[SANS ISC] Malware Victim Selection Through WiFi Identification

I published the following diary on isc.sans.edu: “Malware Victim Selection Through WiFi Identification“: Last week, I found a malware sample that does nothing fancy, it’s a data stealer but it has an interesting feature. It’s always interesting to have a look at the network flows generated by malware samples. For

The post [SANS ISC] Malware Victim Selection Through WiFi Identification appeared first on /dev/random.

Continue reading [SANS ISC] Malware Victim Selection Through WiFi Identification

How-To: Mapping Server Hits with ESP8266 and WS2812

It has never been easier to build displays for custom data visualization than it is right now. I just finished one for my office — as a security researcher I wanted a physical map that will show me from where on the planet my server is being attacked. But the …read more

Continue reading How-To: Mapping Server Hits with ESP8266 and WS2812