Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary], (Wed, Nov 5th)
[This is a Guest Diary by David Hammond, an ISC intern as part of the SANS.edu BACS program] My...
Read More[This is a Guest Diary by David Hammond, an ISC intern as part of the SANS.edu BACS program] My...
Read MoreFor several years, we have offered a “new domain” list of recently registered (or, more accurately, recently discovered) domains. This list is offered via our API (https://isc.sans.edu/api). However, the size of the...
Read MoreApple released its expected set of operating system upgrades. This is a minor feature upgrade that also includes fixes for 110 different vulnerabilities. As usual for Apple, many of the vulnerabilities affect multiple operating...
Read MoreXWiki describes itself as “The Advanced Open-Source Enterprise Wiki” and considers...
Read MoreSensors reporting firewall logs detected a significant increase in scans for port 8530/TCP and...
Read MoreThis week, I noticed some new HTTP request headers that I had not seen before: X-Request-Purpose:...
Read MoreI’ve been doing Unix/Linux IR and Forensics for a long time. I logged into a Unix system for...
Read MoreOverview Email message header syntax can be exploited to bypass authentication protocols such as SPF, DKIM, and DMARC. These exploits enable attackers to deliver spoofed emails that appear to originate from trusted sources....
Read MoreWhile reviewing malicious messages that were delivered to our handler inbox over the past few...
Read MoreI was intrigued when Johannes talked about malware that uses BASE64 over DNS to communicate. Take...
Read MoreWhen I have a binary file to analyze, I often use tools like 010 Editor or format-bytes.py (a tool...
Read MoreOver the past two months, my outlook account has been receiving phishing email regarding cloud...
Read More