Reading Location Position Value in Microsoft Word Documents, (Mon, Aug 25th)
While studying for the GX-FE [1], I started exploring the “Position” value in the...
Read MoreWhile studying for the GX-FE [1], I started exploring the “Position” value in the...
Read MoreThe Internet Storm Center and DShield websites are about 25 years old. Back in the day, I made some questionable decisions that I have never quite cleaned up later. One of these decisions was to use a “15 character...
Read MoreA lot of people like the command line, the CLI, the shell (name it as you want) because it provides a lot of powerful tools to perform investigations. The best example is probably parsing logs! Even if we have SIEM to ingest and...
Read MoreLooking at new usernames collected by our Cowrie honeypots, you will first of all notice a number of HTTP headers. It is very common for attackers to scan for web servers on ports that are covered by our Telnet honeypots. The...
Read MoreI noticed an increase in scans that appear to try to identify Elasticsearch instances....
Read MoreI recently woke up (as one does each day, hopefully) and saw a few Microsoft MFA prompts had pinged me overnight. Since I had just awakened, I just deleted them, then two minutes later clued in – this means that one of my...
Read MoreAs the world gradually adopts and transitions to using 5G for mobile, operational technology (OT),...
Read More[This is a Guest Diary by Joseph Noa, an ISC intern as part of the SANS.edu BACS program]...
Read MoreOne of the key messages broadcasted by security professionals is: “Patch, patch and patch...
Read MoreThis month’s Microsoft patch update addresses a total of 111 vulnerabilities, with 17 classified as critical. Among these, one vulnerability was disclosed prior to the patch release, marking it as a zero-day. While none of...
Read MoreIn recent media events, Tesla has demoed progressively more sophisticated versions of its Optimus...
Read MoreJust saw something that I thought was long gone. The username “pop3user” is showing up in our telnet/ssh logs. I don’t know how long ago it was that I used POP3 to retrieve e-mail from one of my mail servers....
Read More