Information here is neither complete nor universally applicable.
Not responsible for any consequences of self-administered fixes.
All discussions are billable at standard rates.
Automated live feeds updated continuously. Static content last reviewed/updated: May 17, 2007

Live Internet Threats and Traffic Status

SANS Infocon: Internet Storm Center - Current Status
Search Microsoft Knowledgebase
Enter KB article No. for advisory
(obtained from Security Bulletins)
KB No.:
IP Whois/Geo Info Trace/rDNS
IP Address: *
  Internet Traffic Report - Global Index - Click for Internet Status page.

UCI Internet Pulse Bravo Internet Status
Alerts, Advisories & Updates

Latest: Windows Vector Markup Language Buffer Overflow.   Microsoft XML core services. Adobe Reader Unspecified Heap Corruption. Apple Mac OS X UFS ffs_mountfs() Integer Overflow.

Recent: Word vulnerability. IE "createTextRange()" and UNIX/Linux sendmail. WMP issues. Sun Java critical flaws. WMF vulnerability.

  • MS Security Bulletins
  • MSRC Blog
  • MS Virus Alerts
  • Sym Sec Response *
  • Sym Sec Advisories*
  • Sym Virus Threats
  • DefUpd Static Rapid BDL
  • Secunia
  • Technet Security Center
  • Live Safety Center
  • Microsoft Update
  • KB939653 6 7 | IE7upg
  • Windows XP SP2 *
  • Windows 2000 SP4*
  • Win98 Updates
  • Root Cert Upd
  • Check Your IP Address
  • Check Dshield Report
  • Dsh-IP:
  • Bravo Download Center
  • Bravo SIR Toolkit
  • Belarc Report
    SPAM Resources
    DNSBL: OpenRBL SpamCop SpamLinks SORBS MORE
    Other Tools & Resources
  • Trace1 Trace2 Trace3
  • DNS1DNS2
  • Samspade Tools
  • Symantec Online Scan
  • CIS Resources
  • Resources
    SANS Top 20 Vulnerabilities
    Operating Systems
    W1. Internet Explorer
    W2. Windows Libraries
    W3. Microsoft Office
    W4. Windows Services
    W5. Windows Configuration Weaknesses
    M1. Mac OS X
    U1. UNIX Configuration Weaknesses
    Cross-Platform Applications
    C1 Web Applications
    C2. Database Software
    C3. P2P File Sharing Applications
    C4 Instant Messaging
    C5. Media Players
    C6. DNS Servers
    C7. Backup Software
    C8. Security, Enterprise, and Directory Management Servers
    Network Devices
    N1. VoIP Servers and Phones
    N2. Network and Other Devices Common Configuration Weaknesses
    Security Policy and Personnel
    H1. Excessive User Rights and Unauthorized Devices
    H2. Users (Phishing/Spear Phishing)
    Special Section
    Z1. Zero Day Attacks and Prevention Strategies


    Get Secure!
    Stay Secure!

    Brought to You by
    Bravo Technology Center
    Check out our other sites.
    Security-Related Solutions
  • Incident Response
  • Security Analysis & Assessment
  • On-the-fly Drive Encryption
  • Ad-hoc File Encryption
  • Holistic Portable Device Security
  • Disaster Planning & Recovery
  • Data Recovery
  • Password Recovery
  • Computer Forensics
  • eMail Strategies & Techniques
  • Perimeter Security Routers
  • Intrusion Detection (IDS)
  • Enterprise Managed Anti-Virus
  • Patch Management/Deployment
  • Virtual Private Network (VPN)
  • SSH Traffic Tunneling
  • PKI Certificates
  • Remote Access & B.R.A.G.
  • Network Design & Validation
  • Server Data ACL Strategies
  • Network Monitoring
  • Fault-Tolerant DNS & Hosting
  • Wireless Deployment & Security
  • Policy Development
  • Staff Training
          (Procedures & Awareness)
  • Myth Debunking
  • Hot Standby Site
  • Multi-Modal Backup
  • Public/Private Drop-boxes
  • Penetration Test
  • Testing & Certification
  • Notify The Authorities
  • Internet Crime Complaint Center (
  • FBI Field Office (
  • U.S. National Central Bureau of Interpol (
  • Hoaxes
  • Symantec Hoaxes Page
  • Sophos Hoaxes Information
  • F-Secure Hoaxes Warnings
  • CIAC (U.S. Dept of Energy CIO)
  • Urban Legends
  • Related Reading
  • Server-side Filtering
  • Email Attachments
  • Anti-Virus False Positive
  • Spoofed Email Advisory
  • Bravo Anti-SPAM Initiatives
  • Warnings: Dos and Don'ts
  • Summon Urgent Support
  • Disable Firewall

    Get The Facts.