X-Request-Purpose: Identifying “research” and bug bounty related scans?, (Thu, Oct 30th)
This week, I noticed some new HTTP request headers that I had not seen before: X-Request-Purpose:...
Read MoreThis week, I noticed some new HTTP request headers that I had not seen before: X-Request-Purpose:...
Read MoreI’ve been doing Unix/Linux IR and Forensics for a long time. I logged into a Unix system for...
Read MoreWhile reviewing malicious messages that were delivered to our handler inbox over the past few...
Read MoreI was intrigued when Johannes talked about malware that uses BASE64 over DNS to communicate. Take...
Read MoreWhen I have a binary file to analyze, I often use tools like 010 Editor or format-bytes.py (a tool...
Read MoreOver the past two months, my outlook account has been receiving phishing email regarding cloud...
Read MoreInfostealers landscape exploded in 2024 and they remain a top threat today. If Windows remains a...
Read MoreStarting yesterday, some of our honeypots received POST requests to “/cgi-bin/webctrl.cgi”, attempting to exploit an OS command injection vulnerability: POST /cgi-bin/webctrl.cgi Host: [honeypot ip]:80 User-Agent:...
Read MoreYesterday, Chinese security services published a story alleging a multi-year attack against the...
Read MoreThe info is spreading across the news websites: For approximatively two hours, many online services or websites are suffering of an Amazon Web Services outage. Some affected services: Signal Slack Zoom These may affect...
Read MoreI found another piece of malware this weekend. This one looks more like a proof-of-concept because...
Read MoreAttackers are everywhere! They try to abuse victims using new communication channels and social...
Read More