White Hat Computer Consulting

Solutions are only the beginning

Internet Storm Center

Subscribe to Internet Storm Center feed Internet Storm Center
Updated: 2 hours 18 min ago

Memory Forensics Of Network Devices, (Fri, Apr 17th)

Fri, 04/17/2015 - 04:13

Memory forensics of PCs has become a popular forensic method, and has made great progress the las ...(more)...

Exploit kits (still) pushing Teslacrypt ransomware, (Thu, Apr 16th)

Wed, 04/15/2015 - 18:02

Teslacrypt is a form of ransomware that was first noted in January of this year [

MS15-034: HTTP.sys (IIS) DoS And Possible Remote Code Execution. PATCH NOW, (Wed, Apr 15th)

Wed, 04/15/2015 - 12:38

MS15-034, which patches CVE-2015-1635, is quickly emerging as a big deal. The vulnerability can e ...(more)...

Microsoft Patch Tuesday - April 2015, (Tue, Apr 14th)

Tue, 04/14/2015 - 11:23

Overview of the

Odd POST Request To Web Honeypot, (Tue, Apr 14th)

Mon, 04/13/2015 - 20:11

I just saw this odd POST request to our honeypotsENUSMSN)\r\n
Host: [IP Address of Honeypo ...(more)...

The Kill Chain: Now With Pastebin, (Fri, Apr 10th)

Fri, 04/10/2015 - 02:07

I have yet another maldoc sample. They still keep coming, these malicious Word and Excel document ...(more)...

An example of the malicious emails sometimes sent to the ISC handler addresses, (Thu, Apr 9th)

Wed, 04/08/2015 - 18:19

Part of being an ISC handler is reviewing the emails sent to our various email distros. Because t ...(more)...

Is it a breach or not?, (Wed, Apr 8th)

Wed, 04/08/2015 - 06:39

Guest Diary: Xavier Mertens - Analyzing an MS Word document not detected by AV software, (Tue, Apr 7th)

Tue, 04/07/2015 - 11:16

[Guest Diary: Xavier Mertens] [Analyzing an MS Word document not detected by AV software]