March 2008 Archives by thread
Starting: Sat Mar 1 11:28:59 EST 2008
Ending: Mon Mar 31 21:01:08 EDT 2008
Messages: 314
- [nsp-sec] contact at Turk Telekom ? botnet periodically attacking google.
Stephen Gill
- [nsp-sec] AS12491 (was Ping: Google/GMail)
Hank Nussbacher
- [nsp-sec] What's up with *.footprint.net domains???
White, Gerard
- [nsp-sec] Intelligence required: www.firatnews.org
Scott A. McIntyre
- [nsp-sec] Daily Reports Summary for week ending 2008-03-03
Tim Wilde
- [nsp-sec] new storm worm campaign, new peer list
Jose Nazario
- [nsp-sec] Excessive DNS activity for the "qq.com" Domain
Rob Thomas
- [nsp-sec] Sometimes, you have to make lemon-aid.
John Fraizer
- [nsp-sec] DSBL contact
Daniel Schwalbe
- [nsp-sec] UDP 7100 Increase?
Matthew.Swaar at us-cert.gov
- [nsp-sec] DoS to 206.140.121.0/24?
John Payne
- [nsp-sec] 48 hour vetting: John A. Haskins (UCSC, AS5739)
Scott A. McIntyre
- [nsp-sec] Fwd: nsp-security subscription notification
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: John Lyons (Thus, AS2259/5587/8546)
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Atle Soma (Lyse Tele AS, AS29695)
Scott A. McIntyre
- [nsp-sec] GoDaddy Network Security Contact - ASAP
David Ulevitch
- [nsp-sec] Phishing site - redirect L3
Heather Schiller
- [nsp-sec] UDP based DDoS attack against 80.65.160.10 (AS21196)
Nicholas Ianelli
- [nsp-sec] ping google/gmail
Brian Allen
- [nsp-sec] Ping: XO
John Fraizer
- [nsp-sec] Daily Reports Summary for week ending 2008-03-10
Tim Wilde
- [nsp-sec] Kiwibank phishing - dyndns?
David Robb
- [nsp-sec] UDP attack against 62.50.74.122 (AS15650)
Mike Hellers
- [nsp-sec] Wiki link
Jason Chambers
- [nsp-sec] Ping AS8001/AS36351 - possible botnet C&C
Zoe O'Connell
- [nsp-sec] FW: Storm worm changing DNS resolver settings on victim system
Lawrence Baldwin
- [nsp-sec] Possible DDos Attack - Help requested from our law enforcement agency
Rodolfo Baader
- [nsp-sec] Comcast Ping
Dave Mitchell
- [nsp-sec] AS 10316 upstream AS3356 -> level3 SMS spam points to 8182375717
Smith, Donald
- [nsp-sec] Botnet at alpha745.server4you.de
Klaus Moeller
- [nsp-sec] cyberstorm ii
Jared Mauch
- [nsp-sec] puck upgrade
Jared Mauch
- [nsp-sec] Heads up: "Fitna" & defacements (& bears, oh my!)
Scott A. McIntyre
- [nsp-sec] neosploit server
Tom Fischer
- [nsp-sec] Spammer IPs - looking for the malware
Nicholas Ianelli
- [nsp-sec] Wireless SMS Vishing attack - Bank of Cascades
Lawrence Baldwin
- [nsp-sec] Medium TCP SYN DDOS against 163.6.5.36
Patrick Bergen
- [nsp-sec] CareerBuilder Security Contact?
Lawrence Baldwin
- [nsp-sec] Fwd: Kenyan Route Hijack
Danny McPherson
- [nsp-sec] spam sender email addresses begnning with '-'
Torbjorn.Wictorin at cert.sunet.se
- [nsp-sec] Daily Reports Summary for week ending 2008-03-17
Tim Wilde
- [nsp-sec] RBN / Zlob / Security Focus brief #701
John Fraizer
- [nsp-sec] Possible MX query reflection attack to 212.241.192.20
John Kristoff
- [nsp-sec] DSL reports under ddos -- C&C info - AS 9121 (TR)
Jose Nazario
- [nsp-sec] probably compromised web sites
Tom Fischer
- [nsp-sec] Ping ATT: Urgent Route Hijack issue
Heather Schiller
- [nsp-sec] new list of probably compromised web sites
Tom Fischer
- [nsp-sec] CN-Cert to help out msnbc? :)
Chris Morrow
- [nsp-sec] Juniper uRPF to Blackhole
JR Mayberry
- [nsp-sec] Level3: Max-AS
Hank Nussbacher
- [nsp-sec] Sprint to the WCP please?
Campisano, Mario
- [nsp-sec] How to get a global K-line?
John Fraizer
- [nsp-sec] Daily Reports Summary for week ending 2008-03-24
Tim Wilde
- [nsp-sec] Why so much WebMail Abuse / Credential Theft? A Theory...
White, Gerard
- [nsp-sec] DDOS to 163.6.5.36 ongoing
Patrick Bergen
- [nsp-sec] Postini contacts?
Smith, Donald
- [nsp-sec] Has anyone ever dealt with Consumer Base?
Campisano, Mario
- [nsp-sec] Contact at Hetzner Online AG RZ-Nuernberg?
jose nazario
- [nsp-sec] More password stealers and drops - AS13301, AS24940, AS7738,
jose nazario
- [nsp-sec] Cisco Security Advisory: Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS Multicast Virtual Private Network (MVPN) Data Leak
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS User Datagram Protocol Delivery Issue For IPv4/IPv6 Dual-stack Routers
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Vulnerability in Cisco IOS with OSPF, MPLS VPN, and Supervisor 32, Supervisor 720, or Route Switch Processor 720
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS Virtual Private Dial-up Network Denial of Service Vulnerability
Cisco Systems Product Security Incident Response Team
- [nsp-sec] qwest user is misbehaving...
Justin M. Streiner
- [nsp-sec] DDoS Chicken and Egg Problem
Jason Gardiner
- [nsp-sec] "Vietnam Posts and Telecommunications" returned by cymru whois server
Gong, Yiming
- [nsp-sec] Fishing site: Anyone from AS9304 - Hutchison Global Communications
"José A. Domínguez"
- [nsp-sec] Kaiten Botnet C&C is still alive @ AS 8972 - PlusServer
White, Gerard
- [nsp-sec] Has anyone from BOCOG reached out to anyone (Olympics?)
Barry Greene (bgreene)
- [nsp-sec] How to hijack traffic for an entire Content/Ad Company - ARP Poisoning revisited - 8800.org / 6600.org badness
Lawrence Baldwin
- [nsp-sec] psst hey buddy want a list of compromised popmail accounts:)
Smith, Donald
- [nsp-sec] DOS towards 212.181.112.29
Patrick Bergen
- [nsp-sec] [nsp-sec-d] Verizon CTO: Bots and other stuff
Daniel Schwalbe
- [nsp-sec] Fwd: Leaving CERT-Bund..leaving NSP-Sec
Klaus Moeller
- [nsp-sec] Daily Reports Summary for week ending 2008-03-31
Tim Wilde
- [nsp-sec] new storm worm campaign - april fool's day
Jose Nazario
Last message date:
Mon Mar 31 21:01:08 EDT 2008
Archived on: Thu Jan 22 18:51:58 EST 2015
This archive was generated by
Pipermail 0.09 (Mailman edition).