Storm Watch ()

2025-08-01: 9 news articles added
2025-08-01: 17 files added

2025-07-21 (1753056000)

Plenty of interesting files today as well as headlines. Friendly reminder that automating scraping of the site results in not only failure, but blocking at the perimeter.


2025-07-16 (1752624000)

Bot activity will continue to be dropped as detected. If you don't want your entire /12 blocked, please stop your crawls Microsoft. If anyone can afford API access, it's you. Shameful.

...
[ View Full Changelog ]


Polls ()

Packet Storm has long believed that if you do not have an inventory of what you are trying to protect, then you are starting from a point of failure. Incidents, monitoring and scanning, access controls, and more will be impossible to manage. Gauging cost for any security initiative is near impossible without defined scope and knowing what you have to protect.


Does your company have a working asset database to track systems and applications?

AnswersResults
No, because then someone would find all of our super secret environments.50%
No, we prefer to live life on the edge and never see our families.12%
Yes, and everyone is forced to use it.25%
Yes, but no one is required to use it.12%
It's too hard to get agreement on what constitutes an asset.0%
Storm Watch ()

2025-08-01: 9 news articles added
2025-08-01: 17 files added

2025-07-21 (1753056000)

Plenty of interesting files today as well as headlines. Friendly reminder that automating scraping of the site results in not only failure, but blocking at the perimeter.


2025-07-16 (1752624000)

Bot activity will continue to be dropped as detected. If you don't want your entire /12 blocked, please stop your crawls Microsoft. If anyone can afford API access, it's you. Shameful.

...
[ View Full Changelog ]
Polls ()

Packet Storm has long believed that if you do not have an inventory of what you are trying to protect, then you are starting from a point of failure. Incidents, monitoring and scanning, access controls, and more will be impossible to manage. Gauging cost for any security initiative is near impossible without defined scope and knowing what you have to protect.


Does your company have a working asset database to track systems and applications?

AnswersResults
No, because then someone would find all of our super secret environments.50%
No, we prefer to live life on the edge and never see our families.12%
Yes, and everyone is forced to use it.25%
Yes, but no one is required to use it.12%
It's too hard to get agreement on what constitutes an asset.0%
 About | Terms | Copyright | Privacy | BlueSky | X | Mastodon
 © 2024 - 2025
All Rights Reserved Packet Storm Security, LLC
Hosting provided by: RokaSecurity