Internet Storm Center
Sign In
Sign Up
Handler on Duty:
Xavier Mertens
Threat Level:
green
Date
Author
Title
TARGETED ATTACKS SOCIAL ENGINEERING
2009-01-18
Maarten Van Horenbeeck
Targeted social engineering
TARGETED
2010-12-23/a>
Mark Hofman
White house greeting cards
2009-06-04/a>
Raul Siles
Targeted e-mail attacks asking to verify wire transfer details
2009-02-25/a>
Swa Frantzen
Targeted link diversion attempts
2009-01-18/a>
Maarten Van Horenbeeck
Targeted social engineering
2008-09-22/a>
Maarten Van Horenbeeck
Data exfiltration and the use of anonymity providers
2008-07-09/a>
Johannes Ullrich
Unpatched Word Vulnerability
2008-05-26/a>
Marcus Sachs
Predictable Response
2008-04-24/a>
Maarten Van Horenbeeck
Targeted attacks using malicious PDF files
2008-03-27/a>
Maarten Van Horenbeeck
Guarding the guardians: a story of PGP key ring theft
ATTACKS
2024-01-08/a>
Jesse La Grew
What is that User Agent?
2022-08-10/a>
Johannes Ullrich
And Here They Come Again: DNS Reflection Attacks
2021-02-01/a>
Rob VandenBrink
Taking a Shot at Reverse Shell Attacks, CNC Phone Home and Data Exfil from Servers
2019-08-25/a>
Guy Bruneau
Are there any Advantages of Buying Cyber Security Insurance?
2016-11-02/a>
Rob VandenBrink
What Does a Pentest Look Like?
2016-06-03/a>
Tom Liston
MySQL is YourSQL
2015-02-19/a>
Daniel Wesemann
DNS-based DDoS
2014-02-26/a>
Russ McRee
Ongoing NTP Amplification Attacks
2014-02-17/a>
Chris Mohan
NTP reflection attacks continue
2013-08-19/a>
Guy Bruneau
Business Risks and Cyber Attacks
2013-07-27/a>
Scott Fendley
Defending Against Web Server Denial of Service Attacks
2011-12-28/a>
Daniel Wesemann
Hash collisions vulnerability in web servers
2010-08-16/a>
Raul Siles
DDOS: State of the Art
2010-08-13/a>
Tom Liston
The Strange Case of Doctor Jekyll and Mr. ED
2010-01-29/a>
Johannes Ullrich
Analyzing isc.sans.org weblogs, part 2, RFI attacks
2009-02-25/a>
Swa Frantzen
Targeted link diversion attempts
2009-01-18/a>
Maarten Van Horenbeeck
Targeted social engineering
2008-12-03/a>
Andre Ludwig
New ISC Poll! Has your organization suffered a DDoS (Distributed Denial of Service) attack in the last year?
SOCIAL
2022-11-29/a>
Johannes Ullrich
Identifying Groups of "Bot" Accounts on LinkedIn
2022-03-02/a>
Johannes Ullrich
The More Often Something is Repeated, the More True It Becomes: Dealing with Social Media
2017-07-16/a>
Renato Marinho
SMS Phishing induces victims to photograph its own token card
2015-11-21/a>
Didier Stevens
Maldoc Social Engineering Trick
2014-08-20/a>
Kevin Shortt
Social Engineering Alive and Well
2014-01-24/a>
Chris Mohan
Phishing via Social Media
2013-07-13/a>
Lenny Zeltser
Decoy Personas for Safeguarding Online Identity Using Deception
2013-07-08/a>
Richard Porter
Why do we Click?
2013-02-25/a>
Johannes Ullrich
Mass-Customized Malware Lures: Don't trust your cat!
2012-04-06/a>
Johannes Ullrich
Social Share Privacy
2011-05-25/a>
Lenny Zeltser
Monitoring Social Media for Security References to Your Organization
2011-05-10/a>
Swa Frantzen
Changing MO in scamming our users ?
2010-12-29/a>
Daniel Wesemann
Beware of strange web sites bearing gifts ...
2010-11-22/a>
Lenny Zeltser
Brand Impersonations On-Line: Brandjacking and Social Networks
2010-09-16/a>
Johannes Ullrich
Facebook "Like Pages"
2010-07-07/a>
Kevin Shortt
Facebook, Facebook, What Do YOU See?
2010-06-14/a>
Manuel Humberto Santander Pelaez
New way of social engineering on IRC
2010-06-10/a>
Deborah Hale
Top 5 Social Networking Media Risks
2010-05-02/a>
Mari Nichols
Zbot Social Engineering
2010-04-29/a>
Bojan Zdrnja
Who needs exploits when you have social engineering?
2010-04-13/a>
Johannes Ullrich
More Legal Threat Malware E-Mail
2009-06-01/a>
G. N. White
Yet another "Digital Certificate" malware campaign
2009-04-24/a>
Pedro Bueno
Did you check your conference goodies?
2009-01-18/a>
Maarten Van Horenbeeck
Targeted social engineering
ENGINEERING
2017-07-16/a>
Renato Marinho
SMS Phishing induces victims to photograph its own token card
2015-11-21/a>
Didier Stevens
Maldoc Social Engineering Trick
2014-08-20/a>
Kevin Shortt
Social Engineering Alive and Well
2013-07-08/a>
Richard Porter
Why do we Click?
2012-09-14/a>
Lenny Zeltser
Analyzing Malicious RTF Files Using OfficeMalScanner's RTFScan
2012-06-04/a>
Lenny Zeltser
Decoding Common XOR Obfuscation in Malicious Code
2011-05-10/a>
Swa Frantzen
Changing MO in scamming our users ?
2010-12-29/a>
Daniel Wesemann
Beware of strange web sites bearing gifts ...
2010-11-18/a>
Chris Carboni
Stopping the ZeroAccess Rootkit
2010-06-14/a>
Manuel Humberto Santander Pelaez
New way of social engineering on IRC
2010-05-02/a>
Mari Nichols
Zbot Social Engineering
2010-04-29/a>
Bojan Zdrnja
Who needs exploits when you have social engineering?
2010-04-13/a>
Johannes Ullrich
More Legal Threat Malware E-Mail
2009-06-01/a>
G. N. White
Yet another "Digital Certificate" malware campaign
2009-04-24/a>
Pedro Bueno
Did you check your conference goodies?
2009-01-18/a>
Maarten Van Horenbeeck
Targeted social engineering
Homepage
Diaries
Podcasts
Jobs
Data
TCP/UDP Port Activity
Port Trends
SSH/Telnet Scanning Activity
Weblogs
Threat Feeds Activity
Threat Feeds Map
Useful InfoSec Links
Presentations & Papers
Research Papers
API
Tools
DShield Sensor
DNS Looking Glass
Honeypot (RPi/AWS)
InfoSec Glossary
Contact Us
Contact Us
About Us
Handlers
About Us
Slack Channel
Mastodon
Bluesky
X
This site is powered by
your submissions
, so tell us
what you see happening