DATA SCIENCE |
2020-07-04 | Russ McRee | Happy FouRth of July from the Internet Storm Center |
2018-06-16 | Russ McRee | Anomaly Detection & Threat Hunting with Anomalize |
2015-07-31 | Russ McRee | Tech tip: Invoke a system command in R |
2015-07-31 | Russ McRee | Tech tip follow-up: Using the data Invoked with R's system command |
DATA |
2020-07-04/a> | Russ McRee | Happy FouRth of July from the Internet Storm Center |
2020-03-14/a> | Didier Stevens | Phishing PDF With Incremental Updates. |
2020-02-28/a> | Xavier Mertens | Show me Your Clipboard Data! |
2019-05-19/a> | Guy Bruneau | Is Metadata Only Approach, Good Enough for Network Traffic Analysis? |
2018-07-04/a> | Didier Stevens | XPS Metadata |
2018-06-16/a> | Russ McRee | Anomaly Detection & Threat Hunting with Anomalize |
2017-12-16/a> | Xavier Mertens | Microsoft Office VBA Macro Obfuscation via Metadata |
2017-08-07/a> | Xavier Mertens | Increase of phpMyAdmin scans |
2017-05-28/a> | Guy Bruneau | CyberChef a Must Have Tool in your Tool bag! |
2017-02-01/a> | Xavier Mertens | Quick Analysis of Data Left Available by Attackers |
2017-01-06/a> | John Bambenek | Great Misadventures of Security Vendors: Absurd Sandboxing Edition |
2016-09-22/a> | Rick Wanner | YAHDD! (Yet another HUGE data Breach!) |
2016-08-31/a> | Deborah Hale | Dropbox Breach |
2016-08-19/a> | Xavier Mertens | Data Classification For the Masses |
2016-07-03/a> | Guy Bruneau | Is Data Privacy part of your Company's Culture? |
2016-06-20/a> | Xavier Mertens | Using Your Password Manager to Monitor Data Leaks |
2016-02-22/a> | Xavier Mertens | Reducing False Positives with Open Data Sources |
2016-01-30/a> | Xavier Mertens | All CVE Details at Your Fingertips |
2015-09-01/a> | Daniel Wesemann | Encryption of "data at rest" in servers |
2015-07-31/a> | Russ McRee | Tech tip: Invoke a system command in R |
2015-07-31/a> | Russ McRee | Tech tip follow-up: Using the data Invoked with R's system command |
2015-05-23/a> | Guy Bruneau | Business Value in "Big Data" |
2015-03-21/a> | Russell Eubanks | Have you seen my personal information? It has been lost. Again. |
2014-12-01/a> | Guy Bruneau | Do you have a Data Breach Response Plan? |
2014-02-04/a> | Johannes Ullrich | Odd ICMP Echo Request Payload |
2013-10-16/a> | Adrien de Beaupre | Access denied and blockliss |
2013-07-06/a> | Guy Bruneau | Is Metadata the Magic in Modern Network Security? |
2012-12-03/a> | John Bambenek | John McAfee Exposes His Location in Photo About His Being on Run |
2012-11-30/a> | Daniel Wesemann | Snipping Leaks |
2012-11-22/a> | Kevin Liston | Greek National Arrested on Suspicion of Theft of 9M Records on Fellow Greeks |
2012-01-16/a> | Kevin Shortt | Zappos Breached |
2011-04-20/a> | Daniel Wesemann | Data Breach Investigations Report published by Verizon |
2011-01-12/a> | Richard Porter | How Many Loyalty Cards do you Carry? |
2011-01-12/a> | Richard Porter | Yet Another Data Broker? AOL Lifestream. |
2010-09-26/a> | Daniel Wesemann | Egosurfing, the corporate way |
2010-07-29/a> | Rob VandenBrink | The 2010 Verizon Data Breach Report is Out |
2010-04-27/a> | Rob VandenBrink | Layer 2 Security - L2TPv3 for Disaster Recovery Sites |
2010-04-22/a> | John Bambenek | Data Redaction: You're Doing it Wrong |
2010-02-10/a> | Marcus Sachs | Datacenters and Directory Traversals |
2009-10-19/a> | Daniel Wesemann | Backed up, lately ? |
2009-09-07/a> | Lorna Hutcheson | Encrypting Data |
2009-07-28/a> | Adrien de Beaupre | YYAMCCBA |
2009-04-24/a> | John Bambenek | Data Leak Prevention: Proactive Security Requirements of Breach Notification Laws |
2009-04-15/a> | Marcus Sachs | 2009 Data Breach Investigation Report |
2009-03-02/a> | Swa Frantzen | Obama's leaked chopper blueprints: anything we can learn? |
2009-01-30/a> | Mark Hofman | We all "Love" USB drives |
2008-12-17/a> | donald smith | Team CYMRU's Malware Hash Registry |
2008-08-25/a> | John Bambenek | Thoughts on the Best Western Compromise |
SCIENCE |
2020-07-04/a> | Russ McRee | Happy FouRth of July from the Internet Storm Center |
2018-06-16/a> | Russ McRee | Anomaly Detection & Threat Hunting with Anomalize |
2015-07-31/a> | Russ McRee | Tech tip: Invoke a system command in R |
2015-07-31/a> | Russ McRee | Tech tip follow-up: Using the data Invoked with R's system command |