Skip navigation.


Odd ICMP Echo Request Payload, (Tue, Feb 4th)

Tue, 02/04/2014 - 21:46


Firefox 27 Available, (Tue, Feb 4th)

Tue, 02/04/2014 - 15:42

Johannes B. Ullrich, Ph ...(more)...

Adobe Flash Player Emergency Patch, (Tue, Feb 4th)

Tue, 02/04/2014 - 15:29

Adobe today released an emergency patch for a vulnerability that is currently actively exploit ...(more)...

Do you block "new" domain names?, (Tue, Feb 4th)

Tue, 02/04/2014 - 08:41

This is more a quick question then a full post: Many attacks use recently registered domain na ...(more)...

When an Attack isn't an Attack, (Mon, Feb 3rd)

Mon, 02/03/2014 - 09:47

I think I have seen it referred to as the "X-Files Effect". You just installed a new ...(more)...

Phishing via Social Media, (Fri, Jan 24th)

Fri, 01/24/2014 - 10:07
The use of social media as an attack vector is nothing new; We’ve all seen plenty of s ...(more)...

Learning from the breaches that happens to others Part 2, (Thu, Jan 23rd)

Thu, 01/23/2014 - 08:53
My last Diary piece was on the analysis of multiple similar breaches with a great deal of te ...(more)...

Learning from the breaches that happens to others, (Wed, Jan 22nd)

Wed, 01/22/2014 - 05:51
Initially when major breaches or incidents announced via the media, everyone and their pet d ...(more)...

Taking care when publishing Citrix services inside the corporate network or to the Internet, (Tue, Jan 21st)

Tue, 01/21/2014 - 19:17

Citrix has some interesting products like XenApp, which allow peo ...(more)...

You Can Run, but You Can't Hide (SSH and other open services), (Mon, Jan 20th)

Mon, 01/20/2014 - 14:35

In any study of internet traffic, you'll notice that one of the top activities of attacker ...(more)...