2025-03-20 | Johannes Ullrich | Some new Data Feeds, and a little "incident". |
2025-02-17 | Russ McRee | ModelScan - Protection Against Model Serialization Attacks |
2024-08-23 | Jesse La Grew | Pandas Errors: What encoding are my logs in? |
2024-08-16 | Jesse La Grew | [Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools |
2023-08-25 | Xavier Mertens | Python Malware Using Postgresql for C2 Communications |
2023-07-23 | Guy Bruneau | Install & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs |
2023-05-24 | Jesse La Grew | More Data Enrichment for Cowrie Logs |
2023-05-09 | Russ McRee | Exploratory Data Analysis with CISSM Cyber Attacks Database - Part 2 |
2022-06-10 | Russ McRee | EPSScall: An Exploit Prediction Scoring System App |
2021-12-28 | Russ McRee | LotL Classifier tests for shells, exfil, and miners |
2021-10-20 | Xavier Mertens | Thanks to COVID-19, New Types of Documents are Lost in The Wild |
2021-08-29 | Guy Bruneau | Filter JSON Data by Value with Linux jq |
2021-07-04 | Didier Stevens | DIY CD/DVD Destruction - Follow Up |
2021-06-27 | Didier Stevens | DIY CD/DVD Destruction |
2021-02-01 | Rob VandenBrink | Taking a Shot at Reverse Shell Attacks, CNC Phone Home and Data Exfil from Servers |
2021-01-29 | Xavier Mertens | Sensitive Data Shared with Cloud Services |
2020-07-04 | Russ McRee | Happy FouRth of July from the Internet Storm Center |
2020-03-14 | Didier Stevens | Phishing PDF With Incremental Updates. |
2020-02-28 | Xavier Mertens | Show me Your Clipboard Data! |
2019-05-19 | Guy Bruneau | Is Metadata Only Approach, Good Enough for Network Traffic Analysis? |
2018-07-04 | Didier Stevens | XPS Metadata |
2018-06-16 | Russ McRee | Anomaly Detection & Threat Hunting with Anomalize |
2017-12-16 | Xavier Mertens | Microsoft Office VBA Macro Obfuscation via Metadata |
2017-08-07 | Xavier Mertens | Increase of phpMyAdmin scans |
2017-05-28 | Guy Bruneau | CyberChef a Must Have Tool in your Tool bag! |
2017-02-01 | Xavier Mertens | Quick Analysis of Data Left Available by Attackers |
2017-01-06 | John Bambenek | Great Misadventures of Security Vendors: Absurd Sandboxing Edition |
2016-09-22 | Rick Wanner | YAHDD! (Yet another HUGE data Breach!) |
2016-08-31 | Deborah Hale | Dropbox Breach |
2016-08-19 | Xavier Mertens | Data Classification For the Masses |
2016-07-03 | Guy Bruneau | Is Data Privacy part of your Company's Culture? |
2016-06-20 | Xavier Mertens | Using Your Password Manager to Monitor Data Leaks |
2016-02-22 | Xavier Mertens | Reducing False Positives with Open Data Sources |
2016-01-30 | Xavier Mertens | All CVE Details at Your Fingertips |
2015-09-01 | Daniel Wesemann | Encryption of "data at rest" in servers |
2015-07-31 | Russ McRee | Tech tip: Invoke a system command in R |
2015-07-31 | Russ McRee | Tech tip follow-up: Using the data Invoked with R's system command |
2015-05-23 | Guy Bruneau | Business Value in "Big Data" |
2015-03-21 | Russell Eubanks | Have you seen my personal information? It has been lost. Again. |
2014-12-01 | Guy Bruneau | Do you have a Data Breach Response Plan? |
2014-02-04 | Johannes Ullrich | Odd ICMP Echo Request Payload |
2013-10-16 | Adrien de Beaupre | Access denied and blockliss |
2013-07-06 | Guy Bruneau | Is Metadata the Magic in Modern Network Security? |
2012-12-03 | John Bambenek | John McAfee Exposes His Location in Photo About His Being on Run |
2012-11-30 | Daniel Wesemann | Snipping Leaks |
2012-11-22 | Kevin Liston | Greek National Arrested on Suspicion of Theft of 9M Records on Fellow Greeks |
2012-01-16 | Kevin Shortt | Zappos Breached |
2011-04-20 | Daniel Wesemann | Data Breach Investigations Report published by Verizon |
2011-01-12 | Richard Porter | How Many Loyalty Cards do you Carry? |
2011-01-12 | Richard Porter | Yet Another Data Broker? AOL Lifestream. |
2010-09-26 | Daniel Wesemann | Egosurfing, the corporate way |
2010-07-29 | Rob VandenBrink | The 2010 Verizon Data Breach Report is Out |
2010-04-27 | Rob VandenBrink | Layer 2 Security - L2TPv3 for Disaster Recovery Sites |
2010-04-22 | John Bambenek | Data Redaction: You're Doing it Wrong |
2010-02-10 | Marcus Sachs | Datacenters and Directory Traversals |
2009-10-19 | Daniel Wesemann | Backed up, lately ? |
2009-09-07 | Lorna Hutcheson | Encrypting Data |
2009-07-28 | Adrien de Beaupre | YYAMCCBA |
2009-04-24 | John Bambenek | Data Leak Prevention: Proactive Security Requirements of Breach Notification Laws |
2009-04-15 | Marcus Sachs | 2009 Data Breach Investigation Report |
2009-03-02 | Swa Frantzen | Obama's leaked chopper blueprints: anything we can learn? |
2009-01-30 | Mark Hofman | We all "Love" USB drives |
2008-12-17 | donald smith | Team CYMRU's Malware Hash Registry |
2008-08-25 | John Bambenek | Thoughts on the Best Western Compromise |