March 2009 Archives by thread
Starting: Sun Mar 1 20:01:37 EST 2009
Ending: Tue Mar 31 20:36:17 EDT 2009
Messages: 247
- [nsp-sec] 62.109.4.89 taking the DNS "." spanking tonight...
White, Gerard
- [nsp-sec] Daily Reports Summary for week ending 2009-03-02
Tim Wilde
- [nsp-sec] Strong Increase in port 1433/tcp
Klaus Moeller
- [nsp-sec] ATLAS SRF now has Conficker data
Jose Nazario
- [nsp-sec] Subscription
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Kelly Genessy (Utah Educational Network, AS210)
Scott A. McIntyre
- [nsp-sec] Fwd: nsp-security subscription notification
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Saku Tolvanen (Elisa, AS719, 790, 3336, 6667)
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Saku Tolvanen (Elisa, AS719, 790, 3336, 6667)
Jussi Eronen
- [nsp-sec] 48 hour vetting: Saku Tolvanen (Elisa, AS719, 790, 3336, 6667)
Kauto Huopio
- [nsp-sec] 48 hour vetting: Saku Tolvanen (Elisa, AS719, 790, 3336, 6667)
Ari Wikström
- [nsp-sec] 48 hour vetting: Saku Tolvanen (Elisa, AS719, 790, 3336, 6667)
Hillar Aarelaid
- [nsp-sec] 48 hour vetting: Jason Gardiner (DirecPath, AS31939)
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Jon K. Miyake (U. Oregon, AS 3582)
Scott A. McIntyre
- [nsp-sec] TWC dns issues?
Jim Carhart
- [nsp-sec] Perhaps OT: Cisco guard's future
Hank Nussbacher
- [nsp-sec] Ping Google -> Earn fast cash working on Google (fwd)
Joel Rosenblatt
- [nsp-sec] Telia.net contact out there?
Campisano, Mario
- [nsp-sec] live.com phishing address
Daniel Adinolfi
- [nsp-sec] Cymru: suggestion: add "daily-batch-ready" -indicator to the report filestructure
Huopio Kauto
- [nsp-sec] Daily Reports Summary for week ending 2009-03-09
Tim Wilde
- [nsp-sec] Conficker Data Timestamp Anomaly
Tim Wilde
- [nsp-sec] Contact for the person/group who runs co.cc
David Ulevitch
- [nsp-sec] fake av using fake review sites on 217.20.175.74
Smith, Donald
- [nsp-sec] Ping Microsoft - Live.com phish collection address
Joel Rosenblatt
- [nsp-sec] Attention Microsoft: Password hoarding from accountservice_data at live.com
sthaug at nethelp.no
- [nsp-sec] Fast flux or Botnet - Facebook Phish | malware - ns1.castlebin.com | 8.12.160.183 - AS40935 RELYNET - RelyNet Inc
Shelton, Steve
- [nsp-sec] Leaving CERT
Nicholas Ianelli
- [nsp-sec] popped routers? via irc-security list
Jose Nazario
- [nsp-sec] Google: phishing ongoing
Peter Peters
- [nsp-sec] Ping Level3, Microsoft (Livefilestore.com) - banamex pharming
jose nazario
- [nsp-sec] Mebroot/Torpig (AS 13618, 15083, 23498)
Tom Fischer
- [nsp-sec] ACK AS852 - RE: Mebroot/Torpig (AS 13618, 15083, 23498)
Chris Calvert
- [nsp-sec] Mebroot/Torpig (AS 13618, 15083, 23498)
Krista Hickey
- [nsp-sec] Mebroot/Torpig (AS 13618, 15083, 23498)
Chris Calvert
- [nsp-sec] ACK AS3356 - Re:Mebroot/Torpig (AS 13618, 15083, 23498)
David Rossbach
- [nsp-sec] ACK RE: Mebroot/Torpig (AS 13618, 15083, 23498)
Gassen, Derek
- [nsp-sec] Any shaw.ca on the list?
Tom Daly
- [nsp-sec] Daily Reports Summary for week ending 2009-03-16
Tim Wilde
- [nsp-sec] goaeku.breakinggoodnews.com & chatloveonline.com & ?
William Allen Simpson
- [nsp-sec] need help identifying malicious SWF
David Freedman
- [nsp-sec] ACK 14 -> Re: chatloveonline.com & breakinggoodnews.com & breakingfreemichigan.com
Joel Rosenblatt
- [nsp-sec] Conficker question
Maria Rosa Drake - FIU
- [nsp-sec] .cn domain handling?
Chris Morrow
- [nsp-sec] hopone.net - 209.160.0.0/18
Wes Young
- [nsp-sec] Radware Fireproof Application Switch failures and SYN floods
Chris Calvert
- [nsp-sec] Anyone from Barracuda on the list?
Tom Daly
- [nsp-sec] Heads up: consultant.com and Andrews University
SURFcert - Peter
- [nsp-sec] Rackspace around
Smith, Donald
- [nsp-sec] Attn Google: phishing reply address
Young, Beth A.
- [nsp-sec] DNS roots failed in Atlanta and St Louis?
John Fraizer
- [nsp-sec] Anyone from www.enom.com in the list?
Yonglin ZHOU
- [nsp-sec] WikiLeaks Exposes Australian Web Blacklist
Hank Nussbacher
- [nsp-sec] 48 hour vetting: Russell Fulton (Univ of Auckland, AS9431)
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Nick Buraglio (Univ. of Illinois, AS 38, 40387)
Scott A. McIntyre
- [nsp-sec] Daily Reports Summary for week ending 2009-03-23
Tim Wilde
- [nsp-sec] Looking for a contact at SAIX-NET
Hicks, Howard
- [nsp-sec] Interesting Google Calendar Invite
Zane Jarvis
- [nsp-sec] Yahoo! contact
Tarmo Randel
- [nsp-sec] violent ssh scan from 210.95.180.44 ?
Kurt Jaeger
- [nsp-sec] Shopify (204.15.199.4) under fire, got C&C?
Scott A. McIntyre
- [nsp-sec] chatloveonline.com & more
William Allen Simpson
- [nsp-sec] 48 hour vetting: Nick Ianelli (NeuStar, AS12008/etc)
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Nick Ianelli (NeuStar, AS12008/etc)
Henley, Mat
- [nsp-sec] 48 hour vetting: Nick Ianelli (NeuStar, AS12008/etc)
Chris Morrow
- [nsp-sec] 48 hour vetting: Nick Ianelli (NeuStar, AS12008/etc)
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Nick Ianelli (NeuStar, AS12008/etc)
Hillar Aarelaid
- [nsp-sec] 48 hour vetting: Nick Ianelli (NeuStar, AS12008/etc)
Jose Nazario
- [nsp-sec] 48 hour vetting: Nick Ianelli (NeuStar, AS12008/etc)
Justin M. Streiner
- [nsp-sec] 48 hour vetting: Nick Ianelli (NeuStar, AS12008/etc)
Matthew.Swaar at us-cert.gov
- [nsp-sec] 48 hour vetting: Nick Ianelli (NeuStar, AS12008/etc)
Rob Thomas
- [nsp-sec] 48 hour vetting: Nick Ianelli (NeuStar, AS12008/etc)
White, Gerard
- [nsp-sec] 48 hour vetting: Nick Ianelli (NeuStar, AS12008/etc)
Zane Jarvis
- [nsp-sec] Mebroot/Torpig (AS 13618, 23498, 32475)
Tom Fischer
- [nsp-sec] Long lasting DDoS against us (158.38.130.17). Got flows?
Rune Sydskjør
- [nsp-sec] 48 hour vetting: Sid Faber (CERT.org, various US Government Networks)
Scott A. McIntyre
- [nsp-sec] Cisco Security Advisory: Cisco IOS cTCP Denial of Service Vulnerability
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS Software Multiple Features IP Sockets Vulnerability
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS Software Secure Copy Privilege Escalation Vulnerability
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS Software Multiple Features Crafted TCP Sequence Vulnerability
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS Software Multiple Features Crafted UDP Packet Vulnerability
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: Cisco IOS Software WebVPN and SSLVPN Vulnerabilities
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Attn Yahoo: Phishing Reply Address
Keith Schoenefeld
- [nsp-sec] sites that are preying on the conficker victims with scareware and scams.
Smith, Donald
- [nsp-sec] Korea telecom/KORNET?
Michael Sinatra
- [nsp-sec] All your packets are belong to us - Attacking backbone technologies
Hank Nussbacher
- [nsp-sec] Mebroot/Torpig (AS 13618, 8001, 23498)
Tom Fischer
- [nsp-sec] namespace4u.de
John Fraizer
- [nsp-sec] GEANT2 on the list?
Nathan Lee
- [nsp-sec] ATTN: Yahoo - phishing address
Daniel Adinolfi
- [nsp-sec] Somebody from Hanaro on the list?
Monika Machado
- [nsp-sec] Conficker Remediation Effort
Barry Greene
- [nsp-sec] Conficker Remediation Effort (try this again)
Barry Greene
- [nsp-sec] AS39792 | 81.91.181.02/4 IN . NS? DDoS activity
Jose Nazario
- [nsp-sec] headsup Microsoft: number of phishings this weekend
Peter Peters
- [nsp-sec] Daily Reports Summary for week ending 2009-03-30
Tim Wilde
- [nsp-sec] headsup: Minneapolis
Peter Peters
- [nsp-sec] Venezuelan Contacts
Tim Wilde
- [nsp-sec] MAC root kit found on www.funmangames.com 208.113.230.135 - ASN 26347
Joel Rosenblatt
- [nsp-sec] small botnet found on AS812
Philip Taylor
- [nsp-sec] testing
Dave Mitchell
Last message date:
Tue Mar 31 20:36:17 EDT 2009
Archived on: Thu Jan 22 18:52:05 EST 2015
This archive was generated by
Pipermail 0.09 (Mailman edition).