A brief daily summary of what is important in information security. The podcast is published every w
Microsoft Patch Tuesday Microsoft patched over 120 vulnerabilities this month. 11 of these were
XORsearch: Searching With Regexes Didier explains a workaround to use his tool XORsearch to search
New SSH Username Report A new ssh/telnet username reports makes it easier to identify new usernam
Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive Using frequency analysi
Surge in Scans for Juniper t128 Default User Lasst week, we dedtect a significant surge in ssh s
Apple Patches Everything Apple released updates for all of its operating systems. Most were releas
Apache Camel Exploit Attempt by Vulnerability Scans A recently patched vulnerability in Apache Cam
A Tale of Two Phishing Sties Two phishing sites may use very different backends, even if the site
Sitecore "thumbnailsaccesstoken" Deserialization Scans (and some new reports) CVE-2025-27218 Our h
Leveraging CNNs and Entropy-Based Feature Selection to Identify Potential Malware Artifacts of Inte
XWiki Search Vulnerablity Exploit Attempts (CVE-2024-3721) Our honeypot detected an increase in ex
Privacy Aware Bots A botnet is using privacy as well as CSRF prevention headers to better blend in
Critical Next.js Vulnerability CVE-2025-29927 A critical vulnerability in how the x-middleware-sub
Some New Data Feeds and Little Incident We started offering additional data feeds, and an SEO spam
Exploit Attempts for Cisco Smart Licensing Utility CVE-2024-20439 CVE-2024-20440 Attackers added l
Python Bot Delivered Through DLL Side-Loading A "normal", but vulnerable to DLL side-loading PDF r
Static Analysis of GUID Encoded Shellcode Didier explains how to decode shell code embeded as GUID