Internet Storm Center
Sign In
Sign Up
Handler on Duty:
Jesse La Grew
Threat Level:
green
Date
Author
Title
USB DATA BREACH
2009-01-30
Mark Hofman
We all "Love" USB drives
USB
2017-10-06/a>
Johannes Ullrich
What's in a cable? The dangers of unauthorized cables
2016-09-09/a>
Xavier Mertens
Collecting Users Credentials from Locked Devices
2016-07-03/a>
Guy Bruneau
Is Data Privacy part of your Company's Culture?
2015-12-09/a>
Xavier Mertens
Enforcing USB Storage Policy with PowerShell
2015-04-06/a>
Guy Bruneau
'Dead Drops' Hidden USB Sticks Around the World
2013-08-26/a>
Alex Stanford
Stop, Drop and File Carve
2013-05-20/a>
Guy Bruneau
Safe - Tools, Tactics and Techniques
2010-01-06/a>
Guy Bruneau
Secure USB Flaw Exposed
2009-08-13/a>
Jim Clausing
New and updated cheat sheets
2009-01-30/a>
Mark Hofman
We all "Love" USB drives
2008-12-25/a>
Maarten Van Horenbeeck
Merry Christmas, and beware of digital hitchhikers!
2008-11-21/a>
Mark Hofman
To USB or not to USB, well not in the DoD - what do you do?
2008-04-07/a>
John Bambenek
HP USB Keys Shipped with Malware for your Proliant Server
DATA
2024-08-23/a>
Jesse La Grew
Pandas Errors: What encoding are my logs in?
2024-08-16/a>
Jesse La Grew
[Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools
2023-08-25/a>
Xavier Mertens
Python Malware Using Postgresql for C2 Communications
2023-07-23/a>
Guy Bruneau
Install & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-05-24/a>
Jesse La Grew
More Data Enrichment for Cowrie Logs
2023-05-09/a>
Russ McRee
Exploratory Data Analysis with CISSM Cyber Attacks Database - Part 2
2022-06-10/a>
Russ McRee
EPSScall: An Exploit Prediction Scoring System App
2021-12-28/a>
Russ McRee
LotL Classifier tests for shells, exfil, and miners
2021-10-20/a>
Xavier Mertens
Thanks to COVID-19, New Types of Documents are Lost in The Wild
2021-08-29/a>
Guy Bruneau
Filter JSON Data by Value with Linux jq
2021-07-04/a>
Didier Stevens
DIY CD/DVD Destruction - Follow Up
2021-06-27/a>
Didier Stevens
DIY CD/DVD Destruction
2021-02-01/a>
Rob VandenBrink
Taking a Shot at Reverse Shell Attacks, CNC Phone Home and Data Exfil from Servers
2021-01-29/a>
Xavier Mertens
Sensitive Data Shared with Cloud Services
2020-07-04/a>
Russ McRee
Happy FouRth of July from the Internet Storm Center
2020-03-14/a>
Didier Stevens
Phishing PDF With Incremental Updates.
2020-02-28/a>
Xavier Mertens
Show me Your Clipboard Data!
2019-05-19/a>
Guy Bruneau
Is Metadata Only Approach, Good Enough for Network Traffic Analysis?
2018-07-04/a>
Didier Stevens
XPS Metadata
2018-06-16/a>
Russ McRee
Anomaly Detection & Threat Hunting with Anomalize
2017-12-16/a>
Xavier Mertens
Microsoft Office VBA Macro Obfuscation via Metadata
2017-08-07/a>
Xavier Mertens
Increase of phpMyAdmin scans
2017-05-28/a>
Guy Bruneau
CyberChef a Must Have Tool in your Tool bag!
2017-02-01/a>
Xavier Mertens
Quick Analysis of Data Left Available by Attackers
2017-01-06/a>
John Bambenek
Great Misadventures of Security Vendors: Absurd Sandboxing Edition
2016-09-22/a>
Rick Wanner
YAHDD! (Yet another HUGE data Breach!)
2016-08-31/a>
Deborah Hale
Dropbox Breach
2016-08-19/a>
Xavier Mertens
Data Classification For the Masses
2016-07-03/a>
Guy Bruneau
Is Data Privacy part of your Company's Culture?
2016-06-20/a>
Xavier Mertens
Using Your Password Manager to Monitor Data Leaks
2016-02-22/a>
Xavier Mertens
Reducing False Positives with Open Data Sources
2016-01-30/a>
Xavier Mertens
All CVE Details at Your Fingertips
2015-09-01/a>
Daniel Wesemann
Encryption of "data at rest" in servers
2015-07-31/a>
Russ McRee
Tech tip: Invoke a system command in R
2015-07-31/a>
Russ McRee
Tech tip follow-up: Using the data Invoked with R's system command
2015-05-23/a>
Guy Bruneau
Business Value in "Big Data"
2015-03-21/a>
Russell Eubanks
Have you seen my personal information? It has been lost. Again.
2014-12-01/a>
Guy Bruneau
Do you have a Data Breach Response Plan?
2014-02-04/a>
Johannes Ullrich
Odd ICMP Echo Request Payload
2013-10-16/a>
Adrien de Beaupre
Access denied and blockliss
2013-07-06/a>
Guy Bruneau
Is Metadata the Magic in Modern Network Security?
2012-12-03/a>
John Bambenek
John McAfee Exposes His Location in Photo About His Being on Run
2012-11-30/a>
Daniel Wesemann
Snipping Leaks
2012-11-22/a>
Kevin Liston
Greek National Arrested on Suspicion of Theft of 9M Records on Fellow Greeks
2012-01-16/a>
Kevin Shortt
Zappos Breached
2011-04-20/a>
Daniel Wesemann
Data Breach Investigations Report published by Verizon
2011-01-12/a>
Richard Porter
How Many Loyalty Cards do you Carry?
2011-01-12/a>
Richard Porter
Yet Another Data Broker? AOL Lifestream.
2010-09-26/a>
Daniel Wesemann
Egosurfing, the corporate way
2010-07-29/a>
Rob VandenBrink
The 2010 Verizon Data Breach Report is Out
2010-04-27/a>
Rob VandenBrink
Layer 2 Security - L2TPv3 for Disaster Recovery Sites
2010-04-22/a>
John Bambenek
Data Redaction: You're Doing it Wrong
2010-02-10/a>
Marcus Sachs
Datacenters and Directory Traversals
2009-10-19/a>
Daniel Wesemann
Backed up, lately ?
2009-09-07/a>
Lorna Hutcheson
Encrypting Data
2009-07-28/a>
Adrien de Beaupre
YYAMCCBA
2009-04-24/a>
John Bambenek
Data Leak Prevention: Proactive Security Requirements of Breach Notification Laws
2009-04-15/a>
Marcus Sachs
2009 Data Breach Investigation Report
2009-03-02/a>
Swa Frantzen
Obama's leaked chopper blueprints: anything we can learn?
2009-01-30/a>
Mark Hofman
We all "Love" USB drives
2008-12-17/a>
donald smith
Team CYMRU's Malware Hash Registry
2008-08-25/a>
John Bambenek
Thoughts on the Best Western Compromise
BREACH
2023-09-02/a>
Jesse La Grew
What is the origin of passwords submitted to honeypots?
2016-09-22/a>
Rick Wanner
YAHDD! (Yet another HUGE data Breach!)
2016-08-31/a>
Deborah Hale
Dropbox Breach
2015-04-08/a>
Tom Webb
Is it a breach or not?
2015-03-21/a>
Russell Eubanks
Have you seen my personal information? It has been lost. Again.
2014-12-01/a>
Guy Bruneau
Do you have a Data Breach Response Plan?
2014-08-23/a>
Guy Bruneau
NSS Labs Cyber Resilience Report
2014-06-13/a>
Richard Porter
A welcomed response, PF Chang's
2013-12-21/a>
Daniel Wesemann
Adobe phishing underway
2013-10-05/a>
Richard Porter
Adobe Breach Notification, Notifications?
2013-10-04/a>
Johannes Ullrich
The Adobe Breach FAQ
2013-07-22/a>
Johannes Ullrich
Apple Developer Site Breach
2013-07-21/a>
Guy Bruneau
Ubuntu Forums Security Breach
2013-02-22/a>
Johannes Ullrich
Zendesk breach affects Tumblr/Pinterest/Twitter
2013-01-04/a>
Daniel Wesemann
Blue for Reset?
2012-11-22/a>
Kevin Liston
Greek National Arrested on Suspicion of Theft of 9M Records on Fellow Greeks
2012-07-16/a>
Jim Clausing
An analysis of the Yahoo! passwords
2012-06-06/a>
Jim Clausing
Potential leak of 6.5+ million LinkedIn password hashes
2012-01-16/a>
Kevin Shortt
Zappos Breached
2011-09-15/a>
Swa Frantzen
DigiNotar looses their accreditation for qualified certificates
2011-09-07/a>
Lenny Zeltser
GlobalSign Temporarily Stops Issuing Certificates to Investigate a Potential Breach
2011-09-06/a>
Swa Frantzen
DigiNotar audit - intermediate report available
2011-09-01/a>
Swa Frantzen
DigiNotar breach - the story so far
2011-06-21/a>
Chris Mohan
StartSSL, a web authentication authority, suspend services after a security breach
2011-05-30/a>
Johannes Ullrich
Lockheed Martin and RSA Tokens
2011-05-25/a>
Lenny Zeltser
Monitoring Social Media for Security References to Your Organization
2011-04-28/a>
Chris Mohan
DSL Reports advise 9,000 accounts were compromised
2011-04-20/a>
Daniel Wesemann
Data Breach Investigations Report published by Verizon
2011-04-04/a>
Mark Hofman
When your service provider has a breach
2011-03-25/a>
Rob VandenBrink
The Recent RSA Breach - Imagining the Worst Case, And Why it Isn't Time to Panic (Yet)
2010-12-28/a>
John Bambenek
Mozilla Notifies of Relatively Minor Security Breach
2010-07-29/a>
Rob VandenBrink
The 2010 Verizon Data Breach Report is Out
2010-06-10/a>
Deborah Hale
iPad Owners Exposed
2010-04-13/a>
Johannes Ullrich
Apache.org Bugtracker Breach
2009-07-28/a>
Adrien de Beaupre
YYAMCCBA
2009-07-23/a>
John Bambenek
Missouri Passes Breach Notification Law: Gap Still Exists for Banking Account Information
2009-06-06/a>
Patrick Nolan
ARRA/HIPAA Breach Reporting Dates Approaching
2009-05-09/a>
Patrick Nolan
Unusable, Unreadable, or Indecipherable? No Breach reporting required
2009-05-05/a>
Bojan Zdrnja
Health database breached
2009-04-24/a>
John Bambenek
Data Leak Prevention: Proactive Security Requirements of Breach Notification Laws
2009-04-15/a>
Marcus Sachs
2009 Data Breach Investigation Report
2009-02-08/a>
Mari Nichols
Are we becoming desensitized to data breaches?
2009-01-30/a>
Mark Hofman
We all "Love" USB drives
Homepage
Diaries
Podcasts
Jobs
Data
TCP/UDP Port Activity
Port Trends
SSH/Telnet Scanning Activity
Weblogs
Threat Feeds Activity
Threat Feeds Map
Useful InfoSec Links
Presentations & Papers
Research Papers
API
Tools
DShield Sensor
DNS Looking Glass
Honeypot (RPi/AWS)
InfoSec Glossary
Contact Us
Contact Us
About Us
Handlers
About Us
Slack Channel
Mastodon
Bluesky
X
The Internet Storm Center is a community for everyone, so
join the conversation