URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Submission: On February 28 via api from TR — Scanned from DE

Summary

This website contacted 38 IPs in 3 countries across 27 domains to perform 231 HTTP transactions. The main IP is 50.56.167.254, located in United States and belongs to RMH-14, US. The main domain is www.bankinfosecurity.com. The Cisco Umbrella rank of the primary domain is 542775.
TLS certificate: Issued by Go Daddy Secure Certificate Authority... on February 21st 2024. Valid for: 5 months.
This is the only time www.bankinfosecurity.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
31 50.56.167.254 33070 (RMH-14)
2 2a00:1450:400... 15169 (GOOGLE)
1 3.160.150.46 16509 (AMAZON-02)
3 2600:9000:206... 16509 (AMAZON-02)
74 23.45.238.237 16625 (AKAMAI-AS)
1 104.130.251.6 33070 (RMH-14)
1 2a00:1450:400... 15169 (GOOGLE)
2 184.31.85.59 16625 (AKAMAI-AS)
4 2a00:1450:400... 15169 (GOOGLE)
7 2a00:1450:400... 15169 (GOOGLE)
2 199.232.192.134 54113 (FASTLY)
2 34.117.77.79 396982 (GOOGLE-CL...)
1 2a02:26f0:710... 20940 (AKAMAI-ASN1)
2 2a02:26f0:710... 20940 (AKAMAI-ASN1)
22 2.17.100.193 20940 (AKAMAI-ASN1)
1 13.32.23.129 16509 (AMAZON-02)
1 2600:9000:205... 16509 (AMAZON-02)
1 35.156.226.144 16509 (AMAZON-02)
1 52.72.19.156 14618 (AMAZON-AES)
4 5 2620:1ec:21::14 8068 (MICROSOFT...)
1 13.107.42.14 8068 (MICROSOFT...)
9 2a00:1450:400... 15169 (GOOGLE)
2 2a02:26f0:710... 20940 (AKAMAI-ASN1)
2 2606:4700::68... 13335 (CLOUDFLAR...)
4 151.101.64.134 54113 (FASTLY)
3 2600:9000:215... 16509 (AMAZON-02)
2 2620:1ec:bdf::60 8075 (MICROSOFT...)
3 2001:4860:480... 15169 (GOOGLE)
2 13.248.142.121 16509 (AMAZON-02)
13 2600:9000:26d... 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
12 2a00:1450:400... 15169 (GOOGLE)
9 2a00:1450:400... 15169 (GOOGLE)
2 192.28.147.68 15224 (OMNITURE)
3 20.114.189.135 8075 (MICROSOFT...)
1 2 68.219.88.97 8075 (MICROSOFT...)
1 1 2620:1ec:c11:... 8068 (MICROSOFT...)
1 2a00:1450:400... 15169 (GOOGLE)
231 38
74    23.45.238.237 (Frankfurt am Main, Germany)
ASN16625 (AKAMAI-AS, US)
PTR: a23-45-238-237.deploy.static.akamaitechnologies.com
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
Apex Domain
Subdomains
Transfer
74 rackcdn.com
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 224810
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 569109
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 383155
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 242325
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 489820
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 454527
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 605702
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 604944
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 256628
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 763100
8 MB
31 bankinfosecurity.com
www.bankinfosecurity.com — Cisco Umbrella Rank: 542775
475 KB
24 6sc.co
j.6sc.co — Cisco Umbrella Rank: 5326
c.6sc.co — Cisco Umbrella Rank: 8195
ipv6.6sc.co — Cisco Umbrella Rank: 5498
b.6sc.co — Cisco Umbrella Rank: 3594
t.6sc.co — Cisco Umbrella Rank: 8256
44 KB
22 googlesyndication.com
19f5c31a19e90d3043a464f4a45d70b3.safeframe.googlesyndication.com
tpc.googlesyndication.com — Cisco Umbrella Rank: 161
pagead2.googlesyndication.com — Cisco Umbrella Rank: 106
383 KB
13 disquscdn.com
c.disquscdn.com — Cisco Umbrella Rank: 5839
290 KB
9 doubleclick.net
securepubads.g.doubleclick.net — Cisco Umbrella Rank: 219
173 KB
7 clarity.ms
www.clarity.ms — Cisco Umbrella Rank: 775
v.clarity.ms — Cisco Umbrella Rank: 7405
c.clarity.ms — Cisco Umbrella Rank: 1350
28 KB
7 gstatic.com
fonts.gstatic.com
177 KB
6 linkedin.com
px.ads.linkedin.com — Cisco Umbrella Rank: 350
www.linkedin.com — Cisco Umbrella Rank: 615
px4.ads.linkedin.com — Cisco Umbrella Rank: 6418
4 KB
6 disqus.com
bankinfosecurity.disqus.com — Cisco Umbrella Rank: 800636
disqus.com — Cisco Umbrella Rank: 1292
referrer.disqus.com — Cisco Umbrella Rank: 8093
54 KB
6 sharethis.com
platform-api.sharethis.com — Cisco Umbrella Rank: 4457
buttons-config.sharethis.com — Cisco Umbrella Rank: 5023
l.sharethis.com — Cisco Umbrella Rank: 4641
platform-cdn.sharethis.com — Cisco Umbrella Rank: 9457
50 KB
4 googletagmanager.com
www.googletagmanager.com — Cisco Umbrella Rank: 40
285 KB
3 google-analytics.com
region1.google-analytics.com — Cisco Umbrella Rank: 2124
369 B
3 ml314.com
ml314.com — Cisco Umbrella Rank: 1975
in.ml314.com — Cisco Umbrella Rank: 10246
12 KB
3 ensighten.com
nexus.ensighten.com — Cisco Umbrella Rank: 3913
11 KB
2 mktoresp.com
051-zxi-237.mktoresp.com — Cisco Umbrella Rank: 748503
636 B
2 6sense.com
epsilon.6sense.com — Cisco Umbrella Rank: 9224
715 B
2 crazyegg.com
script.crazyegg.com — Cisco Umbrella Rank: 2343
3 KB
2 licdn.com
snap.licdn.com — Cisco Umbrella Rank: 805
17 KB
2 marketo.net
munchkin.marketo.net — Cisco Umbrella Rank: 3542
6 KB
2 googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 32
4 KB
1 google.com
www.google.com — Cisco Umbrella Rank: 2
1 KB
1 bing.com
c.bing.com — Cisco Umbrella Rank: 249
763 B
1 cloudfront.net
dnn506yrbagrg.cloudfront.net
821 B
1 bizographics.com
sjs.bizographics.com — Cisco Umbrella Rank: 39131
855 B
1 googletagservices.com
www.googletagservices.com — Cisco Umbrella Rank: 341
29 KB
1 ismgcorp.com
worker.ismgcorp.com — Cisco Umbrella Rank: 748088
305 B
231 27
Domain Requested by
31 www.bankinfosecurity.com www.bankinfosecurity.com
c.disquscdn.com
18 130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com www.bankinfosecurity.com
15 b.6sc.co www.bankinfosecurity.com
13 c.disquscdn.com disqus.com
c.disquscdn.com
bankinfosecurity.disqus.com
12 tpc.googlesyndication.com securepubads.g.doubleclick.net
tpc.googlesyndication.com
12 75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com www.bankinfosecurity.com
11 dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com www.bankinfosecurity.com
10 0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com www.bankinfosecurity.com
9 pagead2.googlesyndication.com securepubads.g.doubleclick.net
tpc.googlesyndication.com
pagead2.googlesyndication.com
9 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
www.bankinfosecurity.com
pagead2.googlesyndication.com
7 fonts.gstatic.com fonts.googleapis.com
6 6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com www.bankinfosecurity.com
4 disqus.com bankinfosecurity.disqus.com
c.disquscdn.com
4 px.ads.linkedin.com 3 redirects snap.licdn.com
4 www.googletagmanager.com www.bankinfosecurity.com
www.googletagmanager.com
4 21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com www.bankinfosecurity.com
4 fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com www.bankinfosecurity.com
4 4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com www.bankinfosecurity.com
3 v.clarity.ms www.clarity.ms
3 region1.google-analytics.com www.googletagmanager.com
3 platform-cdn.sharethis.com www.bankinfosecurity.com
3 c.6sc.co j.6sc.co
3 752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com www.bankinfosecurity.com
3 nexus.ensighten.com www.bankinfosecurity.com
nexus.ensighten.com
2 c.clarity.ms 1 redirects
2 051-zxi-237.mktoresp.com munchkin.marketo.net
2 t.6sc.co www.bankinfosecurity.com
2 epsilon.6sense.com j.6sc.co
2 www.clarity.ms www.bankinfosecurity.com
www.clarity.ms
2 script.crazyegg.com dnn506yrbagrg.cloudfront.net
script.crazyegg.com
2 ipv6.6sc.co j.6sc.co
2 j.6sc.co www.bankinfosecurity.com
2 snap.licdn.com www.bankinfosecurity.com
snap.licdn.com
2 ml314.com www.bankinfosecurity.com
ml314.com
2 munchkin.marketo.net www.bankinfosecurity.com
munchkin.marketo.net
2 f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com www.bankinfosecurity.com
2 fonts.googleapis.com www.bankinfosecurity.com
client
1 www.google.com tpc.googlesyndication.com
1 c.bing.com 1 redirects
1 referrer.disqus.com www.bankinfosecurity.com
1 19f5c31a19e90d3043a464f4a45d70b3.safeframe.googlesyndication.com securepubads.g.doubleclick.net
1 px4.ads.linkedin.com www.bankinfosecurity.com
1 www.linkedin.com 1 redirects
1 in.ml314.com ml314.com
1 l.sharethis.com platform-api.sharethis.com
1 buttons-config.sharethis.com platform-api.sharethis.com
1 dnn506yrbagrg.cloudfront.net www.bankinfosecurity.com
1 sjs.bizographics.com www.bankinfosecurity.com
1 bankinfosecurity.disqus.com www.bankinfosecurity.com
1 www.googletagservices.com www.bankinfosecurity.com
1 worker.ismgcorp.com www.bankinfosecurity.com
1 platform-api.sharethis.com www.bankinfosecurity.com
231 52
Subject Issuer Validity Valid
ismg.io
Go Daddy Secure Certificate Authority - G2
2024-02-21 -
2024-07-30
5 months crt.sh
upload.video.google.com
GTS CA 1C3
2024-02-05 -
2024-04-29
3 months crt.sh
sharethis.com
Amazon RSA 2048 M02
2023-05-20 -
2024-06-17
a year crt.sh
nexus.ensighten.com
Amazon RSA 2048 M02
2023-09-29 -
2024-10-27
a year crt.sh
*.ssl.cf1.rackcdn.com
DigiCert TLS RSA SHA256 2020 CA1
2023-03-27 -
2024-03-28
a year crt.sh
worker.ismgcorp.com
Go Daddy Secure Certificate Authority - G2
2023-02-12 -
2024-03-15
a year crt.sh
*.g.doubleclick.net
GTS CA 1C3
2024-02-05 -
2024-04-29
3 months crt.sh
*.marketo.net
DigiCert TLS RSA SHA256 2020 CA1
2023-12-08 -
2024-12-11
a year crt.sh
*.google-analytics.com
GTS CA 1C3
2024-02-05 -
2024-04-29
3 months crt.sh
*.gstatic.com
GTS CA 1C3
2024-02-05 -
2024-04-29
3 months crt.sh
*.disqus.com
Sectigo RSA Domain Validation Secure Server CA
2023-04-13 -
2024-04-20
a year crt.sh
event-horizon.gcp.bomm.in
GTS CA 1D4
2024-01-01 -
2024-03-31
3 months crt.sh
js.bizographics.com
DigiCert SHA2 Secure Server CA
2023-08-10 -
2024-08-09
a year crt.sh
snap.licdn.com
DigiCert SHA2 Secure Server CA
2023-12-13 -
2024-12-12
a year crt.sh
6sc.co
R3
2024-01-29 -
2024-04-28
3 months crt.sh
*.cloudfront.net
Amazon RSA 2048 M01
2023-10-10 -
2024-09-19
a year crt.sh
*.ml314.com
Amazon RSA 2048 M02
2023-10-16 -
2024-11-12
a year crt.sh
www.linkedin.com
DigiCert SHA2 Secure Server CA
2024-01-30 -
2024-07-30
6 months crt.sh
script.crazyegg.com
E1
2024-02-06 -
2024-05-06
3 months crt.sh
www.clarity.ms
DigiCert TLS RSA SHA256 2020 CA1
2023-12-07 -
2024-12-07
a year crt.sh
*.6sense.com
Amazon RSA 2048 M01
2023-05-01 -
2024-05-29
a year crt.sh
a.disquscdn.com
Amazon RSA 2048 M01
2023-08-31 -
2024-09-27
a year crt.sh
tpc.googlesyndication.com
GTS CA 1C3
2024-02-05 -
2024-04-29
3 months crt.sh
*.mktoresp.com
DigiCert Global G2 TLS RSA SHA256 2020 CA1
2023-09-07 -
2024-10-07
a year crt.sh
a.clarity.ms
Microsoft Azure TLS Issuing CA 01
2024-01-14 -
2024-06-27
5 months crt.sh
www.google.com
GTS CA 1C3
2024-02-05 -
2024-04-29
3 months crt.sh

This page contains 10 frames:

Primary Page: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Frame ID: 7F1771617C61D3B68133A250C2B08286
Requests: 176 HTTP requests in this frame

Frame: https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&t_d=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&t_t=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&s_o=default
Frame ID: 2E2E0B4CDC66830358F6364949821D47
Requests: 24 HTTP requests in this frame

Frame: https://19f5c31a19e90d3043a464f4a45d70b3.safeframe.googlesyndication.com/safeframe/1-0-40/html/container.html
Frame ID: C42C33017358DB2E1F3A5AFF4D7D39C4
Requests: 1 HTTP requests in this frame

Frame: https://t.6sc.co/img.gif?event=imp&ppgid=7f716014&cb=757668061&xref=https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Frame ID: F0CD3FBA60CDD2E9FF88DD85F76F4A3D
Requests: 9 HTTP requests in this frame

Frame: https://t.6sc.co/img.gif?event=imp&ppgid=7f716014&cb=1696574970&xref=https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Frame ID: 013511AC62E134DB0A607AC53EC5F1DE
Requests: 8 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstu42j3yHJbbsaJkguGH-JNtf1WOseDA1K9mF_fZxB6xejvQCWfVCDw-ruZAQD5ydyTRF6gdEIQCvDl_4iRGRicgJl3UWbbJkUQTBXQ2dF9qlSUq8cCYHrpAYJZzIkAUEU5xnx4ByaSkadallrqpj6dyBgbXySWIq-DT2tyU--JyPleg54T8l-obrIhUCtEBtKZE709hVwkecW7qh6ANJQv55UQdE2mS-Kx0t3oMwI2gRYI3AneX1AyaClB-s_Hgj6WTnnDl3VRAL2JhWyfxG0Jhf-bxRFwzFvnckJ9rigbnY_lsrQoI7bT7mt-BrxSgfFAjeyYGvejCYIWciNkXnU4UHAreUlraAbIE_ajsOfcRBg&sai=AMfl-YTqLZRnZpsXoLkw7Lxv6RnQ0iEZVdNZVAlB3UDXdI28tEEgWK1VfmVn7GOM53EqTd6IbkGuSmlcljZ1pNoN3dKUCHsibbRXbP81_naOqqaGchJDsudoClSwSu-uYCXkY76tYVk6owulgWhDdP3pqz8&sig=Cg0ArKJSzI0HyKAX8iiJEAE&uach_m=%5BUACH%5D&adurl=
Frame ID: FD98EC93C707B07859E57C1C8045F87B
Requests: 8 HTTP requests in this frame

Frame: https://c.disquscdn.com/next/embed/styles/realtime.b23ff3c36dd0169627f8e54ca1621eca.css
Frame ID: F046C5EE17EA8CAC9C5CC492B95641C1
Requests: 1 HTTP requests in this frame

Frame: https://c.disquscdn.com/next/embed/styles/realtime.b23ff3c36dd0169627f8e54ca1621eca.css
Frame ID: 1B4D027FD123069E9C4091F35A98506A
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Frame ID: 498DFD004419DEA3E4C1930B708D99E7
Requests: 3 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/aframe
Frame ID: A5B6D432808A83DC643CFF3AF4A99C54
Requests: 2 HTTP requests in this frame

Screenshot

Page Title

Moscow Military Hackers Used Microsoft Outlook Vulnerability

Detected technologies

Overall confidence: 100%
Detected patterns
  • /tiny_?mce(?:\.min)?\.js

Overall confidence: 100%
Detected patterns
  • bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js

Overall confidence: 100%
Detected patterns
  • script\.crazyegg\.com/pages/scripts/\d+/\d+\.js

Overall confidence: 100%
Detected patterns
  • googletagservices\.com/tag/js/gpt(?:_mobile)?\.js

Overall confidence: 100%
Detected patterns
  • //nexus\.ensighten\.com/

Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
  • <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
  • (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)

Overall confidence: 100%
Detected patterns
  • googlesyndication\.com/

Overall confidence: 100%
Detected patterns

Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com

Overall confidence: 100%
Detected patterns
  • googletagmanager\.com/gtm\.js
  • googletagmanager\.com/gtag/js

Overall confidence: 100%
Detected patterns
  • snap\.licdn\.com/li\.lms-analytics/insight\.min\.js

Overall confidence: 100%
Detected patterns
  • munchkin\.marketo\.\w+/(?:([\d.]+)/)?munchkin\.js

Overall confidence: 100%
Detected patterns
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Overall confidence: 100%
Detected patterns
  • jquery-ui.*\.js

Overall confidence: 100%
Detected patterns
  • (?:<link [^>]*href="[^"]*prettyPhoto(?:\.min)?\.css|<a [^>]*rel="prettyPhoto)
  • jquery\.prettyPhoto\.js

Page Statistics

231
Requests

99 %
HTTPS

55 %
IPv6

27
Domains

52
Subdomains

38
IPs

3
Countries

10700 kB
Transfer

18189 kB
Size

31
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 125
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1709086455027&li_adsId=b78a1918-e6bd-4c99-bd61-ad6382030463&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457 HTTP 302
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1709086455027&li_adsId=b78a1918-e6bd-4c99-bd61-ad6382030463&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&cookiesTest=true HTTP 302
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D749%252C2330930%26time%3D1709086455027%26li_adsId%3Db78a1918-e6bd-4c99-bd61-ad6382030463%26url%3Dhttps%253A%252F%252Fwww.bankinfosecurity.com%252Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457%26cookiesTest%3Dtrue%26liSync%3Dtrue HTTP 302
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1709086455027&li_adsId=b78a1918-e6bd-4c99-bd61-ad6382030463&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&cookiesTest=true&liSync=true HTTP 302
  • https://px4.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1709086455027&li_adsId=b78a1918-e6bd-4c99-bd61-ad6382030463&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&cookiesTest=true&liSync=true&e_ipv6=AQJ_XQE8NdOc4QAAAY3tfbflDVCuA48FuYHLvVC9WkWTFhP-MqHBao46_jWRFYEHEb2ZkV2k
Request Chain 214
  • https://c.clarity.ms/c.gif HTTP 302
  • https://c.bing.com/c.gif?ctsa=mr&CtsSyncId=C3CEB1647B2A459F8C9CC8E6CD01CE6D&RedC=c.clarity.ms&MXFR=1313B5E0F50D6C6F1EC3A1D3F10D62A1 HTTP 302
  • https://c.clarity.ms/c.gif?ctsa=mr&CtsSyncId=C3CEB1647B2A459F8C9CC8E6CD01CE6D&MUID=2B4A25677556666E17533154743D67C7

231 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
www.bankinfosecurity.com/
389 KB
54 KB
Document
General
Full URL
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
23f45ee35cc6bb3dcf35a7848b35637d8980acb043f96ab50621272e12451ab9
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

alt-svc
h3=":443"; ma=2592000
cache-control
no-store, no-cache, must-revalidate
content-encoding
gzip
content-security-policy
frame-ancestors 'none'
content-type
text/html; charset=UTF-8
date
Wed, 28 Feb 2024 02:12:46 GMT
expires
Thu, 19 Nov 1981 08:52:00 GMT
pragma
no-cache
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
vary
Accept-Encoding
x-content-type-options
nosniff
x-frame-options
deny
x-xss-protection
1; mode=block
jquery-ui.min.css
www.bankinfosecurity.com/css-responsive/vendor/
25 KB
5 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/jquery-ui.min.css?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
fc54c09a7a71615ec35a22ed20afa4034588986ed88c3fc184b2c0bc637c33fb
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:46 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/css; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
mediaelementplayer-updated.css
www.bankinfosecurity.com/css-responsive/vendor/
11 KB
3 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/mediaelementplayer-updated.css?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
1a0bbdba57f90a60fef89419fc940d8eae55c5b0d12ecbadde2beaef32ab2d90
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:46 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/css; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
content-length
2729
x-xss-protection
1; mode=block
css
fonts.googleapis.com/
55 KB
3 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80f::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
b17609553b24140fc01409b78fa834fe878de6410fe9e8996b0a5f6a984ddd6d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
date
Wed, 28 Feb 2024 02:14:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
x-xss-protection
0
last-modified
Wed, 28 Feb 2024 00:56:13 GMT
server
ESF
cross-origin-opener-policy
same-origin-allow-popups
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Wed, 28 Feb 2024 02:14:13 GMT
main.css
www.bankinfosecurity.com/css-responsive/
232 KB
45 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/main.css?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
91283916a6e9695687bb57ed913fe6fae10324ebfcfa06d31209357e56ebc004
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:46 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/css; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
prettyPhoto.css
www.bankinfosecurity.com/css-responsive/
20 KB
3 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/prettyPhoto.css?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
7d5e2f10ede290b4ad0d1bb2861dfacae9754453f352923e85e7d101a7686b00
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:46 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/css; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
content-length
2993
x-xss-protection
1; mode=block
bis-hdr.desktop.r2.css
www.bankinfosecurity.com/css-responsive/vendor/
8 KB
2 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/bis-hdr.desktop.r2.css?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
20b9ebf817b8dc640c06e993e5ae1127a6eb6b0c9fc6acbfb288f3b3a82405be
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:46 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/css; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
content-length
1997
x-xss-protection
1; mode=block
bis-hdr.mobile.r2.css
www.bankinfosecurity.com/css-responsive/vendor/
9 KB
2 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/bis-hdr.mobile.r2.css?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
59400de556b42dee4aa3e6f7b73676a81e260d35481b6d8d77656ee45ae9484b
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:46 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/css; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
content-length
2183
x-xss-protection
1; mode=block
font-awesome.min.css
www.bankinfosecurity.com/css-responsive/vendor/
22 KB
5 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/font-awesome.min.css?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
93f466f6b1a81c848140e51c839a5372034ab22182601e86dd86947ad3a7fe94
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:46 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/css; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
jquery.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
91 KB
34 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
eccabf5cc7613433c3ddc71ff34391ae850d304d3aceb5666868c4947134f3b5
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:46 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/javascript; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
bootstrap.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
35 KB
10 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/bootstrap.min.js?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
3fede2d0c0a8c93b0c5d0ab0c38289a5743bb88720255b8298c520d2e3d90939
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:46 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/javascript; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
jquery.validate.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
21 KB
7 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.validate.min.js?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
e51831d751ef667b1f703a47bb05802b681e6a30816f5cce0d56c3552a4eaa31
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:46 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/javascript; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
mediaelement-and-player-updated.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
154 KB
39 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/mediaelement-and-player-updated.min.js?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
4e7304371ef9bcaea396e8928a9647f8306c296b9195c8763848d70c7f6f1390
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:47 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/javascript; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
tinymce.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
295 KB
105 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/tinymce.min.js?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
247d04c4d14c60a79c16245a74a792a662f9e7adf784d68edd4520a35ec90251
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:47 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/javascript; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
jquery.validate.bootstrap.popover.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
2 KB
988 B
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.validate.bootstrap.popover.js?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
04d304d7ee49ac157f146382a46f02a666279bd7f29074f50e863b88f2affae9
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:47 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/javascript; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
content-length
952
x-xss-protection
1; mode=block
jquery.placeholder.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
2 KB
995 B
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.placeholder.js?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
256a489beea4a14eca458f6e5436758f1fcb8dd34034d3c36dd21b22a5841f3b
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:47 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/javascript; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
content-length
936
x-xss-protection
1; mode=block
jquery-ui.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
222 KB
63 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery-ui.min.js?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
78cf63898c91ce3b95e37bc53e07adba5c2ee705ff28c2dd1dd784173c264ad1
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:47 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/javascript; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
crypt_des.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
9 KB
3 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/crypt_des.js?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
34f6a8e7792bc499cdcfcfae70d35a02766db4471551ec36844c3214357d6163
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:47 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/javascript; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
content-length
2829
x-xss-protection
1; mode=block
sharethis.js
platform-api.sharethis.com/js/
206 KB
46 KB
Script
General
Full URL
https://platform-api.sharethis.com/js/sharethis.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
3.160.150.46 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-3-160-150-46.fra60.r.cloudfront.net
Software
/
Resource Hash
cf9e92205faeb2fc9929f8aaf67ee6fb15084be8994babd310cfa01d62e29e5c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Frame-Options SAMEORIGIN

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:13:55 GMT
content-encoding
gzip
via
1.1 256cd380c9790a2b71d68709829caa18.cloudfront.net (CloudFront)
strict-transport-security
max-age=31536000; includeSubDomains
x-amz-cf-pop
FRA60-P7
age
19
etag
W/"3360d-7zvdaxLS2Lhi3Pty7QrCYymkuqI"
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
text/javascript; charset=utf-8
edge-control
cache-maxage=60m,downstream-ttl=60m
cache-control
max-age=600, public
x-cache
Hit from cloudfront
x-amz-cf-id
YIor6teXfyyluraqEfWjmigfdRWBjLe_BLV5QM0NsnV0gGehhPuzNA==
Bootstrap.js
nexus.ensighten.com/choozle/12567/
28 KB
10 KB
Script
General
Full URL
https://nexus.ensighten.com/choozle/12567/Bootstrap.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:600:2:8f43:5780:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
CloudFront /
Resource Hash
7b1f1149b35bdc7a4ad9e37242331df369538b19116d6f08656048728affc113

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Thu, 26 Oct 2023 01:07:38 GMT
x-amz-version-id
wcpAQxtzZKGij2A3X0Ny8qS_0rxUarQG
content-encoding
gzip
via
1.1 36d9e1bd4f00d39c57a56679dc44e264.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA56-C1
age
10803996
x-amz-server-side-encryption
AES256
x-cache
Hit from cloudfront
x-amz-replication-status
COMPLETED
alt-svc
h3=":443"; ma=86400
last-modified
Thu, 26 Oct 2023 00:58:02 GMT
server
CloudFront
etag
W/"aa210dcce2ce9f8169171b4343ee6d29"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
cache-control
max-age=300
x-amz-cf-id
fUYmm8r2hd5cApohrOmbhmXDORWGCUrQkmlYQiaoLI6ylbhPskefjg==
headerlogo-bis.png
www.bankinfosecurity.com/images-responsive/logos/
2 KB
2 KB
Image
General
Full URL
https://www.bankinfosecurity.com/images-responsive/logos/headerlogo-bis.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
ea3325c2094d82033ce9583d4180194fb82729dfae65b62925831a88a6838d7c
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
strict-transport-security
max-age=31536000; includeSubDomains; preload
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:47 GMT
x-frame-options
deny
content-type
image/png
cache-control
max-age=86400, private, must-revalidate
accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000
content-length
1659
x-xss-protection
1; mode=block
eu-to-analyze-microsoft-mistral-ai-partnership-showcase_image-5-a-24461.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
114 KB
115 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/eu-to-analyze-microsoft-mistral-ai-partnership-showcase_image-5-a-24461.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
2a339c4fb3549e0296f88da035ebdaff8bc68ddbe6626afbd3f4503d44159469

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:13 GMT
Last-Modified
Tue, 27 Feb 2024 22:12:44 GMT
ETag
54fb7913752c631710b44471b86f283f
Content-Type
image/jpeg
X-Timestamp
1709071963.86697
Cache-Control
public, max-age=75514
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
117237
X-Trans-Id
tx3379605d858a4938ac468-0065de6c9adfw1
Expires
Wed, 28 Feb 2024 23:12:47 GMT
what-goes-around-comes-back-around-chatbots-too-showcase_image-5-a-24459.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
48 KB
49 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/what-goes-around-comes-back-around-chatbots-too-showcase_image-5-a-24459.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e84ecb328730a1f2b7316ddb4b44d12b2bb0648855671a8ae6be086125b45d12

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:13 GMT
Last-Modified
Tue, 27 Feb 2024 20:47:07 GMT
ETag
670dbce0cd1645410a066f1bb32139c4
Content-Type
image/jpeg
X-Timestamp
1709066826.92712
Cache-Control
public, max-age=68285
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
49481
X-Trans-Id
txc79c7a3befd042e7b12bb-0065de5073dfw1
Expires
Wed, 28 Feb 2024 21:12:18 GMT
scottish-police-faces-toil-trouble-from-cybercrime-showcase_image-9-a-24454.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
92 KB
92 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/scottish-police-faces-toil-trouble-from-cybercrime-showcase_image-9-a-24454.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
508caa4a825c27ee138f2b0587725c52f1746fb5718c73845cc6691fdd9e2df8

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:13 GMT
Last-Modified
Tue, 27 Feb 2024 20:07:30 GMT
ETag
0474049c1cd3133ec6843f3c246fbda5
Content-Type
image/jpeg
X-Timestamp
1709064449.55655
Cache-Control
public, max-age=67607
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
94188
X-Trans-Id
tx23adcc4a7a15464192664-0065de4da9dfw1
Expires
Wed, 28 Feb 2024 21:01:00 GMT
hscc-issues-cyber-call-to-action-plan-for-health-sector-showcase_image-7-a-24456.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
92 KB
92 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/hscc-issues-cyber-call-to-action-plan-for-health-sector-showcase_image-7-a-24456.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f69e6339c64f2cd5ef52ff7cc086eaa0a775b229d49fb5363e11e563737b85fe

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:13 GMT
Last-Modified
Tue, 27 Feb 2024 18:13:28 GMT
ETag
a632909fdb1c39cff29d3ef8f47a8967
Content-Type
image/jpeg
X-Timestamp
1709057607.39341
Cache-Control
public, max-age=61894
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
93772
X-Trans-Id
txba2a506c27de48f5859d6-0065de378fdfw1
Expires
Wed, 28 Feb 2024 19:25:47 GMT
ot-security-keeps-some-healthcare-leaders-up-at-night-showcase_image-7-i-5293.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
58 KB
58 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/ot-security-keeps-some-healthcare-leaders-up-at-night-showcase_image-7-i-5293.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4a4e340f65a49be9a5df1dd0083182e83dc0dce664bca7f38bd78805ff8158d4

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Wed, 27 Sep 2023 18:05:15 GMT
ETag
d082b6f751b345b1583b84e56ab5a85c
Content-Type
image/jpeg
X-Timestamp
1695837914.34207
Cache-Control
public, max-age=25460
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx7e6771d4391e4c8eb3024-0065d63a23dfw1
Content-Length
59274
Expires
Wed, 28 Feb 2024 09:18:34 GMT
curry-brothers-on-cyberwarfare-part-2-showcase_image-2-i-5350.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
109 KB
109 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/curry-brothers-on-cyberwarfare-part-2-showcase_image-2-i-5350.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
998a9f484268121bce18aea31688a4dacfe19c43311cf1aad0d615142e2bd5fe

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 30 Jan 2024 16:42:34 GMT
ETag
332aee6adfeea0889b997942414979ae
Content-Type
image/jpeg
X-Timestamp
1706632953.23966
Cache-Control
public, max-age=28920
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
111197
X-Trans-Id
txbc2fcd2800804469ba4fc-0065cfbc3fdfw1
Expires
Wed, 28 Feb 2024 10:16:14 GMT
bolstering-healthcare-cybersecurity-regulatory-outlook-showcase_image-10-i-5352.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
160 KB
161 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/bolstering-healthcare-cybersecurity-regulatory-outlook-showcase_image-10-i-5352.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
521b9219ab5b3e71f9a6bc706f55b6e05cff7cbff261f7eba0a15401cb886b4d

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Wed, 07 Feb 2024 18:16:02 GMT
ETag
dffd8cc5f16da01b0e2dab79324f4178
Content-Type
image/jpeg
X-Timestamp
1707329761.02515
Cache-Control
public, max-age=61306
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx9590b73d4ef84d96a4778-0065d7113ddfw1
Content-Length
163991
Expires
Wed, 28 Feb 2024 19:16:00 GMT
curry-brothers-on-cyberwarfare-part-1-showcase_image-7-i-5349.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
109 KB
109 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/curry-brothers-on-cyberwarfare-part-1-showcase_image-7-i-5349.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
998a9f484268121bce18aea31688a4dacfe19c43311cf1aad0d615142e2bd5fe

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 30 Jan 2024 16:41:13 GMT
ETag
332aee6adfeea0889b997942414979ae
Content-Type
image/jpeg
X-Timestamp
1706632872.66016
Cache-Control
public, max-age=10130
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx43e9d658ae544959b3890-0065dd6d54dfw1
Content-Length
111197
Expires
Wed, 28 Feb 2024 05:03:04 GMT
whats-next-for-carbon-black-now-that-broadcom-sale-dead-showcase_image-8-p-3569.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
25 KB
25 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/whats-next-for-carbon-black-now-that-broadcom-sale-dead-showcase_image-8-p-3569.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
859c5a6ef6e1d5fbae3806f26284949a64614aa7bb1ff35be2c41327e0ca4087

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 27 Feb 2024 22:12:42 GMT
ETag
a16811b7834e75376cfbf7602ede0e0a
Content-Type
image/jpeg
X-Timestamp
1709071961.80472
Cache-Control
public, max-age=76552
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
25298
X-Trans-Id
tx52d33d5799f04a6eb691b-0065de706adfw1
Expires
Wed, 28 Feb 2024 23:30:06 GMT
post-lockbit-how-will-ransomware-ecosystem-evolve-showcase_image-6-p-3567.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
154 KB
154 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/post-lockbit-how-will-ransomware-ecosystem-evolve-showcase_image-6-p-3567.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
df623d0a9e876c4e9c91ef181cb8b285972b56c40cc3d46749d05b25ce9ffb17

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Fri, 23 Feb 2024 17:03:58 GMT
ETag
b1e2f2cd10b56e3a3946b2cb69ac2ccd
Content-Type
image/jpeg
X-Timestamp
1708707837.18507
Cache-Control
public, max-age=11996
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
157735
X-Trans-Id
tx3e74555df98847658beec-0065d8d94fdfw1
Expires
Wed, 28 Feb 2024 05:34:10 GMT
broken-lockbit-ransomware-group-takedown-will-have-impact-showcase_image-4-p-3566.jpeg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
92 KB
93 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/broken-lockbit-ransomware-group-takedown-will-have-impact-showcase_image-4-p-3566.jpeg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
08339a107dc5ed75c9399ef4b75e2042f3155a5f494c2e7d55b137b7dd00769d

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 20 Feb 2024 11:32:47 GMT
ETag
ff146e3598b4653fb7aae9d97f64c659
Content-Type
image/jpeg
X-Timestamp
1708428766.95376
Cache-Control
public, max-age=53428
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx9aa1847dc8204a77a737a-0065de163fdfw1
Content-Length
94651
Expires
Wed, 28 Feb 2024 17:04:42 GMT
on-point-identity-fabric-future-cybersecurity-showcase_image-10-p-3563.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
89 KB
89 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/on-point-identity-fabric-future-cybersecurity-showcase_image-10-p-3563.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
1381e2141cfa129099fb2fe83c9f625412e3d6514c1805a98c69231eb45084d4

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Mon, 12 Feb 2024 19:58:51 GMT
ETag
196b204b7ddbbe73da68f1f179ace33b
Content-Type
image/jpeg
X-Timestamp
1707767930.97942
Cache-Control
public, max-age=55597
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txe382f8b6051c4cba8bf27-0065d95ed3dfw1
Content-Length
90984
Expires
Wed, 28 Feb 2024 17:40:51 GMT
proof-concept-securing-elections-in-age-ai-showcase_image-5-a-24455.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
135 KB
136 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/proof-concept-securing-elections-in-age-ai-showcase_image-5-a-24455.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
abe2e4083ca08ece5e01e3bb334bac4260c4d5e49a15ec81f8d8baa05738bf5e

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:13 GMT
Last-Modified
Tue, 27 Feb 2024 17:42:52 GMT
ETag
55371c4abaf42e205a44357dd70f9f7f
Content-Type
image/jpeg
X-Timestamp
1709055771.19904
Cache-Control
public, max-age=59408
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
138625
X-Trans-Id
txb85f4c3d24784c729d0dc-0065de2d28dfw1
Expires
Wed, 28 Feb 2024 18:44:21 GMT
microsegmentation-in-zero-trust-worth-it-showcase_image-9-a-24453.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
81 KB
81 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/microsegmentation-in-zero-trust-worth-it-showcase_image-9-a-24453.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f36f3f8f7ca9d802fdf009a3a3c70ac6fd4200b25f9950c1558b68e65ef87626

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 27 Feb 2024 05:27:58 GMT
ETag
86812889923f627e871d0788f4bb2554
Content-Type
image/jpeg
X-Timestamp
1709011677.80264
Cache-Control
public, max-age=58055
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
82735
X-Trans-Id
txd4c7c32b9297498d94a65-0065de285edfw1
Expires
Wed, 28 Feb 2024 18:21:49 GMT
ismg-editors-ai-last-great-hope-identity-security-showcase_image-9-a-24438.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
418 KB
418 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/ismg-editors-ai-last-great-hope-identity-security-showcase_image-9-a-24438.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e86052c17f36d9d2fb86a2b85c799c5bf7efbc4b6922838f1fc871519075e402

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Fri, 23 Feb 2024 20:06:51 GMT
ETag
e69e1ee36c85b2fc55e60b29a145ef71
Content-Type
image/jpeg
X-Timestamp
1708718810.80845
Cache-Control
public, max-age=34555
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx736064590d644b7da8a74-0065dc9cbfdfw1
Content-Length
427536
Expires
Wed, 28 Feb 2024 11:50:09 GMT
privacy-teams-expected-to-guard-ais-future-showcase_image-10-a-24421.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
77 KB
78 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/privacy-teams-expected-to-guard-ais-future-showcase_image-10-a-24421.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d1bced15f3712ec58cff9a514fba69bf714cd353c90d3b56f9daa848a3fe1fb8

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Thu, 22 Feb 2024 10:33:41 GMT
ETag
19e7593d3ffa0e0a32d8de57d2f8f505
Content-Type
image/jpeg
X-Timestamp
1708598020.27819
Cache-Control
public, max-age=9336
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
79060
X-Trans-Id
tx36a88a03cffc49a198ef3-0065d77887dfw1
Expires
Wed, 28 Feb 2024 04:49:50 GMT
how-credit-unions-grow-their-businesses-safely-by-navigating-growing-risk-fraud-showcase_image-5-w-5420.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
63 KB
63 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/how-credit-unions-grow-their-businesses-safely-by-navigating-growing-risk-fraud-showcase_image-5-w-5420.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
5eb353e8a6a5581f004ebe8863c7b5330d617b52fdf2c8622598195b97794c60

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 13 Feb 2024 18:11:35 GMT
ETag
580452e5a7e11d676483d60feee4ee0c
Content-Type
image/jpeg
X-Timestamp
1707847894.33379
Cache-Control
public, max-age=15301
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx577ca7b5dada4f4ab8e5c-0065dad27bdfw1
Content-Length
64109
Expires
Wed, 28 Feb 2024 06:29:15 GMT
how-cisos-ace-cyber-risk-reporting-to-board-sec-showcase_image-4-w-5435.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
73 KB
74 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/how-cisos-ace-cyber-risk-reporting-to-board-sec-showcase_image-4-w-5435.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
0576303cda899d891b7fd666c817ea6a3df7a90230d5282b26507cce3889824f

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 20 Feb 2024 19:56:30 GMT
ETag
b03526fe5545833c9cc0306a72805f08
Content-Type
image/jpeg
X-Timestamp
1708458989.74093
Cache-Control
public, max-age=84082
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
75226
X-Trans-Id
tx95effda07a30464887663-0065d7684edfw1
Expires
Thu, 29 Feb 2024 01:35:36 GMT
live-webinar-unleashing-ai-for-cybersecurity-empowering-non-experts-to-take-action-showcase_image-1-w-5456.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
74 KB
74 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-unleashing-ai-for-cybersecurity-empowering-non-experts-to-take-action-showcase_image-1-w-5456.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
bc8c511b1bf0b7d073bc354b4df9c5585130be8d0a5280a45022757a1f098ab1

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Thu, 22 Feb 2024 22:16:59 GMT
ETag
314279335befeedfad388f9428dd3fd8
Content-Type
image/jpeg
X-Timestamp
1708640218.27956
Cache-Control
public, max-age=10076
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txfd86f9c815fe45e9bd580-0065dd6cfbdfw1
Content-Length
75866
Expires
Wed, 28 Feb 2024 05:02:10 GMT
live-webinar-secrets-detection-coverage-throughout-sdlc-critical-to-your-security-posture-showcase_image-1-w-5440.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
40 KB
41 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-secrets-detection-coverage-throughout-sdlc-critical-to-your-security-posture-showcase_image-1-w-5440.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
900d05b6dc14dc9c9fe265f9a94ddfaa1425286670be61846179d07797f96bf4

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 20 Feb 2024 20:33:40 GMT
ETag
2937760d9749fa3b0c4d8ec28b058388
Content-Type
image/jpeg
X-Timestamp
1708461219.07736
Cache-Control
public, max-age=9044
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
41127
X-Trans-Id
txbf18d6ba7b184fb7a0105-0065d641bcdfw1
Expires
Wed, 28 Feb 2024 04:44:58 GMT
live-webinar-safeguarding-against-non-employee-risks-in-modern-business-ecosystem-showcase_image-10-w-5357.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
30 KB
30 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-safeguarding-against-non-employee-risks-in-modern-business-ecosystem-showcase_image-10-w-5357.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
91b0e424ee6e80ea9f221f7903dec910f6da3538cbe90b469cf8ab872680ad4b

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 16 Jan 2024 18:15:36 GMT
ETag
a617436a36178a0ba113d0bb7efe7ed3
Content-Type
image/jpeg
X-Timestamp
1705428935.60229
Cache-Control
public, max-age=82447
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx6007c9968b844e5fa2644-0065de878bdfw1
Content-Length
30564
Expires
Thu, 29 Feb 2024 01:08:21 GMT
webinar-future-proof-your-organisation-integrated-approach-to-decision-making-showcase_image-5-w-5376.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
41 KB
42 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/webinar-future-proof-your-organisation-integrated-approach-to-decision-making-showcase_image-5-w-5376.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
2b8b1e6ee2ffa2ad98bae9f7ff20d57c5d32681070eb99725b67db2f64df8954

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Wed, 17 Jan 2024 21:22:56 GMT
ETag
3f0edfdcc1106a54bd9fff4e27b2a6fb
Content-Type
image/jpeg
X-Timestamp
1705526575.91628
Cache-Control
public, max-age=29163
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txe0552d1150ad4f74b56f8-0065cf0a68dfw1
Content-Length
42123
Expires
Wed, 28 Feb 2024 10:20:17 GMT
live-webinar-supercharge-your-cmdb-realize-value-sooner-taniums-servicenow-itam-integration-in-spanish-showcase_image-6-w-5335.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
66 KB
66 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-supercharge-your-cmdb-realize-value-sooner-taniums-servicenow-itam-integration-in-spanish-showcase_image-6-w-5335.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
fa371650b1d90a4c94469bc10fddff54c01579cd5f2f30b6af280c3966e8a37f

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Wed, 03 Jan 2024 17:49:06 GMT
ETag
15d16ee6de0a33ead879d3e48833c8c4
Content-Type
image/jpeg
X-Timestamp
1704304145.20064
Cache-Control
public, max-age=12033
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx94f27933271748bca8118-0065d9cadbdfw1
Content-Length
67555
Expires
Wed, 28 Feb 2024 05:34:47 GMT
securing-your-workforce-datto-rmm-automating-patching-hardening-backups-showcase_image-7-w-5385.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
60 KB
61 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/securing-your-workforce-datto-rmm-automating-patching-hardening-backups-showcase_image-7-w-5385.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9b049901e9128b68e8d5e1003480f05af58204d3d3480d4511baa971f505c9b9

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Thu, 25 Jan 2024 23:32:44 GMT
ETag
53475cd141e69d8f696849df0804916b
Content-Type
image/jpeg
X-Timestamp
1706225563.40954
Cache-Control
public, max-age=19438
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx13a23de8b633419d8f9c1-0065d3e7b3dfw1
Content-Length
61638
Expires
Wed, 28 Feb 2024 07:38:12 GMT
ruchir-kumar-largeImage-7-a-1369.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
29 KB
29 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/ruchir-kumar-largeImage-7-a-1369.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
1e8e05879c8f3ed9925a23fdc1e871ba89fef420dd954e22b943382a99a561bf

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Mon, 21 Sep 2015 19:23:19 GMT
ETag
70054780276e9f648cfeabfde9040235
Content-Type
image/jpeg
X-Timestamp
1442863398.22930
Cache-Control
public, max-age=28959
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx957ee84d95e746cbb89bd-0065c130d9dfw1
Content-Length
29328
Expires
Wed, 28 Feb 2024 10:16:53 GMT
julia-grunewald-largeImage-8-a-4984.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
167 KB
168 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/julia-grunewald-largeImage-8-a-4984.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
772fc40be7e41595402286130f18d2c5efedbc372132be4c6c151a378c92c6bd

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Wed, 27 Apr 2022 06:20:15 GMT
ETag
b4e86f116e6f1122103300978bf18a71
Content-Type
image/jpeg
X-Timestamp
1651040414.91891
Cache-Control
public, max-age=29789
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx40cb24666fbc4a238ee1a-0065d9a85fdfw1
Content-Length
171404
Expires
Wed, 28 Feb 2024 10:30:43 GMT
roger-loh-largeImage-1-a-6067.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
33 KB
33 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/roger-loh-largeImage-1-a-6067.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
17df63ce6f415ef3e92b2322b6497166a16f4fbad21daad065e96c8a4c2133be

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Fri, 29 Sep 2023 05:12:20 GMT
ETag
76c8a94f8a4a62b086374969ad0755e1
Content-Type
image/jpeg
X-Timestamp
1695964339.57551
Cache-Control
public, max-age=42612
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx054b518d8dee4aebb69c6-0065d9eff4dfw1
Content-Length
33562
Expires
Wed, 28 Feb 2024 14:04:26 GMT
shawn-kok-largeImage-3-a-5001.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
65 KB
65 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/shawn-kok-largeImage-3-a-5001.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
45ca111389cf59a914935ab49139991417b82ae3bac1b438c43c524278ba555c

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Mon, 09 May 2022 06:40:27 GMT
ETag
4530e83c8e66b67e8c5a9a607725027c
Content-Type
image/jpeg
X-Timestamp
1652078426.78885
Cache-Control
public, max-age=86296
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx9f18279474d44784b5651-0065dd2abcdfw1
Content-Length
66339
Expires
Thu, 29 Feb 2024 02:12:30 GMT
comparative-study-on-cyber-risk-business-vs-security-perspectives-research-survey-report-pdf-3-w-13469.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
292 KB
293 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/comparative-study-on-cyber-risk-business-vs-security-perspectives-research-survey-report-pdf-3-w-13469.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a028f5db78fc49ac52ba273e5ed110c6b4bbb3b0659488b5b69e207b94efe0f7

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 27 Feb 2024 14:45:06 GMT
ETag
5acb37db95b44e5f9e4534bc803b0485
Content-Type
image/jpeg
X-Timestamp
1709045105.42400
Cache-Control
public, max-age=46665
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
299177
X-Trans-Id
tx556ae4cc59b64ca0a3071-0065ddfb8fdfw1
Expires
Wed, 28 Feb 2024 15:11:59 GMT
preparing-your-incident-response-team-for-cyber-resilience-pdf-7-w-13278.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
259 KB
259 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/preparing-your-incident-response-team-for-cyber-resilience-pdf-7-w-13278.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b9f8ffe73b808a152b8844ee460f6518c7977d2e3152db6863f595c47c18dcb7

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Fri, 19 Jan 2024 11:04:34 GMT
ETag
d1097eab57bf2b79e443f49f572dd2c9
Content-Type
image/jpeg
X-Timestamp
1705662273.97849
Cache-Control
public, max-age=61397
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txaa3a8d4211864634ba1f9-0065d842b7dfw1
Content-Length
265233
Expires
Wed, 28 Feb 2024 19:17:31 GMT
buyers-guide-to-complete-cloud-security-pdf-8-w-13450.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
136 KB
137 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/buyers-guide-to-complete-cloud-security-pdf-8-w-13450.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f77af0b962fad6bb7a1ecc526481935393f928f143072f678acb11b8165adba3

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Wed, 21 Feb 2024 17:40:35 GMT
ETag
8018a522f51684443bc71b396b693818
Content-Type
image/jpeg
X-Timestamp
1708537234.54743
Cache-Control
public, max-age=18746
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
139528
X-Trans-Id
txb28492df36104e87a7a5c-0065d66b5fdfw1
Expires
Wed, 28 Feb 2024 07:26:40 GMT
stay-one-step-ahead-identity-thieves-pdf-9-w-13449.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
141 KB
141 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/stay-one-step-ahead-identity-thieves-pdf-9-w-13449.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a6f533cdd675622e82fd5b0de044a47c5794a353131314d235770ec2d981a878

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Wed, 21 Feb 2024 17:25:15 GMT
ETag
7eccfd1995604a627df3deb31cf208f6
Content-Type
image/jpeg
X-Timestamp
1708536314.23356
Cache-Control
public, max-age=70375
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
144228
X-Trans-Id
txa0454628e23d438ca121c-0065d66c3bdfw1
Expires
Wed, 28 Feb 2024 21:47:09 GMT
2021-year-complexity-pdf-9-h-106.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
167 KB
168 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/2021-year-complexity-pdf-9-h-106.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7feb9afd2b66cb0776368af51a4e74d22787d4cbe836e1d6490fc1badbd46d5e

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Fri, 14 Jan 2022 21:05:07 GMT
ETag
9cea7f13e1a59b282e81257964303095
Content-Type
image/jpeg
X-Timestamp
1642194306.07043
Cache-Control
public, max-age=85308
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txb2709d62f1a64822a2133-0065cde8ebdfw1
Content-Length
171288
Expires
Thu, 29 Feb 2024 01:56:02 GMT
combatting-cybercrime-pdf-9-h-103.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
358 KB
358 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/combatting-cybercrime-pdf-9-h-103.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7ff5b98c09ec9d2af43d4108160ea0455f91f415f83031cc79fbe24a3a765bb8

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 26 Nov 2019 19:37:47 GMT
ETag
11a3adb400c0ff282a505428b1d7be73
Content-Type
image/jpeg
X-Timestamp
1574797066.57975
Cache-Control
public, max-age=79018
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx9797adf2c48c4dc883fb2-0065de7a20dfw1
Content-Length
366322
Expires
Thu, 29 Feb 2024 00:11:12 GMT
top-canadian-cyber-threats-expected-in-2020-logo-9-h-102.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
76 KB
77 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/top-canadian-cyber-threats-expected-in-2020-logo-9-h-102.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
eb9ec684a7198fded61e248eaff2d28d0c9f8a15dfee8d9afff66aa6ff200461

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Unused62
8096267
Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Mon, 28 Oct 2019 13:57:45 GMT
ETag
69913c61181f1fc9d730d6c8298e55c4
Content-Type
image/jpeg
X-Timestamp
1572271064.63410
Cache-Control
public, max-age=56745
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx35c59f0b9a9f4110a243c-0065d7001cdfw1
Content-Length
78320
Expires
Wed, 28 Feb 2024 17:59:59 GMT
leveraging-new-technologies-in-fraud-investigations-logo-7-h-101.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
197 KB
198 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/leveraging-new-technologies-in-fraud-investigations-logo-7-h-101.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c70242480ad0a0ecc7c305d659f1fdb3a9cb1eb480927b46f8bd62d33ed0f8b2

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 15 Oct 2019 14:06:53 GMT
ETag
e3e068e355cdbfaa15e88b627d7ebc55
Content-Type
image/jpeg
X-Timestamp
1571148412.42493
Cache-Control
public, max-age=28879
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txfb37991e4cfe4141a765c-0065ddb66fdfw1
Content-Length
202154
Expires
Wed, 28 Feb 2024 10:15:33 GMT
gaining-security-visibility-insights-throughout-identity-ecosystem-showcase_image-9-s-114.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
102 KB
103 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/gaining-security-visibility-insights-throughout-identity-ecosystem-showcase_image-9-s-114.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a1cec7a73b7845d303d289011ccc629bad30dec4e599c12ffbd58be5175f4293

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Fri, 05 Jan 2024 20:26:00 GMT
ETag
23a07d29a39e311ec8925dc8f8589c78
Content-Type
image/jpeg
X-Timestamp
1704486359.17556
Cache-Control
public, max-age=10665
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx2732546559f14d9d99c43-0065d3eb7cdfw1
Content-Length
104845
Expires
Wed, 28 Feb 2024 05:11:59 GMT
key-security-challenges-tooling-approaches-for-2024-showcase_image-7-s-113.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
84 KB
85 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/key-security-challenges-tooling-approaches-for-2024-showcase_image-7-s-113.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4f785422f51f7229ba51f8b7478f504049de257e523b4de14da1781fb5c2b6c3

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Thu, 07 Dec 2023 16:21:54 GMT
ETag
18751318357cfb3339c56e538475d50c
Content-Type
image/jpeg
X-Timestamp
1701966113.48368
Cache-Control
public, max-age=84956
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx911e6e2ab57b462497732-0065dd610bdfw1
Content-Length
86134
Expires
Thu, 29 Feb 2024 01:50:10 GMT
fighting-fraud-financial-crime-showcase_image-4-s-112.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
202 KB
202 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/fighting-fraud-financial-crime-showcase_image-4-s-112.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b157d1fbbb8573e80cb45c09d2ddf858dc72e751553f755c2b9d344406d77b97

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Mon, 23 Oct 2023 21:24:00 GMT
ETag
946f745186684b1303be62398629bd08
Content-Type
image/jpeg
X-Timestamp
1698096239.62063
Cache-Control
public, max-age=36139
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx3fb03114d4084f0c889b9-0065d911f3dfw1
Content-Length
206925
Expires
Wed, 28 Feb 2024 12:16:33 GMT
first-annual-generative-ai-study-business-rewards-vs-security-risks-showcase_image-9-s-109.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
130 KB
130 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/first-annual-generative-ai-study-business-rewards-vs-security-risks-showcase_image-9-s-109.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c2b12be678a6fa2f8518a327911d6d3f70379cc67f3853888cdee84d157071ff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Wed, 06 Sep 2023 21:55:13 GMT
ETag
09432bd6f30033b2de423cd8200f74c2
Content-Type
image/jpeg
X-Timestamp
1694037312.59853
Cache-Control
public, max-age=24633
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx8763f7055df24c0480e1b-0065d2f1fcdfw1
Content-Length
132740
Expires
Wed, 28 Feb 2024 09:04:47 GMT
cybersecurity-implications-ai-summit-north-america-west-imageFileLarge-10-e-405.png
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
343 KB
344 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/cybersecurity-implications-ai-summit-north-america-west-imageFileLarge-10-e-405.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
437860176a95945e3db394634a18e4915aef8a951a5c22300ee086d54ef754ec

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Thu, 07 Dec 2023 21:45:55 GMT
ETag
3838f87849b1478a1a36bf8fa4dd368b
Content-Type
image/png
X-Timestamp
1701985554.92681
Cache-Control
public, max-age=7530
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txe9bf9f0180b14ea892591-0065d89d9fdfw1
Content-Length
351439
Expires
Wed, 28 Feb 2024 04:19:44 GMT
cybersecurity-summit-north-america-midwest-imageFileLarge-10-e-406.png
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
331 KB
332 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/cybersecurity-summit-north-america-midwest-imageFileLarge-10-e-406.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
dabc60c4db193b2b29dc19c11a766e26d7d8664b2db9817609f5d6b372dec654

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Thu, 07 Dec 2023 21:47:49 GMT
ETag
29b8fc9ef9d788c5cab2f7a1a1a9b5d4
Content-Type
image/png
X-Timestamp
1701985668.19250
Cache-Control
public, max-age=61302
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx914f84822a334b32993ce-0065d83d31dfw1
Content-Length
339197
Expires
Wed, 28 Feb 2024 19:15:56 GMT
healthcare-cybersecurity-summit-new-york-imageFileLarge-5-e-407.png
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
373 KB
374 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/healthcare-cybersecurity-summit-new-york-imageFileLarge-5-e-407.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7498bb5e0fd8361da37a2982405883bd697fb64d5467bf6bfa36aa833af4c265

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Thu, 07 Dec 2023 21:48:45 GMT
ETag
6d8f674e15ee03826fb2fb759c7f6f70
Content-Type
image/png
X-Timestamp
1701985724.62851
Cache-Control
public, max-age=84078
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx09ff77a571a246f98bcc0-0065d76d47dfw1
Content-Length
382166
Expires
Thu, 29 Feb 2024 01:35:32 GMT
empty_menu_image.png
www.bankinfosecurity.com/images/navigation/generic/
5 KB
5 KB
Image
General
Full URL
https://www.bankinfosecurity.com/images/navigation/generic/empty_menu_image.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
69278fe35261286939e10f3832f461f9bf6addf267ffe0134e26be3d313dbd7d
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
strict-transport-security
max-age=31536000; includeSubDomains; preload
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:47 GMT
x-frame-options
deny
content-type
image/png
cache-control
max-age=86400, private, must-revalidate
accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000
content-length
5306
x-xss-protection
1; mode=block
embargo-0802-301am-et-endor-labs-raises-70m-to-push-from-code-to-pipeline-defense-showcase_image-7-a-22724.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
72 KB
73 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/embargo-0802-301am-et-endor-labs-raises-70m-to-push-from-code-to-pipeline-defense-showcase_image-7-a-22724.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
492ee0c3d23abc7bf7f07b6e3ec7022dc70ce54762569a42a2ffd845f28419a7

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Thu, 03 Aug 2023 00:36:33 GMT
ETag
27bd41eb3a734927e7c3e2f5d1ed75b6
Content-Type
image/jpeg
X-Timestamp
1691022992.39155
Cache-Control
public, max-age=14895
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx30e07e83c3d9430f988f7-0065ce0992dfw1
Content-Length
73960
Expires
Wed, 28 Feb 2024 06:22:29 GMT
rsa-conference-2023-compendium-160-interviews-more-showcase_image-8-a-22138.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
56 KB
56 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/rsa-conference-2023-compendium-160-interviews-more-showcase_image-8-a-22138.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
441132f48c606bab601058cec5283d3268d69356c7124b04476d42207db99163

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Mon, 22 May 2023 21:09:03 GMT
ETag
f856606b199f038d193ccec767c10182
Content-Type
image/jpeg
X-Timestamp
1684789742.23903
Cache-Control
public, max-age=8338
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx56aab085436f4d7eb524a-0065dd6621dfw1
Content-Length
56844
Expires
Wed, 28 Feb 2024 04:33:12 GMT
pulling-covers-off-secret-sprawl-to-reduce-risk-showcase_image-4-a-21921.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
128 KB
128 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/pulling-covers-off-secret-sprawl-to-reduce-risk-showcase_image-4-a-21921.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7baaef85b1c6761ac939c7dc62d8cdd899f179113d7a1f55925dc82c15bba0b7

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 02 May 2023 11:25:08 GMT
ETag
417dd3ccb914ec05ef9004d49802c9cf
Content-Type
image/jpeg
X-Timestamp
1683026707.37529
Cache-Control
public, max-age=11048
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txa7f2ab72d06444e4a88e2-0065cf2a30dfw1
Content-Length
130922
Expires
Wed, 28 Feb 2024 05:18:22 GMT
detecting-mitigating-fraud-through-trust-building-showcase_image-2-a-21864.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
175 KB
176 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/detecting-mitigating-fraud-through-trust-building-showcase_image-2-a-21864.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d8b70e292d312ceb95a91962382d246c54ef08ccb92adb4e0f7f96a426f6d922

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Thu, 27 Apr 2023 00:16:14 GMT
ETag
4fb2741b4f24b46eea088fb6e2acee8b
Content-Type
image/jpeg
X-Timestamp
1682554573.29034
Cache-Control
public, max-age=37811
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txc272e0df77a945efb7d7d-0065cac452dfw1
Content-Length
179702
Expires
Wed, 28 Feb 2024 12:44:25 GMT
infosec-europe-2019-compendium-imageFile-2-a-12739.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
89 KB
89 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/infosec-europe-2019-compendium-imageFile-2-a-12739.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4546d13ea9bae9935dcd23f61d215a528120a53479bf51e372de3420029ed535

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Fri, 05 Jul 2019 20:13:34 GMT
ETag
f9dab7917669551bb50361c2dcd43aa7
Content-Type
image/jpeg
X-Timestamp
1562357613.59432
Cache-Control
public, max-age=83251
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txe54064b11cbc4c10afafe-0065d899a1dfw1
Content-Length
91187
Expires
Thu, 29 Feb 2024 01:21:45 GMT
improving-iot-risk-management-showcase_image-10-a-12689.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
60 KB
61 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/improving-iot-risk-management-showcase_image-10-a-12689.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6ec9288103b5919c36e28909faf04364cdf19cf7687e234663d0d9daab65a3c0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Fri, 28 Jun 2019 14:04:32 GMT
ETag
7f5fdd9cf37f980ea13c12c231815e13
Content-Type
image/jpeg
X-Timestamp
1561730671.53151
Cache-Control
public, max-age=54221
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx3a90a7edb5b649c0a0207-0065d8283ddfw1
Content-Length
61807
Expires
Wed, 28 Feb 2024 17:17:55 GMT
gdpr-where-do-we-go-from-here-showcase_image-1-a-12681.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
62 KB
62 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/gdpr-where-do-we-go-from-here-showcase_image-1-a-12681.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8bc7f122cae9e9efd75cd58076d06fb057d8f50abf07ffc1716e17d87682b9cf

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 25 Jun 2019 19:30:48 GMT
ETag
bba47bed092092a1c82b09a86a3a0e40
Content-Type
image/jpeg
X-Timestamp
1561491047.60933
Cache-Control
public, max-age=81864
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txe35030101a26497cbfd18-0065dd5472dfw1
Content-Length
63007
Expires
Thu, 29 Feb 2024 00:58:38 GMT
reinventing-application-security-showcase_image-10-a-12671.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
53 KB
53 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/reinventing-application-security-showcase_image-10-a-12671.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4179815331b1b050e45da1ccf1d1a8cb50904e1cbb92228b32d55d545d4aaf7c

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 25 Jun 2019 19:54:35 GMT
ETag
89521d60b07d7e85acabbf0301821f45
Content-Type
image/jpeg
X-Timestamp
1561492474.52472
Cache-Control
public, max-age=27156
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx8caff973d49f438788df0-0065b419e8dfw1
Content-Length
54026
Expires
Wed, 28 Feb 2024 09:46:50 GMT
moscow-military-hackers-used-microsoft-outlook-vulnerability-showcase_image-7-a-24457.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
129 KB
130 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-showcase_image-7-a-24457.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
bd5999b221ad2ae7e04b4b4c8d481a0875bacb9642420286116c10a08008a776

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 27 Feb 2024 18:37:39 GMT
ETag
9245dc39019fa81de6858040888c24ce
Content-Type
image/jpeg
X-Timestamp
1709059058.54924
Cache-Control
public, max-age=60303
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
132568
X-Trans-Id
tx2cffc246ed354837aa3f3-0065de3147dfw1
Expires
Wed, 28 Feb 2024 18:59:17 GMT
david-perera-largeImage-5-a-5119.jpeg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
16 KB
16 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/david-perera-largeImage-5-a-5119.jpeg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
752b98ddea2b1e607b8924f688b192118c405f2e6c9f1e330ba660bd362b526b

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Fri, 17 Jun 2022 19:45:49 GMT
ETag
23e2e1a214394efa8db431e2b366be48
Content-Type
image/jpeg
X-Timestamp
1655495148.43625
Cache-Control
public, max-age=7525
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx895051846e524c1f84b69-0065d959d9dfw1
Content-Length
16270
Expires
Wed, 28 Feb 2024 04:19:39 GMT
manufacturing-system-protection-from-cyber-attacks-showcase_image-1-a-15786.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
65 KB
66 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/manufacturing-system-protection-from-cyber-attacks-showcase_image-1-a-15786.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
18593ebcffb9c9a6a5a88465cf1bc0d2ed4b8bc16d510f5b99c9ef57c30407c2

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 19 Jan 2021 19:32:57 GMT
ETag
8715d3afcab30c3bfbd499831c61eb8f
Content-Type
image/jpeg
X-Timestamp
1611084776.18200
Cache-Control
public, max-age=12078
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txe745e13182534730a1958-0065c733d0dfw1
Content-Length
66880
Expires
Wed, 28 Feb 2024 05:35:32 GMT
esg-showcase-critical-role-endpoint-management-solutions-in-mitigating-ransomware-risk-pdf-9-w-10760.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
145 KB
146 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/esg-showcase-critical-role-endpoint-management-solutions-in-mitigating-ransomware-risk-pdf-9-w-10760.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
2234d23f7decc16514d85f6d03c0f4ebd5d9d50cdd44ace4eb70d1609a9a1fce

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Thu, 18 Aug 2022 13:53:07 GMT
ETag
cebb3601e6eb1b0b7a127985b58fa77d
Content-Type
image/jpeg
X-Timestamp
1660830786.29809
Cache-Control
public, max-age=8309
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx3e0e3da72b144c05894de-00659c7a14dfw1
Content-Length
148859
Expires
Wed, 28 Feb 2024 04:32:43 GMT
6-reasons-you-should-employ-application-control-now-logo-3-w-13276.PNG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
43 KB
43 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/6-reasons-you-should-employ-application-control-now-logo-3-w-13276.PNG
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d40b506f409063c97dda142ad7fac4e1a5a3d790daf7d001e5d521fd109f05df

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Thu, 08 Feb 2024 21:00:17 GMT
ETag
41a12c8a4f2071f40cfbdff3be6b4ff6
Content-Type
image/png
X-Timestamp
1707426016.48690
Cache-Control
public, max-age=20749
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx394a2f3bfcaf45949e140-0065dd9683dfw1
Content-Length
43737
Expires
Wed, 28 Feb 2024 08:00:03 GMT
webinar-combatting-rogue-url-tricks-how-you-quickly-identify-investigate-latest-phishing-attacks-showcase_image-4-w-5414.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
63 KB
64 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/webinar-combatting-rogue-url-tricks-how-you-quickly-identify-investigate-latest-phishing-attacks-showcase_image-4-w-5414.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c30980da6c6f2ec76fdbd29d27519f28daa566818bb50f5df4172e3e84740a64

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Wed, 07 Feb 2024 22:42:44 GMT
ETag
9afaf67a7fa74145beaa3bb9ad8a43b0
Content-Type
image/jpeg
X-Timestamp
1707345763.05034
Cache-Control
public, max-age=83522
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txfcd810def2b9442ea4237-0065de8bb7dfw1
Content-Length
64787
Expires
Thu, 29 Feb 2024 01:26:16 GMT
europe-in-crosshairs-chinas-semiconductor-threat-poses-ip-risk-pdf-4-w-13216.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
421 KB
422 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/europe-in-crosshairs-chinas-semiconductor-threat-poses-ip-risk-pdf-4-w-13216.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
0bbc3648d4f68168b2734395192ce65e5a7394979f304b6fe2c648606eae3562

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Thu, 04 Jan 2024 19:01:54 GMT
ETag
101c22a6d30b7467554d270ad9241cd8
Content-Type
image/jpeg
X-Timestamp
1704394913.95836
Cache-Control
public, max-age=53581
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txa29c31d297744182934eb-0065cda129dfw1
Content-Length
431595
Expires
Wed, 28 Feb 2024 17:07:15 GMT
building-effective-economic-security-program-pdf-7-w-13217.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
94 KB
95 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/building-effective-economic-security-program-pdf-7-w-13217.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
426943d2e7ab574beebc7520b2d4b93199411cbfbe6ecbce6ca1100f56e4d4da

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Thu, 04 Jan 2024 19:06:10 GMT
ETag
637581fe6cc32ad6466f0b5e33566f6b
Content-Type
image/jpeg
X-Timestamp
1704395169.59842
Cache-Control
public, max-age=50638
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txea73494928fe42d296528-0065dcd7d9dfw1
Content-Length
96589
Expires
Wed, 28 Feb 2024 16:18:12 GMT
los-alamos-club-growing-foreign-cybersecurity-threat-pdf-9-w-13215.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
247 KB
247 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/los-alamos-club-growing-foreign-cybersecurity-threat-pdf-9-w-13215.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3349291c74137914c9cdeaa3f02800850086b64a1fe491eb80fc3a57a027db73

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Thu, 04 Jan 2024 18:48:07 GMT
ETag
08a8160759a4c3dbd7b05bac008441d6
Content-Type
image/jpeg
X-Timestamp
1704394086.23417
Cache-Control
public, max-age=50757
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txfe2d45f0d7aa49f593522-0065dcd7d9dfw1
Content-Length
252873
Expires
Wed, 28 Feb 2024 16:20:11 GMT
esg-value-drivers-for-attack-surface-management-asm-program-pdf-5-w-10876.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
93 KB
94 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/esg-value-drivers-for-attack-surface-management-asm-program-pdf-5-w-10876.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
56b1b37661213003fc094fbaa56ce1724437eb3547f2952c7b12ac1aa17ae195

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Wed, 14 Sep 2022 19:50:34 GMT
ETag
ec071147c84b523e21de96883934ce83
Content-Type
image/jpeg
X-Timestamp
1663185033.35089
Cache-Control
public, max-age=18744
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txe3112b70763f4a13bd5c0-0065dd8ee0dfw1
Content-Length
95734
Expires
Wed, 28 Feb 2024 07:26:38 GMT
best-practices-to-safeguard-your-brand-your-customers-digital-identity-in-portuguese-showcase_image-4-w-4620.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
35 KB
35 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/best-practices-to-safeguard-your-brand-your-customers-digital-identity-in-portuguese-showcase_image-4-w-4620.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3b2bfa928bf016d3730393c0542db3b88974414df7a2f474a0a5e5a4f91f0274

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 17 Jan 2023 15:08:24 GMT
ETag
30f0c76c89a68a510641cd44cf6ad6c7
Content-Type
image/jpeg
X-Timestamp
1673968103.96163
Cache-Control
public, max-age=11532
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txbbd2af31753c48cc9a3a7-0065c349c8dfw1
Content-Length
35418
Expires
Wed, 28 Feb 2024 05:26:26 GMT
webinar-how-do-i-secure-use-ai-showcase_image-8-w-5412.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
65 KB
65 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/webinar-how-do-i-secure-use-ai-showcase_image-8-w-5412.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
0083e49d6916f296a27d3194ce8c040fc9ad597da7f7fb508d32b79cc928002c

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Fri, 09 Feb 2024 23:13:26 GMT
ETag
7ad19e8885b0a0f45739d7d8b358e322
Content-Type
image/jpeg
X-Timestamp
1707520405.42059
Cache-Control
public, max-age=67085
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
66214
X-Trans-Id
txbb2287387b1e440e8e382-0065cc8d03dfw1
Expires
Wed, 28 Feb 2024 20:52:19 GMT
live-webinar-two-titans-cybersecurity-blueprint-for-advanced-cyber-defense-showcase_image-9-w-5406.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
70 KB
70 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-two-titans-cybersecurity-blueprint-for-advanced-cyber-defense-showcase_image-9-w-5406.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7516ce56423239becbd57cd759bc7d2d9bba16b3f857817467f4bb2d4a4948fe

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 06 Feb 2024 22:04:42 GMT
ETag
5d0b9bf2e8e405b2a1fe760bd85b6921
Content-Type
image/jpeg
X-Timestamp
1707257081.53669
Cache-Control
public, max-age=23325
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx8d0de0a640f2468088d2d-0065dda0c9dfw1
Content-Length
71590
Expires
Wed, 28 Feb 2024 08:42:59 GMT
javascript-blockchain-technologies-you-cant-ignore-pdf-4-w-4323.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
242 KB
242 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/javascript-blockchain-technologies-you-cant-ignore-pdf-4-w-4323.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
bbbd7bccd313fafa0275f24bb6c30268a0f26f668894cf2ac68a664d95a962f6

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Thu, 10 May 2018 20:39:34 GMT
ETag
a1abea62e815280443173bebee773666
Content-Type
image/jpeg
X-Timestamp
1525984773.18562
Cache-Control
public, max-age=82904
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx430592acccee40b4b1211-0065dd54dcdfw1
Content-Length
247335
Expires
Thu, 29 Feb 2024 01:15:58 GMT
xdr-benefits-managed-services-showcase_image-10-i-5346.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
55 KB
55 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/xdr-benefits-managed-services-showcase_image-10-i-5346.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9e6a65223dc776b7830b0b553588901ae88c66bab32892139e65759b8073980d

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 16 Jan 2024 18:09:16 GMT
ETag
27056753fc36af177c0993627665a33c
Content-Type
image/jpeg
X-Timestamp
1705428555.85624
Cache-Control
public, max-age=31474
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx8254282532254675adb15-0065d43b30dfw1
Content-Length
55858
Expires
Wed, 28 Feb 2024 10:58:48 GMT
pushing-healthcare-sector-into-stronger-cybersecurity-showcase_image-7-i-5351.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
58 KB
58 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/pushing-healthcare-sector-into-stronger-cybersecurity-showcase_image-7-i-5351.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ae891978abe1e901d58b28cf3786c68cac9f4661f4b984ff95f10e21afbf1161

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Wed, 31 Jan 2024 18:20:38 GMT
ETag
b048ed7878997bdb3039b571f7544a6a
Content-Type
image/jpeg
X-Timestamp
1706725237.64327
Cache-Control
public, max-age=65894
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txe0a9f07c64a1415da6648-0065d724dfdfw1
Content-Length
59255
Expires
Wed, 28 Feb 2024 20:32:28 GMT
how-merck-case-shapes-future-cyber-insurance-showcase_image-1-i-5345.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
53 KB
53 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-merck-case-shapes-future-cyber-insurance-showcase_image-1-i-5345.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8a09d82bb8de2c031e4d69743fb3c693add896cc4fff7d741ebb0d8aff0f3d20

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Thu, 11 Jan 2024 18:43:09 GMT
ETag
412be2a92b2c2658dd91957f378ef673
Content-Type
image/jpeg
X-Timestamp
1704998588.62737
Cache-Control
public, max-age=67250
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx1cd38877929c47b888c58-0065d13864dfw1
Content-Length
54258
Expires
Wed, 28 Feb 2024 20:55:04 GMT
how-novel-legal-maneuver-got-hospitals-stolen-data-back-showcase_image-1-i-5347.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
48 KB
48 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-novel-legal-maneuver-got-hospitals-stolen-data-back-showcase_image-1-i-5347.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
dbc06b8f6a8ba1228029faa96f791edaaf1905a1dea7e6272dd9325d9bf1669e

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Wed, 17 Jan 2024 18:17:34 GMT
ETag
bd1c87eb970b43aa7e831a6630e1ab5e
Content-Type
image/jpeg
X-Timestamp
1705515453.67815
Cache-Control
public, max-age=28246
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txea70223ccba6420cb301e-0065d8f2a9dfw1
Content-Length
48877
Expires
Wed, 28 Feb 2024 10:05:00 GMT
how-to-add-resilience-to-todays-security-model-showcase_image-5-i-5348.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
88 KB
88 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-to-add-resilience-to-todays-security-model-showcase_image-5-i-5348.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
2a22629f693e5e719fb878d1f66253ada74073d14b34d989e1f3b757d07bc753

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 23 Jan 2024 19:20:39 GMT
ETag
680dfacb6c9253467be5d719c91d6dd5
Content-Type
image/jpeg
X-Timestamp
1706037638.10150
Cache-Control
public, max-age=13140
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txb59ddf82e824404692bcc-0065dc4860dfw1
Content-Length
90071
Expires
Wed, 28 Feb 2024 05:53:14 GMT
getting-smarter-about-ai-llms-showcase_image-6-i-5334.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
46 KB
46 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/getting-smarter-about-ai-llms-showcase_image-6-i-5334.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
45bed7b536973adb285bd15e4fdb6d6fd9b316c0ca9bd070c1721616901e50e9

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Tue, 26 Dec 2023 20:59:45 GMT
ETag
cd33057f8edbb71ceb6f40358a348107
Content-Type
image/jpeg
X-Timestamp
1703624384.32479
Cache-Control
public, max-age=81974
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx42db6c6093dc42d8b2788-0065d762f9dfw1
Content-Length
46786
Expires
Thu, 29 Feb 2024 01:00:28 GMT
logo-ismg-with-text.png
www.bankinfosecurity.com/images-responsive/
4 KB
4 KB
Image
General
Full URL
https://www.bankinfosecurity.com/images-responsive/logo-ismg-with-text.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
4e2db1bef009e01901b4083a153f1607301428277a76f508e659dc2849cefa04
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
strict-transport-security
max-age=31536000; includeSubDomains; preload
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:47 GMT
x-frame-options
deny
content-type
image/png
cache-control
max-age=86400, private, must-revalidate
accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000
content-length
4419
x-xss-protection
1; mode=block
logo-ismg-print.png
www.bankinfosecurity.com/images-responsive/
5 KB
5 KB
Image
General
Full URL
https://www.bankinfosecurity.com/images-responsive/logo-ismg-print.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
5133e2e1a213ca44a8adb1f42f103a2d2e495849dfa4d42bf67c04fcc962e577
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
strict-transport-security
max-age=31536000; includeSubDomains; preload
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:47 GMT
x-frame-options
deny
content-type
image/png
cache-control
max-age=86400, private, must-revalidate
accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000
content-length
5575
x-xss-protection
1; mode=block
ondemand-preview-w-255.jpg
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
56 KB
57 KB
Image
General
Full URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3059f92e36a564c5cbcedc195f764e3c55c8cf919c84129c5f202870e7026b61

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Fri, 05 Jul 2013 12:55:26 GMT
ETag
7aece0902995efedc289b7c24037434b
Content-Type
image/jpeg
X-Timestamp
1373028925.94439
Cache-Control
public, max-age=900
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txc7366aa185704013b2749-0065de9215dfw1
Content-Length
57633
Expires
Wed, 28 Feb 2024 02:29:14 GMT
ron-ross-smallImage-a-558.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
10 KB
11 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/ron-ross-smallImage-a-558.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9c8bb391a723e088d163b560afa73f709c42a69df5647c4fefce9d16e4226895

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Last-Modified
Fri, 01 Nov 2013 13:09:25 GMT
ETag
fac8c56390d084c4f1dfaa9b24a58c33
Content-Type
image/jpeg
X-Timestamp
1383311364.81114
Cache-Control
public, max-age=43019
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx03c26943215f423b875f4-0065dcbd76dfw1
Content-Length
10640
Expires
Wed, 28 Feb 2024 14:11:13 GMT
main.js
www.bankinfosecurity.com/javascripts-responsive/
42 KB
10 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/main.js?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
8949f4df9776d1bd31694cc9f2c38ea0c5d8d3ecac95380a5afc08adc2ff96bb
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:47 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/javascript; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
media-transcript-navigation.js
www.bankinfosecurity.com/javascripts-responsive/
26 KB
7 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/media-transcript-navigation.js?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
ae3c472ff47a96820c1acdf9574b231a88f62a006b84d320eb313af40f32f2db
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:47 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/javascript; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
bis-hdr.r1.js
www.bankinfosecurity.com/javascripts-responsive/
1 KB
485 B
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/bis-hdr.r1.js?s=1709086366.5723
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
9a13fb5949ace41b41f2baafd0749b4a9e3b98a86082246980d785c0f0e2f494
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:47 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/javascript; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
content-length
449
x-xss-protection
1; mode=block
jquery.browser.js
www.bankinfosecurity.com/javascripts-responsive/
2 KB
1 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/jquery.browser.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
0037005ca3e7cad32331724064278a8cfc3915a31eab50eb1e074f97fe9902a6
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:47 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/javascript; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
content-length
1026
x-xss-protection
1; mode=block
jquery.prettyPhoto.js
www.bankinfosecurity.com/javascripts-responsive/
23 KB
6 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/jquery.prettyPhoto.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
c4309cf270cbc7d300e797f598b5c2f504d2b59ea5894bd7b9fad38528b2f8ab
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:47 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/javascript; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
ismg-user-ip
worker.ismgcorp.com/
12 B
305 B
XHR
General
Full URL
https://worker.ismgcorp.com/ismg-user-ip
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1709086366.5723
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.130.251.6 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
d7299f53c4e3975280f5d8e9245bb5404f203f29b5313288e32f50e1f2a05ceb
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept
*/*
Referer
https://www.bankinfosecurity.com/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
upgrade-insecure-requests
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:09:40 GMT
referrer-policy
no-referrer-when-downgrade
content-type
text/html; charset=UTF-8
access-control-allow-origin
*
cache-control
no-cache, private
content-length
12
x-xss-protection
1; mode=block
gpt.js
www.googletagservices.com/tag/js/
90 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:827::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
20b914b241fbcb6e38e061ec31818f723f76391fc1ba3c2ba28210d16f628136
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:14 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
28749
x-xss-protection
0
server
cafe
etag
45 / 19781 / m202402200101 / config-hash: 15533271893029719535
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
expires
Wed, 28 Feb 2024 02:14:14 GMT
munchkin.js
munchkin.marketo.net/
1 KB
1 KB
Script
General
Full URL
https://munchkin.marketo.net/munchkin.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1709086366.5723
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
184.31.85.59 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a184-31-85-59.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
5206536707c84baa892d3c3231b351985ee828cb8b9c0bd8db42cd3363995fc4

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:15 GMT
Content-Encoding
gzip
Last-Modified
Fri, 17 Mar 2023 01:24:48 GMT
Server
AkamaiNetStorage
ETag
"cb731cc5c2bd9f31d6bfeb19f3c8b1ff:1679016288.730763"
Vary
Accept-Encoding
Content-Type
application/x-javascript
P3P
policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR"
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
729
serverComponent.php
nexus.ensighten.com/choozle/12567/
287 B
618 B
Script
General
Full URL
https://nexus.ensighten.com/choozle/12567/serverComponent.php?namespace=Bootstrapper&staticJsPath=nexus.ensighten.com/choozle/12567/code/&publishedOn=Thu%20Oct%2026%2000:57:53%20GMT%202023&ClientID=923&PageID=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Requested by
Host: nexus.ensighten.com
URL: https://nexus.ensighten.com/choozle/12567/Bootstrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:600:2:8f43:5780:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
CloudFront /
Resource Hash
7c778fb557f572ceee63a3f139973945c4fc43bf9a9a570256d1424f147a0da5

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:14 GMT
via
1.1 36d9e1bd4f00d39c57a56679dc44e264.cloudfront.net (CloudFront)
server
CloudFront
x-amz-cf-pop
FRA56-C1
x-cache
Miss from cloudfront
content-type
text/javascript
cache-control
no-cache, no-store
alt-svc
h3=":443"; ma=86400
content-length
287
x-amz-cf-id
4VBI3applazsAgsQG8tALinOhwr9O3vKt6unEEjsaMfsnV6vJ4UdAA==
expires
Wed, 28 Feb 2024 02:14:13 GMT
gtm.js
www.googletagmanager.com/
208 KB
70 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-T6KM3T
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:813::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
530712eaae83996d6e5c7811994d307a480e9a41f83017efe994db5f02be189f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:14 GMT
content-encoding
br
strict-transport-security
max-age=31536000; includeSubDomains
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
71424
x-xss-protection
0
last-modified
Wed, 28 Feb 2024 00:47:36 GMT
server
Google Tag Manager
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Wed, 28 Feb 2024 02:14:14 GMT
gtm.js
www.googletagmanager.com/
119 KB
46 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-T8C2JFW
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:813::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
86abe0b6b545cad2b8be7a72d249e1db3c01a5cdbb22f04fff7880effc04fa65
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:14 GMT
content-encoding
br
strict-transport-security
max-age=31536000; includeSubDomains
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
47084
x-xss-protection
0
last-modified
Wed, 28 Feb 2024 00:47:36 GMT
server
Google Tag Manager
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Wed, 28 Feb 2024 02:14:14 GMT
memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
fonts.gstatic.com/s/opensans/v40/
47 KB
47 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v40/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:830::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
3c4d6a1421c7ddb7e404521fe8c4cd5be5af446d7689cd880be26612eaad3cfa
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://www.bankinfosecurity.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 21 Feb 2024 03:51:57 GMT
x-content-type-options
nosniff
age
598937
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
48236
x-xss-protection
0
last-modified
Thu, 14 Dec 2023 02:08:40 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="apps-themes"
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 20 Feb 2025 03:51:57 GMT
fontawesome-webfont.woff
www.bankinfosecurity.com/css-responsive/fonts/
43 KB
43 KB
Font
General
Full URL
https://www.bankinfosecurity.com/css-responsive/fonts/fontawesome-webfont.woff?v=4.2.0
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/css-responsive/vendor/font-awesome.min.css?s=1709086366.5723
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
0fd28fece9ebd606b8b071460ebd3fc2ed7bc7a66ef91c8834f11dfacab4a849
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.bankinfosecurity.com/css-responsive/vendor/font-awesome.min.css?s=1709086366.5723
Origin
https://www.bankinfosecurity.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
strict-transport-security
max-age=31536000; includeSubDomains; preload
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
last-modified
Mon, 26 Feb 2024 20:53:33 GMT
date
Wed, 28 Feb 2024 02:12:47 GMT
etag
"s9he19ya8"
x-frame-options
deny
content-type
font/woff
accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000
content-length
44432
x-xss-protection
1; mode=block
memtYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWqWuU6F.woff2
fonts.gstatic.com/s/opensans/v40/
49 KB
50 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v40/memtYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWqWuU6F.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:830::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0d8601a776b7dc777cd23bc42392d05a43df0d6402328e8913b58811083b513d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://www.bankinfosecurity.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Tue, 27 Feb 2024 09:08:28 GMT
x-content-type-options
nosniff
age
61546
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
50296
x-xss-protection
0
last-modified
Thu, 14 Dec 2023 02:10:01 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="apps-themes"
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 26 Feb 2025 09:08:28 GMT
ondemand-preview-w-255.mp4
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
0
0

d3d14424fac71699bdbff068d9b1184b.js
nexus.ensighten.com/choozle/12567/code/
2 KB
872 B
Script
General
Full URL
https://nexus.ensighten.com/choozle/12567/code/d3d14424fac71699bdbff068d9b1184b.js?conditionId0=421905
Requested by
Host: nexus.ensighten.com
URL: https://nexus.ensighten.com/choozle/12567/Bootstrap.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2600:9000:206f:600:2:8f43:5780:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
CloudFront /
Resource Hash
e80cfc6df2f882813f88dcf1175bc0c47e13c0cd8517bc240a65ee6cc758b0f2

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Sun, 24 Dec 2023 05:42:33 GMT
x-amz-version-id
ACrGVhvD9Z.vDoBABfgFbXyniOSHFx8V
content-encoding
gzip
via
1.1 1c5b98f7bd5001d6fe1040daa237afc6.cloudfront.net (CloudFront)
age
5689902
x-amz-cf-pop
FRA56-C1
x-amz-server-side-encryption
AES256
x-cache
Hit from cloudfront
x-amz-replication-status
COMPLETED
alt-svc
h3=":443"; ma=86400
last-modified
Thu, 26 Oct 2023 00:58:08 GMT
server
CloudFront
etag
W/"e8e93310d35a9462151b8fdab5b436ce"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
cache-control
max-age=315360000
x-amz-cf-id
Nx4o7iLSkG8Qe06ne0EtvrY_CxxNyrtat4Kjn1gLpSbDA7EmOBeeow==
embed.js
bankinfosecurity.disqus.com/
80 KB
26 KB
Script
General
Full URL
https://bankinfosecurity.disqus.com/embed.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
199.232.192.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
openresty /
Resource Hash
5d4a1569a6967dac352048f499b8f114b4cee1498dc864b5d43363b50dfe55ef
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=300; includeSubdomains
server
openresty
Age
60
Vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
Cache-Control
private, max-age=60
x-service
router
Cross-Origin-Resource-Policy
cross-origin
Connection
keep-alive
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
26191
tag.aspx
ml314.com/
33 KB
11 KB
Script
General
Full URL
https://ml314.com/tag.aspx?2812024
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.117.77.79 Kansas City, United States, ASN396982 (GOOGLE-CLOUD-PLATFORM, US),
Reverse DNS
79.77.117.34.bc.googleusercontent.com
Software
UploadServer /
Resource Hash
825f6b61f96bc43809abd30cab948309377449c379a6f973c582f5d28bf267ab

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:01:29 GMT
via
1.1 google
content-encoding
br
age
765
x-guploader-uploadid
ABPtcPockbBAbpxkkYTipcsCwPURDYyTrsJTSBAotUZv7Y8s_d6pzkFHFRz1jZtBa5mpW1ugXA
x-goog-storage-class
STANDARD
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
10671
last-modified
Wed, 21 Feb 2024 23:31:36 GMT
server
UploadServer
vary
Accept-Encoding
x-goog-generation
1708558296436903
x-goog-hash
crc32c=srF/gg==, md5=3fpNhUvHTpM0hkxhCmt/UA==
content-type
application/javascript
cache-id
AMS-cba56054
cache-control
public,max-age=3600
x-cache-hit
hit
x-goog-stored-content-length
34175
accept-ranges
bytes
insight.min.js
sjs.bizographics.com/
1 KB
855 B
Script
General
Full URL
https://sjs.bizographics.com/insight.min.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:7100::1720:ef23 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
c1ae5b294dafd600a8377432c1cf1f05694e1d82ced9931f8ba71a11d753c2f1
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 26 Feb 2024 18:10:47 GMT
x-cdn
AKAM
x-amz-server-side-encryption
AES256
vary
Accept-Encoding
content-type
application/javascript;charset=utf-8
cache-control
max-age=48800
accept-ranges
bytes
content-length
645
insight.min.js
snap.licdn.com/li.lms-analytics/
1 KB
855 B
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:7100::213:c60b Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
c1ae5b294dafd600a8377432c1cf1f05694e1d82ced9931f8ba71a11d753c2f1
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 26 Feb 2024 18:10:47 GMT
x-cdn
AKAM
x-amz-server-side-encryption
AES256
vary
Accept-Encoding
content-type
application/javascript;charset=utf-8
cache-control
max-age=48812
accept-ranges
bytes
content-length
645
6si.min.js
j.6sc.co/
64 KB
17 KB
Script
General
Full URL
https://j.6sc.co/6si.min.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
d3851af1bf48f6e0903b5d66e5d64141a559aa05a2da8c76b502dda2b6473933
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 28 Feb 2024 02:14:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 20 Dec 2023 22:26:50 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"65836a2a-ff05"
vary
Accept-Encoding
content-type
application/javascript
cache-control
private, no-cache, proxy-revalidate
accept-ranges
bytes
content-length
17577
expires
Wed, 28 Feb 2024 02:14:14 GMT
2682.js
dnn506yrbagrg.cloudfront.net/pages/scripts/0021/
309 B
821 B
Script
General
Full URL
https://dnn506yrbagrg.cloudfront.net/pages/scripts/0021/2682.js?474746
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.32.23.129 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-32-23-129.fra56.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
6caf904d3dfc096ae3b4e40aed43181686bdf1bac4722b3dd2a775ab6d2a9992

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Fri, 05 Jan 2024 04:31:17 GMT
Via
1.1 7d3c59ee1b45f72158a8cbce053c8978.cloudfront.net (CloudFront)
Last-Modified
Tue, 03 Mar 2020 19:14:28 GMT
Server
AmazonS3
X-Amz-Cf-Pop
FRA56-C2
Age
4657379
ETag
"53b0291ca3900aca920ad48e9790c1b7"
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Cache-Control
max-age=31536000
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
309
X-Amz-Cf-Id
XdSzeIRfTc6_vsAlmG8uhNkekm-rMrrqLRJLODd1gQxyLejPJGNEtQ==
64270ee65d783b00125f1b83.js
buttons-config.sharethis.com/js/
521 B
963 B
Script
General
Full URL
https://buttons-config.sharethis.com/js/64270ee65d783b00125f1b83.js
Requested by
Host: platform-api.sharethis.com
URL: https://platform-api.sharethis.com/js/sharethis.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2057:8c00:c:abe:f440:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
5983be7036fc26270495fd1a318795ac3538b9e8e8a34dff25685a3e4fbe3858
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
via
1.1 c275031486c6f7b744b8d30847e98b14.cloudfront.net (CloudFront)
strict-transport-security
max-age=31536000; includeSubDomains
x-amz-cf-pop
FRA6-C1
age
7
x-amz-server-side-encryption
AES256
x-cache
Hit from cloudfront
content-length
521
last-modified
Fri, 31 Mar 2023 17:48:50 GMT
server
AmazonS3
etag
"b1b92dd067a349c8db8fab212b24e99e"
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=60
accept-ranges
bytes
x-amz-cf-id
wWfE0rmsjc4Cs3rkTb2783Wca605Re_vF1EGQTpK12gfIlFXak8m9g==
pview
l.sharethis.com/
0
411 B
XHR
General
Full URL
https://l.sharethis.com/pview?event=pview&hostname=www.bankinfosecurity.com&location=%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&product=inline-share-buttons&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&source=platform&fcmp=false&fcmpv2=false&has_segmentio=false&title=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&cms=unknown&publisher=64270ee65d783b00125f1b83&sop=true&version=st_sop.js&lang=en&description=A%20campaign%20by%20Russian%20military%20intelligence%20to%20convert%20Ubiquiti%20routers%20into%20a%20platform%20for%20a%20global%20cyberespionage%20operation%20began%20as%20early%20as%202022%2C%20U.S.%20and&ua=&ua_mobile=false&ua_full_version_list=&uuid=9bdd5f28-9863-4848-a62e-c2567ed887bd
Requested by
Host: platform-api.sharethis.com
URL: https://platform-api.sharethis.com/js/sharethis.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.156.226.144 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-35-156-226-144.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains;

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:14 GMT
Strict-Transport-Security
max-age=63072000; includeSubDomains;
Access-Control-Max-Age
1728000
Access-Control-Allow-Origin
https://www.bankinfosecurity.com
Access-Control-Expose-Headers
stid
Cache-Control
no-cache, no-store, must-revalidate
Access-Control-Allow-Credentials
true
Connection
keep-alive
Access-Control-Allow-Headers
*
ondemand-preview-w-255.mp4
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
3 MB
0
Media
General
Full URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.mp4
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.238.237 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-45-238-237.deploy.static.akamaitechnologies.com
Software
/
Resource Hash

Request headers

Referer
https://www.bankinfosecurity.com/
Accept-Encoding
identity;q=1, *;q=0
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36
Range
bytes=0-

Response headers

Date
Wed, 28 Feb 2024 02:14:15 GMT
Last-Modified
Fri, 05 Jul 2013 12:56:36 GMT
ETag
e5d65b36cc2f1ee7de6cc53cd6609280
Content-Type
video/mp4
Content-Range
bytes 0-10621769/10621770
X-Timestamp
1373028995.98411
Cache-Control
public, max-age=837
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx759954ea871d4b77a4024-0065c24befdfw1
Content-Length
10621770
Expires
Wed, 28 Feb 2024 02:28:12 GMT
ajax.php
www.bankinfosecurity.com/
5 B
85 B
XHR
General
Full URL
https://www.bankinfosecurity.com/ajax.php?json=notificationCookies&action=getNotifications
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1709086366.5723
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
fcbcf165908dd18a9e49f7ff27810176db8e9f63b4352213741664245224f8aa
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

Accept
*/*
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
X-Requested-With
XMLHttpRequest
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

pragma
no-cache
content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:48 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/html; charset=UTF-8
cache-control
no-store, no-cache, must-revalidate
alt-svc
h3=":443"; ma=2592000
content-length
25
x-xss-protection
1; mode=block
expires
Thu, 19 Nov 1981 08:52:00 GMT
utsync.ashx
ml314.com/
62 B
254 B
Script
General
Full URL
https://ml314.com/utsync.ashx?pub=&adv=&et=0&eid=57819&ct=js&pi=&fp=&clid=&if=0&ps=&cl=&mlt=&data=&&cp=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&pv=1709086454988_2haw23uav&bl=en-us&cb=7135010&return=&ht=&d=&dc=&si=1709086454988_2haw23uav&cid=&s=1600x1200&rp=&v=2.6.1.139
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?2812024
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.117.77.79 Kansas City, United States, ASN396982 (GOOGLE-CLOUD-PLATFORM, US),
Reverse DNS
79.77.117.34.bc.googleusercontent.com
Software
Google Frontend /
Resource Hash
5a1ba6ff6db12f791bbbfc4da3cb389e06f0cd53eede09ef3eb3ceb074089ef1

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 28 Feb 2024 02:14:15 GMT
via
1.1 google, 1.1 google
server
Google Frontend
content-type
application/javascript
p3p
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
expires
0
ud.ashx
in.ml314.com/
20 B
482 B
Script
General
Full URL
https://in.ml314.com/ud.ashx?topiclimit=&cb=2812024&v=2.6.1.139
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?2812024
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.72.19.156 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-72-19-156.compute-1.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
d0e4a6372d6fb5ffe9505dbe9e94aee8f1b9b96ec8e5e20684cce8b4c5a88fa7

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:15 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public
Connection
keep-alive
Content-Length
138
Expires
Thu, 29 Feb 2024 02:14:15 GMT
insight.old.min.js
snap.licdn.com/li.lms-analytics/
46 KB
16 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.old.min.js
Requested by
Host: snap.licdn.com
URL: https://snap.licdn.com/li.lms-analytics/insight.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:7100::213:c60b Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
dec888202913f9630b63196880ea2e96210c59df2905e55154fe88432c1b0e3d
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 26 Feb 2024 18:22:15 GMT
x-cdn
AKAM
x-amz-server-side-encryption
AES256
vary
Accept-Encoding
content-type
application/javascript;charset=utf-8
cache-control
max-age=49590
accept-ranges
bytes
content-length
16524
collect
px4.ads.linkedin.com/
Redirect Chain
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1709086455027&li_adsId=b78a1918-e6bd-4c99-bd61-ad6382030463&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hacker...
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1709086455027&li_adsId=b78a1918-e6bd-4c99-bd61-ad6382030463&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hacker...
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D749%252C2330930%26time%3D1709086455027%26li_adsId%3Db78a1918-e6bd-4c99-bd61-ad638...
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1709086455027&li_adsId=b78a1918-e6bd-4c99-bd61-ad6382030463&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hacker...
  • https://px4.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1709086455027&li_adsId=b78a1918-e6bd-4c99-bd61-ad6382030463&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hacke...
0
266 B
Image
General
Full URL
https://px4.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1709086455027&li_adsId=b78a1918-e6bd-4c99-bd61-ad6382030463&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&cookiesTest=true&liSync=true&e_ipv6=AQJ_XQE8NdOc4QAAAY3tfbflDVCuA48FuYHLvVC9WkWTFhP-MqHBao46_jWRFYEHEb2ZkV2k
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Server
13.107.42.14 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-li-pop
afd-prod-lor1-x
x-msedge-ref
Ref A: 8CAA8D13A38C45C4AB20F482EBA4421E Ref B: CPH30EDGE0313 Ref C: 2024-02-28T02:14:15Z
linkedin-action
1
x-cache
CONFIG_NOCACHE
content-type
application/javascript
x-li-fabric
prod-lor1
x-li-proto
http/2
content-length
0
x-li-uuid
AAYSZ7MamcA4/WXq5qvPlw==

Redirect headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-li-pop
afd-prod-lor1-x
x-msedge-ref
Ref A: CC4B2C90A2A64177BA87EFAE376C24F8 Ref B: CPH30EDGE0522 Ref C: 2024-02-28T02:14:15Z
linkedin-action
1
x-cache
CONFIG_NOCACHE
x-li-fabric
prod-lor1
location
https://px4.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1709086455027&li_adsId=b78a1918-e6bd-4c99-bd61-ad6382030463&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&cookiesTest=true&liSync=true&e_ipv6=AQJ_XQE8NdOc4QAAAY3tfbflDVCuA48FuYHLvVC9WkWTFhP-MqHBao46_jWRFYEHEb2ZkV2k
x-li-proto
http/2
content-length
0
x-li-uuid
AAYSZ7MWLu18tuWPDLtjKA==
/
px.ads.linkedin.com/wa/
0
627 B
XHR
General
Full URL
https://px.ads.linkedin.com/wa/
Requested by
Host: snap.licdn.com
URL: https://snap.licdn.com/li.lms-analytics/insight.old.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:21::14 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept
*
Referer
https://www.bankinfosecurity.com/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-li-pop
afd-prod-lor1-x
x-msedge-ref
Ref A: 9C0867E055C849D29E282E51BA245E79 Ref B: CPH30EDGE0522 Ref C: 2024-02-28T02:14:15Z
linkedin-action
1
vary
Origin
x-cache
CONFIG_NOCACHE
x-li-fabric
prod-lor1
access-control-allow-origin
https://www.bankinfosecurity.com
x-li-proto
http/2
access-control-allow-credentials
true
x-li-uuid
AAYSZ7MNM5OVU9JpfsCwXQ==
pubads_impl.js
securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202402200101/
428 KB
135 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202402200101/pubads_impl.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7ae3dcf8002e428f15567c5a304172fe086cf525cc41c02a83c091989152e4cf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Tue, 27 Feb 2024 16:44:46 GMT
content-encoding
br
x-content-type-options
nosniff
age
34169
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
137981
x-xss-protection
0
server
cafe
etag
12437356588311396475
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, immutable, max-age=31536000
timing-allow-origin
*
expires
Wed, 26 Feb 2025 16:44:46 GMT
ppub_config
securepubads.g.doubleclick.net/pagead/
69 B
590 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/pagead/ppub_config?ippd=www.bankinfosecurity.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
74f6149451e9771ff198839c50988e2edb5f7e191eea16c7ed01fa0120f7c50a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
content-encoding
br
x-content-type-options
nosniff
server
cafe
content-type
application/json; charset=UTF-8
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cache-control
private, max-age=3600, stale-while-revalidate=3600
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
48
x-xss-protection
0
expires
Wed, 28 Feb 2024 02:14:15 GMT
/
c.6sc.co/
7 B
200 B
XHR
General
Full URL
https://c.6sc.co/
Requested by
Host: j.6sc.co
URL: https://j.6sc.co/6si.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
fe04a9dc88d3f3be8d4f6bc63a9a80f45a4c6d8460e7551dab849457c091920a

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
text/html
access-control-allow-origin
https://www.bankinfosecurity.com
access-control-allow-credentials
true
access-control-allow-headers
*
content-length
7
/
ipv6.6sc.co/
20 B
317 B
XHR
General
Full URL
https://ipv6.6sc.co/
Requested by
Host: j.6sc.co
URL: https://j.6sc.co/6si.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:7100::210:180 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
eca911cde383d98bf0ebfaeae9ffcbf9a217014053c43f8a4206d325f4988a5d

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 28 Feb 2024 02:14:15 GMT
vary
Origin
content-type
text/html
access-control-allow-origin
https://www.bankinfosecurity.com
cache-control
max-age=0, no-cache, no-store
6si-ipv6
2a03:1b20:b:f011::1e
server-timing
cdn-cache; desc=HIT, edge; dur=1, ak_p; desc="1709086455107_34603388_148049299_16_670_27_56_219";dur=1
content-length
20
expires
Wed, 28 Feb 2024 02:14:15 GMT
img.gif
b.6sc.co/v1/beacon/
43 B
485 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=61666340-7a0c-424e-89c1-00bcea81dca6&session=0dded946-4103-4cfb-81c0-0a0ce4851f62&event=a_pageload&q=%7B%22pageLoadTime%22%3A%22Wed%2C%2028%20Feb%202024%2002%3A14%3A15%20GMT%22%7D&isIframe=false&m=%7B%22description%22%3A%22A%20campaign%20by%20Russian%20military%20intelligence%20to%20convert%20Ubiquiti%20routers%20into%20a%20platform%20for%20a%20global%20cyberespionage%20operation%20began%20as%20early%20as%202022%2C%20U.S.%20and%22%2C%22keywords%22%3A%22Russia%2C%20APT28%2C%20Fancy%20Bear%2C%20Microsoft%2C%20relay%20attack%22%2C%22title%22%3A%22Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&pageViewId=0bafc7bf-4366-4afd-8fe4-f8c0393bc084&v=1.1.14
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-content-type-options
nosniff
content-length
43
pragma
no-cache
last-modified
Sat, 05 Jun 2021 07:56:05 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"60bb2e15-2b"
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
image/gif
access-control-allow-origin
cache-control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
access-control-allow-credentials
true
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 19 Apr 2000 11:43:00 GMT
img.gif
b.6sc.co/v1/beacon/
43 B
484 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=61666340-7a0c-424e-89c1-00bcea81dca6&session=0dded946-4103-4cfb-81c0-0a0ce4851f62&event=ni%3AasyncSettingsAudit&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22enableEventTracking%5C%22%2C%5C%22value%5C%22%3A%5C%22true%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Wed%2C%2028%20Feb%202024%2002%3A14%3A15%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22setToken%5C%22%2C%5C%22value%5C%22%3A%5C%228cde4267f2ac828e1ae5d1fbcd5ef992%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Wed%2C%2028%20Feb%202024%2002%3A14%3A15%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22setEndpoint%5C%22%2C%5C%22value%5C%22%3A%5C%22b.6sc.co%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Wed%2C%2028%20Feb%202024%2002%3A14%3A15%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22A%20campaign%20by%20Russian%20military%20intelligence%20to%20convert%20Ubiquiti%20routers%20into%20a%20platform%20for%20a%20global%20cyberespionage%20operation%20began%20as%20early%20as%202022%2C%20U.S.%20and%22%2C%22keywords%22%3A%22Russia%2C%20APT28%2C%20Fancy%20Bear%2C%20Microsoft%2C%20relay%20attack%22%2C%22title%22%3A%22Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&pageViewId=0bafc7bf-4366-4afd-8fe4-f8c0393bc084&v=1.1.14
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-content-type-options
nosniff
content-length
43
pragma
no-cache
last-modified
Fri, 21 Feb 2020 18:57:20 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"5e502810-2b"
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
image/gif
access-control-allow-origin
cache-control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
access-control-allow-credentials
true
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 19 Apr 2000 11:43:00 GMT
2682.js
script.crazyegg.com/pages/scripts/0021/
6 KB
2 KB
Script
General
Full URL
https://script.crazyegg.com/pages/scripts/0021/2682.js
Requested by
Host: dnn506yrbagrg.cloudfront.net
URL: https://dnn506yrbagrg.cloudfront.net/pages/scripts/0021/2682.js?474746
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:9408 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0796855a346bff8e4ade9180ebacd3068499671f45d1ec770eee18c51ef161ec

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
content-encoding
gzip
cf-cache-status
HIT
age
2880
cf-polished
origSize=6112
ce-version
11.5.188
cf-bgj
minify
last-modified
Tue, 27 Feb 2024 12:29:24 GMT
server
cloudflare
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
access-control-expose-headers
CE-Version
cache-control
public, max-age=300, s-maxage=1209600
timing-allow-origin
*
cf-ray
85c52728cdc86a73-TXL
/
disqus.com/embed/comments/ Frame 2E2E
7 KB
4 KB
Document
General
Full URL
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&t_d=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&t_t=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&s_o=default
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
151.101.64.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
7e3ca2b12f110362017b240edc288b67d6312419a7f23b5156430323716c11d6
Security Headers
Name Value
Content-Security-Policy script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ https://com-disqus.netmng.com:* 'unsafe-inline' https://referrer.disqus.com/juggler/ https://connect.facebook.net/en_US/sdk.js https://cdn.syndication.twimg.com/tweets.json https://apis.google.com https://www.google.com/recaptcha/ https://cf.ignitionone.com:* https://disqus.com
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.bankinfosecurity.com/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Age
0
Cache-Control
stale-if-error=3600, s-stalewhilerevalidate=3600, stale-while-revalidate=30, no-cache, must-revalidate, public, s-maxage=5
Connection
keep-alive
Content-Encoding
gzip
Content-Length
2835
Content-Security-Policy
script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ https://com-disqus.netmng.com:* 'unsafe-inline' https://referrer.disqus.com/juggler/ https://connect.facebook.net/en_US/sdk.js https://cdn.syndication.twimg.com/tweets.json https://apis.google.com https://www.google.com/recaptcha/ https://cf.ignitionone.com:* https://disqus.com
Content-Type
text/html; charset=utf-8
Cross-Origin-Resource-Policy
cross-origin
Date
Wed, 28 Feb 2024 02:14:15 GMT
ETag
W/"lounge:view:10100628566.b0ad0856ef2ebfc173aca2df4f033d1c.2"
Last-Modified
Tue, 27 Feb 2024 18:51:19 GMT
Link
<https://c.disquscdn.com>;rel=preconnect,<https://c.disquscdn.com>;rel=dns-prefetch
Referrer-Policy
no-referrer-when-downgrade
Server
nginx
Strict-Transport-Security
max-age=300; includeSubdomains
Timing-Allow-Origin
*
Vary
Accept-Encoding
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
facebook.svg
platform-cdn.sharethis.com/img/
301 B
745 B
Image
General
Full URL
https://platform-cdn.sharethis.com/img/facebook.svg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2156:e000:1d:85c3:6640:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
768d97ec0916217ae82c70aeda3a61b9b0dab344edc4a3240a4f7cd94af00307
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Sat, 03 Feb 2024 01:42:29 GMT
via
1.1 fa5a3d5abd34c6fac657b045a4dcbdc4.cloudfront.net (CloudFront)
strict-transport-security
max-age=31536000; includeSubDomains
x-amz-cf-pop
FRA50-C1
age
2161907
x-amz-server-side-encryption
AES256
x-cache
Hit from cloudfront
content-length
301
last-modified
Thu, 10 Oct 2019 01:20:12 GMT
server
AmazonS3
etag
"c6e9be45643e197ce1db1d7e24a99adc"
vary
Accept-Encoding
content-type
image/svg+xml
cache-control
public, max-age=2592000
accept-ranges
bytes
x-amz-cf-id
yRRV4n2WYDDcL0KBZobajEMpbmzi2X1fJYPCfMu4qDIQZXs_v8Jhfg==
twitter.svg
platform-cdn.sharethis.com/img/
368 B
777 B
Image
General
Full URL
https://platform-cdn.sharethis.com/img/twitter.svg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2156:e000:1d:85c3:6640:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
76ffdc5337cd5a509f15d70767b85a793aead82975d0d86912e1607e963c9aed
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:10:39 GMT
via
1.1 fa5a3d5abd34c6fac657b045a4dcbdc4.cloudfront.net (CloudFront)
strict-transport-security
max-age=31536000; includeSubDomains
last-modified
Fri, 15 Sep 2023 16:58:49 GMT
server
AmazonS3
x-amz-cf-pop
FRA50-C1
age
217
x-amz-server-side-encryption
AES256
etag
"2deb3d5121d475d195577a70b0a91a0c"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
image/svg+xml
accept-ranges
bytes
content-length
368
x-amz-cf-id
3fTPB6xh_igM_6NshFgLj4iQgpYz_MuMYcgo0yiQ4p2IDHY0gXuudQ==
linkedin.svg
platform-cdn.sharethis.com/img/
456 B
899 B
Image
General
Full URL
https://platform-cdn.sharethis.com/img/linkedin.svg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2156:e000:1d:85c3:6640:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
cb8c2b19fd9b56c41db14bd71b5c0616c1ba4e99b08c8e75084cf695f74b7120
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Tue, 13 Feb 2024 16:46:48 GMT
via
1.1 fa5a3d5abd34c6fac657b045a4dcbdc4.cloudfront.net (CloudFront)
strict-transport-security
max-age=31536000; includeSubDomains
x-amz-cf-pop
FRA50-C1
age
1243647
x-amz-server-side-encryption
AES256
x-cache
Hit from cloudfront
content-length
456
last-modified
Thu, 10 Oct 2019 01:20:12 GMT
server
AmazonS3
etag
"fa43b4ede18498b114fc7185993f6da7"
vary
Accept-Encoding
content-type
image/svg+xml
cache-control
public, max-age=2592000
accept-ranges
bytes
x-amz-cf-id
lPcKT1SMVpyP2GhOxsPT3EpFjr1HBuFcVTrR7QDTneh7Fxmbw1AFvg==
js
www.googletagmanager.com/gtag/
248 KB
87 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=G-XJ8Q4QGGRH&l=dataLayer&cx=c
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-T6KM3T
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:813::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
02532bf8e8ace71737f3b720ae8fffd35796ef8f6eafe313c891d3f1cf8c9f1d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
content-encoding
br
strict-transport-security
max-age=31536000; includeSubDomains
server
Google Tag Manager
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
access-control-allow-headers
Cache-Control
content-length
88481
x-xss-protection
0
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
expires
Wed, 28 Feb 2024 02:14:15 GMT
js
www.googletagmanager.com/gtag/
231 KB
82 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=G-2RK1HGW2E4&l=dataLayer&cx=c
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-T6KM3T
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:813::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
04e9bdd67fc955ac6882608ae831afaad0e5753016140084505057fdb01810e8
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
content-encoding
br
strict-transport-security
max-age=31536000; includeSubDomains
server
Google Tag Manager
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
access-control-allow-headers
Cache-Control
content-length
84314
x-xss-protection
0
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
expires
Wed, 28 Feb 2024 02:14:15 GMT
/
c.6sc.co/
7 B
200 B
XHR
General
Full URL
https://c.6sc.co/
Requested by
Host: j.6sc.co
URL: https://j.6sc.co/6si.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
fe04a9dc88d3f3be8d4f6bc63a9a80f45a4c6d8460e7551dab849457c091920a

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
text/html
access-control-allow-origin
https://www.bankinfosecurity.com
access-control-allow-credentials
true
access-control-allow-headers
*
content-length
7
6si.min.js
j.6sc.co/
64 KB
18 KB
Script
General
Full URL
https://j.6sc.co/6si.min.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
8c1781ec4483c6fb3bd9ad005d312800eaf24e232c12976624bff84f8ab908b3
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 28 Feb 2024 02:14:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 22 Feb 2024 19:00:41 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"65d799d9-101dd"
vary
Accept-Encoding
content-type
application/javascript
cache-control
private, no-cache, proxy-revalidate
accept-ranges
bytes
content-length
17693
expires
Wed, 28 Feb 2024 02:14:15 GMT
i5wta0dq65
www.clarity.ms/tag/
701 B
1 KB
Script
General
Full URL
https://www.clarity.ms/tag/i5wta0dq65
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2620:1ec:bdf::60 , United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
d1936fef90455229c9869fffbf07e57df892c81ef651de1553d981e13c5db231

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

expires
-1
date
Wed, 28 Feb 2024 02:14:15 GMT
x-azure-ref
20240228T021415Z-h2vc552axp3491wy7pe7r95x7800000007b0000000004na8
x-cache
CONFIG_NOCACHE
content-type
application/x-javascript
cache-control
no-cache, no-store
accept-ranges
bytes
content-length
701
request-context
appId=cid-v1:593e4080-f032-4d00-a652-e17f01252a9d
img.gif
b.6sc.co/v1/beacon/
43 B
484 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=61666340-7a0c-424e-89c1-00bcea81dca6&session=0dded946-4103-4cfb-81c0-0a0ce4851f62&event=s_update&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22enableEventTracking%5C%22%2C%5C%22value%5C%22%3A%5C%22true%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Wed%2C%2028%20Feb%202024%2002%3A14%3A15%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%2283%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22A%20campaign%20by%20Russian%20military%20intelligence%20to%20convert%20Ubiquiti%20routers%20into%20a%20platform%20for%20a%20global%20cyberespionage%20operation%20began%20as%20early%20as%202022%2C%20U.S.%20and%22%2C%22keywords%22%3A%22Russia%2C%20APT28%2C%20Fancy%20Bear%2C%20Microsoft%2C%20relay%20attack%22%2C%22title%22%3A%22Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&pageViewId=0bafc7bf-4366-4afd-8fe4-f8c0393bc084&v=1.1.14
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-content-type-options
nosniff
content-length
43
pragma
no-cache
last-modified
Sat, 18 Feb 2023 00:49:36 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"63f020a0-2b"
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
image/gif
access-control-allow-origin
cache-control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
access-control-allow-credentials
true
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 19 Apr 2000 11:43:00 GMT
img.gif
b.6sc.co/v1/beacon/
43 B
484 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=61666340-7a0c-424e-89c1-00bcea81dca6&session=0dded946-4103-4cfb-81c0-0a0ce4851f62&event=s_update&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22setToken%5C%22%2C%5C%22value%5C%22%3A%5C%228cde4267f2ac828e1ae5d1fbcd5ef992%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Wed%2C%2028%20Feb%202024%2002%3A14%3A15%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%2283%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22A%20campaign%20by%20Russian%20military%20intelligence%20to%20convert%20Ubiquiti%20routers%20into%20a%20platform%20for%20a%20global%20cyberespionage%20operation%20began%20as%20early%20as%202022%2C%20U.S.%20and%22%2C%22keywords%22%3A%22Russia%2C%20APT28%2C%20Fancy%20Bear%2C%20Microsoft%2C%20relay%20attack%22%2C%22title%22%3A%22Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&pageViewId=0bafc7bf-4366-4afd-8fe4-f8c0393bc084&v=1.1.14
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-content-type-options
nosniff
content-length
43
pragma
no-cache
last-modified
Fri, 21 Feb 2020 18:57:20 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"5e502810-2b"
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
image/gif
access-control-allow-origin
cache-control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
access-control-allow-credentials
true
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 19 Apr 2000 11:43:00 GMT
img.gif
b.6sc.co/v1/beacon/
43 B
485 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=61666340-7a0c-424e-89c1-00bcea81dca6&session=0dded946-4103-4cfb-81c0-0a0ce4851f62&event=s_update&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22setEndpoint%5C%22%2C%5C%22value%5C%22%3A%5C%22b.6sc.co%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Wed%2C%2028%20Feb%202024%2002%3A14%3A15%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%2283%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22A%20campaign%20by%20Russian%20military%20intelligence%20to%20convert%20Ubiquiti%20routers%20into%20a%20platform%20for%20a%20global%20cyberespionage%20operation%20began%20as%20early%20as%202022%2C%20U.S.%20and%22%2C%22keywords%22%3A%22Russia%2C%20APT28%2C%20Fancy%20Bear%2C%20Microsoft%2C%20relay%20attack%22%2C%22title%22%3A%22Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&pageViewId=0bafc7bf-4366-4afd-8fe4-f8c0393bc084&v=1.1.14
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-content-type-options
nosniff
content-length
43
pragma
no-cache
last-modified
Sat, 18 Feb 2023 01:45:17 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"63f02dad-2b"
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
image/gif
access-control-allow-origin
cache-control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
access-control-allow-credentials
true
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 19 Apr 2000 11:43:00 GMT
img.gif
b.6sc.co/v1/beacon/
43 B
484 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=61666340-7a0c-424e-89c1-00bcea81dca6&session=0dded946-4103-4cfb-81c0-0a0ce4851f62&event=s_update&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22setEpsilonKey%5C%22%2C%5C%22value%5C%22%3A%5C%227207ef3e32cb3a527876a3e90b6bf51dbd9d9339%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Wed%2C%2028%20Feb%202024%2002%3A14%3A15%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%2283%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22A%20campaign%20by%20Russian%20military%20intelligence%20to%20convert%20Ubiquiti%20routers%20into%20a%20platform%20for%20a%20global%20cyberespionage%20operation%20began%20as%20early%20as%202022%2C%20U.S.%20and%22%2C%22keywords%22%3A%22Russia%2C%20APT28%2C%20Fancy%20Bear%2C%20Microsoft%2C%20relay%20attack%22%2C%22title%22%3A%22Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&pageViewId=0bafc7bf-4366-4afd-8fe4-f8c0393bc084&v=1.1.14
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-content-type-options
nosniff
content-length
43
pragma
no-cache
last-modified
Tue, 05 Oct 2021 22:17:52 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"615ccf10-2b"
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
image/gif
access-control-allow-origin
cache-control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
access-control-allow-credentials
true
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 19 Apr 2000 11:43:00 GMT
img.gif
b.6sc.co/v1/beacon/
43 B
485 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=61666340-7a0c-424e-89c1-00bcea81dca6&session=0dded946-4103-4cfb-81c0-0a0ce4851f62&event=s_update&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22enableCompanyDetails%5C%22%2C%5C%22value%5C%22%3A%5C%22%5Btrue%2Cnull%2C3%5D%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Wed%2C%2028%20Feb%202024%2002%3A14%3A15%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%2283%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22A%20campaign%20by%20Russian%20military%20intelligence%20to%20convert%20Ubiquiti%20routers%20into%20a%20platform%20for%20a%20global%20cyberespionage%20operation%20began%20as%20early%20as%202022%2C%20U.S.%20and%22%2C%22keywords%22%3A%22Russia%2C%20APT28%2C%20Fancy%20Bear%2C%20Microsoft%2C%20relay%20attack%22%2C%22title%22%3A%22Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&pageViewId=0bafc7bf-4366-4afd-8fe4-f8c0393bc084&v=1.1.14
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-content-type-options
nosniff
content-length
43
pragma
no-cache
last-modified
Sat, 18 Feb 2023 02:04:22 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"63f03226-2b"
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
image/gif
access-control-allow-origin
cache-control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
access-control-allow-credentials
true
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 19 Apr 2000 11:43:00 GMT
/
c.6sc.co/
7 B
200 B
XHR
General
Full URL
https://c.6sc.co/
Requested by
Host: j.6sc.co
URL: https://j.6sc.co/6si.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
fe04a9dc88d3f3be8d4f6bc63a9a80f45a4c6d8460e7551dab849457c091920a

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
text/html
access-control-allow-origin
https://www.bankinfosecurity.com
access-control-allow-credentials
true
access-control-allow-headers
*
content-length
7
/
ipv6.6sc.co/
20 B
316 B
XHR
General
Full URL
https://ipv6.6sc.co/
Requested by
Host: j.6sc.co
URL: https://j.6sc.co/6si.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:7100::210:180 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
eca911cde383d98bf0ebfaeae9ffcbf9a217014053c43f8a4206d325f4988a5d

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 28 Feb 2024 02:14:15 GMT
vary
Origin
content-type
text/html
access-control-allow-origin
https://www.bankinfosecurity.com
cache-control
max-age=0, no-cache, no-store
6si-ipv6
2a03:1b20:b:f011::1e
server-timing
cdn-cache; desc=HIT, edge; dur=1, ak_p; desc="1709086455185_34603388_148049305_17_855_27_0_219";dur=1
content-length
20
expires
Wed, 28 Feb 2024 02:14:15 GMT
www.bankinfosecurity.com.json
script.crazyegg.com/pages/data-scripts/0021/2682/site/
1023 B
728 B
XHR
General
Full URL
https://script.crazyegg.com/pages/data-scripts/0021/2682/site/www.bankinfosecurity.com.json?t=1
Requested by
Host: script.crazyegg.com
URL: https://script.crazyegg.com/pages/scripts/0021/2682.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:9408 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5337ab202514f86c0c5ab5f816539c11f82ff2c39dde0c5ff430b6521b5bc68d

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
content-encoding
gzip
cf-cache-status
HIT
age
47485
ce-version
11.5.188
content-length
456
last-modified
Tue, 27 Feb 2024 12:29:26 GMT
server
cloudflare
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
access-control-expose-headers
CE-Version
cache-control
public, max-age=300, s-maxage=1209600
accept-ranges
bytes
timing-allow-origin
*
cf-ray
85c527292ad15902-TXL
img.gif
b.6sc.co/v1/beacon/
43 B
485 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=61666340-7a0c-424e-89c1-00bcea81dca6&session=0dded946-4103-4cfb-81c0-0a0ce4851f62&event=ipv6&q=%7B%22address%22%3A%222a03%3A1b20%3Ab%3Af011%3A%3A1e%22%7D&isIframe=false&m=%7B%22description%22%3A%22A%20campaign%20by%20Russian%20military%20intelligence%20to%20convert%20Ubiquiti%20routers%20into%20a%20platform%20for%20a%20global%20cyberespionage%20operation%20began%20as%20early%20as%202022%2C%20U.S.%20and%22%2C%22keywords%22%3A%22Russia%2C%20APT28%2C%20Fancy%20Bear%2C%20Microsoft%2C%20relay%20attack%22%2C%22title%22%3A%22Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&pageViewId=0bafc7bf-4366-4afd-8fe4-f8c0393bc084&v=1.1.14
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-content-type-options
nosniff
content-length
43
pragma
no-cache
last-modified
Sat, 18 Feb 2023 01:45:17 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"63f02dad-2b"
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
image/gif
access-control-allow-origin
cache-control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
access-control-allow-credentials
true
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 19 Apr 2000 11:43:00 GMT
munchkin.js
munchkin.marketo.net/163/
11 KB
5 KB
Script
General
Full URL
https://munchkin.marketo.net/163/munchkin.js
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
184.31.85.59 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a184-31-85-59.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
68cc280ce370c6f1f51a4fc5950103fc38df80a429552c549add04ebd8bd3a23

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:15 GMT
Content-Encoding
gzip
Last-Modified
Fri, 06 Jan 2023 02:26:40 GMT
Server
AkamaiNetStorage
ETag
"ea7826f34518d7c2295738f39c7640fa:1672972000.238769"
Vary
Accept-Encoding
Content-Type
application/x-javascript
P3P
policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR"
Cache-Control
max-age=8640000
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
4741
Expires
Fri, 07 Jun 2024 02:14:15 GMT
collect
region1.google-analytics.com/g/
0
261 B
Ping
General
Full URL
https://region1.google-analytics.com/g/collect?v=2&tid=G-XJ8Q4QGGRH&gtm=45je42q1v886765778z86625173za200&_p=1709086453974&gcd=13l3l3l3l1&npa=0&dma_cps=sypham&dma=1&cid=405024302.1709086455&ul=en-us&sr=1600x1200&uaa=&uab=&uafvl=&uamb=0&uam=&uap=&uapv=&uaw=0&pscdl=noapi&_s=1&sid=1709086455&sct=1&seg=0&dl=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&dt=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&en=page_view&_fv=1&_nsi=1&_ss=1&ep.asset_type=article24457&ep.asset_categories=420%2C506%2C409%2C465&ep.asset_keywords_1=Russia%2C%20APT28%2C%20Fancy%20Bear%2C%20Microsoft%2C%20relay%20attack&ep.asset_keywords_2=&ep.asset_keywords_3=&ep.asset_keywords_4=&ep.asset_keywords_5=&ep.asset_keywords_6=&ep.asset_keywords_7=&ep.asset_keywords_8=&ep.asset_keywords_9=&ep.asset_keywords_10=&tfd=2562
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=G-XJ8Q4QGGRH&l=dataLayer&cx=c
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4860:4802:34::36 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 28 Feb 2024 02:14:15 GMT
server
Golfe2
content-type
text/plain
access-control-allow-origin
https://www.bankinfosecurity.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
region1.google-analytics.com/g/
0
54 B
Ping
General
Full URL
https://region1.google-analytics.com/g/collect?v=2&tid=G-2RK1HGW2E4&gtm=45je42q1v9122981174z86625173za200&_p=1709086453974&gcd=13l3l3l2l1&npa=1&dma_cps=sypham&dma=1&cid=405024302.1709086455&ul=en-us&sr=1600x1200&ir=1&uaa=&uab=&uafvl=&uamb=0&uam=&uap=&uapv=&uaw=0&pscdl=noapi&_eu=EA&_s=1&sid=1709086455&sct=1&seg=0&dl=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&dt=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&en=page_view&_fv=1&_ss=1&tfd=2579
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=G-2RK1HGW2E4&l=dataLayer&cx=c
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4860:4802:34::36 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 28 Feb 2024 02:14:15 GMT
server
Golfe2
content-type
text/plain
access-control-allow-origin
https://www.bankinfosecurity.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
details
epsilon.6sense.com/v3/company/
721 B
715 B
XHR
General
Full URL
https://epsilon.6sense.com/v3/company/details
Requested by
Host: j.6sc.co
URL: https://j.6sc.co/6si.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.248.142.121 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ac3ff6aafb2cddae2.awsglobalaccelerator.com
Software
nginx /
Resource Hash
082fa0c79a75af418f2646c10fd835a404e731cd00837f3b1aaf5e36e014909b

Request headers

Referer
https://www.bankinfosecurity.com/
accept-language
de-DE,de;q=0.9
Authorization
Token 7207ef3e32cb3a527876a3e90b6bf51dbd9d9339
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36
X-6s-CustomID
WebTag1.0 8cde4267f2ac828e1ae5d1fbcd5ef992

Response headers

x-trace-id
4487453197257643085
date
Wed, 28 Feb 2024 02:14:15 GMT
content-encoding
gzip
server
nginx
vary
Origin, Accept-Encoding
content-type
application/json
x-6si-region
eu-central-1a
access-control-allow-origin
https://www.bankinfosecurity.com
access-control-expose-headers
X-6si-Region
access-control-allow-credentials
true
timing-allow-origin
https://6sense.com, https://www.ssga.com
content-length
388
details
epsilon.6sense.com/v3/company/ Frame
0
0
Preflight
General
Full URL
https://epsilon.6sense.com/v3/company/details
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.248.142.121 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ac3ff6aafb2cddae2.awsglobalaccelerator.com
Software
nginx /
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Headers
authorization,x-6s-customid
Access-Control-Request-Method
GET
Origin
https://www.bankinfosecurity.com
Sec-Fetch-Mode
cors
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

access-control-allow-credentials
true
access-control-allow-headers
authorization,x-6s-customid
access-control-allow-methods
OPTIONS,GET
access-control-allow-origin
https://www.bankinfosecurity.com
access-control-expose-headers
X-6si-Region
access-control-max-age
1800
date
Wed, 28 Feb 2024 02:14:15 GMT
server
nginx
timing-allow-origin
https://6sense.com, https://www.ssga.com
x-6si-region
eu-central-1a
x-trace-id
8453541476189962384
lounge.load.73089b0e9a0024b949a6fc2641b276de.js
c.disquscdn.com/next/embed/ Frame 2E2E
1 KB
1 KB
Script
General
Full URL
https://c.disquscdn.com/next/embed/lounge.load.73089b0e9a0024b949a6fc2641b276de.js
Requested by
Host: disqus.com
URL: https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&t_d=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&t_t=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&s_o=default
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:26db:e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
4a1202604992d32fe0ddb3d14c8b7150929c18abb07f692c65937c59676eaf51
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&t_d=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&t_t=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&s_o=default
Origin
https://disqus.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

x-cache-hits
0
date
Thu, 22 Feb 2024 15:19:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
via
1.1 2d22bd8fe92380401bbc1d8cc010e5a0.cloudfront.net (CloudFront)
x-amz-cf-pop
MUC50-P3
age
471295
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
631
x-xss-protection
1; mode=block
x-served-by
static-web-2
surrogate-key
next
last-modified
Thu, 22 Feb 2024 15:14:32 GMT
server
nginx
etag
"65d764d8-277"
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
timing-allow-origin
*
x-amz-cf-id
9TJ7fIAXbDAT5MaSaHN2eke2cw8oB19Gzu9YFYIxzBcOSfT5U5s2qw==
expires
Fri, 21 Feb 2025 15:19:20 GMT
ads
securepubads.g.doubleclick.net/gampad/
279 KB
38 KB
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?pvsid=2263288754734607&correlator=2335881242858237&eid=31080115&output=ldjh&gdfp_req=1&vrg=202402200101&ptt=17&impl=fifs&iu_parts=4444691%2CBIS_TOP_728x90%2CBIS_MID_RB_300x250%2CBIS_MID_RB_2_300x250%2CBIS_MID_RB_3_300x250%2CBIS_MID_RB_300x600%2CBIS_MID_L_180x150%2CBIS_MID_R_180x150%2CBIS_MID2_L_180x150%2CBIS_MID2_R_180x150%2CBIS_TEXT_1%2CBIS_TEXT_2%2CBIS_BOTTOM_728x90%2CBIS_MID_728x90%2CBIS_Interstitial%2CBIS_TOP_320x50%2CBIS_BOTTOM_320x50%2CBIS_MID_320x50%2CBIS_CAT_LOGO&enc_prev_ius=%2F0%2F1%2C%2F0%2F2%2C%2F0%2F3%2C%2F0%2F4%2C%2F0%2F5%2C%2F0%2F6%2C%2F0%2F7%2C%2F0%2F8%2C%2F0%2F9%2C%2F0%2F10%2C%2F0%2F11%2C%2F0%2F12%2C%2F0%2F13%2C%2F0%2F14%2C%2F0%2F15%2C%2F0%2F16%2C%2F0%2F17%2C%2F0%2F18&prev_iu_szs=728x90%2C300x250%2C300x250%2C300x250%2C300x600%2C180x150%2C180x150%2C180x150%2C180x150%2C280x70%2C280x70%2C728x90%2C728x90%2C640x480%2C320x50%2C320x50%2C320x50%2C216x54&ifi=1&sfv=1-0-40&sc=1&cookie_enabled=1&abxe=1&dt=1709086455362&lmt=1709086455&adxs=615%2C1025%2C1025%2C-9%2C1010%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C15%2C-9%2C-12245933%2C-12245933%2C-12245933%2C-9%2C-12245933&adys=71%2C584%2C1907%2C-9%2C1842%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C3318%2C-9%2C-12245933%2C-12245933%2C-12245933%2C-9%2C-12245933&biw=1600&bih=1200&scr_x=0&scr_y=0&btvi=0%7C0%7C1%7C-1%7C2%7C-1%7C-1%7C-1%7C-1%7C-1%7C-1%7C3%7C-1%7C-1%7C-1%7C-1%7C-1%7C-1&ucis=1%7C2%7C3%7C4%7C5%7C6%7C7%7C8%7C9%7Ca%7Cb%7Cc%7Cd%7Ce%7Cf%7Cg%7Ch%7Ci&oid=2&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&u_tz=60&dmc=8&bc=31&nvt=1&uach=WyIiLCIiLCIiLCIiLCIiLG51bGwsMCxudWxsLCIiLG51bGwsMF0.&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&vis=1&psz=800x1%7C360x0%7C360x0%7C0x-1%7C390x0%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C1600x1%7C0x-1%7C0x-1%7C0x0%7C0x0%7C0x-1%7C780x2959&msz=770x0%7C360x1%7C360x1%7C0x-1%7C390x1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C1570x0%7C0x-1%7C0x-1%7C0x0%7C0x0%7C0x-1%7C236x36&fws=0%2C0%2C0%2C2%2C0%2C2%2C2%2C2%2C2%2C2%2C2%2C0%2C2%2C644%2C128%2C128%2C2%2C128&ohw=0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C1600%2C0%2C0%2C0%2C0&ga_vid=405024302.1709086455&ga_sid=1709086455&ga_hid=103384&ga_fc=true&dlt=1709086453359&idt=1987&cust_params=category%3D%255B420%252C506%252C409%252C465%255D%26gated%3Dn&adks=606436291%2C592806581%2C4037182823%2C700692632%2C585369811%2C2214922354%2C1142555781%2C3687202745%2C1536889060%2C1397140349%2C824892936%2C1158310571%2C1554130010%2C3082656849%2C1657167512%2C3519266287%2C3120678580%2C3463778582&frm=20
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202402200101/pubads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
d21ed86bc9f483d10a6484577102d63340801e50a31f98f0935a7e69e4ff3e05
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
37932
x-xss-protection
0
google-lineitem-id
6475611354,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,6475611354,6475611354,6533843250,-2,-2,-2,-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138460893066,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,138461570770,138460893105,138466060798,-2,-2,-2,-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.bankinfosecurity.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
19f5c31a19e90d3043a464f4a45d70b3.safeframe.googlesyndication.com/safeframe/1-0-40/html/ Frame C42C
6 KB
3 KB
Document
General
Full URL
https://19f5c31a19e90d3043a464f4a45d70b3.safeframe.googlesyndication.com/safeframe/1-0-40/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202402200101/pubads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82a::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
468959e93f9b4e6f07c6a8f8d0e93d8fcb37d76a8615a93ec153f5842247ba99
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
cache-control
public, immutable, max-age=31536000
content-encoding
br
content-length
2653
content-type
text/html
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
cross-origin-resource-policy
cross-origin
date
Wed, 28 Feb 2024 02:14:15 GMT
expires
Thu, 27 Feb 2025 02:14:15 GMT
last-modified
Thu, 03 Nov 2022 19:10:08 GMT
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
server
sffe
timing-allow-origin
*
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
common.bundle.8206e89799ee4181c95ad226ce8a6edb.js
c.disquscdn.com/next/embed/ Frame 2E2E
280 KB
93 KB
Script
General
Full URL
https://c.disquscdn.com/next/embed/common.bundle.8206e89799ee4181c95ad226ce8a6edb.js
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/lounge.load.73089b0e9a0024b949a6fc2641b276de.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:26db:e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
59b27b9442ecb41e2470374f8e6ca0c3c47a83ca6bcb8473d0e8ed63f5da1c18
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&t_d=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&t_t=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&s_o=default
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

x-cache-hits
0
date
Mon, 12 Feb 2024 09:16:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
via
1.1 bc5539655ffc88be2596a0239ddfae52.cloudfront.net (CloudFront)
x-amz-cf-pop
MUC50-P3
age
1357066
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
94174
x-xss-protection
1; mode=block
x-served-by
static-web-1
surrogate-key
next
last-modified
Mon, 12 Feb 2024 09:07:21 GMT
server
nginx
etag
"65c9dfc9-16fde"
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
timing-allow-origin
*
x-amz-cf-id
rImQk7y4hVdbEiOdS2DfmEYON2HEhvw3BN8nLUTFip026Aq9HnRfbA==
expires
Tue, 11 Feb 2025 09:16:29 GMT
img.gif
b.6sc.co/v1/beacon/
43 B
485 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=6sense-temp-analytics&svisitor=null&visitor=61666340-7a0c-424e-89c1-00bcea81dca6&session=0dded946-4103-4cfb-81c0-0a0ce4851f62&event=https%3A%2F%2Fepsilon.6sense.com&q=%7B%22name%22%3A%22https%3A%2F%2Fepsilon.6sense.com%2Fv3%2Fcompany%2Fdetails%22%2C%22entryType%22%3A%22resource%22%2C%22startTime%22%3A2585.2000007629395%2C%22duration%22%3A175.5999994277954%2C%22initiatorType%22%3A%22xmlhttprequest%22%2C%22deliveryType%22%3A%22%22%2C%22nextHopProtocol%22%3A%22%22%2C%22renderBlockingStatus%22%3A%22non-blocking%22%2C%22workerStart%22%3A0%2C%22redirectStart%22%3A0%2C%22redirectEnd%22%3A0%2C%22fetchStart%22%3A2585.2000007629395%2C%22domainLookupStart%22%3A0%2C%22domainLookupEnd%22%3A0%2C%22connectStart%22%3A0%2C%22secureConnectionStart%22%3A0%2C%22connectEnd%22%3A0%2C%22requestStart%22%3A0%2C%22responseStart%22%3A0%2C%22firstInterimResponseStart%22%3A0%2C%22responseEnd%22%3A2760.800000190735%2C%22transferSize%22%3A0%2C%22encodedBodySize%22%3A0%2C%22decodedBodySize%22%3A0%2C%22responseStatus%22%3A200%2C%22serverTiming%22%3A%5B%5D%2C%22metadata%22%3A%7B%22region%22%3A%22eu-central-1a%22%7D%7D&isIframe=false&m=%7B%22endpoint%22%3A%22epsilon.6sense.com%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&pageViewId=&d=1&v=1.1.14
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-content-type-options
nosniff
content-length
43
pragma
no-cache
last-modified
Sat, 18 Feb 2023 01:45:17 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"63f02dad-2b"
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
image/gif
access-control-allow-origin
cache-control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
access-control-allow-credentials
true
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 19 Apr 2000 11:43:00 GMT
clarity.js
www.clarity.ms/s/0.7.20/
60 KB
25 KB
Script
General
Full URL
https://www.clarity.ms/s/0.7.20/clarity.js
Requested by
Host: www.clarity.ms
URL: https://www.clarity.ms/tag/i5wta0dq65
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2620:1ec:bdf::60 , United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
cbcfb303a1e7d1f9da8965565b535f4122f2de2f1f3ed9f61f3f9e2dad3dcf9d

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
content-encoding
br
last-modified
Wed, 24 Jan 2024 14:33:55 GMT
etag
W/"0x8DC1CE97EB406F9"
vary
Accept-Encoding
x-azure-ref
20240228T021415Z-h2vc552axp3491wy7pe7r95x7800000007b0000000004naf
content-type
application/javascript;charset=utf-8
access-control-allow-origin
*
x-ms-request-id
053da0a1-301e-002f-15d4-652310000000
cache-control
public, max-age=86400
x-cache
TCP_HIT
x-ms-version
2018-03-28
x-fd-int-roxy-purgeid
51562430
img.gif
t.6sc.co/ Frame F0CD
43 B
485 B
Fetch
General
Full URL
https://t.6sc.co/img.gif?event=imp&ppgid=7f716014&cb=757668061&xref=https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-content-type-options
nosniff
content-length
43
pragma
no-cache
last-modified
Tue, 05 Oct 2021 22:17:58 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"615ccf16-2b"
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
image/gif
access-control-allow-origin
cache-control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
access-control-allow-credentials
true
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 19 Apr 2000 11:43:00 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame F0CD
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjst_LgqezFTI4DtMYITNlGANA1ifUQxwkU_3-5jwoZHtxQjq6JSCsWeQSd_L6Md4j_xKjdZ8kugon06r2cuFM0yieuRXmwR8kXv0wOyjH5dmAtjAfnBQyL0e7mE3mXAsOdEjY11rqGzUH_ivCjT4SK76bab3a5YuzAVQ2j-HMfmOS_Q1UFccLvpy1qcrvFz_PlzNXUGpk9kxkQrSvBKis_2YGQHS_yr6vgd6SwjjovyDxLisLaB9kXiv30D9EzYgoRJt77z2yOqKtZLqP7UdRlY7oNuzKzqFkTOYygVhNCwxcvvADTfe3Ecc75u69Bcd4J-NMFmpGh_KHdsvVATOTAl1Y9c7T9m1-F7-XFxTVLZ2&sai=AMfl-YSgEOXaSGgbltGdDIb9s0QnJaUFts_2KRcZdC9IKJKc3ozzHvVYdPPTLgy0e0bbxJoWl-qxmvpBcWUwajz0jL_CeK0HUIOTkE6M2-pXp9UoRp5XAmK0MDnYVoJEXKKexHhal8lIjOk3z-llwL-kaQs&sig=Cg0ArKJSzMDoB-z1undTEAE&uach_m=%5BUACH%5D&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-WoW64
server
cafe
content-type
image/gif
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cache-control
private
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Wed, 28 Feb 2024 02:14:15 GMT
abg_lite_fy2021.js
tpc.googlesyndication.com/pagead/js/r20240226/r20110914/ Frame F0CD
23 KB
9 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20240226/r20110914/abg_lite_fy2021.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202402200101/pubads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
8a33861cdc370b2db8442132658b06069640881bc90f369feca9b30c77e5f460
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Tue, 27 Feb 2024 22:05:30 GMT
content-encoding
br
x-content-type-options
nosniff
age
14925
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
8947
x-xss-protection
0
server
cafe
etag
12299188824252842506
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Tue, 12 Mar 2024 22:05:30 GMT
window_focus_fy2021.js
tpc.googlesyndication.com/pagead/js/r20240226/r20110914/client/ Frame F0CD
3 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20240226/r20110914/client/window_focus_fy2021.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202402200101/pubads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
3164db7ef9efc7121ce85192340a653c6cb87e34caa05849c8fd47b7872f9fc5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Tue, 27 Feb 2024 22:05:30 GMT
content-encoding
br
x-content-type-options
nosniff
age
14925
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
1236
x-xss-protection
0
server
cafe
etag
15004572836499977866
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Tue, 12 Mar 2024 22:05:30 GMT
ufs_web_display.js
pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ Frame F0CD
207 KB
63 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202402200101/pubads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
bc7efecace0085173f1ee9971a7094a6ed99c5c9489afc6d62c5546e16377861
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 01:48:15 GMT
content-encoding
br
x-content-type-options
nosniff
age
1560
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
64043
x-xss-protection
0
server
cafe
etag
vary
Accept-Encoding
content-type
text/javascript; charset=ISO-8859-1
cache-control
public, max-age=3600, stale-while-revalidate=3600
timing-allow-origin
*
expires
Wed, 28 Feb 2024 02:48:15 GMT
4351042334766601323
tpc.googlesyndication.com/simgad/ Frame F0CD
38 KB
38 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/4351042334766601323
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202402200101/pubads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1fdc574df317e2487663416adfd79a13394b9cefb07fc780ef70e49c9a4441aa
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

expires
Wed, 26 Feb 2025 09:07:52 GMT
date
Tue, 27 Feb 2024 09:07:52 GMT
x-content-type-options
nosniff
age
61583
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
39183
x-xss-protection
0
last-modified
Thu, 11 Jan 2024 13:24:52 GMT
server
sffe
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
allow-fenced-frame-automatic-beacons
true
img.gif
t.6sc.co/ Frame 0135
43 B
485 B
Fetch
General
Full URL
https://t.6sc.co/img.gif?event=imp&ppgid=7f716014&cb=1696574970&xref=https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-content-type-options
nosniff
content-length
43
pragma
no-cache
last-modified
Sat, 18 Feb 2023 00:49:41 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"63f020a5-2b"
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
image/gif
access-control-allow-origin
cache-control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
access-control-allow-credentials
true
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 19 Apr 2000 11:43:00 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 0135
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsujBeJlR4LCZ5QA40Y5RG8hRW6Ko9V8zNfJCCppSm-aGfN1t_wFjIyLAK4dfoEnNt0UjHBeXGn9Nn8kSqaU5HYJ4MEjK8FcBvtwy0scVcxz7_Iu5gLLxo5fQqPKXcv-IrSzjT-zFbDcy3gIpko1nVJM6Fq2DuS_8n1VKg6sPoY8ep1C8yVNyxIHi56M5OUSnUyuuyhJhm6O1h2e-FfJs1dZnEfH1pTHxRNP6qSCaHhuXvsSg2rRDyFju5IocFH44152mTc81GDX2e8tzj8Se4d2ZaD6q-N6Yle8Aqg_88EwkPcvjsnpMOfTctEul135pkObYKAVB2-n3hECCygL28mmAaGlAS-UdQP23yzux5J1FI5l&sai=AMfl-YRE5Ymi5ZVC-EQelrhbvIH3XRIIz28aesPcZj-yjuy7G7onJr89t0GE1zfJWFIdYzcF-weeO2pNMjSsOc_nRBpDX3fXtf1C5MEB25I7tEi0m3dN9hoe05lv-AlSHEmruKQrwopA9iMdL_9gsqnPHFw&sig=Cg0ArKJSzE1HZomCZaoBEAE&uach_m=%5BUACH%5D&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-WoW64
server
cafe
content-type
image/gif
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cache-control
private
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Wed, 28 Feb 2024 02:14:15 GMT
4351042334766601323
tpc.googlesyndication.com/simgad/ Frame 0135
38 KB
39 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/4351042334766601323
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202402200101/pubads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1fdc574df317e2487663416adfd79a13394b9cefb07fc780ef70e49c9a4441aa
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

expires
Wed, 26 Feb 2025 09:07:52 GMT
date
Tue, 27 Feb 2024 09:07:52 GMT
x-content-type-options
nosniff
age
61583
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
39183
x-xss-protection
0
last-modified
Thu, 11 Jan 2024 13:24:52 GMT
server
sffe
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
allow-fenced-frame-automatic-beacons
true
abg_lite_fy2021.js
tpc.googlesyndication.com/pagead/js/r20240226/r20110914/ Frame 0135
23 KB
9 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20240226/r20110914/abg_lite_fy2021.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202402200101/pubads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
8a33861cdc370b2db8442132658b06069640881bc90f369feca9b30c77e5f460
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Tue, 27 Feb 2024 22:05:30 GMT
content-encoding
br
x-content-type-options
nosniff
age
14925
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
8947
x-xss-protection
0
server
cafe
etag
12299188824252842506
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Tue, 12 Mar 2024 22:05:30 GMT
window_focus_fy2021.js
tpc.googlesyndication.com/pagead/js/r20240226/r20110914/client/ Frame 0135
3 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20240226/r20110914/client/window_focus_fy2021.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202402200101/pubads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
3164db7ef9efc7121ce85192340a653c6cb87e34caa05849c8fd47b7872f9fc5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Tue, 27 Feb 2024 22:05:30 GMT
content-encoding
br
x-content-type-options
nosniff
age
14925
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
1236
x-xss-protection
0
server
cafe
etag
15004572836499977866
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Tue, 12 Mar 2024 22:05:30 GMT
ufs_web_display.js
pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ Frame 0135
207 KB
63 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202402200101/pubads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
bc7efecace0085173f1ee9971a7094a6ed99c5c9489afc6d62c5546e16377861
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 01:48:15 GMT
content-encoding
br
x-content-type-options
nosniff
age
1560
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
64043
x-xss-protection
0
server
cafe
etag
vary
Accept-Encoding
content-type
text/javascript; charset=ISO-8859-1
cache-control
public, max-age=3600, stale-while-revalidate=3600
timing-allow-origin
*
expires
Wed, 28 Feb 2024 02:48:15 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame FD98
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstu42j3yHJbbsaJkguGH-JNtf1WOseDA1K9mF_fZxB6xejvQCWfVCDw-ruZAQD5ydyTRF6gdEIQCvDl_4iRGRicgJl3UWbbJkUQTBXQ2dF9qlSUq8cCYHrpAYJZzIkAUEU5xnx4ByaSkadallrqpj6dyBgbXySWIq-DT2tyU--JyPleg54T8l-obrIhUCtEBtKZE709hVwkecW7qh6ANJQv55UQdE2mS-Kx0t3oMwI2gRYI3AneX1AyaClB-s_Hgj6WTnnDl3VRAL2JhWyfxG0Jhf-bxRFwzFvnckJ9rigbnY_lsrQoI7bT7mt-BrxSgfFAjeyYGvejCYIWciNkXnU4UHAreUlraAbIE_ajsOfcRBg&sai=AMfl-YTqLZRnZpsXoLkw7Lxv6RnQ0iEZVdNZVAlB3UDXdI28tEEgWK1VfmVn7GOM53EqTd6IbkGuSmlcljZ1pNoN3dKUCHsibbRXbP81_naOqqaGchJDsudoClSwSu-uYCXkY76tYVk6owulgWhDdP3pqz8&sig=Cg0ArKJSzI0HyKAX8iiJEAE&uach_m=%5BUACH%5D&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-WoW64
server
cafe
content-type
image/gif
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cache-control
private
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Wed, 28 Feb 2024 02:14:15 GMT
abg_lite_fy2021.js
tpc.googlesyndication.com/pagead/js/r20240226/r20110914/ Frame FD98
23 KB
9 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20240226/r20110914/abg_lite_fy2021.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202402200101/pubads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
8a33861cdc370b2db8442132658b06069640881bc90f369feca9b30c77e5f460
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Tue, 27 Feb 2024 22:05:30 GMT
content-encoding
br
x-content-type-options
nosniff
age
14925
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
8947
x-xss-protection
0
server
cafe
etag
12299188824252842506
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Tue, 12 Mar 2024 22:05:30 GMT
window_focus_fy2021.js
tpc.googlesyndication.com/pagead/js/r20240226/r20110914/client/ Frame FD98
3 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20240226/r20110914/client/window_focus_fy2021.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202402200101/pubads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
3164db7ef9efc7121ce85192340a653c6cb87e34caa05849c8fd47b7872f9fc5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Tue, 27 Feb 2024 22:05:30 GMT
content-encoding
br
x-content-type-options
nosniff
age
14925
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
1236
x-xss-protection
0
server
cafe
etag
15004572836499977866
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Tue, 12 Mar 2024 22:05:30 GMT
ufs_web_display.js
pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ Frame FD98
207 KB
63 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202402200101/pubads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
bc7efecace0085173f1ee9971a7094a6ed99c5c9489afc6d62c5546e16377861
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 01:48:15 GMT
content-encoding
br
x-content-type-options
nosniff
age
1560
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
64043
x-xss-protection
0
server
cafe
etag
vary
Accept-Encoding
content-type
text/javascript; charset=ISO-8859-1
cache-control
public, max-age=3600, stale-while-revalidate=3600
timing-allow-origin
*
expires
Wed, 28 Feb 2024 02:48:15 GMT
1120823102541427678
tpc.googlesyndication.com/simgad/ Frame FD98
45 KB
45 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/1120823102541427678
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202402200101/pubads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5da772b22bed110af10724bc11ef610a89b50e3cf19e2cc23f91100afe3e1819
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

expires
Wed, 26 Feb 2025 09:50:43 GMT
date
Tue, 27 Feb 2024 09:50:43 GMT
x-content-type-options
nosniff
age
59012
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
46178
x-xss-protection
0
last-modified
Fri, 23 Feb 2024 03:58:50 GMT
server
sffe
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
allow-fenced-frame-automatic-beacons
true
truncated
/ Frame F0CD
211 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a6b05fdaef67f0fe5a1f7a98d66fcff01c59b1595b1a302e401806dc1cf97ece

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 0135
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c84aa181bddb618ff63d9739a7f7062bc09861c22cd8cb2b338b0fe66dc92568

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Content-Type
image/png
visitWebPage
051-zxi-237.mktoresp.com/webevents/
2 B
318 B
Ping
General
Full URL
https://051-zxi-237.mktoresp.com/webevents/visitWebPage?_mchNc=1709086455584&_mchCn=&_mchId=051-ZXI-237&_mchTk=_mch-bankinfosecurity.com-1709086455583-21557&_mchHo=www.bankinfosecurity.com&_mchPo=&_mchRu=%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&_mchPc=https%3A&_mchVr=163&_mchEcid=&_mchHa=&_mchRe=&_mchQp=
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/163/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.28.147.68 , United States, ASN15224 (OMNITURE, US),
Reverse DNS
Software
nginx/1.20.1 /
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:16 GMT
Content-Encoding
gzip
Server
nginx/1.20.1
Transfer-Encoding
chunked
Content-Type
text/plain; charset=UTF-8
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Request-Id
8cfc34bb-1011-4c16-b573-eed8c35e81d7
visitWebPage
051-zxi-237.mktoresp.com/webevents/
2 B
318 B
Ping
General
Full URL
https://051-zxi-237.mktoresp.com/webevents/visitWebPage?_mchNc=1709086455584&_mchRu=%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&_mchQp=cat%3D420%26cat%3D506%26cat%3D409%26cat%3D465%26assetID%3D24457%26assetType%3Darticle%26key%3Drussia%26key%3Dapt28%26key%3Dfancy%20bear%26key%3Dmicrosoft%26key%3Drelay%20attack%26key%3D&_mchId=051-ZXI-237&_mchTk=_mch-bankinfosecurity.com-1709086455583-21557&_mchHo=www.bankinfosecurity.com&_mchPo=&_mchPc=https%3A&_mchVr=163&_mchEcid=&_mchRe=
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/163/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.28.147.68 , United States, ASN15224 (OMNITURE, US),
Reverse DNS
Software
nginx/1.20.1 /
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:16 GMT
Content-Encoding
gzip
Server
nginx/1.20.1
Transfer-Encoding
chunked
Content-Type
text/plain; charset=UTF-8
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Request-Id
14000277-aed6-4b3c-94f0-0c7637c8d97c
lounge.20aeaf1ce78e43e05e713a3d26336e90.css
c.disquscdn.com/next/embed/styles/ Frame 2E2E
235 KB
33 KB
Stylesheet
General
Full URL
https://c.disquscdn.com/next/embed/styles/lounge.20aeaf1ce78e43e05e713a3d26336e90.css
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/common.bundle.8206e89799ee4181c95ad226ce8a6edb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:26db:e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
ff6aa98f91f0a86e601f989acfeaf922d35a4adb36f73f1b0bf54c24e848408a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&t_d=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&t_t=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&s_o=default
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

x-cache-hits
0
date
Tue, 20 Feb 2024 09:11:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
via
1.1 bc5539655ffc88be2596a0239ddfae52.cloudfront.net (CloudFront)
x-amz-cf-pop
MUC50-P3
age
666160
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
33487
x-xss-protection
1; mode=block
x-served-by
static-web-1
surrogate-key
next
last-modified
Mon, 19 Feb 2024 05:03:30 GMT
server
nginx
etag
"65d2e122-82cf"
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
timing-allow-origin
*
x-amz-cf-id
vVI850p7CvaWSwnATnUuLfBO_lobOOX0B6Do2ABylmkhDlGEzwcdqQ==
expires
Wed, 19 Feb 2025 09:11:35 GMT
lounge.bundle.11603433e00d5475a79bfe963de47003.js
c.disquscdn.com/next/embed/ Frame 2E2E
514 KB
129 KB
Script
General
Full URL
https://c.disquscdn.com/next/embed/lounge.bundle.11603433e00d5475a79bfe963de47003.js
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/common.bundle.8206e89799ee4181c95ad226ce8a6edb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:26db:e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
69d9112f6529b5ec8ef1bf638197e85b71827d511bb5b51a108231ca49898bff
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&t_d=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&t_t=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&s_o=default
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

x-cache-hits
0
date
Thu, 22 Feb 2024 15:19:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
via
1.1 bc5539655ffc88be2596a0239ddfae52.cloudfront.net (CloudFront)
x-amz-cf-pop
MUC50-P3
age
471294
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
131292
x-xss-protection
1; mode=block
x-served-by
static-web-2
surrogate-key
next
last-modified
Thu, 22 Feb 2024 15:14:32 GMT
server
nginx
etag
"65d764d8-200dc"
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
timing-allow-origin
*
x-amz-cf-id
6kMqN7Kook3FlH-VSwsdOC31XRwvWh6RQOAp-cl9Sa4SxKIZFeRRXQ==
expires
Fri, 21 Feb 2025 15:19:21 GMT
config.js
disqus.com/next/ Frame 2E2E
19 KB
20 KB
Script
General
Full URL
https://disqus.com/next/config.js
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/common.bundle.8206e89799ee4181c95ad226ce8a6edb.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
151.101.64.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
0592762c58abc38317866e587d12a455a504ba23d35fa07773ae91218746ebf8
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&t_d=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&t_t=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&s_o=default
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:15 GMT
Strict-Transport-Security
max-age=300; includeSubdomains
X-Content-Type-Options
nosniff
Server
nginx
Age
35
X-Frame-Options
SAMEORIGIN
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Access-Control-Allow-Origin
*
Content-Type
application/javascript; charset=UTF-8
Cache-Control
public, stale-while-revalidate=300, s-stalewhilerevalidate=3600, max-age=60
Cross-Origin-Resource-Policy
cross-origin
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
19475
X-XSS-Protection
1; mode=block
collect
v.clarity.ms/
0
304 B
XHR
General
Full URL
https://v.clarity.ms/collect
Requested by
Host: www.clarity.ms
URL: https://www.clarity.ms/s/0.7.20/clarity.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
20.114.189.135 Boydton, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
nginx/1.18.0 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept
application/x-clarity-gzip
Referer
https://www.bankinfosecurity.com/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Access-Control-Allow-Origin
https://www.bankinfosecurity.com
Date
Wed, 28 Feb 2024 02:14:16 GMT
Access-Control-Allow-Credentials
true
Server
nginx/1.18.0 (Ubuntu)
Connection
keep-alive
Vary
Origin
Request-Context
appId=cid-v1:3f60b293-70d6-4805-b0bb-3484f0a73bf0
details
disqus.com/api/3.0/forums/ Frame 2E2E
3 KB
4 KB
XHR
General
Full URL
https://disqus.com/api/3.0/forums/details?forum=bankinfosecurity&attach=forumFeatures&api_key=E8Uh5l5fHZ6gD8U3KycjAIAk46f68Zw7C6eW8WSjZvCLXebZ7p0r1yrYDrLilk2F
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/common.bundle.8206e89799ee4181c95ad226ce8a6edb.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
151.101.64.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
b39c86a45b38fff2a5d9391eb98c48d0edaa0d938e15dbebc2cf735d7c9815ca
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
*/*
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&t_d=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&t_t=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&s_o=default
X-Requested-With
XMLHttpRequest
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:15 GMT
Strict-Transport-Security
max-age=300; includeSubdomains
X-Content-Type-Options
nosniff
Server
nginx
Age
58
X-Frame-Options
SAMEORIGIN
Vary
Origin, Cookie
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Content-Type
application/json
Cross-Origin-Resource-Policy
cross-origin
Connection
keep-alive
Content-Length
3158
X-XSS-Protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame F0CD
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssMkidh0KruMjVvGTDwu2NjgOvYzTgDH7DZYIeDlPDaUKAURiwX7A6NrUwTWjX3yrWzB5lQVE4RN0vdkF9kJeoedIA1l1NlqFE7zKeqmwc3-HxZT-274OxFr3d7Jp4TdDnsHAR9GD9lnrP16lzHwID3Hp9YhZKsmiZ-Xnj2Rf84psmrJk-_-liF0rxWJxco8JtJmpNpPshvC-UgfFP7vsG52Lsdjdesx-pyOiRw4dW4cNocsSCWmgSs_8MIcd0jOZy6df5F8v3jxl068rUHOScEXheEFoTB5nf8voZfXw0OJPpBsBrBhBmHaPe1t92lQv5y6Gvzb_YaJaN7r9StdsCF7NZfbfwPLS5SIYZFKRi9WrU&sai=AMfl-YTt0nJ64zRtOg2vTcwjvq6yYlK2pK01phI9L7WpXs0covXYXyvzeHFmEDay5nwpwwjHHEK1BXGtlGw8ho6WHxXbQmjgBQJUGCiFENehDFMS0iamd_OmqnBatIOL5j9gVRvxMJTjXV7xfszP0wWkJvs&sig=Cg0ArKJSzEBF2S2Xw1zWEAE&uach_m=%5BUACH%5D&adurl=
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-WoW64
server
cafe
content-type
image/gif
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cache-control
private
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Wed, 28 Feb 2024 02:14:15 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 0135
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuKrNLY-lXzMX-6WfQqveHDw9K68c4QeQeewKF-NagVcIN4dmLkFGLX8M7bsjxxktbLGv1NaE363vyzE_7gXaOwgXp0gUGNZgQYY_tMJ_AZQcq4yFHK24R-ScPhsSxmOq7v14MMPnY9dVXFJ86yEQ3Rh7PK9bTPNyBL2OhJ56Ec3kQKjOjdJZQs4ZytC4ublqjwpm3a8FL_gkRiUHetxy9nQqGwHf-2luATHvE0joRfPiMk79ASos2NY-fD9V_k9rOxtGPub-s97xz7r_7zlwi_yHZW3Ffsl0qqfiCLHfvYMSljDADDcgBFze3VkBc5SaIfVnIJQ_NUB5ec0QS03JqV8ZyuMrUacpytGI-p-ctQPepz5uc&sai=AMfl-YRWhVbPm7q4kBtq1kVcc6c6xV_oCPVdRuXqrt0QcHH_tBvAB3YDHIb-Gg5TVL61no4B0XvaMHTm7QYmRiDK7VI559zz2DWU54rMLXQeT8sp0W-jRY3qiYbJrOFPddg3pvBrxmSWDQFs79n-gcwOblM&sig=Cg0ArKJSzFK-ttOTZpXKEAE&uach_m=%5BUACH%5D&adurl=
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-WoW64
server
cafe
content-type
image/gif
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cache-control
private
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Wed, 28 Feb 2024 02:14:15 GMT
css2
fonts.googleapis.com/ Frame 2E2E
11 KB
994 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css2?family=Roboto:ital,wght@0,400;0,500;0,600;0,700;1,400;1,700&display=swap
Requested by
Host: client
URL: about:client
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80f::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
7dd43d1e52f57a1b70d8100f287348147524859f631b3bb0de03ade37213786f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&t_d=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&t_t=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&s_o=default
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
date
Wed, 28 Feb 2024 02:14:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
x-xss-protection
0
last-modified
Wed, 28 Feb 2024 00:51:21 GMT
server
ESF
cross-origin-opener-policy
same-origin-allow-popups
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Wed, 28 Feb 2024 02:14:15 GMT
threadDetails.json
disqus.com/api/3.0/embed/ Frame 2E2E
36 B
463 B
XHR
General
Full URL
https://disqus.com/api/3.0/embed/threadDetails.json?thread=10100628566&api_key=E8Uh5l5fHZ6gD8U3KycjAIAk46f68Zw7C6eW8WSjZvCLXebZ7p0r1yrYDrLilk2F
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/common.bundle.8206e89799ee4181c95ad226ce8a6edb.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
151.101.64.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
89f4889eebc36f4ad79abb20ba84c4e8b0dac9bce1c0dfbe779ac8d5022572bd
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
*/*
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&t_d=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&t_t=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&s_o=default
X-Requested-With
XMLHttpRequest
X-Disqus-Publisher-API-Key
kgLGW0evKY3stsTyDzF6Uv5Etlrt7MzZ7AWQESkvyZPev49GJCrbtByseVYlfQj6
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36
X-Disqus-Remote-Auth
W10= 754658cd74f0027c11db50c74b37e950771342e1 1709086366

Response headers

Date
Wed, 28 Feb 2024 02:14:16 GMT
Strict-Transport-Security
max-age=300; includeSubdomains
X-Content-Type-Options
nosniff
Server
nginx
X-Frame-Options
SAMEORIGIN
Vary
Origin, Cookie
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Content-Type
application/json
Cross-Origin-Resource-Policy
cross-origin
Connection
keep-alive
Content-Length
36
X-XSS-Protection
1; mode=block
disqus-sso-login.png
www.bankinfosecurity.com/images/ Frame 2E2E
4 KB
4 KB
Image
General
Full URL
https://www.bankinfosecurity.com/images/disqus-sso-login.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
c15d7c72b50d4cad5e7a1fcbd75c78ded4c75eaf3ec382783a1903f88e6db1cf
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&t_d=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&t_t=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&s_o=default
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
strict-transport-security
max-age=31536000; includeSubDomains; preload
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:49 GMT
x-frame-options
deny
content-type
image/png
cache-control
max-age=86400, private, must-revalidate
accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000
content-length
4222
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame FD98
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv5dnuyTU541bKljjSgOK7ojqtpcG9I94YXfqdhMScuN6RicJGnuPsEfIlnHrwX1PILpWBi-wRK8du4UxDt7IhS3h944jBMuwzIFG3sCSWoaHGfwdXbA6aU6ben7SP49jjEcjKVz2B0RnybFSKAS64kdZzAhagKvCu54G0_pRLu84VYcWDLlTdnivwtId6BLYd1Ru4jNn6-4H4rWz1YjLXJ_JKVRY2Fu5pJplM-bOmzKw5CqA4Ri0Rjp3KfQ-HNqo7mF4dlXaY039A74J7iG5FGW1POQr5Vqadf0Dksl411F9yQ4dvJAWSZLw5V8Va3LauVQlk4F22Z-JlP0-YvqKq4YC62tVpRyiHQxJTsFDYU0g99kw&sai=AMfl-YSeZKvMnvuzjswCi8JKueS6oNa6-ffELEwWXi1PqTLEXiHxSDbPu2fPXBMb8-YvuqhmlWYeiiMN6oUnpbutc5apCY1LgJHX0PIVzMZPD7EokmmNOOq8TyG_9JF7Duwu1YY94txMA-wHYoIll82mgL8&sig=Cg0ArKJSzIDTMGsqTJQOEAE&uach_m=%5BUACH%5D&adurl=
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:15 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-WoW64
server
cafe
content-type
image/gif
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cache-control
private
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Wed, 28 Feb 2024 02:14:15 GMT
svg-sprite.6d7ccb1c98b314b20422a2c2f0497a7f.svg
c.disquscdn.com/next/embed/assets/img/ Frame 2E2E
13 KB
14 KB
Image
General
Full URL
https://c.disquscdn.com/next/embed/assets/img/svg-sprite.6d7ccb1c98b314b20422a2c2f0497a7f.svg
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/styles/lounge.20aeaf1ce78e43e05e713a3d26336e90.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:26db:e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
973329cbeaebf60b87a29ec5651af3302c3cdc4c3dd610bf18b6ff346087428a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://c.disquscdn.com/next/embed/styles/lounge.20aeaf1ce78e43e05e713a3d26336e90.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

x-cache-hits
0
date
Tue, 30 Jan 2024 18:41:19 GMT
via
1.1 bc5539655ffc88be2596a0239ddfae52.cloudfront.net (CloudFront)
x-content-type-options
nosniff
x-amz-cf-pop
MUC50-P3
age
2446376
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
13540
x-xss-protection
1; mode=block
x-served-by
static-web-1
surrogate-key
next
last-modified
Tue, 30 Jan 2024 16:48:51 GMT
server
nginx
etag
"65b92873-34e4"
content-type
image/svg+xml; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
kBAI7lOqLZGeJPUJFsuvqd3nLJP3zNdO_SJ-DpbRhZOS5k4kwj9o2A==
expires
Wed, 29 Jan 2025 18:41:19 GMT
loader.ba7c86e8b4b6135bb668d05223f8f127.gif
c.disquscdn.com/next/embed/assets/img/ Frame 2E2E
3 KB
3 KB
Image
General
Full URL
https://c.disquscdn.com/next/embed/assets/img/loader.ba7c86e8b4b6135bb668d05223f8f127.gif
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/styles/lounge.20aeaf1ce78e43e05e713a3d26336e90.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:26db:e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
4c4491dcfa94cb46fb73742fc2caf49a1cd59027304af1830c7dc6ce1889857c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://c.disquscdn.com/next/embed/styles/lounge.20aeaf1ce78e43e05e713a3d26336e90.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

x-cache-hits
0
date
Sun, 20 Aug 2023 12:05:10 GMT
via
1.1 bc5539655ffc88be2596a0239ddfae52.cloudfront.net (CloudFront)
x-content-type-options
nosniff
x-amz-cf-pop
MUC50-P3
age
16553345
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
2971
x-xss-protection
1; mode=block
x-served-by
static-web-2
surrogate-key
next
last-modified
Wed, 02 Aug 2023 23:18:56 GMT
server
nginx
etag
"64cae460-b9b"
content-type
image/gif
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
0okalpxLnSadS6cYkHfA8aoRU5t8uxIa00Sm9VA0W7YX56_9zltbcA==
expires
Mon, 19 Aug 2024 12:05:10 GMT
email.727e30eb9b6c1e85cb010b9c8eb04c7e.svg
c.disquscdn.com/next/embed/assets/img/ Frame 2E2E
840 B
1 KB
Image
General
Full URL
https://c.disquscdn.com/next/embed/assets/img/email.727e30eb9b6c1e85cb010b9c8eb04c7e.svg
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/styles/lounge.20aeaf1ce78e43e05e713a3d26336e90.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:26db:e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
0589c5845288117448d7aa710af60618b151d78efd1a2653f89a0b57f7eb3de8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://c.disquscdn.com/next/embed/styles/lounge.20aeaf1ce78e43e05e713a3d26336e90.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

x-cache-hits
0
date
Thu, 21 Sep 2023 03:03:24 GMT
via
1.1 bc5539655ffc88be2596a0239ddfae52.cloudfront.net (CloudFront)
x-content-type-options
nosniff
x-amz-cf-pop
MUC50-P3
age
13821050
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
840
x-xss-protection
1; mode=block
x-served-by
static-web-2
surrogate-key
next
last-modified
Wed, 20 Sep 2023 10:55:06 GMT
server
nginx
etag
"650acf8a-348"
content-type
image/svg+xml; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
S4ebFJ47XDIVxJ-yftueFfcHTT3Ug7zI0A03D2XQjI2GgNvscS9fTw==
expires
Fri, 20 Sep 2024 03:03:24 GMT
privacy.8c96be6b50de1c3fab838c5f050e0be5.svg
c.disquscdn.com/next/embed/assets/img/ Frame 2E2E
891 B
1 KB
Image
General
Full URL
https://c.disquscdn.com/next/embed/assets/img/privacy.8c96be6b50de1c3fab838c5f050e0be5.svg
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/styles/lounge.20aeaf1ce78e43e05e713a3d26336e90.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:26db:e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
068753b8f09b32ad8a3283199c7252090d0076a56924df724dda72828ae31b95
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://c.disquscdn.com/next/embed/styles/lounge.20aeaf1ce78e43e05e713a3d26336e90.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

x-cache-hits
0
date
Fri, 12 May 2023 01:14:12 GMT
via
1.1 bc5539655ffc88be2596a0239ddfae52.cloudfront.net (CloudFront)
x-content-type-options
nosniff
x-amz-cf-pop
MUC50-P3
age
25232403
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
891
x-xss-protection
1; mode=block
x-served-by
static-web-2
surrogate-key
next
last-modified
Tue, 09 May 2023 18:32:30 GMT
server
nginx
etag
"645a91be-37b"
content-type
image/svg+xml; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
SiZFxNmvz1ES_eFneVJgZ9lE8DSm5hM4Iw7C7QSdUTtJhIsldcnVNw==
expires
Sat, 11 May 2024 01:14:12 GMT
warning.3bc0b4bff6c268a4ceaf404014b9be42.svg
c.disquscdn.com/next/embed/assets/img/ Frame 2E2E
605 B
1 KB
Image
General
Full URL
https://c.disquscdn.com/next/embed/assets/img/warning.3bc0b4bff6c268a4ceaf404014b9be42.svg
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/styles/lounge.20aeaf1ce78e43e05e713a3d26336e90.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:26db:e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
a657bedd3bc0c106f7cfa5fe6556a0b7e175870d33bd7da9ef67ffcffbafda69
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://c.disquscdn.com/next/embed/styles/lounge.20aeaf1ce78e43e05e713a3d26336e90.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

x-cache-hits
0
date
Thu, 11 Jan 2024 04:39:35 GMT
via
1.1 bc5539655ffc88be2596a0239ddfae52.cloudfront.net (CloudFront)
x-content-type-options
nosniff
x-amz-cf-pop
MUC50-P3
age
4138480
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
605
x-xss-protection
1; mode=block
x-served-by
static-web-2
surrogate-key
next
last-modified
Mon, 08 Jan 2024 22:12:55 GMT
server
nginx
etag
"659c7367-25d"
content-type
image/svg+xml; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
nY_PSfywILxqNmdxwbGdlkOu-VQCDUcVwIbWiZ6OyBuLv3Ol1I9tMw==
expires
Fri, 10 Jan 2025 04:39:35 GMT
sprite.ad630a07080a45451f139a7487853ff8.png
c.disquscdn.com/next/embed/assets/img/ Frame 2E2E
2 KB
2 KB
Image
General
Full URL
https://c.disquscdn.com/next/embed/assets/img/sprite.ad630a07080a45451f139a7487853ff8.png
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/styles/lounge.20aeaf1ce78e43e05e713a3d26336e90.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:26db:e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
9714221c828961b20f45a782c3281c0596f6652cfe1299bee18097f98e8fb7b3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://c.disquscdn.com/next/embed/styles/lounge.20aeaf1ce78e43e05e713a3d26336e90.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

x-cache-hits
0
date
Mon, 24 Jul 2023 12:53:27 GMT
via
1.1 bc5539655ffc88be2596a0239ddfae52.cloudfront.net (CloudFront)
x-content-type-options
nosniff
x-amz-cf-pop
MUC50-P3
age
18883248
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
1763
x-xss-protection
1; mode=block
x-served-by
static-web-1
surrogate-key
next
last-modified
Wed, 12 Jul 2023 14:04:56 GMT
server
nginx
etag
"64aeb308-6e3"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
JD7i3wqn_MpUk0_b4ik644f5xl4u5Iex-OPBCb1uRSgWWwmFoF7yfw==
expires
Tue, 23 Jul 2024 12:53:27 GMT
icons.79e576f9489bae308388e5b8e250aa86.woff2
c.disquscdn.com/next/embed/assets/font/ Frame 2E2E
8 KB
9 KB
Font
General
Full URL
https://c.disquscdn.com/next/embed/assets/font/icons.79e576f9489bae308388e5b8e250aa86.woff2
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/styles/lounge.20aeaf1ce78e43e05e713a3d26336e90.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:26db:e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
8dc675da542f629aca965669b35900a5ed0685f4d87dce9eac4660baf4493687
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://c.disquscdn.com/next/embed/styles/lounge.20aeaf1ce78e43e05e713a3d26336e90.css
Origin
https://disqus.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

x-cache-hits
0
date
Wed, 06 Dec 2023 19:49:42 GMT
via
1.1 2d22bd8fe92380401bbc1d8cc010e5a0.cloudfront.net (CloudFront)
x-content-type-options
nosniff
x-amz-cf-pop
MUC50-P3
age
7194273
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
8216
x-xss-protection
1; mode=block
x-served-by
static-web-1
surrogate-key
next
last-modified
Wed, 06 Dec 2023 19:40:12 GMT
server
nginx
etag
"6570ce1c-2018"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
SCwKt8Poz3tCTwMH4R-a26lRIQXoGmYIHj1HA2sp-CKEXW5-9rLBSg==
expires
Thu, 05 Dec 2024 19:49:42 GMT
realtime.b23ff3c36dd0169627f8e54ca1621eca.css
c.disquscdn.com/next/embed/styles/ Frame F046
337 B
840 B
Stylesheet
General
Full URL
https://c.disquscdn.com/next/embed/styles/realtime.b23ff3c36dd0169627f8e54ca1621eca.css
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:26db:e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
c284dcb06ef882b1b45e11e0a16baa223b4117eca94e243c8e725c4ce3f909b3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

x-cache-hits
0
date
Wed, 20 Sep 2023 17:08:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
via
1.1 bc5539655ffc88be2596a0239ddfae52.cloudfront.net (CloudFront)
x-amz-cf-pop
MUC50-P3
age
13856768
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
244
x-xss-protection
1; mode=block
x-served-by
static-web-1
surrogate-key
next
last-modified
Wed, 20 Sep 2023 10:55:06 GMT
server
nginx
etag
"650acf8a-f4"
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
timing-allow-origin
*
x-amz-cf-id
NUtbzofjpTLCquAFnBL1vRRfvXx2QZOGcIYWz8VyO8eiTfcm64iWYA==
expires
Thu, 19 Sep 2024 17:08:07 GMT
realtime.b23ff3c36dd0169627f8e54ca1621eca.css
c.disquscdn.com/next/embed/styles/ Frame 1B4D
337 B
839 B
Stylesheet
General
Full URL
https://c.disquscdn.com/next/embed/styles/realtime.b23ff3c36dd0169627f8e54ca1621eca.css
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:26db:e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
c284dcb06ef882b1b45e11e0a16baa223b4117eca94e243c8e725c4ce3f909b3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

x-cache-hits
0
date
Wed, 20 Sep 2023 17:08:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
via
1.1 bc5539655ffc88be2596a0239ddfae52.cloudfront.net (CloudFront)
x-amz-cf-pop
MUC50-P3
age
13856768
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
244
x-xss-protection
1; mode=block
x-served-by
static-web-1
surrogate-key
next
last-modified
Wed, 20 Sep 2023 10:55:06 GMT
server
nginx
etag
"650acf8a-f4"
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
timing-allow-origin
*
x-amz-cf-id
fGJY1vkhjar5KA-dFsYKoj0NkJsuWC5916sBVws6NlXaA5ggEhAiYg==
expires
Thu, 19 Sep 2024 17:08:07 GMT
KFOmCnqEu92Fr1Mu4mxK.woff2
fonts.gstatic.com/s/roboto/v30/ Frame 2E2E
15 KB
15 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v30/KFOmCnqEu92Fr1Mu4mxK.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css2?family=Roboto:ital,wght@0,400;0,500;0,600;0,700;1,400;1,700&display=swap
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:830::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f6734f8177112c0839b961f96d813fcb189d81b60e96c33278c1983b6f419615
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://disqus.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Tue, 27 Feb 2024 08:53:04 GMT
x-content-type-options
nosniff
age
62471
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
15744
x-xss-protection
0
last-modified
Wed, 11 May 2022 19:24:48 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="apps-themes"
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 26 Feb 2025 08:53:04 GMT
KFOlCnqEu92Fr1MmWUlfBBc4.woff2
fonts.gstatic.com/s/roboto/v30/ Frame 2E2E
15 KB
16 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmWUlfBBc4.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css2?family=Roboto:ital,wght@0,400;0,500;0,600;0,700;1,400;1,700&display=swap
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:830::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f5aebdfea35d1e7656ef4acc5db1f243209755ae3300943ef8fc6280f363c860
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://disqus.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Tue, 27 Feb 2024 08:48:53 GMT
x-content-type-options
nosniff
age
62722
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
15860
x-xss-protection
0
last-modified
Wed, 11 May 2022 19:24:42 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="apps-themes"
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 26 Feb 2025 08:48:53 GMT
KFOlCnqEu92Fr1MmEU9fBBc4.woff2
fonts.gstatic.com/s/roboto/v30/ Frame 2E2E
16 KB
16 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmEU9fBBc4.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css2?family=Roboto:ital,wght@0,400;0,500;0,600;0,700;1,400;1,700&display=swap
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:830::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b019538234514166ec7665359d097403358f8a4c991901983922fb4d56989f1e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://disqus.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Tue, 27 Feb 2024 01:17:56 GMT
x-content-type-options
nosniff
age
89779
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
15920
x-xss-protection
0
last-modified
Wed, 11 May 2022 19:24:45 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="apps-themes"
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 26 Feb 2025 01:17:56 GMT
KFOkCnqEu92Fr1Mu51xIIzI.woff2
fonts.gstatic.com/s/roboto/v30/ Frame 2E2E
17 KB
17 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1Mu51xIIzI.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css2?family=Roboto:ital,wght@0,400;0,500;0,600;0,700;1,400;1,700&display=swap
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:830::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
db0424fb67fb52e7e538490240cc7fb9c05aa076333a4968f3dee30b825dabf9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://disqus.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Tue, 27 Feb 2024 08:59:49 GMT
x-content-type-options
nosniff
age
62066
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
17368
x-xss-protection
0
last-modified
Wed, 11 May 2022 19:24:42 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="apps-themes"
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 26 Feb 2025 08:59:49 GMT
KFOjCnqEu92Fr1Mu51TzBic6CsQ.woff2
fonts.gstatic.com/s/roboto/v30/ Frame 2E2E
17 KB
17 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v30/KFOjCnqEu92Fr1Mu51TzBic6CsQ.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css2?family=Roboto:ital,wght@0,400;0,500;0,600;0,700;1,400;1,700&display=swap
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:830::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
6be97ca17228a69c406231d89c003194c3dfba7401eaa9fe9e9ed0ef1c18dc38
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://disqus.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Tue, 27 Feb 2024 08:49:17 GMT
x-content-type-options
nosniff
age
62699
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
17032
x-xss-protection
0
last-modified
Wed, 11 May 2022 19:24:52 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="apps-themes"
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 26 Feb 2025 08:49:17 GMT
img.gif
b.6sc.co/v1/beacon/
43 B
485 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=61666340-7a0c-424e-89c1-00bcea81dca6&session=0dded946-4103-4cfb-81c0-0a0ce4851f62&event=active_time_track&q=%7B%22currentTime%22%3A%22Wed%2C%2028%20Feb%202024%2002%3A14%3A16%20GMT%22%2C%22lastTrackTime%22%3A%22Wed%2C%2028%20Feb%202024%2002%3A14%3A15%20GMT%22%2C%22timeSpent%22%3A%221002%22%2C%22totalTimeSpent%22%3A%221002%22%7D&isIframe=false&m=%7B%22description%22%3A%22A%20campaign%20by%20Russian%20military%20intelligence%20to%20convert%20Ubiquiti%20routers%20into%20a%20platform%20for%20a%20global%20cyberespionage%20operation%20began%20as%20early%20as%202022%2C%20U.S.%20and%22%2C%22keywords%22%3A%22Russia%2C%20APT28%2C%20Fancy%20Bear%2C%20Microsoft%2C%20relay%20attack%22%2C%22title%22%3A%22Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&pageViewId=0bafc7bf-4366-4afd-8fe4-f8c0393bc084&v=1.1.14
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:16 GMT
x-content-type-options
nosniff
content-length
43
pragma
no-cache
last-modified
Sat, 18 Feb 2023 01:45:17 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"63f02dad-2b"
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
image/gif
access-control-allow-origin
cache-control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
access-control-allow-credentials
true
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 19 Apr 2000 11:43:00 GMT
disqus-sso-login.png
www.bankinfosecurity.com/images/ Frame 2E2E
4 KB
4 KB
Image
General
Full URL
https://www.bankinfosecurity.com/images/disqus-sso-login.png
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/lounge.bundle.11603433e00d5475a79bfe963de47003.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
c15d7c72b50d4cad5e7a1fcbd75c78ded4c75eaf3ec382783a1903f88e6db1cf
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&t_d=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&t_t=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&s_o=default
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
strict-transport-security
max-age=31536000; includeSubDomains; preload
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:49 GMT
x-frame-options
deny
content-type
image/png
cache-control
max-age=86400, private, must-revalidate
accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000
content-length
4222
x-xss-protection
1; mode=block
event.gif
referrer.disqus.com/juggler/ Frame 2E2E
43 B
339 B
Image
General
Full URL
https://referrer.disqus.com/juggler/event.gif?abe=0&embed_hidden=0&load_time=458&event=init_embed&thread=10100628566&forum=bankinfosecurity&forum_id=1538940&imp=8dbntej16evotq&thread_slug=moscow_military_hackers_used_microsoft_outlook_vulnerability&user_type=anon&referrer=https%3A%2F%2Fwww.bankinfosecurity.com%2F&theme=next&dnt=0&tracking_enabled=0&experiment=network_default_hidden&variant=fallthrough&service=dynamic&promoted_enabled=false&max_enabled=false
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
199.232.192.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&t_d=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&t_t=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&s_o=default
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Date
Wed, 28 Feb 2024 02:14:16 GMT
x-content-type-options
nosniff
last-modified
Mon, 28 Sep 1970 06:00:00 GMT
server
nginx
content-type
image/gif
Cross-Origin-Resource-Policy
cross-origin
Connection
keep-alive
Content-Length
43
x-xss-protection
1; mode=block
bis-hdr.desktop.r2.js
www.bankinfosecurity.com/javascripts-responsive/
2 KB
629 B
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/bis-hdr.desktop.r2.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
56d67bff3c0d11af3f7b09d825eca83408c0017d7c34a03678f0f9433a97819d
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'none'
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
date
Wed, 28 Feb 2024 02:12:49 GMT
vary
Accept-Encoding
x-frame-options
deny
content-type
text/javascript; charset=utf-8
cache-control
max-age=86400, private, must-revalidate
alt-svc
h3=":443"; ma=2592000
content-length
593
x-xss-protection
1; mode=block
sodar
pagead2.googlesyndication.com/getconfig/
16 KB
12 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=m202402200101&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202402200101/pubads_impl.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e924660760a5c5b4ed1e854a0fd2ae90aa9969386edcf32e88d7555570277cd6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:16 GMT
content-encoding
br
x-content-type-options
nosniff
server
cafe
content-type
application/json; charset=UTF-8
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
12426
x-xss-protection
0
c.gif
c.clarity.ms/
Redirect Chain
  • https://c.clarity.ms/c.gif
  • https://c.bing.com/c.gif?ctsa=mr&CtsSyncId=C3CEB1647B2A459F8C9CC8E6CD01CE6D&RedC=c.clarity.ms&MXFR=1313B5E0F50D6C6F1EC3A1D3F10D62A1
  • https://c.clarity.ms/c.gif?ctsa=mr&CtsSyncId=C3CEB1647B2A459F8C9CC8E6CD01CE6D&MUID=2B4A25677556666E17533154743D67C7
42 B
442 B
Image
General
Full URL
https://c.clarity.ms/c.gif?ctsa=mr&CtsSyncId=C3CEB1647B2A459F8C9CC8E6CD01CE6D&MUID=2B4A25677556666E17533154743D67C7
Protocol
H2
Server
68.219.88.97 Dublin, Ireland, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
99c2917ee5b2a01459a923bdd1c676f15ee73b62b87f696e6735312d26f51e12

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 28 Feb 2024 02:14:15 GMT
last-modified
Fri, 09 Feb 2024 19:55:32 GMT
server
Microsoft-IIS/10.0
etag
"2155d7f0915bda1:0"
x-powered-by
ASP.NET
content-type
image/gif
p3p
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
cache-control
private, no-cache, proxy-revalidate, no-store
accept-ranges
bytes
content-length
42

Redirect headers

pragma
no-cache
date
Wed, 28 Feb 2024 02:14:16 GMT
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref
Ref A: A4F30866A6D748E5824583DF31002B11 Ref B: CPH30EDGE0914 Ref C: 2024-02-28T02:14:16Z
x-powered-by
ASP.NET
x-cache
CONFIG_NOCACHE
p3p
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
location
https://c.clarity.ms/c.gif?ctsa=mr&CtsSyncId=C3CEB1647B2A459F8C9CC8E6CD01CE6D&MUID=2B4A25677556666E17533154743D67C7
cache-control
private, no-cache, proxy-revalidate, no-store
content-length
0
truncated
/ Frame FD98
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6b1746165601c4c900b238ea60aa6bbf882011ac99c46ea1b2341fa60570795e

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Content-Type
image/png
sodar2.js
tpc.googlesyndication.com/sodar/
17 KB
7 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202402200101/pubads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
61c32059a5e94075a7ecff678b33907966fc9cfa384daa01aa057f872da14dbb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
6386
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
etag
"1637097310169751"
vary
Accept-Encoding
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Wed, 28 Feb 2024 02:14:16 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/225/ Frame 498D
13 KB
5 KB
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
55a119c0394f901a8a297e109c17b5e5402689708b999ab10691c16179f32a4a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ranges
bytes
age
39820
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
cache-control
public, max-age=31536000
content-encoding
gzip
content-length
5046
content-type
text/html
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
cross-origin-resource-policy
cross-origin
date
Tue, 27 Feb 2024 15:10:36 GMT
expires
Wed, 26 Feb 2025 15:10:36 GMT
last-modified
Mon, 21 Jun 2021 20:47:05 GMT
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
server
sffe
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
aframe
www.google.com/recaptcha/api2/ Frame A5B6
829 B
1 KB
Document
General
Full URL
https://www.google.com/recaptcha/api2/aframe
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82f::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
93d61c7f96439383937ed94d701416d0dc193410a429d026d8384a50760803c4
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-ZD8zA3FC--97kTDqM3G_pw' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.bankinfosecurity.com/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
cache-control
private, max-age=300
content-encoding
gzip
content-security-policy
script-src 'report-sample' 'nonce-ZD8zA3FC--97kTDqM3G_pw' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-type
text/html; charset=utf-8
cross-origin-embedder-policy
require-corp
cross-origin-resource-policy
cross-origin
date
Wed, 28 Feb 2024 02:14:16 GMT
expires
Wed, 28 Feb 2024 02:14:16 GMT
report-to
{"group":"recaptcha","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/recaptcha"}]}
server
GSE
x-content-type-options
nosniff
x-xss-protection
1; mode=block
BoEj1MRYnOy5BSN5ElbJySd6MGFyYBWT_ZtkFEIAVvM.js
pagead2.googlesyndication.com/bg/ Frame 498D
39 KB
15 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/bg/BoEj1MRYnOy5BSN5ElbJySd6MGFyYBWT_ZtkFEIAVvM.js
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
068123d4c4589cecb90523791256c9c9277a306172601593fd9b6414420056f3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Tue, 27 Feb 2024 08:48:16 GMT
content-encoding
br
x-content-type-options
nosniff
age
62760
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/botguard-scs
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
15302
x-xss-protection
0
last-modified
Mon, 19 Feb 2024 17:58:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="botguard-scs"
vary
Accept-Encoding
report-to
{"group":"botguard-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/botguard-scs"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Wed, 26 Feb 2025 08:48:16 GMT
generate_204
tpc.googlesyndication.com/ Frame 498D
0
10 B
Image
General
Full URL
https://tpc.googlesyndication.com/generate_204?6mWEuw
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:829::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:16 GMT
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
0
sodar
pagead2.googlesyndication.com/pagead/ Frame A5B6
0
0
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/sodar?id=sodar2&v=225&li=gpt_m202402200101&jk=2263288754734607&rc=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.google.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

activeview
pagead2.googlesyndication.com/pcs/ Frame F0CD
42 B
64 B
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssiZirN0eHKRjCRusHNlMUNbF7Qfs0bw-NdZfZuEdGD07J8I-M1B7CG2ez6e4-1vKQQn_EhO9D2H2zcS-iGYSb5a3VL6FS81SF9yxYaqY6zgkwqnUi59GGvTt4gOf0i4sTuGr2ucwQc-FOjuRUKGii0XHwpHpxwKkw&sig=Cg0ArKJSzMdWHJU5U_7yEAE&id=lidar2&mcvt=1000&p=71,636,161,1364&mtos=1000,1000,1000,1000,1000&tos=1000,0,0,0,0&v=20240227&bin=7&avms=nio&bs=1600,1200&mc=1&vu=1&app=0&itpl=3&adk=606436291&rs=4&la=0&cr=0&uach=WyIiLCIiLCIiLCIiLCIiLG51bGwsMCxudWxsLCIiLG51bGwsMF0%3D&vs=4&r=v&co=501925500&rst=1709086455536&rpt=292&isd=0&lsd=0&met=mue&wmsd=0&pbe=0&vae=0&spb=0&sfl=0&ffslot=0&reach=8&io2=0
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 28 Feb 2024 02:14:16 GMT
x-content-type-options
nosniff
server
cafe
content-type
image/gif
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
v.clarity.ms/
0
304 B
XHR
General
Full URL
https://v.clarity.ms/collect
Requested by
Host: www.clarity.ms
URL: https://www.clarity.ms/s/0.7.20/clarity.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
20.114.189.135 Boydton, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
nginx/1.18.0 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept
application/x-clarity-gzip
Referer
https://www.bankinfosecurity.com/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Access-Control-Allow-Origin
https://www.bankinfosecurity.com
Date
Wed, 28 Feb 2024 02:14:16 GMT
Access-Control-Allow-Credentials
true
Server
nginx/1.18.0 (Ubuntu)
Connection
keep-alive
Vary
Origin
Request-Context
appId=cid-v1:3f60b293-70d6-4805-b0bb-3484f0a73bf0
img.gif
b.6sc.co/v1/beacon/
43 B
485 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=61666340-7a0c-424e-89c1-00bcea81dca6&session=0dded946-4103-4cfb-81c0-0a0ce4851f62&event=active_time_track&q=%7B%22currentTime%22%3A%22Wed%2C%2028%20Feb%202024%2002%3A14%3A17%20GMT%22%2C%22lastTrackTime%22%3A%22Wed%2C%2028%20Feb%202024%2002%3A14%3A16%20GMT%22%2C%22timeSpent%22%3A%221001%22%2C%22totalTimeSpent%22%3A%222003%22%7D&isIframe=false&m=%7B%22description%22%3A%22A%20campaign%20by%20Russian%20military%20intelligence%20to%20convert%20Ubiquiti%20routers%20into%20a%20platform%20for%20a%20global%20cyberespionage%20operation%20began%20as%20early%20as%202022%2C%20U.S.%20and%22%2C%22keywords%22%3A%22Russia%2C%20APT28%2C%20Fancy%20Bear%2C%20Microsoft%2C%20relay%20attack%22%2C%22title%22%3A%22Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&pageViewId=0bafc7bf-4366-4afd-8fe4-f8c0393bc084&v=1.1.14
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:17 GMT
x-content-type-options
nosniff
content-length
43
pragma
no-cache
last-modified
Sat, 18 Feb 2023 02:04:22 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"63f03226-2b"
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
image/gif
access-control-allow-origin
cache-control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
access-control-allow-credentials
true
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 19 Apr 2000 11:43:00 GMT
sodar
pagead2.googlesyndication.com/pagead/
0
0
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/sodar?id=sodar2&v=225&t=2&li=gpt_m202402200101&jk=2263288754734607&bg=!8vGl8b7NAAZ3BdUuVwU7ADQBe5WfODEhw0kYhyJuioL0Btn6GZfiobPvHwnQN-Y70SdC2R1krRTsWS6VMBWiEzD3knU5AgAAADhSAAAAAmgBB5kDGLzyhbBhPpOwtkY_wrJaRc47CH4nZsFU4Vajg-GCNPo8dpLLJArKV4akLR1b9Ax1OD5lPJoOXe9Yu_GZV60pGIK9Zgr5WjsBULKzI3-hyelHe4gnvHw8VnEH0aMPk2qO_BAEbkeBU6Y_8zSqAwZJcQn2_t9TceLM7xdZZh-dqz9BM9y_eHLN0OKwNLI3Q21sHOjQJES5r5TkG-QCMGeRZwHzpZ91UW1GvG5COyWrWGeFQoxveMeoQIyeg76Nqn3t2uaxYbAUvrYz4Gci63WTc5nGeYHW37sz1YdAtf_16PeVBdshtTgRH7w4YLxnBXpVH3qdHP67QUKndcM7G3k-vjSWx05AfFabrjasz0i3TZTMTUEoUdUM5sDNm8Rjuki442oLjSRaeNbpJJW0hSN_zyA9PjAmVNVd1gFLtWRK4avl7gAWFMR6TLRqM4kzUaBqVIX5L5qqQZxxyeq3ZoqxP4zKIR-Cy1PN6le3jwaOpgxTwkHyzsIvDfqNhyN7IFqCmH054dSvGGIVydAFSkMGIlyBzq0FAEgR1deYgZdJGy2IluMFFl5nyMRj-7EmTaZIVLrfidGmaqxe-w2ba7JeloeIF9He01_HB8iRcukQhko4z4BEOf58IZWg0YFrkLIRliOjW_F_ube6hUk1S6M19gDwNhmZVuXGfnXMW4fyBAoaQF3ZfkuW13LINoAF4Y5T8n-XTVPtJmATOpaG2Tu0iC9kJSCEyXxP1NTV-4RmQwV0YeMEJR1OKbk0TRqTDc6S-I3G4E8rX1R6DPouYYYmcSE78O6ScunqG2S9AOxojyzuMkktjUfv6M2CLZAGArpJK2UtRRY7kpil-AHOxQbMJpTz1hknoNYkZwDeh0XxUX-IHLJ4zcsZOYsaq1wnYIWUi7HgrkGTaPSxUoxToLLA2XJHBUvbRkamztLQFdsWEZx9Ko8BCwSzShr3WqUgMOuJ57lug_DRUJqaIsIekYaRW8QwTT5P9bjvBojfMDVLFbdYpSriqCNGLvMzUmNtLb9_u2yZ2Na6DXQ39qpao-EcOPMiqBw3XEJHig
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

activeview
pagead2.googlesyndication.com/pcs/ Frame FD98
42 B
64 B
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvGfsN0h7hkN1eVaWVEPgaLl4wGb2nEr8zfBBpMJiHzh2FBhLlOkK7Ag38UzbXrPitaBCmC5fUfrzdjndN7NI4NZPju3yDUZInW9c12K2MOEKeDDCvwAzPjU-xwivLbf9q-_9xO9qh-h_-noteiYyegxN_KnXh2YW8&sig=Cg0ArKJSzEmw4pruUS4-EAE&id=lidar2&mcvt=1000&p=0,0,480,640&mtos=1000,1000,1000,1000,1000&tos=1000,0,0,0,0&v=20240227&bin=7&avms=nio&bs=1600,1200&mc=1&vu=1&app=0&itpl=3&adk=3082656849&rs=4&la=1&cr=0&uach=WyIiLCIiLCIiLCIiLCIiLG51bGwsMCxudWxsLCIiLG51bGwsMF0%3D&vs=4&r=v&co=501925500&rst=1709086455556&rpt=328&isd=0&lsd=0&met=mue&wmsd=0&pbe=0&vae=0&spb=0&sfl=0&ffslot=0&reach=8&io2=0
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 28 Feb 2024 02:14:17 GMT
x-content-type-options
nosniff
server
cafe
content-type
image/gif
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
img.gif
b.6sc.co/v1/beacon/
43 B
484 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=61666340-7a0c-424e-89c1-00bcea81dca6&session=0dded946-4103-4cfb-81c0-0a0ce4851f62&event=active_time_track&q=%7B%22currentTime%22%3A%22Wed%2C%2028%20Feb%202024%2002%3A14%3A18%20GMT%22%2C%22lastTrackTime%22%3A%22Wed%2C%2028%20Feb%202024%2002%3A14%3A17%20GMT%22%2C%22timeSpent%22%3A%221001%22%2C%22totalTimeSpent%22%3A%223004%22%7D&isIframe=false&m=%7B%22description%22%3A%22A%20campaign%20by%20Russian%20military%20intelligence%20to%20convert%20Ubiquiti%20routers%20into%20a%20platform%20for%20a%20global%20cyberespionage%20operation%20began%20as%20early%20as%202022%2C%20U.S.%20and%22%2C%22keywords%22%3A%22Russia%2C%20APT28%2C%20Fancy%20Bear%2C%20Microsoft%2C%20relay%20attack%22%2C%22title%22%3A%22Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&pageViewId=0bafc7bf-4366-4afd-8fe4-f8c0393bc084&v=1.1.14
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:18 GMT
x-content-type-options
nosniff
content-length
43
pragma
no-cache
last-modified
Sat, 18 Feb 2023 00:49:36 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"63f020a0-2b"
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
image/gif
access-control-allow-origin
cache-control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
access-control-allow-credentials
true
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 19 Apr 2000 11:43:00 GMT
img.gif
b.6sc.co/v1/beacon/
43 B
484 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=61666340-7a0c-424e-89c1-00bcea81dca6&session=0dded946-4103-4cfb-81c0-0a0ce4851f62&event=active_time_track&q=%7B%22currentTime%22%3A%22Wed%2C%2028%20Feb%202024%2002%3A14%3A19%20GMT%22%2C%22lastTrackTime%22%3A%22Wed%2C%2028%20Feb%202024%2002%3A14%3A18%20GMT%22%2C%22timeSpent%22%3A%221001%22%2C%22totalTimeSpent%22%3A%224005%22%7D&isIframe=false&m=%7B%22description%22%3A%22A%20campaign%20by%20Russian%20military%20intelligence%20to%20convert%20Ubiquiti%20routers%20into%20a%20platform%20for%20a%20global%20cyberespionage%20operation%20began%20as%20early%20as%202022%2C%20U.S.%20and%22%2C%22keywords%22%3A%22Russia%2C%20APT28%2C%20Fancy%20Bear%2C%20Microsoft%2C%20relay%20attack%22%2C%22title%22%3A%22Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&pageViewId=0bafc7bf-4366-4afd-8fe4-f8c0393bc084&v=1.1.14
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:19 GMT
x-content-type-options
nosniff
content-length
43
pragma
no-cache
last-modified
Sat, 18 Feb 2023 00:49:36 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"63f020a0-2b"
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
image/gif
access-control-allow-origin
cache-control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
access-control-allow-credentials
true
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 19 Apr 2000 11:43:00 GMT
collect
v.clarity.ms/
0
304 B
XHR
General
Full URL
https://v.clarity.ms/collect
Requested by
Host: www.clarity.ms
URL: https://www.clarity.ms/s/0.7.20/clarity.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
20.114.189.135 Boydton, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
nginx/1.18.0 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept
application/x-clarity-gzip
Referer
https://www.bankinfosecurity.com/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

Access-Control-Allow-Origin
https://www.bankinfosecurity.com
Date
Wed, 28 Feb 2024 02:14:19 GMT
Access-Control-Allow-Credentials
true
Server
nginx/1.18.0 (Ubuntu)
Connection
keep-alive
Vary
Origin
Request-Context
appId=cid-v1:3f60b293-70d6-4805-b0bb-3484f0a73bf0
img.gif
b.6sc.co/v1/beacon/
43 B
485 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=61666340-7a0c-424e-89c1-00bcea81dca6&session=0dded946-4103-4cfb-81c0-0a0ce4851f62&event=active_time_track&q=%7B%22currentTime%22%3A%22Wed%2C%2028%20Feb%202024%2002%3A14%3A20%20GMT%22%2C%22lastTrackTime%22%3A%22Wed%2C%2028%20Feb%202024%2002%3A14%3A19%20GMT%22%2C%22timeSpent%22%3A%221001%22%2C%22totalTimeSpent%22%3A%225006%22%7D&isIframe=false&m=%7B%22description%22%3A%22A%20campaign%20by%20Russian%20military%20intelligence%20to%20convert%20Ubiquiti%20routers%20into%20a%20platform%20for%20a%20global%20cyberespionage%20operation%20began%20as%20early%20as%202022%2C%20U.S.%20and%22%2C%22keywords%22%3A%22Russia%2C%20APT28%2C%20Fancy%20Bear%2C%20Microsoft%2C%20relay%20attack%22%2C%22title%22%3A%22Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&pageViewId=0bafc7bf-4366-4afd-8fe4-f8c0393bc084&v=1.1.14
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:20 GMT
x-content-type-options
nosniff
content-length
43
pragma
no-cache
last-modified
Sat, 05 Jun 2021 07:56:05 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"60bb2e15-2b"
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
image/gif
access-control-allow-origin
cache-control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
access-control-allow-credentials
true
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 19 Apr 2000 11:43:00 GMT
collect
region1.google-analytics.com/g/
0
54 B
Ping
General
Full URL
https://region1.google-analytics.com/g/collect?v=2&tid=G-XJ8Q4QGGRH&gtm=45je42q1v886765778z86625173za200&_p=1709086453974&gcd=13l3l3l2l1&npa=1&dma_cps=sypham&dma=1&cid=405024302.1709086455&ul=en-us&sr=1600x1200&uaa=&uab=&uafvl=&uamb=0&uam=&uap=&uapv=&uaw=0&pscdl=noapi&_s=2&sid=1709086455&sct=1&seg=0&dl=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&dt=Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability&en=6sense&ep.asset_type=article24457&ep.asset_categories=420%2C506%2C409%2C465&ep.asset_keywords_1=Russia%2C%20APT28%2C%20Fancy%20Bear%2C%20Microsoft%2C%20relay%20attack&ep.asset_keywords_2=&ep.asset_keywords_3=&ep.asset_keywords_4=&ep.asset_keywords_5=&ep.asset_keywords_6=&ep.asset_keywords_7=&ep.asset_keywords_8=&ep.asset_keywords_9=&ep.asset_keywords_10=&_et=203&up.company_name_6s=&up.confidence_6s=NA&up.naics_6s=&up.domain_6s=&tfd=7766
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=G-XJ8Q4QGGRH&l=dataLayer&cx=c
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4860:4802:34::36 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 28 Feb 2024 02:14:20 GMT
server
Golfe2
content-type
text/plain
access-control-allow-origin
https://www.bankinfosecurity.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
img.gif
b.6sc.co/v1/beacon/
43 B
484 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=61666340-7a0c-424e-89c1-00bcea81dca6&session=0dded946-4103-4cfb-81c0-0a0ce4851f62&event=active_time_track&q=%7B%22currentTime%22%3A%22Wed%2C%2028%20Feb%202024%2002%3A14%3A21%20GMT%22%2C%22lastTrackTime%22%3A%22Wed%2C%2028%20Feb%202024%2002%3A14%3A20%20GMT%22%2C%22timeSpent%22%3A%221000%22%2C%22totalTimeSpent%22%3A%226006%22%7D&isIframe=false&m=%7B%22description%22%3A%22A%20campaign%20by%20Russian%20military%20intelligence%20to%20convert%20Ubiquiti%20routers%20into%20a%20platform%20for%20a%20global%20cyberespionage%20operation%20began%20as%20early%20as%202022%2C%20U.S.%20and%22%2C%22keywords%22%3A%22Russia%2C%20APT28%2C%20Fancy%20Bear%2C%20Microsoft%2C%20relay%20attack%22%2C%22title%22%3A%22Moscow%20Military%20Hackers%20Used%20Microsoft%20Outlook%20Vulnerability%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmoscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457&pageViewId=0bafc7bf-4366-4afd-8fe4-f8c0393bc084&v=1.1.14
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.17.100.193 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-17-100-193.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.69 Safari/537.36

Response headers

date
Wed, 28 Feb 2024 02:14:21 GMT
x-content-type-options
nosniff
content-length
43
pragma
no-cache
last-modified
Tue, 05 Oct 2021 22:17:52 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"615ccf10-2b"
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
image/gif
access-control-allow-origin
cache-control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
access-control-allow-credentials
true
accept-ranges
bytes
access-control-allow-headers
*
expires
Wed, 19 Apr 2000 11:43:00 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.mp4

Verdicts & Comments Add Verdict or Comment

193 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| 2 object| 3 object| 4 object| 5 object| 6 object| 7 object| 8 object| 9 function| $ function| jQuery object| jQuery1910702110852145301 object| mejs function| MediaElement object| HtmlMediaElement function| onYouTubePlayerAPIReady function| DefaultPlayer function| MediaElementPlayer number| mce-data-1hnmnrc5n object| tinyMCE object| tinymce function| des function| des_createKeys function| stringToHex function| hexToString function| readCookie function| disqus_config object| googletag object| top_banner_display object| ensBootstraps object| Bootstrapper object| dataLayer function| importScript function| cleanExistingScript function| refreshJavascript string| base_url string| base_url_auto string| ssl_base string| services_url string| includes_url object| video_intro object| audio_data boolean| rsa_page boolean| ceo_page boolean| interview_page boolean| article_page boolean| is_gatedasset number| videoAskLoginTime number| videoStart boolean| identified_user object| identified_user_data object| gaKeywords string| gaCategories number| videoGA4EventTime1 number| videoGA4EventTime3 boolean| display_videologin string| current_page string| session_id boolean| user_is_acq object| login_reload_pages object| scrollTopPages string| popup_to_open string| marketo_contact_identification_ajax object| all_states object| all_countries_with_states string| webinar_auto_click_register string| webinar_auto_click_register_slot string| __family__ boolean| exclude_pre_roll object| user_email number| ENTER_KEY object| article_video_caption_id object| highlight number| show_subtitles_speakers string| caption_speakers string| register_source undefined| opened_modal undefined| do_hashchange boolean| player_is_running boolean| videoGA4Event1Saved boolean| videoGA4Event2Saved boolean| videoGA4Event3Saved boolean| interviewGA4Event1Saved boolean| interviewGA4Event2Saved function| closeCookieTerms function| uncheckGroupInputs function| submitFormPopup function| setMembershipPrices function| updatePriceBox function| forgotPassword function| generateHash2w function| login function| register function| pagination function| scrollTO function| showAlert function| assetPrequalSubmit function| addToBriefcase function| toggleDdlsByValue function| populateStates function| registerFormShowErrors function| recordLead function| initAudio function| initVideos function| initVideoScrolling function| resizeVideoPlayer function| removePlayerFromSidebar function| togglePrePostTime function| jumpSlide function| initVideoEvents function| URLToObj function| timedPopUpCount function| initAutoPopups function| initAJAXpopups function| checkClassicPopupPrequalErrors function| submitPopupAction function| saveToMyJobs function| initEmailSubscriptionsValidation function| emailSubscriptionsUncheckAll function| showPopupOnDemand function| sendAssetEmail function| displayChallengeText function| runStrikesOnMKTLeadIdentification function| mediaMetadataNavigation number| width function| isMobile boolean| isDesktop function| addClassToMenuItem function| addClassToDropDown function| removeClassFromMenuItem function| removeClassFromDropDown function| clearDropDowns function| showDropDown function| hideDropDown function| showDropDown2 function| hideDropDown2 string| disqus_shortname string| disqus_url object| _ml function| CE_READY string| _bizo_data_partner_id string| _linkedin_partner_id object| _linkedin_data_partner_ids function| lintrk object| _6si number| top_banner_display_interval object| st object| __stdos__ boolean| tpcCookiesEnableCheckingDone boolean| tpcCookiesEnabledStatus function| __sharethis__docReady object| __sharethis__ object| ua_fields object| jQBrowser boolean| pp_alreadyInitialized boolean| doresize object| scroll_pos string| url boolean| hashtag boolean| notifications object| DISQUS boolean| _already_called_lintrk object| ORIBILI object| ggeac object| google_tag_data object| google_js_reporting_queue object| google_tag_manager function| processEpsilonData string| epsilonName boolean| enabled function| callback number| version function| clarity boolean| CE_USER_SCRIPT object| CE2 string| CE_USER_SITE_DATA_URL string| CE_USER_DATA_URL function| mktoMunchkinFunction object| Munchkin function| mktoMunchkin string| CE_USER_COMMON_SCRIPT_URL undefined| CE_USER_THIRDPARTY_SCRIPT_URL function| onYouTubeIframeAPIReady object| gaGlobal boolean| _storagePopulated undefined| google_measure_js_timing number| google_unique_id object| MunchkinTracker function| showSearch function| hideSearch object| GoogleGcLKhOms object| google_image_requests

31 Cookies

Domain/Path Name / Value
www.bankinfosecurity.com/ Name: PHPSESSID
Value: g3rdn25rkth8ttvdn7s527sg4g
www.bankinfosecurity.com/ Name: _advert
Value: false
www.bankinfosecurity.com/ Name: visitorip
Value: 10.187.187.9
www.bankinfosecurity.com/ Name: _gd_visitor
Value: 61666340-7a0c-424e-89c1-00bcea81dca6
www.bankinfosecurity.com/ Name: _gd_session
Value: 0dded946-4103-4cfb-81c0-0a0ce4851f62
.linkedin.com/ Name: li_sugr
Value: 9b0bf029-65d4-490f-bf94-acc23e3134e7
.bankinfosecurity.com/ Name: _ga
Value: GA1.1.405024302.1709086455
.bankinfosecurity.com/ Name: _ga_2RK1HGW2E4
Value: GS1.1.1709086455.1.0.1709086455.0.0.0
.linkedin.com/ Name: lidc
Value: "b=OGST05:s=O:r=O:a=O:p=O:g=2977:u=1:x=1:i=1709086455:t=1709172855:v=2:sig=AQEl2wEuxPBkV1du2bvRD45YbceX4HLQ"
.linkedin.com/ Name: UserMatchHistory
Value: AQK-P9ezC_zgsgAAAY3tfbY455F_r1MEuG2y1U0UmKptQJHIW4wjyDgXAB-QfT4_cZnXdURsYgFO6Q
.linkedin.com/ Name: AnalyticsSyncHistory
Value: AQK5BLEabRsYHQAAAY3tfbY4xHhkaDa0MP-KpzVKGLV_QroWAiJFDXIrWghNvo3fFmjnRgbPRemziTCTM9XeIQ
.linkedin.com/ Name: bcookie
Value: "v=2&5099d44f-ff2c-4482-8521-24f39717ef09"
.bankinfosecurity.com/ Name: _ga_XJ8Q4QGGRH
Value: GS1.1.1709086455.1.0.1709086455.0.0.0
www.clarity.ms/ Name: CLID
Value: 932a2dcb706446a784cb793eef10da40.20240228.20250227
.bankinfosecurity.com/ Name: __gads
Value: ID=09a35c1825237274:T=1709086455:RT=1709086455:S=ALNI_MbW8MOwhipp_UcluWiKoqzpWpv8Ew
.bankinfosecurity.com/ Name: __gpi
Value: UID=00000d64eb4a0e02:T=1709086455:RT=1709086455:S=ALNI_Ma7VVyaoM_238DdEKsEJfmpCQhPxA
.bankinfosecurity.com/ Name: __eoi
Value: ID=44c18a296cb3fefb:T=1709086455:RT=1709086455:S=AA-AfjZEV9biFCaZZMCHPakGxXTq
.bankinfosecurity.com/ Name: _mkto_trk
Value: id:051-ZXI-237&token:_mch-bankinfosecurity.com-1709086455583-21557
.bankinfosecurity.com/ Name: _clck
Value: jji7i%7C2%7Cfjn%7C0%7C1519
.doubleclick.net/ Name: IDE
Value: AHWqTUno6ZTdn0O-i0cQZ3c-9MN-Ugq8g4Pcq5tJ1ITpbLGL2gQopq8Y7jNhsjZ5qKo
.www.linkedin.com/ Name: bscookie
Value: "v=1&2024022802141504198941-1649-439f-8f90-9710e68c6103AQH-CJWm9S2NezgkPA0NJ1giwYdYaMfJ"
.linkedin.com/ Name: li_gc
Value: MTswOzE3MDkwODY0NTU7MjswMjEYJs+T3YlyRjwIY2gz6RIEcP8UGt5iq4pzIEJQmYc76A==
.6sc.co/ Name: 6suuid
Value: bd64110268863700f796de6500010000ece87800
.bankinfosecurity.com/ Name: _clsk
Value: 90b4lx%7C1709086456445%7C1%7C1%7Cv.clarity.ms%2Fcollect
.bing.com/ Name: MUID
Value: 2B4A25677556666E17533154743D67C7
.c.bing.com/ Name: MR
Value: 0
.c.bing.com/ Name: SRM_B
Value: 2B4A25677556666E17533154743D67C7
.c.clarity.ms/ Name: SM
Value: C
.clarity.ms/ Name: MUID
Value: 2B4A25677556666E17533154743D67C7
.c.clarity.ms/ Name: MR
Value: 0
.c.clarity.ms/ Name: ANONCHK
Value: 0

112 Console Messages

Source Level URL
Text
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.
other warning URL: https://www.bankinfosecurity.com/moscow-military-hackers-used-microsoft-outlook-vulnerability-a-24457
Message:
Third-party cookie will be blocked. Learn more in the Issues tab.

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com
051-zxi-237.mktoresp.com
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com
19f5c31a19e90d3043a464f4a45d70b3.safeframe.googlesyndication.com
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com
b.6sc.co
bankinfosecurity.disqus.com
buttons-config.sharethis.com
c.6sc.co
c.bing.com
c.clarity.ms
c.disquscdn.com
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com
disqus.com
dnn506yrbagrg.cloudfront.net
epsilon.6sense.com
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com
fonts.googleapis.com
fonts.gstatic.com
in.ml314.com
ipv6.6sc.co
j.6sc.co
l.sharethis.com
ml314.com
munchkin.marketo.net
nexus.ensighten.com
pagead2.googlesyndication.com
platform-api.sharethis.com
platform-cdn.sharethis.com
px.ads.linkedin.com
px4.ads.linkedin.com
referrer.disqus.com
region1.google-analytics.com
script.crazyegg.com
securepubads.g.doubleclick.net
sjs.bizographics.com
snap.licdn.com
t.6sc.co
tpc.googlesyndication.com
v.clarity.ms
worker.ismgcorp.com
www.bankinfosecurity.com
www.clarity.ms
www.google.com
www.googletagmanager.com
www.googletagservices.com
www.linkedin.com
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
104.130.251.6
13.107.42.14
13.248.142.121
13.32.23.129
151.101.64.134
184.31.85.59
192.28.147.68
199.232.192.134
2.17.100.193
20.114.189.135
2001:4860:4802:34::36
23.45.238.237
2600:9000:2057:8c00:c:abe:f440:93a1
2600:9000:206f:600:2:8f43:5780:93a1
2600:9000:2156:e000:1d:85c3:6640:93a1
2600:9000:26db:e00:6:8656:f5c0:93a1
2606:4700::6813:9408
2620:1ec:21::14
2620:1ec:bdf::60
2620:1ec:c11::200
2a00:1450:4001:808::2002
2a00:1450:4001:80f::200a
2a00:1450:4001:813::2008
2a00:1450:4001:827::2002
2a00:1450:4001:829::2001
2a00:1450:4001:82a::2001
2a00:1450:4001:82a::2002
2a00:1450:4001:82f::2004
2a00:1450:4001:830::2003
2a02:26f0:7100::1720:ef23
2a02:26f0:7100::210:180
2a02:26f0:7100::213:c60b
3.160.150.46
34.117.77.79
35.156.226.144
50.56.167.254
52.72.19.156
68.219.88.97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