Search

POP POP RETN

Information security research, reflections and events

Skip to content
Menu
  • Home
  • About Me
  • Publications
  • Research
  • Events
  • Blog
  • Appearances

Tag: SANS Internet Storm Center

graphic
Posted on April 26, 2023April 27, 2023Blog

SANS InfoSec Handlers Diary Blog – Strolling through Cyberspace and Hunting for Phishing Sites

I recently wrote a diary on the SANS Internet Storm Center about hunting for phishing sites. Please click here to…

Continue Reading
graphic
Posted on February 7, 2023February 8, 2023Blog

SANS InfoSec Handlers Diary Blog – A Survey of Bluetooth Vulnerabilities Trends (2023 Edition)

I recently wrote a diary on the SANS Internet Storm Center about a survey of Bluetooth Vulnerabilities Trends (2023 Edition).

Continue Reading
graphic
Posted on July 22, 2022July 25, 2022Blog

SANS InfoSec Handlers Diary Blog – An Analysis of a Discerning Phishing Website

I recently wrote a diary on the SANS Internet Storm Center about an analysis of a discerning phishing website.

Continue Reading
graphic
Posted on May 24, 2022July 22, 2022Blog

SANS InfoSec Handlers Diary Blog – ctx Python Library Updated with “Extra” Features

I recently wrote a diary on the SANS Internet Storm Center about the ctx Python library updated with “extra” features.

Continue Reading
graphic
Posted on December 9, 2021December 10, 2021Blog

SANS InfoSec Handlers Diary Blog – Phishing Direct Messages via Discord

I recently wrote a diary on the SANS Internet Storm Center about phishing direct messages via Discord.

Continue Reading

Posts navigation

Page 1 Page 2 … Page 5 Next Page

Popular Posts

  • Public Disclosure: Firmware Vulnerabilities in iSmartAlarm CubeOne
    Public Disclosure: Firmware Vulnerabilities in iSmartAlarm CubeOne
  • SANS InfoSec Handlers Diary Blog - Rediscovering Limitations of Stateful Firewalls: "NAT Slipstreaming" ? Implications, Detections and Mitigations
    SANS InfoSec Handlers Diary Blog - Rediscovering Limitations of Stateful Firewalls: "NAT Slipstreaming" ? Implications, Detections and Mitigations
  • SANS InfoSec Handlers Diary Blog - Netfox Detective: An Alternative Open-Source Packet Analysis Tool
    SANS InfoSec Handlers Diary Blog - Netfox Detective: An Alternative Open-Source Packet Analysis Tool
  • SANS InfoSec Handlers Diary Blog - Securing and Optimizing Networks: Using pfSense Traffic Shaper Limiters to Combat Bufferbloat
    SANS InfoSec Handlers Diary Blog - Securing and Optimizing Networks: Using pfSense Traffic Shaper Limiters to Combat Bufferbloat
  • SANS InfoSec Handlers Diary Blog - Submitting pfSense Firewall Logs to DShield
    SANS InfoSec Handlers Diary Blog - Submitting pfSense Firewall Logs to DShield

Recent Posts

  • SANS InfoSec Handlers Diary Blog – Strolling through Cyberspace and Hunting for Phishing Sites April 26, 2023
  • SANS Asia Pacific DFIR Summit 2023 – Call for Presentations Open April 19, 2023
  • SANS InfoSec Handlers Diary Blog – A Survey of Bluetooth Vulnerabilities Trends (2023 Edition) February 7, 2023
  • Identifying Threats, Cybercrime and Digital Forensic Opportunities in Smart City Infrastructure via Threat Modeling October 27, 2022
  • SANS InfoSec Handlers Diary Blog – An Analysis of a Discerning Phishing Website July 22, 2022

Subscribe to Website via Email

Enter your email address to subscribe to this website and receive notifications of new posts by email.

Archives

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Follow me on Twitter

My Tweets

Mastodon

Translate

  • Contact Me
  • Privacy Policy
  • Disclaimer
© Copyright 2017 – 2023 - poppopretn[dot]com. All rights reserved.
Magazine WordPress Themes by DesignOrbital
×
 

Loading Comments...