2024-01-17 | Jesse La Grew | Number Usage in Passwords |
2023-10-29 | Guy Bruneau | Spam or Phishing? Looking for Credentials & Passwords |
2023-09-29 | Xavier Mertens | Are You Still Storing Passwords In Plain Text Files? |
2023-09-02 | Jesse La Grew | What is the origin of passwords submitted to honeypots? |
2023-08-04 | Xavier Mertens | Are Leaked Credentials Dumps Used by Attackers? |
2023-04-19 | Rob VandenBrink | Taking a Bite Out of Password Expiry Helpdesk Calls |
2022-08-13 | Guy Bruneau | Phishing HTML Attachment as Voicemail Audio Transcription |
2022-03-10 | Xavier Mertens | Credentials Leaks on VirusTotal |
2021-01-06 | Johannes Ullrich | Scans for Zyxel Backdoors are Commencing. |
2017-05-17 | Richard Porter | Wait What? We don?t have to change passwords every 90 days? |
2016-06-20 | Xavier Mertens | Using Your Password Manager to Monitor Data Leaks |
2015-06-26 | Daniel Wesemann | Cisco default credentials - again! |
2014-08-06 | Johannes Ullrich | All Passwords have been lost: What's next? |
2013-05-14 | Jim Clausing | So what passwords are those ssh scanners trying? |
2012-07-16 | Jim Clausing | An analysis of the Yahoo! passwords |
2012-06-06 | Jim Clausing | Potential leak of 6.5+ million LinkedIn password hashes |
2011-10-10 | Tom Liston | What's In A Name? |
2011-08-10 | Johannes Ullrich | Theoretical and Practical Password Entropy |
2011-06-28 | Johannes Ullrich | Hashing Passwords |
2011-05-30 | Johannes Ullrich | Allied Telesis Passwords Leaked |
2010-12-13 | Deborah Hale | Gawker Media Breach of Security |
2010-02-02 | Johannes Ullrich | Twitter Mass Password Reset due to Phishing |
2009-12-04 | Daniel Wesemann | The economics of security advice (MSFT research paper) |
2008-09-22 | Jim Clausing | Lessons learned from the Palin (and other) account hijacks |