RSS Feeds

SANS Internet Storm Center, InfoCON: green SANS Internet Storm Center – Cooperative Cyber Security Monitor

  • Scans for “adminer”, (Wed, Mar 18th)
    on 18 March 2026 at 13:18

    A very popular target of attackers scanning our honeypots is “phpmyadmin”. phpMyAdmin is a script first released in the late 90s, before many security concepts had&#;x26;#;xc2;&#;x26;#;xa0;been discovered. It&#;x26;#;39;s rich history of vulnerabilities made it a favorite target. Its alternative, “adminer”, began appearing about a decade later (https://www.adminer.org). One of its main “selling” points was simplicity. Adminer is just a single PHP file. It requires no configuration. Copy it to your server, and you are ready to go. “adminer” has a much better security record&#;x26;#;xc2;&#;x26;#;xa0;and claims to prioritize security in its development.

  • ISC Stormcast For Wednesday, March 18th, 2026 https://isc.sans.edu/podcastdetail/9854, (Wed, Mar 18th)
    on 18 March 2026 at 11:05

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

  • IPv4 Mapped IPv6 Addresses, (Tue, Mar 17th)
    on 17 March 2026 at 11:36

    Yesterday, in my diary about the scans for “/proxy/” URLs, I noted how attackers are using IPv4-mapped IPv6 addresses to possibly obfuscate their attack. These addresses are defined in RFC 4038. These addresses are one of the many transition mechanisms used to retain some backward compatibility as IPv6 is deployed. Many modern applications use IPv6-only networking code. IPv4-mapped IPv6 addresses can be used to represent IPv4 addresses in these cases. IPv4-mapped IPv6 addresses are not used on the network, but instead, translated to IPv4 before a packet is sent.

  • ISC Stormcast For Tuesday, March 17th, 2026 https://isc.sans.edu/podcastdetail/9852, (Tue, Mar 17th)
    on 17 March 2026 at 02:00

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

  • /proxy/ URL scans with IP addresses, (Mon, Mar 16th)
    on 16 March 2026 at 13:48

    Attempts to find proxy servers are among the most common scans our honeypots detect. Most of the time, the attacker attempts to use a host header or include the hostname in the URL to trigger the proxy server forwarding the request. In some cases, common URL prefixes like “/proxy/” are used. This weekend, I noticed a slightly different pattern in our logs:

Artificial Intelligence Archives – TechRepublic News, Tips, and Advice for Technology Professionals

Cybersecurity Archives – TechRepublic News, Tips, and Advice for Technology Professionals

Quantum Computing Archives – TechRepublic News, Tips, and Advice for Technology Professionals

United Kingdom Archives – TechRepublic News, Tips, and Advice for Technology Professionals