Date Author Title

SPEAR PHISHING

2018-05-24Xavier Mertens"Blocked" Does Not Mean "Forget It"
2012-08-17Guy BruneauSuspicious eFax Spear Phishing Messages
2008-04-14John BambenekA Federal Subpoena or Just Some More Spam & Malware?

SPEAR

2021-05-29/a>Guy BruneauSpear-phishing Email Targeting Outlook Mail Clients
2019-08-15/a>Didier StevensAnalysis of a Spearphishing Maldoc
2018-05-24/a>Xavier Mertens"Blocked" Does Not Mean "Forget It"
2012-08-17/a>Guy BruneauSuspicious eFax Spear Phishing Messages
2011-07-19/a>Richard PorterSMS Phishing at the SANSFire 2011 Handler Dinner
2008-04-14/a>John BambenekA Federal Subpoena or Just Some More Spam & Malware?

PHISHING

2024-10-14/a>Xavier MertensPhishing Page Delivered Through a Blob URL
2024-07-16/a>Jan Kopriva"Reply-chain phishing" with a twist
2024-03-14/a>Jan KoprivaIncrease in the number of phishing messages pointing to IPFS and to R2 buckets
2024-02-21/a>Jan KoprivaPhishing pages hosted on archive.org
2023-11-17/a>Jan KoprivaPhishing page with trivial anti-analysis features
2023-11-08/a>Xavier MertensExample of Phishing Campaign Project File
2023-10-29/a>Guy BruneauSpam or Phishing? Looking for Credentials & Passwords
2023-10-16/a>Jan KoprivaAre typos still relevant as an indicator of phishing?
2023-09-26/a>Jan KoprivaA new spin on the ZeroFont phishing technique
2023-09-03/a>Didier StevensAnalysis of a Defective Phishing PDF
2023-08-31/a>Jan KoprivaThe low, low cost of (committing) cybercrime
2023-08-18/a>Xavier MertensFrom a Zalando Phishing to a RAT
2023-06-21/a>Yee Ching TokAnalyzing a YouTube Sponsorship Phishing Mail and Malware Targeting Content Creators
2023-06-16/a>Xavier MertensAnother RAT Delivered Through VBS
2023-05-20/a>Xavier MertensPhishing Kit Collecting Victim's IP Address
2023-05-15/a>Jan KoprivaOngoing Facebook phishing campaign without a sender and (almost) without links
2023-05-01/a>Jan Kopriva"Passive" analysis of a phishing attachment
2023-04-26/a>Yee Ching TokStrolling through Cyberspace and Hunting for Phishing Sites
2023-04-03/a>Johannes UllrichTax Season Risks
2023-03-31/a>Jan KoprivaUse of X-Frame-Options and CSP frame-ancestors security headers on 1 million most popular domains
2023-03-20/a>Xavier MertensFrom Phishing Kit To Telegram... or Not!
2023-03-15/a>Jan KoprivaIPFS phishing and the need for correctly set HTTP security headers
2023-03-12/a>Guy BruneauAsynRAT Trojan - Bill Payment (Pago de la factura)
2023-02-27/a>Xavier MertensPhishing Again and Again
2023-02-21/a>Xavier MertensPhishing Page Branded with Your Corporate Website
2023-02-18/a>Guy BruneauSpear Phishing Handlers for Username/Password
2023-02-16/a>Jan KoprivaHTML phishing attachment with browser-in-the-browser technique
2022-11-24/a>Xavier MertensAttackers Keep Phishing Victims Under Stress
2022-11-19/a>Guy BruneauMcAfee Fake Antivirus Phishing Campaign is Back!
2022-10-27/a>Tom WebbSupersizing your DUO and 365 Integration
2022-10-04/a>Johannes UllrichCredential Harvesting with Telegram API
2022-09-21/a>Xavier MertensPhishing Campaigns Use Free Online Resources
2022-09-10/a>Guy BruneauPhishing Word Documents with Suspicious URL
2022-08-26/a>Xavier MertensPaypal Phishing/Coinbase in One Image
2022-08-13/a>Guy BruneauPhishing HTML Attachment as Voicemail Audio Transcription
2022-07-22/a>Yee Ching TokAn Analysis of a Discerning Phishing Website
2022-07-13/a>Xavier MertensUsing Referers to Detect Phishing Attacks
2022-06-01/a>Jan KoprivaHTML phishing attachments - now with anti-analysis features
2022-05-18/a>Jan KoprivaDo you want 30 BTC? Nothing is easier (or cheaper) in this phishing campaign...
2022-05-14/a>Didier StevensQuick Analysis Of Phishing MSG
2022-05-07/a>Guy BruneauPhishing PDF Received in my ISC Mailbox
2022-04-24/a>Didier StevensAnalyzing a Phishing Word Document
2022-04-07/a>Johannes UllrichWhat is BIMI and how is it supposed to help with Phishing.
2022-04-04/a>Johannes UllrichEmptying the Phishtank: Are WordPress sites the Mosquitoes of the Internet?
2022-02-13/a>Guy BruneauDHL Spear Phishing to Capture Username/Password
2022-01-31/a>Xavier MertensBe careful with RPMSG files
2022-01-28/a>Xavier MertensMalicious ISO Embedded in an HTML Page
2022-01-18/a>Jan KoprivaPhishing e-mail with...an advertisement?
2022-01-03/a>Xavier MertensMcAfee Phishing Campaign with a Nice Fake Scan
2021-12-23/a>Xavier MertensNicely Crafted indeed.com Login Page
2021-12-09/a>Yee Ching TokPhishing Direct Messages via Discord
2021-12-04/a>Guy BruneauA Review of Year 2021
2021-11-24/a>Jan KoprivaPhishing page hiding itself using dynamically adjusted IP-based allow list
2021-11-10/a>Xavier MertensShadow IT Makes People More Vulnerable to Phishing
2021-10-26/a>Yee Ching TokHunting for Phishing Sites Masquerading as Outlook Web Access
2021-09-16/a>Jan KoprivaPhishing 101: why depend on one suspicious message subject when you can use many?
2021-09-02/a>Xavier MertensAttackers Will Always Abuse Major Events in our Lifes
2021-08-03/a>Johannes UllrichIs this the Weirdest Phishing (SMishing?) Attempt Ever?
2021-07-28/a>Jan KoprivaA sextortion e-mail from...IT support?!
2021-07-14/a>Jan KoprivaOne way to fail at malspam - give recipients the wrong password for an encrypted attachment
2021-07-13/a>Johannes UllrichUSPS Phishing Using Telegram to Collect Data
2021-06-22/a>Jan KoprivaPhishing asking recipients not to report abuse
2021-05-29/a>Guy BruneauSpear-phishing Email Targeting Outlook Mail Clients
2021-05-22/a>Xavier Mertens"Serverless" Phishing Campaign
2021-04-19/a>Jan KoprivaHunting phishing websites with favicon hashes
2021-03-11/a>Johannes UllrichPiktochart - Phishing with Infographics
2021-02-26/a>Guy BruneauPretending to be an Outlook Version Update
2021-02-10/a>Brad DuncanPhishing message to the ISC handlers email distro
2020-10-22/a>Jan KoprivaBazarLoader phishing lures: plan a Halloween party, get a bonus and be fired in the same afternoon
2020-10-09/a>Jan KoprivaPhishing kits as far as the eye can see
2020-10-02/a>Xavier MertensAnalysis of a Phishing Kit
2020-09-21/a>Jan KoprivaSlightly broken overlay phishing
2020-09-20/a>Guy BruneauAnalysis of a Salesforce Phishing Emails
2020-06-18/a>Jan KoprivaBroken phishing accidentally exploiting Outlook zero-day
2020-06-15/a>Rick WannerHTML based Phishing Run
2020-05-27/a>Jan KoprivaFrankenstein's phishing using Google Cloud Storage
2020-05-02/a>Guy BruneauPhishing PDF with Unusual Hostname
2020-04-28/a>Jan KoprivaAgent Tesla delivered by the same phishing campaign for over a year
2020-04-18/a>Guy BruneauMaldoc Falsely Represented as DOCX Invoice Redirecting to Fake Apple Store
2020-04-13/a>Jan KoprivaLook at the same phishing campaign 3 months apart
2020-04-03/a>Xavier MertensObfuscated with a Simple 0x0A
2020-03-14/a>Didier StevensPhishing PDF With Incremental Updates.
2020-03-05/a>Xavier MertensWill You Put Your Password in a Survey?
2020-02-10/a>Jan KoprivaCurrent PayPal phishing campaign or "give me all your personal information"
2020-02-03/a>Jan KoprivaAnalysis of a triple-encrypted AZORult downloader
2020-01-24/a>Xavier MertensWhy Phishing Remains So Popular?
2020-01-16/a>Jan KoprivaPicks of 2019 malware - the large, the small and the one full of null bytes
2019-12-06/a>Jan KoprivaPhishing with a self-contained credentials-stealing webpage
2019-12-05/a>Jan KoprivaE-mail from Agent Tesla
2019-12-04/a>Jan KoprivaAnalysis of a strangely poetic malware
2019-11-26/a>Jan KoprivaLessons learned from playing a willing phish
2019-10-31/a>Jan KoprivaEML attachments in O365 - a recipe for phishing
2019-10-17/a>Jan KoprivaPhishing e-mail spoofing SPF-enabled domain
2019-08-15/a>Didier StevensAnalysis of a Spearphishing Maldoc
2019-08-09/a>Xavier Mertens100% JavaScript Phishing Page
2019-05-13/a>Xavier MertensFrom Phishing To Ransomware?
2019-04-17/a>Xavier MertensMalware Sample Delivered Through UDF Image
2019-02-28/a>Tom WebbPhishing impersonations
2019-02-07/a>Xavier Mertens Phishing Kit with JavaScript Keylogger
2019-02-03/a>Didier StevensVideo: Analyzing a Simple HTML Phishing Attachment
2019-01-29/a>Johannes UllrichA Not So Well Done Phish (Why Attackers need to Implement IPv6 Now! ;-) )
2019-01-02/a>Lorna HutchesonGift Card Scams on the rise
2018-12-27/a>Didier StevensMatryoshka Phish
2018-12-21/a>Lorna HutchesonPhishing Attempts That Bypass 2FA
2018-12-13/a>Xavier MertensPhishing Attack Through Non-Delivery Notification
2018-08-23/a>Xavier MertensSimple Phishing Through formcrafts.com
2018-08-12/a>Didier StevensA URL shortener handy for phishers
2018-07-01/a>Didier StevensVideo: Analyzing XPS Files
2018-06-30/a>Didier StevensXPS samples
2018-06-26/a>Didier StevensAnalyzing XPS files
2018-06-22/a>Lorna HutchesonXPS Attachment Used for Phishing
2018-05-24/a>Xavier Mertens"Blocked" Does Not Mean "Forget It"
2018-05-09/a>Xavier MertensNice Phishing Sample Delivering Trickbot
2018-03-12/a>Xavier MertensPayload delivery via SMB
2018-03-02/a>Xavier MertensCommon Patterns Used in Phishing Campaigns Files
2018-02-01/a>Xavier MertensAdaptive Phishing Kit
2018-01-31/a>Tom WebbTax Phishing Time
2018-01-20/a>Didier StevensAn RTF phish
2018-01-03/a>John BambenekPhishing to Rural America Leads to Six-figure Wire Fraud Losses
2018-01-02/a>Didier StevensPDF documents & URLs: video
2017-12-01/a>Xavier MertensPhishing Kit (Ab)Using Cloud Services
2017-11-23/a>Xavier MertensProactive Malicious Domain Search
2017-11-10/a>Bojan ZdrnjaBattling e-mail phishing
2017-11-05/a>Didier StevensExtracting the text from PDF documents
2017-11-04/a>Didier StevensPDF documents & URLs
2017-08-16/a>Xavier MertensAnalysis of a Paypal phishing kit
2017-08-13/a>Didier StevensThe Good Phishing Email
2017-07-16/a>Renato MarinhoSMS Phishing induces victims to photograph its own token card
2017-06-27/a>Brad DuncanA Tale of Two Phishies
2017-06-15/a>Bojan ZdrnjaUberscammers
2017-06-02/a>Xavier MertensPhishing Campaigns Follow Trends
2017-05-20/a>Xavier MertensTyposquatting: Awareness and Hunting
2017-05-03/a>Bojan ZdrnjaOAUTH phishing against Google Docs ? beware!
2017-04-18/a>Johannes UllrichYet Another Apple Phish and Some DNS Lessons Learned From It
2017-04-16/a>Johannes UllrichTool to Detect Active Phishing Attacks Using Unicode Look-Alike Domains
2017-03-28/a>Xavier MertensLogical & Physical Security Correlation
2017-03-24/a>Xavier MertensNicely Obfuscated JavaScript Sample
2017-03-06/a>Renato MarinhoA very convincing Typosquatting + Social Engineering campaign is targeting Santander corporate customers in Brazil
2017-02-01/a>Xavier MertensQuick Analysis of Data Left Available by Attackers
2017-01-10/a>Johannes UllrichRealtors Be Aware: You Are a Target
2017-01-04/a>John BambenekMixed Messages : Novel Phishing Attempts Trying to Steal Your E-mail Password Goes Wrong
2016-11-16/a>Xavier MertensExample of Getting Analysts & Researchers Away
2016-08-23/a>Xavier MertensVoice Message Notifications Deliver Ransomware
2016-06-29/a>Xavier MertensPhishing Campaign with Blurred Images
2016-05-12/a>Xavier MertensAnother Day, Another Wave of Phishing Emails
2016-02-07/a>Xavier MertensMore Malicious JavaScript Obfuscation
2016-01-13/a>Alex StanfordYou Have Got a New Audio Message - Guest Diary by Pasquale Stirparo
2015-01-31/a>Guy BruneauBeware of Phishing and Spam Super Bowl Fans!
2014-09-16/a>Daniel Wesemannhttps://yourfakebank.support -- TLD confusion starts!
2014-03-27/a>Alex StanfordApple Credential Phishing via appleidconfirm.net
2014-01-24/a>Johannes UllrichHow to send mass e-mail the right way
2014-01-24/a>Chris MohanPhishing via Social Media
2013-12-21/a>Daniel WesemannAdobe phishing underway
2013-12-11/a>Johannes UllrichFacebook Phishing and Malware via Tumblr Redirects
2013-08-05/a>Chris MohanDMARC: another step forward in the fight against phishing?
2013-05-21/a>Adrien de BeaupreMoore, Oklahoma tornado charitable organization scams, malware, and phishing
2012-12-06/a>Daniel WesemannFake tech support calls - revisited
2012-12-03/a>John BambenekJohn McAfee Exposes His Location in Photo About His Being on Run
2012-11-29/a>Kevin ShorttNew Apple Security Update: APPLE-SA-2012-11-29-1 Apple TV 5.1.1
2012-11-28/a>Mark HofmanMcAfee releases extraDAT for W32/Autorun.worm.aaeb-h
2012-11-28/a>Mark HofmanNew version of wireshark is available (1.8.4), some security fixes included.
2012-11-27/a>Chris MohanCan users' phish emails be a security admin's catch of the day?
2012-11-26/a>John BambenekOnline Shopping for the Holidays? Tips, News and a Fair Warning
2012-11-20/a>John BambenekBehind the Random NTP Bizarreness of Incorrect Year Being Set
2012-11-20/a>John BambenekFirefox v 17.0 just released, more here: http://www.mozilla.org/en-US/firefox/17.0/releasenotes/
2012-11-19/a>John BambenekMoneyGram fined $100 million for aiding wire fraud - http://krebsonsecurity.com/2012/11/moneygram-fined-100-million-for-wire-fraud/
2012-11-19/a>John BambenekNew Poll: Top 5 Unresolved Security Problems of 2012
2012-11-17/a>Manuel Humberto Santander PelaezNew Sysinternal Updates: AdExplorer v1.44, Contig v1.7, Coreinfo v3.2, Procdump v5.1. See http://blogs.technet.com/b/sysinternals/archive/2012/11/16/updates-adexplorer-v1-44-contig-v1-7-coreinfo-v3-2-procdump-v5-1.aspx?Redirected=true
2012-11-12/a>John BambenekRequest for info: Robocall Phishing Against Local/Regional Banks
2012-11-09/a>Mark BaggettRemote Diagnostics with PSR
2012-11-09/a>Mark BaggettFresh batch of Microsoft patches next week
2012-11-08/a>Daniel WesemannGet a 40% discount on your hotel room!
2012-11-07/a>Mark BaggettHelp eliminate unquoted path vulnerabilities
2012-11-07/a>Mark BaggettMultiple 0-Days Reported!
2012-11-07/a>Mark BaggettCisco TACACS+ Authentication Bypass
2012-11-05/a>Johannes UllrichReminder: Ongoing SMTP Brute Forcing Attacks
2012-11-05/a>Johannes UllrichPossible Fake-AV Ads from Doubleclick Servers
2012-11-04/a>Lorna HutchesonWhat's important on your network?
2012-10-31/a>Johannes UllrichCyber Security Awareness Month - Day 31 - Business Continuity and Disaster Recovery
2012-10-30/a>Johannes UllrichHurricane Sandy Update
2012-10-30/a>Richard PorterSplunk 5.0 SP-CAAAHB4 http://www.splunk.com/view/SP-CAAAHB4
2012-10-28/a>Tony CarothersFirefox 16.02 Released
2012-10-26/a>Russ McReeCyber Security Awareness Month - Day 26 - Attackers use trusted domain to propagate Citadel Zeus variant
2012-10-25/a>Richard PorterCyber Security Awareness Month - Day 25 - Pro Audio & Video Packets on the Wire
2012-10-24/a>Russ McReeOngoing Windstream outage in the midwest - https://twitter.com/search?q=windstream
2012-10-21/a>Johannes UllrichCyber Security Awareness Month - Day 22: Connectors
2012-10-21/a>Lorna HutchesonPotential Phish for Regular Webmail Accounts
2012-10-19/a>Johannes UllrichCyber Security Awareness Month - Day 19: Standard log formats and CEE.
2012-10-18/a>Rob VandenBrinkCyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide
2012-10-17/a>Mark HofmanNew Acrobat release (including reader) available. Version 11. Some security improvements more here -->http://blogs.adobe.com/adobereader/
2012-10-16/a>Richard PorterCyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook.
2012-10-16/a>Johannes UllrichCyber Security Awareness Month - Day 16: W3C and HTML
2012-10-14/a>Pedro BuenoCyber Security Awareness Month - Day 14 - Poor Man's File Analysis System - Part 1
2012-10-09/a>Johannes UllrichMicrosoft October 2012 Black Tuesday Update - Overview
2012-10-07/a>Tony CarothersCyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1
2012-10-05/a>Johannes UllrichCyber Security Awareness Month - Day 5: Standards Body Soup, So many Flavors in the bowl.
2012-10-05/a>Richard PorterVMWare Security Advisory: VMSA-2012-0014 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html
2012-10-05/a>Richard PorterReports of a Distributed Injection Scan
2012-10-04/a>Mark HofmanAnd the SHA-3 title goes to .....Keccak
2012-10-03/a>Kevin ShorttFake Support Calls Reported
2012-10-02/a>Russ McReeCyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines
2012-10-01/a>Johannes UllrichCyber Security Awareness Month
2012-09-28/a>Joel EslerAdobe certification revocation for October 4th
2012-09-26/a>Johannes UllrichSome Android phones can be reset to factory default by clicking on links
2012-09-26/a>Johannes UllrichMore Java Woes
2012-09-21/a>Johannes UllrichiOS 6 Security Roundup
2012-09-20/a>Russ McReeFinancial sector advisory: attacks and threats against financial institutions
2012-09-19/a>Russ McReeScript kiddie scavenging with Shellbot.S
2012-09-17/a>Rob VandenBrinkWhat's on your iPad?
2012-09-14/a>Lenny ZeltserScam Report - Fake Voice Mail Email Notification Redirects to Malicious Site
2012-09-13/a>Mark BaggettTCP Fuzzing with Scapy
2012-09-13/a>Mark BaggettMicrosoft disrupts traffic associated with the Nitol botnet
2012-09-13/a>Mark BaggettMore SSL trouble
2012-09-10/a>Johannes UllrichMicrosoft Patch Tuesday Pre-Release
2012-09-10/a>Johannes UllrichGodaddy DDoS Attack
2012-09-09/a>Guy BruneauPhishing/Spam Pretending to be from BBB
2012-09-06/a>Johannes UllrichSSL Requests sent to port 80 (request for help/input)
2012-09-04/a>Johannes UllrichAnother round of "Spot the Exploit E-Mail"
2012-09-01/a>Russ McReeBlackhole targeting Java vulnerability via fake Microsoft Services Agreement email phish
2012-08-30/a>Johannes UllrichEditorial: The Slumlord Approach to Network Security http://isc.sans.edu/j/editorial
2012-08-29/a>Johannes Ullrich"Data" URLs used for in-URL phishing
2012-08-27/a>Johannes UllrichThe Good, Bad and Ugly about Assigning IPv6 Addresses
2012-08-27/a>Johannes UllrichMalware Spam harvesting Facebook Information
2012-08-26/a>Lorna HutchesonWho ya gonna contact?
2012-08-22/a>Adrien de BeaupreApple Remote Desktop update fixes no encryption issue
2012-08-22/a>Adrien de BeauprePhishing/spam via SMS
2012-08-21/a>Adrien de BeaupreYYABCAFU - Yes Yet Another Bleeping Critical Adobe Flash Update
2012-08-21/a>Adrien de BeaupreRuggedCom fails key management 101 on Rugged Operating System (ROS)
2012-08-20/a>Manuel Humberto Santander PelaezDo we need test procedures in our companies before implementing Antivirus signatures?
2012-08-19/a>Manuel Humberto Santander PelaezAuthentication Issues between entities during protocol message exchange in SCADA Systems
2012-08-17/a>Guy BruneauSuspicious eFax Spear Phishing Messages
2012-08-12/a>Tony CarothersLayers of the Defense-in-Depth Onion
2012-08-12/a>Tony CarothersOracle Security Alert for CVE-2012-3132
2012-08-09/a>Mark HofmanZeus/Citadel variant causing issues in the Netherlands
2012-08-09/a>Mark HofmanSQL Injection Lilupophilupop style, Part 2
2012-08-07/a>Adrien de BeaupreWho protects small business?
2012-08-04/a>Kevin ListonVendors: More Patch-Release Options Please
2012-07-27/a>Daniel WesemannCuckoo 0.4 is out - cool new features for malware analysis http://www.cuckoosandbox.org/
2012-07-24/a>Richard PorterWireshark 1.8.1 Released http://www.wireshark.org/
2012-07-24/a>Richard PorterReport of spike in DNS Queries gd21.net
2012-07-20/a>Mark BaggettSyria Internet connection cut?
2012-07-19/a>Mark BaggettDiagnosing Malware with Resource Monitor
2012-07-19/a>Mark BaggettA Heap of Overflows?
2012-07-16/a>Richard PorterSysinternals Update @ http://blogs.technet.com/b/sysinternals/archive/2012/07/16/updates-handle-v3-5-process-explorer-v15-22-process-monitor-v3-03-rammap-v1-21-zoomit-v4-3.aspx
2012-07-13/a>Richard PorterYesterday (not as on the ball as Rob) at SANSFire
2012-07-13/a>Russ McRee2 for 1: SANSFIRE & MSRA presentations
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Recording Server - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts
2012-07-12/a>Rick WannerCisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Manager - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman
2012-07-09/a>Manuel Humberto Santander PelaezInternet Storm Center panel tonight at SANSFIRE 2012!
2012-07-09/a>Johannes UllrichThe FBI will turn off the Internet on Monday (or not)
2012-07-05/a>Adrien de BeaupreNew OS X trojan backdoor MaControl variant reported
2012-07-02/a>Joel EslerA rough guide to keeping your website up
2012-07-02/a>Joel EslerLinux & Java leap second bug
2012-06-29/a>Jim ClausingUpdated SysInternals tools - Autoruns, Process Explorer, Process Monitor, PSKill -- http://blogs.technet.com/b/sysinternals/archive/2012/06/28/updates-autoruns-v11-32-process-explorer-v15-21-process-monitor-v3-02-pskill-v1-15-rammap-v1-2.aspx
2012-06-21/a>Russ McReeWireshark 1.8.0 released 21 JUN 2012 http://www.wireshark.org/download.html
2012-06-19/a>Daniel Wesemann Vulnerabilityqueerprocessbrittleness
2012-06-14/a>Johannes UllrichSpot the Phish: Verizon Wireless
2012-06-10/a>Scott FendleyPreying on Users After Major Security Incidents
2012-05-30/a>Rob VandenBrinkIt's Phishing Season! In fact, it's ALWAYS Phishing Season!
2011-08-31/a>Johannes UllrichPhishing e-mail to custom e-mail addresses
2011-08-16/a>Scott FendleyPhishing Scam Victim Response
2011-06-08/a>Johannes UllrichSpam from compromised Hotmail accounts
2011-06-06/a>Manuel Humberto Santander PelaezPhishing: Same goal, same techniques and people still falling for such scams
2011-02-02/a>Johannes UllrichHaving Phish on Friday
2010-11-29/a>Stephen HalliPhone phishing - What you see, isn't what you get
2010-11-22/a>Lenny ZeltserBrand Impersonations On-Line: Brandjacking and Social Networks
2010-04-19/a>Daniel WesemannLinked into scams?
2010-02-02/a>Johannes UllrichTwitter Mass Password Reset due to Phishing
2009-10-19/a>Daniel WesemannScam Email
2009-05-24/a>Raul SilesFacebook phising using Belgium (.be) domains
2009-05-04/a>Tom ListonFacebook phishing malware
2009-01-11/a>Deborah HaleThe Frustration of Phishing Attacks
2009-01-04/a>Rick WannerTwitter/Facebook Phishing Attempt
2008-11-11/a>Swa FrantzenPhishing for Google adwords
2008-10-29/a>Deborah HaleEnom Phishing - Caution Enom Registrars
2008-10-10/a>Marcus SachsFake Microsoft Update Email
2008-06-17/a>Kyle HaugsnessWhy go high-tech?
2008-05-26/a>Marcus SachsPredictable Response
2008-05-19/a>Maarten Van HorenbeeckText message and telephone aid scams
2008-04-14/a>John BambenekA Federal Subpoena or Just Some More Spam & Malware?