Posts related to information security, including news, tutorials, malware analysis, and threat intelligence.
The Parler data dumps you've heard were obtained legally. Here's how they did it.
If you receive a fraudulent email, can be very useful to send a full forensic copy to an organization that…
Email headers contain very useful information for tracing a message's origin and troubleshooting its delivery. Email headers are written with…
I have written extensively about the DMARC email security standard, including publishing a comprehensive guide on how to implement it,…
Emotet is a Trojan designed to steal banking information. It is frequently spread by sending phishing emails to governments, banks,…
If you ever need to inspect the certificate of a remote SMTP server, you can use the openssl CLI tool.…
DMARC can stop spoofed spam and phishing from reaching you and your customers, protecting your information security and your brand.…
SPF and DMARC are standards that describe how the origins of email messages should be verified, to prevent email spoofing.…
YARA is described as "The pattern matching Swiss knife for malware researchers (and everyone else)". Think of it as like…
The WannaCry ransomware worm has spread panic and destruction as it infects hundreds of thousands of systems around the world;…