What Setting Live Traps For Cybercriminals Taught Me About Securityhttps://isc.sans.edu/diary/What%20Setting%20Live%20Traps%20for%20Cybercriminals%20Taught%20Me%20About%20Security%20%5BGuest%20Diary%5D/31038TeamViewer Compromisehttps://www
TCP Latency Sidechannelhttps://www.snailload.com/snailload.pdfMicrosoft Management Console for Intial Access and Evasionhttps://www.elastic.co/security-labs/grimresourceWyze Camera Vulnerabilitieshttps://forums.wyze.com/t/security-advis
Sysinternals Process Monitor Version 4 Releasedhttps://isc.sans.edu/diary/Sysinternals%27%20Process%20Monitor%20Version%204%20Released/31026Kaspersky Sanctionshttps://home.treasury.gov/news/press-releases/jy2420Phoenix UEFI Buffer Overflo
No Excuses: Free Tools to Help Secure Authentication in Ubuntuhttps://isc.sans.edu/diary/No%20Excuses%2C%20Free%20Tools%20to%20Help%20Secure%20Authentication%20in%20Ubuntu%20Linux%20%5BGuest%20Diary%5D/31024Handling BOM MIME Fileshttps://i
New NetSupport Campaign Deleivered Through MSIX Packageshttps://isc.sans.edu/diary/New%20NetSupport%20Campaign%20Delivered%20Through%20MSIX%20Packages/31018D-Link Router Backdoorhttps://www.twcert.org.tw/en/cp-139-7880-629f5-2.htmlhttps:
Overview of My Tools That Handle JSON Datahttps://isc.sans.edu/diary/Overview%20of%20My%20Tools%20That%20Handle%20JSON%20Data/31012Python Serialization and "Sleepy Pickle"https://x.com/MarkBaggett/status/1801732554740969561Detecting Headl
The Art of JQ and Command-Line Fuhttps://isc.sans.edu/diary/The%20Art%20of%20JQ%20and%20Command-line%20Fu%20%5BGuest%20Diary%5D/31006Microsoft Outlook Vulnerablity Detailshttps://blog.morphisec.com/cve-2024-30103-microsoft-outlook-vulnerab
Microsoft Patch Tuesdayhttps://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20June%202024/31000JetBrains IntelliJ Based IDE GitHub Plugin Vulnerabilityhttps://blog.jetbrains.com/security/2024/06/updates-for-security-issue-affecting-intel
Veeam Exploit CVE-2024-29849https://summoning.team/blog/veeam-enterprise-manager-cve-2024-29849-auth-bypass/SORBS Shutdownhttps://www.theregister.com/2024/06/07/sorbs_closed/Rogue Cell Tower Shut Down in Londonhttps://www.cityoflondon.p
WatchGuard VPN Brutefordinghttps://isc.sans.edu/diary/Brute%20Force%20Attacks%20Against%20Watchguard%20VPN%20Endpoints/30984TotalRecall Tool To Extract Data from Microsoft Recallhttps://github.com/xaitax/TotalRecallWebEx Flawhttps://www
No Defender Yes Defenderhttps://isc.sans.edu/diary/No-Defender%2C%20Yes-Defender/30980Fake Job Ads Lead to Stolen Crypto Currencyhttps://www.ic3.gov/Media/Y2024/PSA240604Zyxel NAS Vulnerabilitieshttps://outpost24.com/blog/zyxel-nas-crit
A Wireshark Lua Dissector for Fixed Field Length Protocolshttps://isc.sans.edu/diary/A%20Wireshark%20Lua%20Dissector%20for%20Fixed%20Field%20Length%20Protocols/30976COX Cable Modem Admin API Weaknesshttps://samcurry.net/hacking-millions-of
K1w1 Infostealer Uses gofile.io for Exfiltrationhttps://isc.sans.edu/diary/%22K1w1%22%20InfoStealer%20Uses%20gofile.io%20for%20Exfiltration/30972Kaspersky Linux Malware Scannerhttps://www.kaspersky.com/blog/kvrt-for-linux/51375/Snowflake
Is that It? Finding the Unknown: Correlations Between Honeypot Logs and PCAPshttps://isc.sans.edu/diary/Is%20that%20It%3F%20%20Finding%20the%20Unknown%3A%20Correlations%20Between%20Honeypot%20Logs%20%26%20PCAPs%20%5BGuest%20Diary%5D/30962Che
Preventing SQL Injection with Pythonhttps://www.youtube.com/watch?v=1cQy9N1XndkPoC Exploit for CVE-2024-23108 in Fortinet FortiSIEMhttps://www.horizon3.ai/attack-research/cve-2024-23108-fortinet-fortisiem-2nd-order-command-injection-deep-d
Files with TGZ Extension used as malspam attachementshttps://isc.sans.edu/diary/Files%20with%20TXZ%20extension%20used%20as%20malspam%20attachments/30958Google 0-Dayhttps://chromereleases.googleblog.com/2024/05/stable-channel-update-for-des
Analysis of 'redtail' file uploads to ISC Honeypothttps://isc.sans.edu/diary/Analysis%20of%20%3Fredtail%3F%20File%20Uploads%20to%20ICS%20Honeypot%2C%20a%20Multi-Architecture%20Coin%20Miner%20%5BGuest%20Diary%5D/30950Veeam Vulnerablityhttps
NMAP Scanning Without Scanning - The ipinfo APIhttps://isc.sans.edu/diary/NMAP%20Scanning%20without%20Scanning%20%28Part%202%29%20-%20The%20ipinfo%20API/30948Why Your WiFi Router Doubles As An Apple Airtaghttps://krebsonsecurity.com/2024/0
Scanning without Scanning with nmaphttps://isc.sans.edu/diary/Scanning%20without%20Scanning%20with%20NMAP%20%28APIs%20FTW%29/30944iTerm2 Vulnerablitieshttps://vin01.github.io/piptagole/escape-sequences/iterm2/hyper/url-handlers/code-execut