X-Request-Purpose: Identifying “research” and bug bounty related scans?, (Thu, Oct 30th)
This week, I noticed some new HTTP request headers that I had not seen before: X-Request-Purpose:...
Read MoreThis week, I noticed some new HTTP request headers that I had not seen before: X-Request-Purpose:...
Read MoreI’ve been doing Unix/Linux IR and Forensics for a long time. I logged into a Unix system for...
Read MoreOverview Email message header syntax can be exploited to bypass authentication protocols such as SPF, DKIM, and DMARC. These exploits enable attackers to deliver spoofed emails that appear to originate from trusted sources....
Read MoreWhile reviewing malicious messages that were delivered to our handler inbox over the past few...
Read MoreI was intrigued when Johannes talked about malware that uses BASE64 over DNS to communicate. Take...
Read MoreWhen I have a binary file to analyze, I often use tools like 010 Editor or format-bytes.py (a tool...
Read MoreOver the past two months, my outlook account has been receiving phishing email regarding cloud...
Read MoreInfostealers landscape exploded in 2024 and they remain a top threat today. If Windows remains a...
Read MoreStarting yesterday, some of our honeypots received POST requests to “/cgi-bin/webctrl.cgi”, attempting to exploit an OS command injection vulnerability: POST /cgi-bin/webctrl.cgi Host: [honeypot ip]:80 User-Agent:...
Read MoreYesterday, Chinese security services published a story alleging a multi-year attack against the...
Read MoreThe info is spreading across the news websites: For approximatively two hours, many online services or websites are suffering of an Amazon Web Services outage. Some affected services: Signal Slack Zoom These may affect...
Read MoreI found another piece of malware this weekend. This one looks more like a proof-of-concept because...
Read More