Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary], (Wed, Nov 5th)
[This is a Guest Diary by David Hammond, an ISC intern as part of the SANS.edu BACS program] My...
Read More[This is a Guest Diary by David Hammond, an ISC intern as part of the SANS.edu BACS program] My...
Read MoreFor several years, we have offered a “new domain” list of recently registered (or, more accurately, recently discovered) domains. This list is offered via our API (https://isc.sans.edu/api). However, the size of the...
Read MoreApple released its expected set of operating system upgrades. This is a minor feature upgrade that also includes fixes for 110 different vulnerabilities. As usual for Apple, many of the vulnerabilities affect multiple operating...
Read MoreXWiki describes itself as “The Advanced Open-Source Enterprise Wiki” and considers...
Read MoreSensors reporting firewall logs detected a significant increase in scans for port 8530/TCP and...
Read MoreThis week, I noticed some new HTTP request headers that I had not seen before: X-Request-Purpose:...
Read MoreI’ve been doing Unix/Linux IR and Forensics for a long time. I logged into a Unix system for...
Read MoreWhile reviewing malicious messages that were delivered to our handler inbox over the past few...
Read MoreI was intrigued when Johannes talked about malware that uses BASE64 over DNS to communicate. Take...
Read MoreWhen I have a binary file to analyze, I often use tools like 010 Editor or format-bytes.py (a tool...
Read MoreOver the past two months, my outlook account has been receiving phishing email regarding cloud...
Read MoreInfostealers landscape exploded in 2024 and they remain a top threat today. If Windows remains a...
Read More