White Hat Computer Consulting

Solutions are only the beginning

Internet Storm Center

Subscribe to Internet Storm Center feed Internet Storm Center
Updated: 2 hours 59 min ago

SSH Fingerprints Are Important, (Fri, Apr 3rd)

Fri, 04/03/2015 - 06:47

Some years ago, I was preparing Cisco certification exams. I connected via SSH to a new Cisco rou ...(more)...

Angler Exploit Kit - Recent Traffic Patterns, (Thu, Apr 2nd)

Wed, 04/01/2015 - 19:40

Angler exploit kit (EK) has changed URL patterns (again) during the past month. I infected a Wind ...(more)...

Rig Exploit Kit Changes Traffic Patterns, (Wed, Apr 1st)

Tue, 03/31/2015 - 18:34

Sometime within the past month, Rig exploit kit (EK) changed URL structure." />

Not ...(more)...

Select Star from PCAP - Treating Packet Captures as Databases, (Tue, Mar 31st)

Mon, 03/30/2015 - 19:29

Have you ever had to work with a large packet capture, and after getting past the initial stage o ...(more)...

YARA Rules For Shellcode, (Mon, Mar 30th)

Mon, 03/30/2015 - 10:11

I had a

Malicious XML: Matryoshka Edition, (Sun, Mar 29th)

Sun, 03/29/2015 - 04:23

A couple of days ago I received another malicious document (078409755.doc B28EF236D901A96CFEFF9A7 ...(more)...

Friday Digest - 27 MAR 2015, (Fri, Mar 27th)

Fri, 03/27/2015 - 18:59

JS Malware uptick

Weve been seeing an uptick in JS malware (Tro ...(more)...

Pin-up on your Smartphone!, (Thu, Mar 26th)

Wed, 03/25/2015 - 18:59

Yeah, okay, I admit that headline is cheap click bait. Originally, it said Certificate Pinning on ...(more)...

Nmap/Google Summer of Code, (Wed, Mar 25th)

Wed, 03/25/2015 - 10:06

The Nmap security scanner project is participating again in its 11th Google Summer of Code. We of ...(more)...

F-Secure: FSC-2015-2: PATH TRAVERSAL VULNERABILITY, (Wed, Mar 25th)

Wed, 03/25/2015 - 09:20

F-Secure has announced a security vulnerability affecting their corporate and consumer protection ...(more)...

PHP 5.5.23 is available, (Wed, Mar 25th)

Wed, 03/25/2015 - 08:55

From the fine folks at php.net:

Repurposing Logs, (Tue, Mar 24th)

Tue, 03/24/2015 - 10:11

Keeping an eye on your logs is critical (really, its number 14 on the SANS critical list of contr ...(more)...