Ransomware Operations Part 1 - Intro

Ransomware Operations Part 2 - Vorgehen und Verfahren

Ransomware Operations Part 3 - Protection

Ransomware Operations Part 4 - Addendum Referenzen

Security Incidents Logbook - 2021

Cobaltstrike-Beacons analyzed

Analysing the DDOS-Threat-Landscape, Part 2: DDoS-Size over Time (Botnet, Volume, Max-Values)

Scanning for Exchange - Exploitation/Webshells (CVE-2021-26855 ProxyLogon)

Centreo - another Supply-Chain-Attack

DDoS Resiliency Score (DRS) updates based on attacker-capabilities

Security Incidents Logbook-EN

Zerologon (CVE-2020-1472) finding and checking

Analysing the DDOS-Threat-Landscape, Part 1: UDP Amplification/Reflection

Strassenpreise DDoS

Ransomware vs Infrastruktur (DE)

Ransomware vs Infrastruktur (EN)

Collection of Extortion/Ransom-Mails

Security Incidents Logbook


Homearbeitsplätze absichern Part I

DNSSEC Fail due to DLV and expired signature for dlv.isc.org

Citrix im Fadenkreuz - eine Kurzanalyse potentieller Ziele

Juicy Remote Vulns and Exploits

Cyberien im Winterschlaf Teil 3 | Windows Server 2008 R2 EOL

Cyberien im Winterschlaf Teil 2 | Go-Ahead Webserver