SANS
SANS ISC Diary - A Tale of Two Phishing Sites
· β˜• 1 min read
A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we’ll take a look two phishing sites based on the same phishing kit, that differed significantly (not just) in the level of obfuscation…

Measuring security operations capabilities and improving their maturity, efficiency, and effectiveness
· β˜• 15 min read
To slightly paraphrase Peter Drucker’s famous quote, one can’t manage what one can’t measure. This – of course – holds true even for Computer Security Incident Response Teams (CSIRTs) and Security Operations Centers (SOCs). The only question is, how can we β€œmeasure” what they do in a meaningful way? This is what we will discuss in this article...

SANS ISC Diary - An unusual 'shy z-wasp' phishing
· β˜• 1 min read
A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we’ll take a look at an unusual phishing message, in which two different techniques for splitting text using unrendered characters were used with the intention of bypassing security scans…

SANS ISC Diary - Changes in SSL and TLS support in 2024
· β˜• 1 min read
A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we’ll take a look at changes in SSL/TLS support on web servers and e-mail servers during the 12 months of 2024…

SANS ISC Diary - 'Reply-chain phishing' with a twist
· β˜• 1 min read
A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we’ll take a look at a slightly unusual “reply-chain” phishing technique…