Date Author Title
2023-03-28Jesse La GrewNetwork Data Collector Placement Makes a Difference
2023-02-12Jesse La GrewPCAP Data Analysis with Zeek
2022-08-14Johannes UllrichRealtek SDK SIP ALG Vulnerability: A Big Deal, but not much you can do about it. CVE 2022-27255
2022-02-03Johannes UllrichKeeping Track of Your Attack Surface for Cheap
2021-04-10Guy BruneauBuilding an IDS Sensor with Suricata & Zeek with Logs to ELK
2021-01-15Brad DuncanThrowback Friday: An Example of Rig Exploit Kit
2020-11-16Jan KoprivaHeartbleed, BlueKeep and other vulnerabilities that didn't disappear just because we don't talk about them anymore
2019-11-10Jan KoprivaDid the recent malicious BlueKeep campaign have any positive impact when it comes to patching?
2019-11-05Rick WannerBluekeep exploitation causing Bluekeep vulnerability scan to fail
2019-08-14Brad DuncanRecent example of MedusaHTTP malware
2019-08-05Rick WannerScanning for Bluekeep vulnerable RDP instances
2019-05-22Johannes UllrichAn Update on the Microsoft Windows RDP "Bluekeep" Vulnerability (CVE-2019-0708) [now with pcaps]
2017-02-09Brad DuncanCryptoShield Ransomware from Rig EK
2016-08-31Deborah HaleAngler Exploit Kits Reported
2016-04-21Daniel WesemannDecoding Pseudo-Darkleech (#1)
2016-04-21Daniel WesemannDecoding Pseudo-Darkleech (Part #2)
2015-07-27Daniel WesemannAngler's best friends
2015-05-03Russ McReeVolDiff, for memory image differential analysis
2015-04-02Brad DuncanAngler Exploit Kit - Recent Traffic Patterns
2015-04-01Brad DuncanRig Exploit Kit Changes Traffic Patterns
2014-03-07Tom WebbLinux Memory Dump with Rekall
2014-03-02Stephen HallSunday Reading
2009-10-02Stephen HallNew SysInternal fun for the weekend