to custom e-mail addresses
2011-06-30/a>Guy BruneauSymantec Report - Spam Surge against Social Networks
2011-06-27/a>Kevin ShorttPhishy Spam
2011-06-08/a>Johannes UllrichSpam from compromised Hotmail accounts
2011-03-29/a>Daniel WesemannRequesting deletion of "free" email and chat accounts
2011-01-11/a>Kevin ShorttSpam Cannons on Holiday
2010-12-03/a>Mark HofmanT'is the season to be SPAMMY, trallalalaa la la la laaa
2010-11-22/a>Lenny ZeltserAdobe Acrobat Spam Going Strong - More to Come?
2010-09-18/a>Rick WannerI'm fine, thanks!
2010-08-29/a>Swa FrantzenAbandoned free email accounts
2010-07-15/a>Deborah HaleBe on the Alert
2010-07-03/a>Deborah HaleDelivery Status Failure Notice That Packed A Wallop
2010-06-21/a>Adrien de BeaupreGoDaddy Scam/Phish/Spam
2010-06-10/a>Deborah HaleAnother Morning of Fun
2010-06-02/a>Rob VandenBrinkSPAM pretending to be from Habitat for Humanity
2010-04-22/a>Deborah HaleDon't Be Fooled by Twitter Spam in Your Inbox
2010-04-13/a>Johannes UllrichMore Legal Threat Malware E-Mail
2010-03-17/a>Deborah HaleSpam was killing us! Here is what we did to help!
2010-03-15/a>Adrien de BeaupreSpamassassin Milter Plugin Remote Root Attack
2010-02-03/a>Johannes UllrichAnatomy of a Form Spam Campaign (in progress against isc.sans.org right now) https://blogs.sans.org/appsecstreetfighter/
2009-12-02/a>Rob VandenBrinkSPAM and Malware taking advantage of H1N1 concerns
2009-11-03/a>Andre LudwigSURBL now posting abuse statistics for TLD's
2009-10-12/a>Mark HofmanSome interesting SSL SPAM
2009-10-08/a>Johannes UllrichCyber Security Awareness Month - Day 8 - Port 25 - SMTP
2009-10-07/a>Joel EslerSpam rate increase is seen
2009-09-10/a>Johannes UllrichHealthcare Spam
2009-07-28/a>Adrien de BeaupreTwitter spam/phish
2009-06-25/a>Mark HofmanMichael J & Farrah F death SPAM
2009-06-20/a>Scott FendleySituational Awareness: Spam Crisis and China
2009-04-06/a>Adrien de BeaupreAbuse addresses
2009-01-25/a>Rick WannerTwam?? Twammers?
2009-01-16/a>G. N. White...and all that SPAM - Evolution of Spam Bots in 2009
2008-09-09/a>Swa FrantzenThe complaint that's an attack
2008-08-13/a>Adrien de BeaupreCNN switched to MSNBC
2008-08-10/a>Stephen HallFake IE 7 update spam doing the rounds
2008-08-06/a>Bojan ZdrnjaWhen spammers use your own e-mails
2008-08-05/a>Daniel WesemannThe news update you never asked for
2008-05-02/a>Adrien de BeaupreHi, remember me?...
2008-04-22/a>donald smithSpam to your calendar via Google agenda?
2008-03-26/a>Raul SilesORDB.org blocklisting all IP addresses
2006-10-08/a>Swa FrantzenSpam Backscatter