Juicy Open Ports for Recon and Pentests




Whitepaper: Ransomware Operations erklärt




Fancy Lazarus DDoS-Erpressergang in DACH-Region gesichtet




[ SB 21.12 ] Supply-Chain-Attack against Kaseya and MSP




Ransomware Operations Part 1 - Intro




Ransomware Operations Part 2 - Vorgehen und Verfahren




Ransomware Operations Part 3 - Protection




Ransomware Operations Part 4 - Addendum Referenzen




DDoS-Stresstest Mk 5 released




Cobaltstrike-Beacons analyzed




[ SB 21.11 ] 21 Exim-vulns discovered by Qualys




[ SB 21.10 ] Out-of-Cycle Advisory: Pulse Connect Secure RCE Vulnerability (CVE-2021-22893)




Analysing the DDOS-Threat-Landscape, Part 2: DDoS-Size over Time (Botnet, Volume, Max-Values)




Scanning for Exchange - Exploitation/Webshells (CVE-2021-26855 ProxyLogon)




[ SB 21.07 ] Emergency-Patches for MS Exchange / HAFNIUM targeting Exchange Servers with 0-day exploits ( CVE-2021-26855 )




[ SB 21.09 ] Microsoft DNS-Server RCE (CVE-2021-26897)




[ SB 21.08 ] Big-IP Loadbalancer RCE and DoS with POC released (CVE-2021-22986)




Centreo - another Supply-Chain-Attack




[ SB 21.06 ] SaltStack RCE and multiple Vulns (CVE-2021-25282, CVE-2021-25281, CVE-2021-3197)




[ SB 21.04 ] VMWare vSphere simpel RCE ( CVE-2021-21972 )




[ SB 21.05 ] ISC Bind RCE ( CVE-2020-8625 )




[ SB 21.02 ] Critical vulns in Windows TCP-Stack with DOS, RCE or wormable capabilities (CVE-2021-24074, CVE-2021-24094)




[ SB 21.03 ] Windows DNS Server Remote Code Execution Vulnerability (CVE-2021-24078)




[ 21.01 ] vulns in DNSMasq may lead to Cache Poisoning and RCE (CVE-2020-25686)




DDoS Resiliency Score (DRS) updates based on attacker-capabilities