redis

Are attackers harnessing your Redis server?

Earlier this year security researchers warned about vulnerable Apache Solr, Redis, and Windows servers hit with cryptominers. Imperva now says that that are still too many …

Wi-Fi

Wi-Fi honeypots: Alive and well at RSAC 2018

It was a gorgeous, sunny week in San Francisco as the best and brightest security experts around the globe gathered to attend one of the leading cybersecurity tradeshows in …

storm

Attacks within the Dark Web

For six months, Trend Micro researchers operated a honeypot setup simulating several underground services on the Dark Web. The goal of their research was to see if those …

The GasPot experiment: Hackers target gas tanks

Physically tampering with gasoline tanks is dangerous enough, given how volatile gas can be. Altering a fuel gauge can cause a tank to overflow, and a simple spark can set …

How to develop effective honeypots

Honeypots – decoy systems used for learning cyber attackers’ capabilities and potential objectives – can be very useful to organizations, businesses, and …