Ransomware Operations Part 1 - Intro




Ransomware Operations Part 2 - Vorgehen und Verfahren




Ransomware Operations Part 3 - Protection




Ransomware Operations Part 4 - Addendum Referenzen




Security Incidents Logbook - 2021




Cobaltstrike-Beacons analyzed




Analysing the DDOS-Threat-Landscape, Part 2: DDoS-Size over Time (Botnet, Volume, Max-Values)




Scanning for Exchange - Exploitation/Webshells (CVE-2021-26855 ProxyLogon)




Centreo - another Supply-Chain-Attack




DDoS Resiliency Score (DRS) updates based on attacker-capabilities




Security Incidents Logbook-EN




Zerologon (CVE-2020-1472) finding and checking




Analysing the DDOS-Threat-Landscape, Part 1: UDP Amplification/Reflection




Strassenpreise DDoS




Ransomware vs Infrastruktur (DE)




Ransomware vs Infrastruktur (EN)




Collection of Extortion/Ransom-Mails




Security Incidents Logbook




Zombie-Bug




Homearbeitsplätze absichern Part I




DNSSEC Fail due to DLV and expired signature for dlv.isc.org




Citrix im Fadenkreuz - eine Kurzanalyse potentieller Ziele




Juicy Remote Vulns and Exploits




Cyberien im Winterschlaf Teil 3 | Windows Server 2008 R2 EOL




Cyberien im Winterschlaf Teil 2 | Go-Ahead Webserver