2025-01-24 | Jesse La Grew | [Guest Diary] How Access Brokers Maintain Persistence |
2024-12-24 | Xavier Mertens | More SSH Fun! |
2024-12-05 | Jesse La Grew | [Guest Diary] Business Email Compromise |
2022-12-29 | Jesse La Grew | Opening the Door for a Knock: Creating a Custom DShield Listener |
2022-12-19 | Xavier Mertens | Hunting for Mastodon Servers |
2022-11-29 | Johannes Ullrich | Identifying Groups of "Bot" Accounts on LinkedIn |
2022-09-19 | Russ McRee | Chainsaw: Hunt, search, and extract event log records |
2022-06-10 | Russ McRee | EPSScall: An Exploit Prediction Scoring System App |
2022-03-11 | Xavier Mertens | Keep an Eye on WebSockets |
2022-03-02 | Johannes Ullrich | The More Often Something is Repeated, the More True It Becomes: Dealing with Social Media |
2021-12-28 | Russ McRee | LotL Classifier tests for shells, exfil, and miners |
2021-03-02 | Russ McRee | Adversary Simulation with Sim |
2021-01-19 | Russ McRee | Gordon for fast cyber reputation checks |
2020-11-29 | Didier Stevens | Quick Tip: Using JARM With a SOCKS Proxy |
2020-10-23 | Russ McRee | Sooty: SOC Analyst's All-in-One Tool |
2020-02-05 | Brad Duncan | Fake browser update pages are "still a thing" |
2019-04-04 | Xavier Mertens | New Waves of Scans Detected by an Old Rule |
2018-06-21 | Xavier Mertens | Are Your Hunting Rules Still Working? |
2018-05-24 | Xavier Mertens | "Blocked" Does Not Mean "Forget It" |
2017-08-31 | Tom Webb | Remote SOC Workers Concerns |
2017-07-16 | Renato Marinho | SMS Phishing induces victims to photograph its own token card |
2017-03-31 | Xavier Mertens | Pro & Con of Outsourcing your SOC |
2015-11-21 | Didier Stevens | Maldoc Social Engineering Trick |
2015-11-09 | John Bambenek | Protecting Users and Enterprises from the Mobile Malware Threat |
2014-08-20 | Kevin Shortt | Social Engineering Alive and Well |
2014-02-05 | Johannes Ullrich | To Merrillville or Sochi: How Dangerous is it to travel? |
2014-01-24 | Chris Mohan | Phishing via Social Media |
2013-07-13 | Lenny Zeltser | Decoy Personas for Safeguarding Online Identity Using Deception |
2013-07-08 | Richard Porter | Why do we Click? |
2013-02-25 | Johannes Ullrich | Mass-Customized Malware Lures: Don't trust your cat! |
2012-04-06 | Johannes Ullrich | Social Share Privacy |
2011-05-25 | Lenny Zeltser | Monitoring Social Media for Security References to Your Organization |
2011-05-10 | Swa Frantzen | Changing MO in scamming our users ? |
2010-12-29 | Daniel Wesemann | Beware of strange web sites bearing gifts ... |
2010-11-22 | Lenny Zeltser | Brand Impersonations On-Line: Brandjacking and Social Networks |
2010-09-16 | Johannes Ullrich | Facebook "Like Pages" |
2010-07-07 | Kevin Shortt | Facebook, Facebook, What Do YOU See? |
2010-06-26 | Guy Bruneau | socat to Simulate a Website |
2010-06-14 | Manuel Humberto Santander Pelaez | New way of social engineering on IRC |
2010-06-10 | Deborah Hale | Top 5 Social Networking Media Risks |
2010-05-02 | Mari Nichols | Zbot Social Engineering |
2010-04-29 | Bojan Zdrnja | Who needs exploits when you have social engineering? |
2010-04-13 | Johannes Ullrich | More Legal Threat Malware E-Mail |
2009-06-01 | G. N. White | Yet another "Digital Certificate" malware campaign |
2009-04-24 | Pedro Bueno | Did you check your conference goodies? |
2009-03-26 | Mark Hofman | Webhoneypot fun |
2009-01-18 | Maarten Van Horenbeeck | Targeted social engineering |