May 2010 Archives by thread
Starting: Sun May 2 18:32:31 EDT 2010
Ending: Mon May 31 13:00:15 EDT 2010
Messages: 165
- [nsp-sec] Active koobface sites
Thomas Hungenberg
- [nsp-sec] Phishing dropbox at live.com
Helge Aksdal
- [nsp-sec] Botnet C&C at AS44347 (188.65.49.11)
Carles Fragoso
- [nsp-sec] Daily Reports Summary for week ending 2010-05-03
Dave Monnier
- [nsp-sec] ACK: system infected with proxy malware
Rodolfo Baader
- [nsp-sec] ACK: A list of 253 SSH scanners
Rodolfo Baader
- [nsp-sec] Money Mules Account emails
Peter Haag
- [nsp-sec] Breaking News(?) - Storm Worm masquerading as Fake Antivirus? Many DDoS Targets (and Heads up Google)
Brian Eckman
- [nsp-sec] 72.55.133.149
Chris Calvert
- [nsp-sec] Please welcome Link King to nsp-sec
Rob Thomas
- [nsp-sec] Koobface infected machines - 653 ips
Carles Fragoso
- [nsp-sec] Yahoo - phishing dropbox
Torsten Voss
- [nsp-sec] distributed VNC scanning... ~ 600 IPs
Russell Fulton
- [nsp-sec] Yahoo! mail to the WCP
Daniel Robert Adinolfi
- [nsp-sec] Anyone from Singlehop? AS32475
Nicholas Ianelli
- [nsp-sec] ATTN Google - Malware on a Googlegroups workspace -> setting for your mailbox copyright-abuse at columbia.edu are changed (fwd)
Joel Rosenblatt
- [nsp-sec] Dear gmail owners (Fwd: Dear Webmail Account Owner)
Daniel Robert Adinolfi
- [nsp-sec] Ack. Re: system infected with proxy malware
Taka Mizuguchi
- [nsp-sec] Daily Reports Summary for week ending 2010-05-10
Tim Wilde
- [nsp-sec] Application from Anthony Edwards, AS4589, AS5607, British Sky Broadcasting
Rob Thomas
- [nsp-sec] CeCOS APWG summit + Incident Response on the Cloud issues
Carles Fragoso
- [nsp-sec] Ping University of Pennsylvania
Krista Hickey
- [nsp-sec] Unassigned networks being announced (AS 702, 26116, 26896, and 30991)
Tim Wilde
- [nsp-sec] Short unplanned NSP-SEC IRC outage
Tim Wilde
- [nsp-sec] A new variant of the Googlegroups zipfile abuse
Bill Owens
- [nsp-sec] Compromised websites spreading Koobface
Thomas Hungenberg
- [nsp-sec] Peter may have chased the "mailbox settings" folks off Google
Bill Owens
- [nsp-sec] gumblar-style infections
Dirk Stander
- [nsp-sec] C&C Server: Request for information
Keith Schoenefeld
- [nsp-sec] gumblar-style infections - Proxy ACK for ASN 3352, 16371 and 44652
Carles Fragoso
- [nsp-sec] Application from Arne Nilsson, AS<lots>, SUNET
Rob Thomas
- [nsp-sec] And now the mailbox settings folks are on Yahoo!
Bill Owens
- [nsp-sec] IRC C&C at 204.45.13.154 (AS30058) and malware at 204.45.58.2 (AS30058)
Carles Fragoso
- [nsp-sec] Two variations on the mail settings stuff - one on a Google Docs site
Bill Owens
- [nsp-sec] VNC scanners again
Russell Fulton
- [nsp-sec] Got traffic DDoS: 80.239.232.152 and 80.239.232.154 (TCP SYN attack)
Nicholas Ianelli
- [nsp-sec] need some help with C&C
Igor Gashinsky
- [nsp-sec] Yet another variation on mailbox settings - now Google and 100mb.com
Bill Owens
- [nsp-sec] Application from Brian Smith-Sweeney, AS12, New York University
Rob Thomas
- [nsp-sec] Application from Brian Smith-Sweeney, AS12, New York University
Brian Eckman
- [nsp-sec] Application from Brian Smith-Sweeney, AS12, New York University
Joel Rosenblatt
- [nsp-sec] Application from Brian Smith-Sweeney, AS12, New York University
Greenberg, David A
- [nsp-sec] Application from Brian Smith-Sweeney, AS12, New York University
Dave Monnier
- [nsp-sec] Application from Brian Smith-Sweeney, AS12, New York University
Gabriel Iovino
- [nsp-sec] Live.com to the WCP, please
Daniel Robert Adinolfi
- [nsp-sec] Daily Reports Summary for week ending 2010-05-17
Tim Wilde
- [nsp-sec] Southern Light Fiber, AS 13760
Stephen Gill
- [nsp-sec] Security Contact of CNCG / China Unicom
Tay, Chee Yong
- [nsp-sec] NSP-SEC APPLICATION from Arne Nilsson, SUNet CERT, Sweden
Thomas Stridh
- [nsp-sec] Phishing website in AS 10297
Helge Aksdal
- [nsp-sec] att netflow person to the wcp plz
Smith, Donald
- [nsp-sec] Application from Daniel Goscomb, AS39326, AS6908, Goscomb Technologies Limited
Rob Thomas
- [nsp-sec] Welcome to the list, Brian Smith-Sweeney!
Rob Thomas
- [nsp-sec] Welcome to the list, Anthony Edwards
Rob Thomas
- [nsp-sec] Welcome to the list, Arne Nilsson
Rob Thomas
- [nsp-sec] What malware is this?
John Payne
- [nsp-sec] Phishing html form @ AS 11388
Gabriel Iovino
- [nsp-sec] Distributed SQL Injection attemps
Carles Fragoso
- [nsp-sec] Botnet C&C in AS30058 (ACTIVO) at FDCServers.NET
Carles Fragoso
- [nsp-sec] Ongoing Attack
Davis, Mark
- [nsp-sec] Got traffic? - DDoS towards 80.239.232.152
Nicholas Ianelli
- [nsp-sec] AS4355 Earthlink to the WCP - Fwd: Email Account User
Daniel Robert Adinolfi
- [nsp-sec] On-going DDoS
Jonas Thambert
- [nsp-sec] Daily Reports Summary for week ending 2010-05-24
Tim Wilde
- [nsp-sec] Anyone have any Intel on Rustock!?
Shelton, Steve
- [nsp-sec] ISP Security BOF - Nanog 49 San Francisco
Scalzo, Frank
- [nsp-sec] anyone got anything for 71.5.250.88
Yiming Gong
- [nsp-sec] Welcome to the list, Daniel Goscomb
Rob Thomas
- [nsp-sec] Mediatemple - let me try here
Rodney Joffe
- [nsp-sec] Some compromised machines and IDs
Joel Rosenblatt
- [nsp-sec] VoIP pwnage tool, recognise it?
Scott A. McIntyre
- [nsp-sec] AT&T to the WCP please
Sean Crandall
- [nsp-sec] 200Kpps UDP/53 flood against 80.168.88.251
David Freedman
Last message date:
Mon May 31 13:00:15 EDT 2010
Archived on: Thu Jan 22 18:52:12 EST 2015
This archive was generated by
Pipermail 0.09 (Mailman edition).