PYTHON WEB APPLICATION SECURITY |
2010-08-15 | Manuel Humberto Santander Pelaez | Python to test web application security |
PYTHON |
2025-03-18/a> | Xavier Mertens | Python Bot Delivered Through DLL Side-Loading |
2025-03-10/a> | Xavier Mertens | Shellcode Encoded in UUIDs |
2025-02-17/a> | Russ McRee | ModelScan - Protection Against Model Serialization Attacks |
2025-02-14/a> | Xavier Mertens | Fake BSOD Delivered by Malicious Python Script |
2025-02-06/a> | Xavier Mertens | The Unbreakable Multi-Layer Anti-Debugging System |
2025-01-29/a> | Xavier Mertens | From PowerShell to a Python Obfuscation Race! |
2025-01-28/a> | Xavier Mertens | Fileless Python InfoStealer Targeting Exodus |
2025-01-18/a> | Jim Clausing | New tool: immutable.py |
2025-01-03/a> | Xavier Mertens | SwaetRAT Delivery Through Python |
2024-12-31/a> | Xavier Mertens | No Holiday Season for Attackers |
2024-12-26/a> | Jesse La Grew | Capturing Honeypot Data Beyond the Logs |
2024-12-17/a> | Xavier Mertens | Python Delivering AnyDesk Client as RAT |
2024-11-30/a> | Xavier Mertens | From a Regular Infostealer to its Obfuscated Version |
2024-11-22/a> | Xavier Mertens | An Infostealer Searching for « BIP-0039 » Data |
2024-11-19/a> | Xavier Mertens | Detecting the Presence of a Debugger in Linux |
2024-11-07/a> | Xavier Mertens | Steam Account Checker Poisoned with Infostealer |
2024-11-05/a> | Xavier Mertens | Python RAT with a Nice Screensharing Feature |
2024-09-18/a> | Xavier Mertens | Python Infostealer Patching Windows Exodus App |
2024-09-17/a> | Xavier Mertens | 23:59, Time to Exfiltrate! |
2024-09-16/a> | Xavier Mertens | Managing PE Files With Overlays |
2024-09-13/a> | Jesse La Grew | Finding Honeypot Data Clusters Using DBSCAN: Part 2 |
2024-09-11/a> | Xavier Mertens | Python Libraries Used for Malicious Purposes |
2024-08-30/a> | Jesse La Grew | Simulating Traffic With Scapy |
2024-08-29/a> | Xavier Mertens | Live Patching DLLs with Python |
2024-08-27/a> | Xavier Mertens | Why Is Python so Popular to Infect Windows Hosts? |
2024-08-26/a> | Xavier Mertens | From Highly Obfuscated Batch File to XWorm and Redline |
2024-08-23/a> | Jesse La Grew | Pandas Errors: What encoding are my logs in? |
2024-08-19/a> | Xavier Mertens | Do you Like Donuts? Here is a Donut Shellcode Delivered Through PowerShell/Python |
2024-08-16/a> | Jesse La Grew | [Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools |
2024-07-26/a> | Xavier Mertens | ExelaStealer Delivered "From Russia With Love" |
2024-07-24/a> | Xavier Mertens | "Mouse Logger" Malicious Python Script |
2024-07-10/a> | Jesse La Grew | Finding Honeypot Data Clusters Using DBSCAN: Part 1 |
2024-06-06/a> | Xavier Mertens | Malicious Python Script with a "Best Before" Date |
2024-05-31/a> | Xavier Mertens | "K1w1" InfoStealer Uses gofile.io for Exfiltration |
2024-05-30/a> | Xavier Mertens | Feeding MISP with OSSEC |
2024-03-13/a> | Xavier Mertens | Using ChatGPT to Deobfuscate Malicious Scripts |
2024-02-20/a> | Xavier Mertens | Python InfoStealer With Dynamic Sandbox Detection |
2024-02-08/a> | Xavier Mertens | A Python MP3 Player with Builtin Keylogger Capability |
2024-01-25/a> | Xavier Mertens | Facebook AdsManager Targeted by a Python Infostealer |
2024-01-19/a> | Xavier Mertens | macOS Python Script Replacing Wallet Applications with Rogue Apps |
2024-01-17/a> | Jesse La Grew | Number Usage in Passwords |
2024-01-08/a> | Jesse La Grew | What is that User Agent? |
2023-12-23/a> | Xavier Mertens | Python Keylogger Using Mailtrap.io |
2023-12-22/a> | Xavier Mertens | Shall We Play a Game? |
2023-12-16/a> | Xavier Mertens | An Example of RocketMQ Exploit Scanner |
2023-11-20/a> | Jesse La Grew | Overflowing Web Honeypot Logs |
2023-10-31/a> | Xavier Mertens | Multiple Layers of Anti-Sandboxing Techniques |
2023-09-30/a> | Xavier Mertens | Simple Netcat Backdoor in Python Script |
2023-08-25/a> | Xavier Mertens | Python Malware Using Postgresql for C2 Communications |
2023-08-23/a> | Guy Bruneau | How I made a qwerty ?keyboard walk? password generator with ChatGPT [Guest Diary] |
2023-08-22/a> | Xavier Mertens | Have You Ever Heard of the Fernet Encryption Algorithm? |
2023-08-17/a> | Jesse La Grew | Command Line Parsing - Are These Really Unique Strings? |
2023-08-11/a> | Xavier Mertens | Show me All Your Windows! |
2023-07-28/a> | Xavier Mertens | ShellCode Hidden with Steganography |
2023-06-20/a> | Xavier Mertens | Malicious Code Can Be Anywhere |
2023-04-28/a> | Xavier Mertens | Quick IOC Scan With Docker |
2023-03-18/a> | Xavier Mertens | Old Backdoor, New Obfuscation |
2023-03-11/a> | Xavier Mertens | Overview of a Mirai Payload Generator |
2023-03-01/a> | Xavier Mertens | Python Infostealer Targeting Gamers |
2023-02-09/a> | Xavier Mertens | A Backdoor with Smart Screenshot Capability |
2022-11-14/a> | Jesse La Grew | Extracting 'HTTP CONNECT' Requests with Python |
2022-10-24/a> | Xavier Mertens | C2 Communications Through outlook.com |
2022-10-18/a> | Xavier Mertens | Python Obfuscation for Dummies |
2022-09-26/a> | Xavier Mertens | Easy Python Sandbox Detection |
2022-09-14/a> | Xavier Mertens | Easy Process Injection within Python |
2022-08-19/a> | Johannes Ullrich | Windows Security Blocks UPX Compressed (packed) Binaries |
2022-08-18/a> | Johannes Ullrich | Honeypot Attack Summaries with Python |
2022-07-20/a> | Xavier Mertens | Malicious Python Script Behaving Like a Rubber Ducky |
2022-06-24/a> | Xavier Mertens | Python (ab)using The Windows GUI |
2022-05-24/a> | Yee Ching Tok | ctx Python Library Updated with "Extra" Features |
2022-04-21/a> | Xavier Mertens | Multi-Cryptocurrency Clipboard Swapper |
2022-01-20/a> | Xavier Mertens | RedLine Stealer Delivered Through FTP |
2022-01-07/a> | Xavier Mertens | Custom Python RAT Builder |
2022-01-06/a> | Xavier Mertens | Malicious Python Script Targeting Chinese People |
2021-12-10/a> | Xavier Mertens | Python Shellcode Injection From JSON Data |
2021-12-01/a> | Xavier Mertens | Info-Stealer Using webhook.site to Exfiltrate Data |
2021-08-30/a> | Xavier Mertens | Cryptocurrency Clipboard Swapper Delivered With Love |
2021-07-16/a> | Xavier Mertens | Multiple BaseXX Obfuscations |
2021-07-08/a> | Xavier Mertens | Using Sudo with Python For More Security Controls |
2021-07-06/a> | Xavier Mertens | Python DLL Injection Check |
2021-07-02/a> | Xavier Mertens | "inception.py"... Multiple Base64 Encodings |
2021-06-11/a> | Xavier Mertens | Keeping an Eye on Dangerous Python Modules |
2021-05-31/a> | Rick Wanner | Quick and dirty Python: nmap |
2021-05-04/a> | Rick Wanner | Quick and dirty Python: masscan |
2021-04-29/a> | Xavier Mertens | From Python to .Net |
2021-04-09/a> | Xavier Mertens | No Python Interpreter? This Simple RAT Installs Its Own Copy |
2021-04-02/a> | Xavier Mertens | C2 Activity: Sandboxes or Real Victims? |
2021-03-18/a> | Xavier Mertens | Simple Python Keylogger |
2020-12-10/a> | Xavier Mertens | Python Backdoor Talking to a C2 Through Ngrok |
2020-11-20/a> | Xavier Mertens | Malicious Python Code and LittleSnitch Detection |
2020-11-09/a> | Xavier Mertens | How Attackers Brush Up Their Malicious Scripts |
2020-10-20/a> | Xavier Mertens | Mirai-alike Python Scanner |
2020-10-14/a> | Xavier Mertens | Nicely Obfuscated Python RAT |
2020-09-18/a> | Xavier Mertens | A Mix of Python & VBA in a Malicious Word Document |
2020-09-03/a> | Xavier Mertens | Sandbox Evasion Using NTP |
2020-09-02/a> | Xavier Mertens | Python and Risky Windows API Calls |
2020-08-18/a> | Xavier Mertens | Using API's to Track Attackers |
2020-07-30/a> | Johannes Ullrich | Python Developers: Prepare!!! |
2019-10-29/a> | Xavier Mertens | Generating PCAP Files from YAML |
2018-11-26/a> | Russ McRee | ViperMonkey: VBA maldoc deobfuscation |
2017-11-23/a> | Xavier Mertens | Proactive Malicious Domain Search |
2017-10-05/a> | Johannes Ullrich | pcap2curl: Turning a pcap file into a set of cURL commands for "replay" |
2017-08-22/a> | Xavier Mertens | Defang all the things! |
2017-04-19/a> | Xavier Mertens | Hunting for Malicious Excel Sheets |
2017-01-12/a> | Mark Baggett | System Resource Utilization Monitor |
2017-01-01/a> | Didier Stevens | py2exe Decompiling - Part 1 |
2016-11-27/a> | Russ McRee | Scapy vs. CozyDuke |
2016-07-25/a> | Didier Stevens | Python Malware - Part 4 |
2016-07-16/a> | Didier Stevens | Python Malware - Part 3 |
2016-05-15/a> | Didier Stevens | Python Malware - Part 1 |
2014-12-04/a> | Mark Baggett | Automating Incident data collection with Python |
2011-02-21/a> | Adrien de Beaupre | What’s New, it's Python 3.2 |
2010-08-15/a> | Manuel Humberto Santander Pelaez | Python to test web application security |
2010-06-14/a> | Manuel Humberto Santander Pelaez | Python on a microcontroller? |
2010-03-30/a> | Marcus Sachs | Zigbee Analysis Tools |
2010-02-17/a> | Rob VandenBrink | Multiple Security Updates for ESX 3.x and ESXi 3.x |
2009-05-25/a> | Jim Clausing | More tools for (US) Memorial Day |
WEB |
2025-03-09/a> | Johannes Ullrich | Commonly Probed Webshell URLs |
2025-02-26/a> | Jesse La Grew | [Guest Diary] Malware Source Servers: The Threat of Attackers Using Ephemeral Ports as Service Ports to Upload Data |
2024-12-26/a> | Jesse La Grew | Capturing Honeypot Data Beyond the Logs |
2024-11-06/a> | Jesse La Grew | [Guest Diary] Insights from August Web Traffic Surge |
2024-01-22/a> | Johannes Ullrich | Apple Updates Everything - New 0 Day in WebKit |
2024-01-08/a> | Jesse La Grew | What is that User Agent? |
2023-07-23/a> | Guy Bruneau | Install & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs |
2023-05-03/a> | Xavier Mertens | Increased Number of Configuration File Scans |
2023-04-18/a> | Johannes Ullrich | UDDIs are back? Attackers rediscovering old exploits. |
2023-02-25/a> | Didier Stevens | Crypto Inside a Browser |
2023-02-24/a> | Brad Duncan | URL files and WebDAV used for IcedID (Bokbot) infection |
2022-09-21/a> | Xavier Mertens | Phishing Campaigns Use Free Online Resources |
2022-08-23/a> | Xavier Mertens | Who's Looking at Your security.txt File? |
2022-08-17/a> | Johannes Ullrich | Apple Patches Two Exploited Vulnerabilities |
2022-08-01/a> | Johannes Ullrich | A Little DDoS In the Morning |
2022-04-05/a> | Johannes Ullrich | WebLogic Crypto Miner Malware Disabling Alibaba Cloud Monitoring Tools |
2022-03-11/a> | Xavier Mertens | Keep an Eye on WebSockets |
2022-02-07/a> | Johannes Ullrich | web3 phishing via self-customizing landing pages |
2021-12-07/a> | Johannes Ullrich | Webshells, Webshells everywhere! |
2021-12-01/a> | Xavier Mertens | Info-Stealer Using webhook.site to Exfiltrate Data |
2021-10-11/a> | Johannes Ullrich | Things that go "Bump" in the Night: Non HTTP Requests Hitting Web Servers |
2021-10-09/a> | Guy Bruneau | Scanning for Previous Oracle WebLogic Vulnerabilities |
2021-06-24/a> | Xavier Mertens | Do you Like Cookies? Some are for sale! |
2021-04-24/a> | Guy Bruneau | Base64 Hashes Used in Web Scanning |
2020-11-07/a> | Guy Bruneau | Cryptojacking Targeting WebLogic TCP/7001 |
2020-10-29/a> | Johannes Ullrich | PATCH NOW: CVE-2020-14882 Weblogic Actively Exploited Against Honeypots |
2020-08-10/a> | Bojan Zdrnja | Scoping web application and web service penetration tests |
2020-07-24/a> | Xavier Mertens | Compromized Desktop Applications by Web Technologies |
2019-11-22/a> | Xavier Mertens | Abusing Web Filters Misconfiguration for Reconnaissance |
2019-09-24/a> | Xavier Mertens | Huge Amount of remotewebaccess.com Sites Found in Certificate Transparency Logs |
2019-08-28/a> | Johannes Ullrich | [Guest Diary] Open Redirect: A Small But Very Common Vulnerability |
2019-08-01/a> | Johannes Ullrich | What is Listening On Port 9527/TCP? |
2019-06-19/a> | Johannes Ullrich | Critical Actively Exploited WebLogic Flaw Patched CVE-2019-2729 |
2019-04-28/a> | Johannes Ullrich | Update about Weblogic CVE-2019-2725 (Exploits Used in the Wild, Patch Status) |
2019-04-25/a> | Rob VandenBrink | Unpatched Vulnerability Alert - WebLogic Zero Day |
2019-02-02/a> | Guy Bruneau | Scanning for WebDAV PROPFIND Exploiting CVE-2017-7269 |
2018-11-17/a> | Xavier Mertens | Quickly Investigating Websites with Lookyloo |
2018-07-20/a> | Kevin Liston | Weblogic Exploit Code Made Public (CVE-2018-2893) |
2018-05-03/a> | Renato Marinho | WebLogic Exploited in the Wild (Again) |
2018-04-30/a> | Remco Verhoef | Another approach to webapplication fingerprinting |
2017-09-14/a> | Xavier Mertens | Another webshell, another backdoor! |
2017-07-19/a> | Xavier Mertens | Bots Searching for Keys & Config Files |
2017-06-01/a> | Xavier Mertens | Sharing Private Data with Webcast Invitations |
2017-05-12/a> | Xavier Mertens | When Bad Guys are Pwning Bad Guys... |
2017-04-07/a> | Xavier Mertens | Tracking Website Defacers with HTTP Referers |
2017-04-02/a> | Guy Bruneau | IPFire - A Household Multipurpose Security Gateway |
2017-02-28/a> | Xavier Mertens | Analysis of a Simple PHP Backdoor |
2017-01-24/a> | Johannes Ullrich | Critical Vulnerability in Cisco WebEx Chrome Plugin |
2017-01-14/a> | Xavier Mertens | Backup Files Are Good but Can Be Evil |
2016-07-13/a> | Xavier Mertens | The Power of Web Shells |
2016-01-29/a> | Xavier Mertens | Scripting Web Categorization |
2015-06-25/a> | Bojan Zdrnja | Web security subtleties and exploitation of combined vulnerabilities |
2015-04-23/a> | Bojan Zdrnja | When automation does not help |
2015-04-14/a> | Johannes Ullrich | Odd POST Request To Web Honeypot |
2014-08-16/a> | Lenny Zeltser | Web Server Attack Investigation - Installing a Bot and Reverse Shell via a PHP Vulnerability |
2014-08-09/a> | Adrien de Beaupre | Complete application ownage via Multi-POST XSRF |
2014-06-11/a> | Daniel Wesemann | Gimme your keys! |
2014-06-10/a> | Daniel Wesemann | Sampling Bias |
2014-04-24/a> | Rob VandenBrink | Apple IOS updates to 7.1.1, OSX Security update 2014-002, Airport Updates - http://support.apple.com/kb/HT1222, http://support.apple.com/kb/HT6208, http://support.apple.com/kb/HT6207, http://support.apple.com/kb/HT6203 |
2014-04-11/a> | Guy Bruneau | Heartbleed Fix Available for Download for Cisco Products |
2014-04-07/a> | Johannes Ullrich | Attack or Bad Link? Your Guess? |
2014-01-17/a> | Russ McRee | Massive RFI scans likely a free web app vuln scanner rather than bots |
2014-01-13/a> | Johannes Ullrich | Special Webcast today: HTML5, Risky Business or Hidden Security Toolchest? https://www.sans.org/webcasts/html5-risky-business-hidden-security-tool-chest-mobile-web-app-authentication-97650 |
2014-01-11/a> | Guy Bruneau | tcpflow 1.4.4 and some of its most Interesting Features |
2013-12-24/a> | Daniel Wesemann | Unfriendly crontab additions |
2013-11-02/a> | Rick Wanner | Protecting Your Family's Computers |
2013-10-04/a> | Pedro Bueno | CSAM: WebHosting BruteForce logs |
2013-09-05/a> | Rob VandenBrink | What's Next for IPS? |
2013-07-27/a> | Scott Fendley | Defending Against Web Server Denial of Service Attacks |
2013-06-25/a> | Bojan Zdrnja | The race for resources |
2013-06-10/a> | Johannes Ullrich | When Google isn't Google |
2013-04-08/a> | Johannes Ullrich | Cleaning Up After the Leak: Hiding exposed web content |
2013-03-26/a> | Daniel Wesemann | How your Webhosting Account is Getting Abused |
2013-02-25/a> | Johannes Ullrich | Punkspider enumerates web application vulnerabilities |
2013-02-22/a> | Johannes Ullrich | When web sites go bad: bible . org compromise |
2013-01-25/a> | Johannes Ullrich | Vulnerability Scans via Search Engines (Request for Logs) |
2012-10-26/a> | Adam Swanger | Securing the Human Special Webcast - October 30, 2012 |
2012-09-08/a> | Guy Bruneau | Webmin Input Validation Vulnerabilities |
2012-08-13/a> | Rick Wanner | Interesting scan for medical certification information... |
2012-07-23/a> | Johannes Ullrich | Most Anti-Privacy Web Browsing Tool Ever? |
2012-03-11/a> | Johannes Ullrich | An Analysis of Jester's QR Code Attack. (Guest Diary) |
2011-12-28/a> | Daniel Wesemann | Hash collisions vulnerability in web servers |
2011-11-01/a> | Russ McRee | Secure languages & frameworks |
2011-10-12/a> | Adam Swanger | We are experiencing technical issues with the webcast. The webcast will start as soon as these issues are resolved. |
2011-08-16/a> | Johannes Ullrich | What are the most dangerous web applications and how to secure them? |
2011-07-28/a> | Johannes Ullrich | Announcing: The "404 Project" |
2011-07-05/a> | Raul Siles | Helping Developers Understand Security - Spot the Vuln |
2011-05-17/a> | Johannes Ullrich | A Couple Days of Logs: Looking for the Russian Business Network |
2011-05-14/a> | Guy Bruneau | Websense Study Claims Canada Next Hotbed for Cybercrime Web Hosting Activity |
2011-05-11/a> | Swa Frantzen | Time to disable WebGL ? |
2011-04-10/a> | Raul Siles | Recent security enhancements in web browsers (e.g. Google Chrome) |
2011-04-01/a> | John Bambenek | LizaMoon Mass SQL-Injection Attack Infected at least 500k Websites |
2011-02-28/a> | Deborah Hale | Possible Botnet Scanning |
2011-02-01/a> | Lenny Zeltser | The Importance of HTTP Headers When Investigating Malicious Sites |
2010-12-18/a> | Raul Siles | Google Chrome (Stable and Beta) have been updated to 8.0.552.224 for all platforms (Chrome OS too). http://bit.ly/fW04cr |
2010-12-12/a> | Raul Siles | New trend regarding web application vulnerabilities? |
2010-12-02/a> | Kevin Johnson | Robert Hansen and our happiness |
2010-11-18/a> | Chris Carboni | All of your pages are belonging to us |
2010-08-16/a> | Raul Siles | Blind Elephant: A New Web Application Fingerprinting Tool |
2010-08-15/a> | Manuel Humberto Santander Pelaez | Python to test web application security |
2010-08-13/a> | Tom Liston | The Strange Case of Doctor Jekyll and Mr. ED |
2010-07-25/a> | Rick Wanner | Updated version of Mandiant's Web Historian |
2010-07-21/a> | Adrien de Beaupre | Update on .LNK vulnerability |
2010-07-20/a> | Manuel Humberto Santander Pelaez | LNK vulnerability now with Metasploit module implementing the WebDAV method |
2010-06-23/a> | Scott Fendley | Opera Browser Update |
2010-06-15/a> | Manuel Humberto Santander Pelaez | iPhone 4 Order Security Breach Exposes Private Information |
2010-04-26/a> | Raul Siles | Vulnerable Sites Database |
2010-04-13/a> | Adrien de Beaupre | Web App Testing Tools |
2010-03-24/a> | Johannes Ullrich | ".sys" Directories Delivering Driveby Downloads |
2010-03-21/a> | Scott Fendley | Skipfish - Web Application Security Tool |
2010-03-08/a> | Raul Siles | Samurai WTF 0.8 |
2010-02-06/a> | Guy Bruneau | Oracle WebLogic Server Security Alert |
2010-02-03/a> | Johannes Ullrich | Anatomy of a Form Spam Campaign (in progress against isc.sans.org right now) https://blogs.sans.org/appsecstreetfighter/ |
2010-01-29/a> | Johannes Ullrich | Analyzing isc.sans.org weblogs, part 2, RFI attacks |
2010-01-25/a> | William Salusky | "Bots and Spiders and Crawlers, be gone!" - or - "New Open Source WebAppSec tools, Huzzah!" |
2010-01-20/a> | Johannes Ullrich | Weathering the Storm Part 1: An analysis of our SANS ISC weblogs http://appsecstreetfighter.com |
2010-01-08/a> | Rob VandenBrink | Microsoft OfficeOnline, Searching for Trust and Malware |
2009-12-28/a> | Johannes Ullrich | 8 Basic Rules to Implement Secure File Uploads http://jbu.me/48 (inspired by IIS ; bug) |
2009-10-26/a> | Johannes Ullrich | Web honeypot Update |
2009-10-20/a> | Raul Siles | WASC 2008 Statistics |
2009-10-09/a> | Rob VandenBrink | THAWTE to discontinue free Email Certificate Services and Web of Trust Service |
2009-09-18/a> | Jason Lam | Results from Webhoneypot project |
2009-09-16/a> | Raul Siles | Review the security controls of your Web Applications... all them! |
2009-08-18/a> | Deborah Hale | Domain tcpdump.org unavailable |
2009-08-18/a> | Deborah Hale | Website compromises - what's happening? |
2009-08-17/a> | Adrien de Beaupre | YAMWD: Yet Another Mass Web Defacement |
2009-08-01/a> | Deborah Hale | Website Warnings |
2009-07-13/a> | Adrien de Beaupre | Vulnerability in Microsoft Office Web Components Control Could Allow Remote Code Execution |
2009-07-05/a> | Bojan Zdrnja | More on ColdFusion hacks |
2009-06-11/a> | Jason Lam | Dshield Web Honeypot going beta |
2009-05-27/a> | donald smith | WebDAV write-up |
2009-05-26/a> | Jason Lam | A new Web application security blog |
2009-05-24/a> | Raul Siles | IIS admins, help finding WebDAV remotely using nmap |
2009-05-21/a> | Adrien de Beaupre | IIS admins, help finding WebDAV |
2009-05-20/a> | Tom Liston | Web Toolz |
2009-05-05/a> | Bojan Zdrnja | Every dot matters |
2009-04-21/a> | Bojan Zdrnja | Web application vulnerabilities |
2009-03-26/a> | Mark Hofman | Webhoneypot fun |
2009-02-17/a> | Jason Lam | DShield Web Honeypot - Alpha Preview Release |
2009-01-12/a> | William Salusky | Web Application Firewalls (WAF) - Have you deployed WAF technology? |
2008-12-01/a> | Jason Lam | Call for volunteers - Web Honeypot Project |
2008-11-20/a> | Jason Lam | Large quantity SQL Injection mitigation |
2008-09-08/a> | Raul Siles | Quick Analysis of the 2007 Web Application Security Statistics |
2008-08-19/a> | Johannes Ullrich | A morning stroll through my web logs |
2008-08-15/a> | Jim Clausing | WebEx ActiveX buffer overflow |
2008-06-07/a> | Jim Clausing | Followup to 'How do you monitor your website?' |
2008-04-24/a> | donald smith | Hundreds of thousands of SQL injections |
2006-09-30/a> | Swa Frantzen | Yellow: WebViewFolderIcon setslice exploit spreading |
APPLICATION |
2020-07-24/a> | Xavier Mertens | Compromized Desktop Applications by Web Technologies |
2019-06-20/a> | Xavier Mertens | Using a Travel Packing App for Infosec Purpose |
2018-12-31/a> | Didier Stevens | Software Crashes: A New Year's Resolution |
2018-04-30/a> | Remco Verhoef | Another approach to webapplication fingerprinting |
2014-08-09/a> | Adrien de Beaupre | Complete application ownage via Multi-POST XSRF |
2014-01-17/a> | Russ McRee | Massive RFI scans likely a free web app vuln scanner rather than bots |
2013-07-27/a> | Scott Fendley | Defending Against Web Server Denial of Service Attacks |
2013-01-25/a> | Johannes Ullrich | Vulnerability Scans via Search Engines (Request for Logs) |
2011-11-01/a> | Russ McRee | Secure languages & frameworks |
2011-08-16/a> | Johannes Ullrich | What are the most dangerous web applications and how to secure them? |
2011-07-28/a> | Johannes Ullrich | Announcing: The "404 Project" |
2011-07-05/a> | Raul Siles | Helping Developers Understand Security - Spot the Vuln |
2011-04-22/a> | Manuel Humberto Santander Pelaez | In-house developed applications: The constant headache for the information security officer |
2010-12-25/a> | Manuel Humberto Santander Pelaez | An interesting vulnerability playground to learn application vulnerabilities |
2010-12-12/a> | Raul Siles | New trend regarding web application vulnerabilities? |
2010-08-16/a> | Raul Siles | Blind Elephant: A New Web Application Fingerprinting Tool |
2010-08-15/a> | Manuel Humberto Santander Pelaez | Python to test web application security |
2010-06-14/a> | Manuel Humberto Santander Pelaez | Another way to get protection for application-level attacks |
2010-06-14/a> | Manuel Humberto Santander Pelaez | Rogue facebook application acting like a worm |
2010-04-13/a> | Adrien de Beaupre | Web App Testing Tools |
2010-04-06/a> | Daniel Wesemann | Application Logs |
2010-03-21/a> | Scott Fendley | Skipfish - Web Application Security Tool |
2010-03-08/a> | Raul Siles | Samurai WTF 0.8 |
2010-02-20/a> | Mari Nichols | Is "Green IT" Defeating Security? |
2010-01-29/a> | Adrien de Beaupre | Neo-legacy applications |
2010-01-24/a> | Pedro Bueno | Outdated client applications |
2009-10-20/a> | Raul Siles | WASC 2008 Statistics |
2009-09-16/a> | Raul Siles | Review the security controls of your Web Applications... all them! |
2009-05-26/a> | Jason Lam | A new Web application security blog |
2009-05-20/a> | Tom Liston | Web Toolz |
2009-04-21/a> | Bojan Zdrnja | Web application vulnerabilities |
2009-01-12/a> | William Salusky | Web Application Firewalls (WAF) - Have you deployed WAF technology? |
2008-11-20/a> | Jason Lam | Large quantity SQL Injection mitigation |
SECURITY |
2025-01-31/a> | Richard Porter | To Simulate or Replicate: Crafting Cyber Ranges |
2025-01-17/a> | Guy Bruneau | Leveraging Honeypot Data for Offensive Security Operations [Guest Diary] |
2024-06-26/a> | Guy Bruneau | What Setting Live Traps for Cybercriminals Taught Me About Security [Guest Diary] |
2024-06-20/a> | Guy Bruneau | No Excuses, Free Tools to Help Secure Authentication in Ubuntu Linux [Guest Diary] |
2023-12-20/a> | Guy Bruneau | How to Protect your Webserver from Directory Enumeration Attack ? Apache2 [Guest Diary] |
2023-12-06/a> | Guy Bruneau | Revealing the Hidden Risks of QR Codes [Guest Diary] |
2023-11-22/a> | Guy Bruneau | CVE-2023-1389: A New Means to Expand Botnets |
2023-10-29/a> | Guy Bruneau | Spam or Phishing? Looking for Credentials & Passwords |
2023-09-18/a> | Johannes Ullrich | Internet Wide Multi VPN Search From Single /24 Network |
2023-09-06/a> | Johannes Ullrich | Security Relevant DNS Records |
2023-05-28/a> | Guy Bruneau | We Can no Longer Ignore the Cost of Cybersecurity |
2022-08-23/a> | Xavier Mertens | Who's Looking at Your security.txt File? |
2022-08-13/a> | Guy Bruneau | Phishing HTML Attachment as Voicemail Audio Transcription |
2022-07-26/a> | Xavier Mertens | How is Your macOS Security Posture? |
2022-04-23/a> | Guy Bruneau | Are Roku Streaming Devices Safe from Exploitation? |
2021-10-28/a> | Yee Ching Tok | Multiple Apple Patches for October 2021 |
2021-07-21/a> | Johannes Ullrich | "Summer of SAM": Microsoft Releases Guidance for CVE-2021-36934 |
2021-07-08/a> | Xavier Mertens | Using Sudo with Python For More Security Controls |
2021-05-29/a> | Guy Bruneau | Spear-phishing Email Targeting Outlook Mail Clients |
2021-05-08/a> | Guy Bruneau | Who is Probing the Internet for Research Purposes? |
2021-04-24/a> | Guy Bruneau | Base64 Hashes Used in Web Scanning |
2021-02-26/a> | Guy Bruneau | Pretending to be an Outlook Version Update |
2020-12-19/a> | Guy Bruneau | Secure Communication using TLS in Elasticsearch |
2020-06-05/a> | Johannes Ullrich | Cyber Security for Protests |
2020-05-05/a> | Russ McRee | Cloud Security Features Don't Replace the Need for Personnel Security Capabilities |
2020-03-24/a> | Russ McRee | Another Critical COVID-19 Shortage: Digital Security |
2020-03-21/a> | Guy Bruneau | Honeypot - Scanning and Targeting Devices & Services |
2020-03-15/a> | Guy Bruneau | VPN Access and Activity Monitoring |
2019-10-19/a> | Russell Eubanks | What Assumptions Are You Making? |
2019-07-20/a> | Guy Bruneau | Re-evaluating Network Security - It is Increasingly More Complex |
2019-07-09/a> | John Bambenek | MSFT July 2019 Patch Tuesday |
2018-12-31/a> | Didier Stevens | Software Crashes: A New Year's Resolution |
2018-10-08/a> | Guy Bruneau | Apple Security Updates |
2018-06-16/a> | Russ McRee | Anomaly Detection & Threat Hunting with Anomalize |
2018-05-30/a> | Bojan Zdrnja | The end of the lock icon |
2018-01-23/a> | John Bambenek | Life after GDPR: Implications for Cybersecurity |
2017-12-27/a> | Guy Bruneau | What are your Security Challenges for 2018? |
2017-12-20/a> | Richard Porter | VMWare Security Advisory: VMSA-2017-0021: https://www.vmware.com/security/advisories/VMSA-2017-0021.html |
2017-12-14/a> | Russ McRee | Security Planner: Improve your online safety |
2017-07-24/a> | Russell Eubanks | Trends Over Time |
2017-06-10/a> | Russell Eubanks | An Occasional Look in the Rear View Mirror |
2017-05-23/a> | Rob VandenBrink | What did we Learn from WannaCry? - Oh Wait, We Already Knew That! |
2017-04-28/a> | Russell Eubanks | KNOW before NO |
2017-04-02/a> | Guy Bruneau | IPFire - A Household Multipurpose Security Gateway |
2017-03-25/a> | Russell Eubanks | Distraction as a Service |
2017-03-11/a> | Russell Eubanks | What's On Your Not To Do List? |
2016-10-02/a> | Guy Bruneau | Is there an Infosec Cybersecurity Talent Shortage? |
2016-06-09/a> | Xavier Mertens | Offensive or Defensive Security? Both! |
2016-02-27/a> | Guy Bruneau | OpenSSL Security Update Planned for 1 March Release |
2016-01-10/a> | Jim Clausing | VMware security update |
2015-12-04/a> | Tom Webb | Automating Phishing Analysis using BRO |
2015-10-18/a> | Russell Eubanks | Security Awareness for Security Professionals |
2015-10-17/a> | Russell Eubanks | CIS Critical Security Controls - Version 6.0 |
2015-10-09/a> | Guy Bruneau | Adobe Acrobat and Reader Pre-Announcement |
2015-09-23/a> | Daniel Wesemann | Making our users unlearn what we taught them |
2014-11-25/a> | Adrien de Beaupre | Less is, umm, less? |
2014-10-13/a> | Lorna Hutcheson | For or Against: Port Security for Network Access Control |
2014-10-01/a> | Russ McRee | Security Onion news: Updated ShellShock detection scripts for Bro |
2014-08-12/a> | Adrien de Beaupre | Adobe updates for 2014/08 |
2014-07-28/a> | Guy Bruneau | Management and Control of Mobile Device Security |
2014-07-06/a> | Richard Porter | Physical Access, Point of Sale, Vegas |
2014-07-02/a> | Johannes Ullrich | July Ouch! Security Awareness Newsletter Released. E-mail Do's and Don'ts http://www.securingthehuman.org/resources/newsletters/ouch/2014#july2014 |
2014-06-19/a> | Tony Carothers | WordPress and Security |
2014-06-17/a> | Rob VandenBrink | New Security Advisories / Updates from Microsoft - Heads up for Next Patch Tuesday! |
2014-06-12/a> | Guy Bruneau | BIND Security Update for CVE-2014-3859 |
2014-04-12/a> | Guy Bruneau | Critical Security Update for JetPack WordPress Plugin. Bug has existed since Jetpack 1.9, released in October 2012. - http://jetpack.me/2014/04/10/jetpack-security-update/ |
2014-04-11/a> | Rob VandenBrink | VMware Security Advisories / Patches released for 2 issues (NOT Heartbleed) - http://www.vmware.com/security/advisories/VMSA-2014-0003.html and http://www.vmware.com/security/advisories/VMSA-2014-0002.html |
2014-04-02/a> | Kevin Shortt | Apple Security Update for Safari 6.1.3/7.0.3: http://support.apple.com/kb/HT6181 |
2014-03-24/a> | Johannes Ullrich | Integrating Physical Security Sensors |
2014-02-05/a> | Johannes Ullrich | SANS Ouch Security Awareness Newsletter What is Malware http://www.securingthehuman.org/ouch |
2014-01-25/a> | Guy Bruneau | Finding in Cisco's Annual Security Report |
2013-12-28/a> | Russ McRee | Weekend Reading List 27 DEC |
2013-12-17/a> | Adrien de Beaupre | Apple security updates Mac OS X and Safari |
2013-12-06/a> | Guy Bruneau | VMware ESX 4.x Security Advisory |
2013-11-22/a> | Rick Wanner | Port 0 DDOS |
2013-10-30/a> | Russ McRee | SIR v15: Five good reasons to leave Windows XP behind |
2013-10-01/a> | Adrien de Beaupre | CSAM! Send us your logs! |
2013-09-24/a> | Tom Webb | IDS, NSM, and Log Management with Security Onion 12.04.3 |
2013-09-17/a> | John Bambenek | Microsoft Releases Out-of-Band Advisory for all Versions of Internet Explorer |
2013-08-13/a> | Swa Frantzen | Microsoft security advisories: RDP and MD5 deprecation in Microsoft root certificates |
2013-07-28/a> | Guy Bruneau | Wireshark 1.8.9 and 1.10.1 Security Update |
2013-07-03/a> | Kevin Shortt | Apple Security Update 2013-003 |
2013-06-27/a> | Tony Carothers | Physical Security in the Cyber World |
2013-06-11/a> | Swa Frantzen | Other Microsoft Black Tuesday News |
2013-05-14/a> | Swa Frantzen | Microsoft Security Advisory 2846338 |
2013-04-23/a> | Russ McRee | Microsoft's Security Intelligence Report (SIRv14) released |
2013-04-19/a> | Russ McRee | Java 8 release schedule delayed for renewed focus on security |
2013-03-18/a> | Kevin Shortt | Cisco IOS Type 4 Password Issue: http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20130318-type4 |
2013-03-07/a> | Guy Bruneau | Wireshark Security Updates |
2013-02-12/a> | Adam Swanger | Microsoft February 2013 Black Tuesday Update - Overview |
2013-02-01/a> | Jim Clausing | Oracle quitely releases Java 7u13 early |
2013-01-25/a> | Johannes Ullrich | Vulnerability Scans via Search Engines (Request for Logs) |
2013-01-18/a> | Russ McRee | Interesting reads for Friday 18 JAN 2013 |
2013-01-15/a> | Russ McRee | Cisco introducing Cisco Security Notices 16 JAN 2013 |
2013-01-09/a> | Rob VandenBrink | Security Update - Cisco Prime LMS (cisco-sa-20130109-lms - remote execution as root vulnerability) - advisory at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-lms |
2013-01-09/a> | Rob VandenBrink | Security Update - Cisco 7900 Phones - cisco-sa-20130109-uipphone privilege escallation issue - advisory at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone |
2012-12-22/a> | Guy Bruneau | New Poll - Which of the following issues impacted the most your business in 2012? - https://isc.sans.edu/poll.html |
2012-12-11/a> | John Bambenek | Microsoft December 2012 Black Tuesday Update - Overview |
2012-12-03/a> | John Bambenek | John McAfee Exposes His Location in Photo About His Being on Run |
2012-12-01/a> | Guy Bruneau | Firefox 17.0.1 Bug Fixes - http://www.mozilla.org/en-US/firefox/17.0.1/releasenotes/ |
2012-11-29/a> | Kevin Shortt | New Apple Security Update: APPLE-SA-2012-11-29-1 Apple TV 5.1.1 |
2012-11-28/a> | Mark Hofman | McAfee releases extraDAT for W32/Autorun.worm.aaeb-h |
2012-11-28/a> | Mark Hofman | New version of wireshark is available (1.8.4), some security fixes included. |
2012-11-27/a> | Chris Mohan | Can users' phish emails be a security admin's catch of the day? |
2012-11-26/a> | John Bambenek | Online Shopping for the Holidays? Tips, News and a Fair Warning |
2012-11-20/a> | John Bambenek | Behind the Random NTP Bizarreness of Incorrect Year Being Set |
2012-11-20/a> | John Bambenek | Firefox v 17.0 just released, more here: http://www.mozilla.org/en-US/firefox/17.0/releasenotes/ |
2012-11-19/a> | John Bambenek | MoneyGram fined $100 million for aiding wire fraud - http://krebsonsecurity.com/2012/11/moneygram-fined-100-million-for-wire-fraud/ |
2012-11-19/a> | John Bambenek | New Poll: Top 5 Unresolved Security Problems of 2012 |
2012-11-17/a> | Manuel Humberto Santander Pelaez | New Sysinternal Updates: AdExplorer v1.44, Contig v1.7, Coreinfo v3.2, Procdump v5.1. See http://blogs.technet.com/b/sysinternals/archive/2012/11/16/updates-adexplorer-v1-44-contig-v1-7-coreinfo-v3-2-procdump-v5-1.aspx?Redirected=true |
2012-11-13/a> | Jim Clausing | Microsoft November 2012 Black Tuesday Update - Overview |
2012-11-12/a> | John Bambenek | Request for info: Robocall Phishing Against Local/Regional Banks |
2012-11-09/a> | Mark Baggett | Remote Diagnostics with PSR |
2012-11-09/a> | Mark Baggett | Fresh batch of Microsoft patches next week |
2012-11-07/a> | Mark Baggett | Help eliminate unquoted path vulnerabilities |
2012-11-07/a> | Mark Baggett | Multiple 0-Days Reported! |
2012-11-07/a> | Mark Baggett | Cisco TACACS+ Authentication Bypass |
2012-11-05/a> | Johannes Ullrich | Reminder: Ongoing SMTP Brute Forcing Attacks |
2012-11-05/a> | Johannes Ullrich | Possible Fake-AV Ads from Doubleclick Servers |
2012-11-04/a> | Lorna Hutcheson | What's important on your network? |
2012-10-31/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 31 - Business Continuity and Disaster Recovery |
2012-10-30/a> | Johannes Ullrich | Hurricane Sandy Update |
2012-10-30/a> | Richard Porter | Splunk 5.0 SP-CAAAHB4 http://www.splunk.com/view/SP-CAAAHB4 |
2012-10-30/a> | Mark Hofman | Cyber Security Awareness Month - Day 30 - DSD 35 mitigating controls |
2012-10-29/a> | Kevin Shortt | Cyber Security Awareness Month - Day 29 - Clear Desk: The Unacquainted Standard |
2012-10-28/a> | Tony Carothers | Firefox 16.02 Released |
2012-10-26/a> | Russ McRee | Cyber Security Awareness Month - Day 26 - Attackers use trusted domain to propagate Citadel Zeus variant |
2012-10-25/a> | Richard Porter | Cyber Security Awareness Month - Day 25 - Pro Audio & Video Packets on the Wire |
2012-10-24/a> | Russ McRee | Cyber Security Awareness Month - Day 24 - A Standard for Information Security Incident Management - ISO 27035 |
2012-10-24/a> | Russ McRee | Ongoing Windstream outage in the midwest - https://twitter.com/search?q=windstream |
2012-10-23/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 23: Character Encoding Standards - ASCII and Successors |
2012-10-21/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 22: Connectors |
2012-10-21/a> | Lorna Hutcheson | Potential Phish for Regular Webmail Accounts |
2012-10-19/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 19: Standard log formats and CEE. |
2012-10-18/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide |
2012-10-17/a> | Mark Hofman | Oracle Critical Patch Update October |
2012-10-17/a> | Mark Hofman | New Acrobat release (including reader) available. Version 11. Some security improvements more here -->http://blogs.adobe.com/adobereader/ |
2012-10-17/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 17 - A Standard for Risk Management - ISO 27005 |
2012-10-16/a> | Richard Porter | CyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook. |
2012-10-16/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 16: W3C and HTML |
2012-10-14/a> | Pedro Bueno | Cyber Security Awareness Month - Day 14 - Poor Man's File Analysis System - Part 1 |
2012-10-13/a> | Guy Bruneau | New Poll - Cyber Security Awareness Month Activities 2012 - https://isc.sans.edu/poll.html |
2012-10-12/a> | Mark Hofman | Cyber Security Awareness Month - Day 12 PCI DSS |
2012-10-11/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 11 - Vendor Agnostic Standards (Center for Internet Security) |
2012-10-10/a> | Kevin Shortt | Cyber Security Awareness Month - Day 10 - Standard Sudo - Part Two |
2012-10-09/a> | Johannes Ullrich | Cyber Security Awreness Month - Day 9 - Request for Comment (RFC) |
2012-10-09/a> | Johannes Ullrich | Microsoft October 2012 Black Tuesday Update - Overview |
2012-10-08/a> | Mark Hofman | Cyber Security Awareness Month - Day 8 ISO 27001 |
2012-10-07/a> | Tony Carothers | Cyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1 |
2012-10-06/a> | Manuel Humberto Santander Pelaez | Cyber Security Awareness Month - Day 6 - NERC: The standard that enforces security on power SCADA |
2012-10-05/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 5: Standards Body Soup, So many Flavors in the bowl. |
2012-10-05/a> | Richard Porter | VMWare Security Advisory: VMSA-2012-0014 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html |
2012-10-05/a> | Richard Porter | Reports of a Distributed Injection Scan |
2012-10-04/a> | Mark Hofman | And the SHA-3 title goes to .....Keccak |
2012-10-04/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 4: Crypto Standards |
2012-10-03/a> | Kevin Shortt | Cyber Security Awareness Month - Day 3 - Standard Sudo - Part One |
2012-10-02/a> | Russ McRee | Cyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines |
2012-10-01/a> | Johannes Ullrich | Cyber Security Awareness Month |
2012-09-28/a> | Joel Esler | Adobe certification revocation for October 4th |
2012-09-27/a> | Kevin Shortt | Cisco IOS Security Advisory Bundle - http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep12.html |
2012-09-26/a> | Johannes Ullrich | Some Android phones can be reset to factory default by clicking on links |
2012-09-26/a> | Johannes Ullrich | More Java Woes |
2012-09-21/a> | Johannes Ullrich | iOS 6 Security Roundup |
2012-09-20/a> | Russ McRee | Flash Player update but no announcement, check your version http://www.adobe.com/software/flash/about/ |
2012-09-20/a> | Russ McRee | Apple and Cisco Security Advisories 19 SEP 2012 |
2012-09-20/a> | Russ McRee | Financial sector advisory: attacks and threats against financial institutions |
2012-09-19/a> | Russ McRee | Script kiddie scavenging with Shellbot.S |
2012-09-17/a> | Rob VandenBrink | What's on your iPad? |
2012-09-14/a> | Lenny Zeltser | Scam Report - Fake Voice Mail Email Notification Redirects to Malicious Site |
2012-09-13/a> | Mark Baggett | TCP Fuzzing with Scapy |
2012-09-13/a> | Mark Baggett | Microsoft disrupts traffic associated with the Nitol botnet |
2012-09-13/a> | Mark Baggett | More SSL trouble |
2012-09-10/a> | donald smith | Blue Toad publishing co compromise lead to UDID release. http://redtape.nbcnews.com/_news/2012/09/10/13781440-exclusive-the-real-source-of-apple-device-ids-leaked-by-anonymous-last-week?lite |
2012-09-10/a> | Johannes Ullrich | Microsoft Patch Tuesday Pre-Release |
2012-09-10/a> | Johannes Ullrich | Godaddy DDoS Attack |
2012-09-07/a> | Chris Mohan | Keeping an eye on those BYODs with DHCP |
2012-09-06/a> | Johannes Ullrich | SSL Requests sent to port 80 (request for help/input) |
2012-09-04/a> | Johannes Ullrich | Another round of "Spot the Exploit E-Mail" |
2012-09-02/a> | Lorna Hutcheson | Demonstrating the value of your Intrusion Detection Program and Analysts |
2012-09-01/a> | Russ McRee | Blackhole targeting Java vulnerability via fake Microsoft Services Agreement email phish |
2012-08-31/a> | Russ McRee | Not so fast: Java 7 Update 7 critical vulnerability discovered in less than 24 hours |
2012-08-30/a> | Johannes Ullrich | Editorial: The Slumlord Approach to Network Security http://isc.sans.edu/j/editorial |
2012-08-29/a> | Johannes Ullrich | "Data" URLs used for in-URL phishing |
2012-08-27/a> | Johannes Ullrich | The Good, Bad and Ugly about Assigning IPv6 Addresses |
2012-08-27/a> | Johannes Ullrich | Malware Spam harvesting Facebook Information |
2012-08-26/a> | Lorna Hutcheson | Who ya gonna contact? |
2012-08-22/a> | Adrien de Beaupre | Apple Remote Desktop update fixes no encryption issue |
2012-08-22/a> | Adrien de Beaupre | Phishing/spam via SMS |
2012-08-21/a> | Adrien de Beaupre | RuggedCom fails key management 101 on Rugged Operating System (ROS) |
2012-08-21/a> | Adrien de Beaupre | YYABCAFU - Yes Yet Another Bleeping Critical Adobe Flash Update |
2012-08-20/a> | Manuel Humberto Santander Pelaez | Do we need test procedures in our companies before implementing Antivirus signatures? |
2012-08-19/a> | Manuel Humberto Santander Pelaez | Authentication Issues between entities during protocol message exchange in SCADA Systems |
2012-08-15/a> | Guy Bruneau | Wireshark Security Update |
2012-08-12/a> | Tony Carothers | Layers of the Defense-in-Depth Onion |
2012-08-12/a> | Tony Carothers | Oracle Security Alert for CVE-2012-3132 |
2012-08-09/a> | Mark Hofman | Zeus/Citadel variant causing issues in the Netherlands |
2012-08-09/a> | Mark Hofman | SQL Injection Lilupophilupop style, Part 2 |
2012-08-07/a> | Adrien de Beaupre | Who protects small business? |
2012-08-04/a> | Kevin Liston | Vendors: More Patch-Release Options Please |
2012-08-02/a> | Guy Bruneau | Opera Security Update |
2012-07-27/a> | Daniel Wesemann | Cuckoo 0.4 is out - cool new features for malware analysis http://www.cuckoosandbox.org/ |
2012-07-24/a> | Richard Porter | Wireshark 1.8.1 Released http://www.wireshark.org/ |
2012-07-24/a> | Richard Porter | Report of spike in DNS Queries gd21.net |
2012-07-20/a> | Mark Baggett | Syria Internet connection cut? |
2012-07-19/a> | Mark Baggett | A Heap of Overflows? |
2012-07-19/a> | Mark Baggett | Diagnosing Malware with Resource Monitor |
2012-07-16/a> | Richard Porter | Sysinternals Update @ http://blogs.technet.com/b/sysinternals/archive/2012/07/16/updates-handle-v3-5-process-explorer-v15-22-process-monitor-v3-03-rammap-v1-21-zoomit-v4-3.aspx |
2012-07-13/a> | Richard Porter | Yesterday (not as on the ball as Rob) at SANSFire |
2012-07-13/a> | Russ McRee | 2 for 1: SANSFIRE & MSRA presentations |
2012-07-13/a> | Russ McRee | VMWare Security Advisory 12 JUL 2012 |
2012-07-13/a> | Russ McRee | Yahoo service SQL injection vuln leads to account exposure |
2012-07-12/a> | Rick Wanner | Cisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms |
2012-07-12/a> | Rick Wanner | Cisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Recording Server - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs |
2012-07-12/a> | Rick Wanner | Cisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts |
2012-07-12/a> | Rick Wanner | Cisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Manager - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman |
2012-07-10/a> | Swa Frantzen | Microsoft revoking trust in Microsoft certificates - SA 2728973 |
2012-07-10/a> | Swa Frantzen | Microsoft fix-it to disable gadgets - SA 2719662 |
2012-07-09/a> | Johannes Ullrich | The FBI will turn off the Internet on Monday (or not) |
2012-07-09/a> | Manuel Humberto Santander Pelaez | Internet Storm Center panel tonight at SANSFIRE 2012! |
2012-07-05/a> | Adrien de Beaupre | New OS X trojan backdoor MaControl variant reported |
2012-07-05/a> | Adrien de Beaupre | Microsoft advanced notification for July 2012 patch Tuesday |
2012-07-02/a> | Joel Esler | A rough guide to keeping your website up |
2012-07-02/a> | Joel Esler | Linux & Java leap second bug |
2012-06-29/a> | Jim Clausing | Updated SysInternals tools - Autoruns, Process Explorer, Process Monitor, PSKill -- http://blogs.technet.com/b/sysinternals/archive/2012/06/28/updates-autoruns-v11-32-process-explorer-v15-21-process-monitor-v3-02-pskill-v1-15-rammap-v1-2.aspx |
2012-06-28/a> | Chris Mohan | Massive spike in BGP traffic - Possible BGP poisoning? |
2012-06-21/a> | Russ McRee | Cisco Security Advisories 20 JUN 2012 |
2012-06-21/a> | Russ McRee | Analysis of drive-by attack sample set |
2012-06-21/a> | Russ McRee | Wireshark 1.8.0 released 21 JUN 2012 http://www.wireshark.org/download.html |
2012-06-20/a> | Raul Siles | Firefox 13.0.1 Update |
2012-06-19/a> | Daniel Wesemann | Vulnerabilityqueerprocessbrittleness |
2012-06-06/a> | Jim Clausing | Firefox, Thunderbird, and Seamonkey Security Updates |
2012-05-22/a> | Johannes Ullrich | nmap 6 released |
2012-05-04/a> | Guy Bruneau | Adobe Security Flash Update |
2012-03-27/a> | Guy Bruneau | Wireshark 1.6.6 and 1.4.2 Released |
2012-03-27/a> | Guy Bruneau | Opera 11.62 for Windows patch several bugs and vulnerabilities - http://www.opera.com/docs/changelogs/windows/1162/ |
2012-02-29/a> | Russ McRee | Cisco Security Advisories - 29FEB2011 |
2012-02-04/a> | Scott Fendley | Apple Security Advisory 2012-001 v1.1 |
2012-02-01/a> | Russ McRee | Oracle Security Alert: http://www.oracle.com/technetwork/topics/security/alert-cve-2011-5035-1506603.html |
2012-01-31/a> | Russ McRee | Firefox 10 and VMWare advisories and updates |
2012-01-03/a> | Rick Wanner | Analysis of the Stratfor Password List |
2011-12-08/a> | Adrien de Beaupre | Microsoft Security Bulletin Advance Notification for December 2011 |
2011-11-01/a> | Russ McRee | Secure languages & frameworks |
2011-10-29/a> | Richard Porter | The Sub Critical Control? Evidence Collection |
2011-10-28/a> | Russ McRee | Critical Control 19: Data Recovery Capability |
2011-10-28/a> | Daniel Wesemann | Critical Control 20: Security Skills Assessment and Training to fill Gaps |
2011-10-27/a> | Mark Baggett | Critical Control 18: Incident Response Capabilities |
2011-10-26/a> | Rick Wanner | Critical Control 17:Penetration Tests and Red Team Exercises |
2011-10-17/a> | Rob VandenBrink | Critical Control 11: Account Monitoring and Control |
2011-10-13/a> | Guy Bruneau | Critical Control 10: Continuous Vulnerability Assessment and Remediation |
2011-10-12/a> | Kevin Shortt | Critical Control 8 - Controlled Use of Administrative Privileges |
2011-10-11/a> | Swa Frantzen | Critical Control 7 - Application Software Security |
2011-10-10/a> | Jim Clausing | Critical Control 6 - Maintenance, Monitoring, and Analysis of Security Audit Logs |
2011-10-07/a> | Mark Hofman | Critical Control 5 - Boundary Defence |
2011-10-04/a> | Rob VandenBrink | Critical Control 2 - Inventory of Authorized and Unauthorized Software |
2011-10-04/a> | Johannes Ullrich | Critical Control 3 - Secure Configurations for Hardware and Software on Laptops, Workstations and Servers |
2011-10-03/a> | Mark Hofman | Critical Control 1 - Inventory of Authorized and Unauthorized Devices |
2011-10-03/a> | Mark Baggett | What are the 20 Critical Controls? |
2011-10-03/a> | Tom Liston | Security 101 : Security Basics in 140 Characters Or Less |
2011-10-02/a> | Mark Hofman | Cyber Security Awareness Month Day 1/2 - Schedule |
2011-10-02/a> | Mark Hofman | Cyber Security Awareness Month Day 1/2 - Introduction to the controls |
2011-09-21/a> | Mark Hofman | October 2011 Cyber Security Awareness Month |
2011-08-05/a> | Johannes Ullrich | Microsoft Patch Tuesday Advance Notification: 13 Bulletins coming http://www.microsoft.com/technet/security/Bulletin/MS11-aug.mspx |
2011-07-10/a> | Raul Siles | Security Testing SSL/TLS (HTTPS) Implementations |
2011-07-05/a> | Raul Siles | Helping Developers Understand Security - Spot the Vuln |
2011-06-29/a> | Johannes Ullrich | Random SSL Tips and Tricks |
2011-06-23/a> | Jim Clausing | Apple Security Updates 2011-004 |
2011-06-22/a> | Guy Bruneau | How Good is your Employee Termination Policy? |
2011-06-17/a> | Richard Porter | When do you stop owning Technology? |
2011-06-09/a> | Richard Porter | Chrome Version 12.0.742.91 Released |
2011-06-01/a> | Adrien de Beaupre | Cisco Security Advisory: Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series - http://www.cisco.com/warp/public/707/cisco-sa-20110601-phone.shtml |
2011-06-01/a> | Adrien de Beaupre | Cisco Security Advisory: Default Credentials Vulnerability in Cisco Network Registrar - http://www.cisco.com/warp/public/707/cisco-sa-20110601-cnr.shtml |
2011-06-01/a> | Adrien de Beaupre | Cisco Security Advisory: Default Credentials for root Account on the Cisco Media Experience Engine 5600 - http://www.cisco.com/warp/public/707/cisco-sa-20110601-mxe.shtml |
2011-06-01/a> | Adrien de Beaupre | Cisco Security Advisory: Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client - http://www.cisco.com/warp/public/707/cisco-sa-20110601-ac.shtml |
2011-05-31/a> | Chris Mohan | Getting the IT security word out there to the rest of the world |
2011-05-08/a> | Lorna Hutcheson | Monitoring Virtual Machines |
2011-04-10/a> | Raul Siles | Pros and Cons of "Secure" Wi-Fi Access |
2011-03-30/a> | Adrien de Beaupre | Two Cisco advisories: cisco-sa-20110330-nac and cisco-sa-20110330-acs |
2011-03-21/a> | Kevin Shortt | APPLE-SA-2011-03-21-1 Mac OS X v10.6.7 and Security Update 2011-001 |
2011-02-15/a> | Jason Lam | HTTP headers fun |
2011-02-10/a> | Chris Mohan | Linksys WAP610N has Unauthenticated Root Console issue |
2011-01-19/a> | Johannes Ullrich | Microsoft's Secure Developer Tools |
2011-01-13/a> | Rob VandenBrink | Is Infosec seeing "Death by a Thousand Budget Cuts"? |
2011-01-05/a> | Johannes Ullrich | Survey: Software Security Awareness Training |
2010-12-28/a> | John Bambenek | Mozilla Notifies of Relatively Minor Security Breach |
2010-12-08/a> | Rob VandenBrink | How a Tablet Changed My Life |
2010-12-02/a> | Kevin Johnson | Robert Hansen and our happiness |
2010-11-16/a> | Guy Bruneau | Mac OS X Server v10.6.5 (10H575) Security Update: http://support.apple.com/kb/HT4452 |
2010-11-08/a> | Manuel Humberto Santander Pelaez | Network Security Perimeter: How to choose the correct firewall and IPS for your environment? |
2010-10-31/a> | Marcus Sachs | Cyber Security Awareness Month - Day 31 - Tying it all together |
2010-10-30/a> | Guy Bruneau | Cyber Security Awareness Month - Day 30 - Role of the network team |
2010-10-29/a> | Manuel Humberto Santander Pelaez | Cyber Security Awareness Month - Day 29- Role of the office geek |
2010-10-28/a> | Rick Wanner | Cyber Security Awareness Month - Day 27 - Social Media use in the office |
2010-10-28/a> | Tony Carothers | Cyber Security Awareness Month - Day 28 - Role of the employee |
2010-10-26/a> | Pedro Bueno | Cyber Security Awareness Month - Day 26 - Sharing Office Files |
2010-10-25/a> | Kevin Shortt | Cyber Security Awareness Month - Day 25 - Using Home Computers for Work |
2010-10-24/a> | Swa Frantzen | Cyber Security Awarenes Month - Day 24 - Using work computers at home |
2010-10-23/a> | Mark Hofman | Cyber Security Awareness Month - Day 23 - The Importance of compliance |
2010-10-22/a> | Daniel Wesemann | Cyber Security Awareness Month - Day 22 - Security of removable media |
2010-10-22/a> | Manuel Humberto Santander Pelaez | Intypedia project |
2010-10-21/a> | Chris Carboni | Cyber Security Awareness Month - Day 21 - Impossible Requests from the Boss |
2010-10-20/a> | Jim Clausing | Cyber Security Awareness Month - Day 20 - Securing Mobile Devices |
2010-10-19/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - Remote Access Tools |
2010-10-19/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - Remote User VPN Tunnels - to Split or not to Split? |
2010-10-19/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - VPN Architectures – SSL or IPSec? |
2010-10-19/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - Remote User VPN Access – Are things getting too easy, or too hard? |
2010-10-19/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - VPN and Remote Access Tools |
2010-10-18/a> | Manuel Humberto Santander Pelaez | Cyber Security Awareness Month - Day 18 - What you should tell your boss when there's a crisis |
2010-10-17/a> | Stephen Hall | Cyber Security Awareness Month - Day 17 - What a boss should and should not have access to |
2010-10-15/a> | Marcus Sachs | Cyber Security Awareness Month - Day 15 - What Teachers Need to Know About Their Students |
2010-10-15/a> | Guy Bruneau | Cyber Security Awareness Month - Day 16 - Securing a donated computer |
2010-10-14/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 14 - Securing a public computer |
2010-10-13/a> | Deborah Hale | Cyber Security Awareness Month - Day 13 - Online Bullying |
2010-10-12/a> | Scott Fendley | Cyber Security Awareness Month - Day 12 - Protecting and Managing Your Digital Identity On Social Media Sites |
2010-10-11/a> | Rick Wanner | Cyber Security Awareness Month - Day 11 - Safe Browsing for Teens |
2010-10-10/a> | Kevin Liston | Cyber Security Awareness Month - Day 10 - Safe browsing for pre-teens |
2010-10-09/a> | Kevin Shortt | Cyber Security Awareness Month - Day 9 - Disposal of an Old Computer |
2010-10-08/a> | Rick Wanner | Cyber Security Awareness Month - Day 8 - Patch Management and System Updates |
2010-10-06/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 7 - Remote Access and Monitoring Tools |
2010-10-06/a> | Marcus Sachs | Cyber Security Awareness Month - Day 6 - Computer Monitoring Tools |
2010-10-05/a> | Rick Wanner | Cyber Security Awareness Month - Day 5 - Sites you should stay away from |
2010-10-04/a> | Daniel Wesemann | Cyber Security Awareness Month - Day 4 - Managing EMail |
2010-10-03/a> | Adrien de Beaupre | Cyber Security Awareness Month - Day 3 - Recognizing phishing and online scams |
2010-10-03/a> | Adrien de Beaupre | Canada's Cyber Security Strategy released today |
2010-10-02/a> | Mark Hofman | Cyber Security Awareness Month - Day 2 - Securing the Family Network |
2010-10-01/a> | Marcus Sachs | Cyber Security Awareness Month - 2010 |
2010-10-01/a> | Marcus Sachs | Cyber Security Awareness Month - Day 1 - Securing the Family PC |
2010-09-18/a> | Rick Wanner | Microsoft Security Advisory for ASP.NET |
2010-08-25/a> | Pedro Bueno | Adobe released security update for Shockwave player that fix several CVEs: APSB1020 |
2010-08-15/a> | Manuel Humberto Santander Pelaez | Python to test web application security |
2010-08-14/a> | Tony Carothers | Freedom of Information |
2010-08-08/a> | Marcus Sachs | Thinking about Cyber Security Awareness Month in October |
2010-08-02/a> | Manuel Humberto Santander Pelaez | Securing Windows Internet Kiosk |
2010-07-21/a> | Adrien de Beaupre | Update on .LNK vulnerability |
2010-06-17/a> | Deborah Hale | Digital Copy Machines - Security Risk? |
2010-06-10/a> | Deborah Hale | iPad Owners Exposed |
2010-06-10/a> | Deborah Hale | Microsoft Security Advisory 2219475 |
2010-06-07/a> | Manuel Humberto Santander Pelaez | Software Restriction Policy to keep malware away |
2010-05-12/a> | Rob VandenBrink | Layer 2 Security - Private VLANs (the Story Continues ...) |
2010-05-07/a> | Rob VandenBrink | Security Awareness – Many Audiences, Many Messages (Part 2) |
2010-05-02/a> | Mari Nichols | Zbot Social Engineering |
2010-04-13/a> | Adrien de Beaupre | Web App Testing Tools |
2010-04-07/a> | Rob VandenBrink | The Many Paths to Security Awareness |
2010-04-06/a> | Daniel Wesemann | Application Logs |
2010-04-02/a> | Guy Bruneau | Security Advisory for ESX Service Console |
2010-04-02/a> | Guy Bruneau | Apple QuickTime and iTunes Security Update |
2010-04-02/a> | Guy Bruneau | Foxit Reader Security Update |
2010-03-29/a> | Adrien de Beaupre | APPLE-SA-2010-03-29-1 Security Update 2010-002 / Mac OS X v10.6.3 |
2010-03-22/a> | Guy Bruneau | New Opera 10.51 available with security fixes. More information available at: http://www.opera.com/docs/changelogs/windows/1051/ |
2010-03-21/a> | Scott Fendley | Skipfish - Web Application Security Tool |
2010-03-10/a> | Rob VandenBrink | Microsoft Security Advisory 981374 - Remote Code Execution Vulnerability for IE6 and IE7 |
2010-03-08/a> | Raul Siles | Samurai WTF 0.8 |
2010-03-07/a> | Mari Nichols | DHS issues Cybersecurity challenge |
2010-02-20/a> | Mari Nichols | Is "Green IT" Defeating Security? |
2010-02-17/a> | Rob VandenBrink | Cisco ASA5500 Security Updates - cisco-sa-20100217-asa |
2010-02-17/a> | Rob VandenBrink | Cisco Security Agent Security Updates: cisco-sa-20100217-csa |
2010-01-06/a> | Guy Bruneau | Firefox security and stability update for version 3.5.7 and 3.0.17 available for download |
2009-11-29/a> | Patrick Nolan | A Cloudy Weekend |
2009-11-09/a> | Guy Bruneau | Apple Security Update 2009-006 for Mac OS X v10.6.2 |
2009-10-29/a> | Kyle Haugsness | Cyber Security Awareness Month - Day 29 - dns port 53 |
2009-10-28/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 28 - ntp (123/udp) |
2009-10-25/a> | Lorna Hutcheson | Cyber Security Awareness Month - Day 25 - Port 80 and 443 |
2009-10-22/a> | Adrien de Beaupre | Cyber Security Awareness Month - Day 22 port 502 TCP - Modbus |
2009-10-21/a> | Pedro Bueno | Cyber Security Awareness Month - Day 21 - Port 135 |
2009-10-20/a> | Raul Siles | WASC 2008 Statistics |
2009-10-19/a> | Daniel Wesemann | Cyber Security Awareness Month - Day 19 - ICMP |
2009-10-18/a> | Mari Nichols | Computer Security Awareness Month - Day 18 - Telnet an oldie but a goodie |
2009-10-16/a> | Adrien de Beaupre | Cyber Security Awareness Month - Day 16 - Port 1521 - Oracle TNS Listener |
2009-10-11/a> | Mark Hofman | Cyber Security Awareness Month - Day 12 Ports 161/162 Simple Network Management Protocol (SNMP) |
2009-10-09/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 9 - Port 3389/tcp (RDP) |
2009-10-06/a> | Adrien de Beaupre | Cyber Security Awareness Month - Day 6 ports 67&68 udp - bootp and dhcp |
2009-10-05/a> | Adrien de Beaupre | Cyber Security Awareness Month - Day 5 port 31337 |
2009-10-02/a> | Stephen Hall | Cyber Security Awareness Month - Day 2 - Port 0 |
2009-09-20/a> | Mari Nichols | Insider Threat and Security Awareness |
2009-09-16/a> | Raul Siles | Review the security controls of your Web Applications... all them! |
2009-09-10/a> | Guy Bruneau | Firefox 3.5.3 and 3.0.14 has been released |
2009-08-04/a> | donald smith | Java Security Update |
2009-07-18/a> | Patrick Nolan | Chrome update contains Security fixes |
2009-07-16/a> | Guy Bruneau | Changes in Windows Security Center |
2009-06-15/a> | Daniel Wesemann | Drive-by Blackouting ? |
2009-05-29/a> | Lorna Hutcheson | Blackberry Server Vulnerability |
2009-05-26/a> | Jason Lam | A new Web application security blog |
2009-05-18/a> | Rick Wanner | Cisco SAFE Security Reference Guide Updated |
2009-04-06/a> | Adrien de Beaupre | Abuse addresses |
2009-03-27/a> | David Goldsmith | Firefox 3.0.8 Released |
2009-02-17/a> | Jason Lam | DShield Web Honeypot - Alpha Preview Release |
2009-01-31/a> | John Bambenek | Google Search Engine's Malware Detection Broken |
2009-01-12/a> | William Salusky | Web Application Firewalls (WAF) - Have you deployed WAF technology? |
2008-12-31/a> | David Goldsmith | Thunderbird 2.0.0.19 Released |
2008-12-17/a> | donald smith | Opera 9.6.3 released with security fixes |
2008-12-16/a> | donald smith | Cisco's Annual Security report has been released. |
2008-12-12/a> | Swa Frantzen | Browser Security Handbook |
2008-11-29/a> | Pedro Bueno | Ubuntu users: Time to update! |
2008-11-12/a> | John Bambenek | Thoughts on Security Intelligence (McColo Corp alleged spam/malware host knocked offline) |
2008-09-24/a> | Deborah Hale | Flurry of Security Advisories from CISCO |
2008-09-22/a> | Jim Clausing | Lessons learned from the Palin (and other) account hijacks |
2008-09-21/a> | Mari Nichols | You still have time! |
2008-09-08/a> | Raul Siles | CitectSCADA ODBC service exploit published |
2008-08-09/a> | Deborah Hale | A Few Tips to Help You Protect Your Home Computer |
2008-08-03/a> | Deborah Hale | Securing A Network - Lessons Learned |
2008-07-30/a> | David Goldsmith | Serious 0-Day Flaw in Oracle -- Patch Released |
2008-06-11/a> | John Bambenek | CitectSCADA Buffer Overflow Vulnerability |
2008-05-05/a> | John Bambenek | Defenses Against Automated Patch-Based Exploit Generation |
2008-04-07/a> | John Bambenek | HP USB Keys Shipped with Malware for your Proliant Server |
2008-03-20/a> | Joel Esler | APPLE-SA-2008-03-19 AirPort Extreme Base Station Firmware 7.3.1 |
2008-03-20/a> | Joel Esler | Potential Vulnerability in Flash CS3 Professional, Flash Professional 8 and Flash Basic 8? |
2008-03-12/a> | Joel Esler | Adobe security updates |
2006-10-05/a> | John Bambenek | There are no more Passive Exploits |