Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: Diaries by Keyword Diaries by Keyword

Watch ISC TV. Great for NOCs, SOCs and Living Rooms: https://isctv.sans.edu

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Date Author Title

EMAIL PASSWORD HACKS

2018-08-22Deborah HaleEmail/password Frustration

EMAIL

2019-12-06/a>Jan KoprivaPhishing with a self-contained credentials-stealing webpage
2019-12-05/a>Jan KoprivaE-mail from Agent Tesla
2019-12-04/a>Jan KoprivaAnalysis of a strangely poetic malware
2019-11-26/a>Jan KoprivaLessons learned from playing a willing phish
2019-10-31/a>Jan KoprivaEML attachments in O365 - a recipe for phishing
2019-10-30/a>Xavier MertensKeep an Eye on Remote Access to Mailboxes
2019-10-17/a>Jan KoprivaPhishing e-mail spoofing SPF-enabled domain
2019-04-13/a>Johannes UllrichConfiguring MTA-STS and TLS Reporting For Your Domain
2019-04-07/a>Guy BruneauFake Office 365 Payment Information Update
2019-03-21/a>Xavier MertensNew Wave of Extortion Emails: Central Intelligence Agency Case
2019-03-06/a>Xavier MertensKeep an Eye on Disposable Email Addresses
2019-02-19/a>Didier StevensIdentifying Files: Failure Happens
2019-02-11/a>Didier StevensHave You Seen an Email Virus Recently?
2018-12-21/a>Lorna HutchesonPhishing Attempts That Bypass 2FA
2018-08-23/a>Xavier MertensSimple Phishing Through formcrafts.com
2018-08-22/a>Deborah HaleEmail/password Frustration
2018-08-19/a>Didier StevensVideo: Peeking into msg files - revisited
2018-08-11/a>Didier StevensPeeking into msg files - revisited
2018-07-23/a>Didier StevensAnalyzing MSG files
2018-07-15/a>Didier StevensExtracting BTC addresses from emails
2018-06-22/a>Lorna HutchesonXPS Attachment Used for Phishing
2017-11-10/a>Bojan ZdrnjaBattling e-mail phishing
2017-10-15/a>Didier StevensPeeking into .msg files
2017-08-14/a>Didier StevensSometimes it's just SPAM
2015-02-20/a>Tom WebbFast analysis of a Tax Scam
2014-07-09/a>Daniel WesemannWho owns your typo?
2014-01-31/a>Chris MohanAttack on Yahoo mail accounts
2014-01-24/a>Johannes UllrichHow to send mass e-mail the right way
2014-01-08/a>Kevin ShorttIntercepted Email Attempts to Steal Payments
2013-10-05/a>Richard PorterAdobe Breach Notification, Notifications?
2013-03-29/a>Chris MohanFake Link removal requests
2013-02-25/a>Johannes UllrichMass-Customized Malware Lures: Don't trust your cat!
2012-06-15/a>Johannes UllrichAuthenticating E-Mail
2012-02-07/a>Johannes UllrichSecure E-Mail Access
2011-05-01/a>Deborah HaleAnother Potentially Malicious Email Making The Rounds
2011-02-21/a>Adrien de BeaupreWinamp forums compromised
2010-09-09/a>Marcus Sachs'Here You Have' Email
2010-08-29/a>Swa FrantzenAbandoned free email accounts
2010-05-23/a>Manuel Humberto Santander Pelaeze-mail scam announcing Fidel Castro's funeral ... and nasty malware to your computer.
2010-03-05/a>Kyle HaugsnessFalse scare email proclaiming North Korea nuclear launch against Japan
2009-10-15/a>Deborah HaleCyber Security Awareness Month - Day 15 - Ports 995, 465, and 993 - Secure Email
2009-10-09/a>Rob VandenBrinkTHAWTE to discontinue free Email Certificate Services and Web of Trust Service
2009-10-08/a>Johannes UllrichCyber Security Awareness Month - Day 8 - Port 25 - SMTP
2009-05-04/a>Tom ListonFacebook phishing malware
2009-01-11/a>Deborah HaleThe Frustration of Phishing Attacks
2008-11-30/a>Mari NicholsRejected Email Issues

PASSWORD

2019-11-01/a>Didier StevensTip: Password Managers and 2FA
2018-12-17/a>Didier StevensPassword Protected ZIP with Maldoc
2018-08-22/a>Deborah HaleEmail/password Frustration
2018-07-12/a>Johannes UllrichNew Extortion Tricks: Now Including Your Password!
2017-11-28/a>Xavier MertensApple High Sierra Uses a Passwordless Root Account
2017-05-17/a>Richard PorterWait What? We don?t have to change passwords every 90 days?
2017-04-26/a>Johannes UllrichIf there are some unexploited MSSQL Servers With Weak Passwords Left: They got you now (again)
2017-04-10/a>Didier StevensPassword History: Insights Shared by a Reader
2017-02-07/a>Johannes UllrichMy Password is [taco] Using Emojis for Stronger Passwords
2016-12-07/a>Xavier MertensThe Passwords You Should Never Use
2016-09-15/a>Xavier MertensIn Need of a OTP Manager Soon?
2016-07-21/a>Didier StevensPractice ntds.dit File
2016-06-20/a>Xavier MertensUsing Your Password Manager to Monitor Data Leaks
2015-06-26/a>Daniel WesemannCisco default credentials - again!
2014-09-19/a>Guy BruneauAdded today in oclhashcat 131 Django [Default Auth] (PBKDF2 SHA256 Rounds Salt) Support - http://hashcat.net/hashcat/
2014-08-22/a>Richard PorterOCLHashCat 1.30 Released
2014-08-06/a>Johannes UllrichAll Passwords have been lost: What's next?
2014-05-22/a>Rob VandenBrinkAnother Site Breached - Time to Change your Passwords! (If you can that is)
2013-11-22/a>Rick WannerTales of Password Reuse
2013-07-21/a>Guy BruneauUbuntu Forums Security Breach
2013-06-11/a>Swa FrantzenStore passwords the right way in your application
2013-05-14/a>Jim ClausingSo what passwords are those ssh scanners trying?
2013-03-18/a>Kevin ShorttCisco IOS Type 4 Password Issue: http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20130318-type4
2013-01-18/a>Russ McReeInteresting reads for Friday 18 JAN 2013
2013-01-04/a>Daniel WesemannBlue for Reset?
2012-11-15/a>Jim ClausingAnother month another password disclosure breach
2012-07-16/a>Jim ClausingAn analysis of the Yahoo! passwords
2012-06-06/a>Jim ClausingPotential leak of 6.5+ million LinkedIn password hashes
2012-05-22/a>Johannes Ullrichnmap 6 released
2012-01-03/a>Rick WannerAnalysis of the Stratfor Password List
2011-10-10/a>Tom ListonWhat's In A Name?
2011-08-10/a>Johannes UllrichTheoretical and Practical Password Entropy
2011-06-28/a>Johannes UllrichHashing Passwords
2011-05-30/a>Johannes UllrichAllied Telesis Passwords Leaked
2010-12-28/a>John BambenekMozilla Notifies of Relatively Minor Security Breach
2010-12-15/a>Manuel Humberto Santander PelaezHP StorageWorks P2000 G3 MSA hardcoded user
2010-12-13/a>Deborah HaleGawker Media Breach of Security
2010-11-26/a>Mark HofmanUsing password cracking as metric/indicator for the organisation's security posture
2010-08-27/a>Mark HofmanFTP Brute Password guessing attacks
2010-02-25/a>Chris CarboniPass The Hash
2010-02-02/a>Johannes UllrichTwitter Mass Password Reset due to Phishing
2009-12-04/a>Daniel WesemannThe economics of security advice (MSFT research paper)
2009-11-02/a>Daniel WesemannPassword rules: Change them every 25 years
2009-10-23/a>Johannes UllrichLittle new tool: reversing md5/sha1 hashes http://isc.sans.org/tools/reversehash.html
2008-09-22/a>Jim ClausingLessons learned from the Palin (and other) account hijacks

HACKS

2018-08-22/a>Deborah HaleEmail/password Frustration
2008-05-08/a>Joel EslerCOMPROMISED FILE IN VIETNAMESE LANGUAGE PACK FOR FIREFOX 2
2008-03-12/a>Joel EslerAdobe security updates
2006-10-17/a>Arrigo TriulziHacking Tor, the anonymity onion routing network