honeypots

First framework to score the agility of cyber attackers and defenders
To help train government and industry organizations on how to prevent cyberattacks, as part of a research project for the U.S. Army, scientists at The University of Texas at …

Companies investing in advanced forensic capabilities to identify attackers in greater detail
One in five companies are already using forensic investigations and other sophisticated methods to identify their attackers, like setting up honey pots and repositories of …

Are attackers harnessing your Redis server?
Earlier this year security researchers warned about vulnerable Apache Solr, Redis, and Windows servers hit with cryptominers. Imperva now says that that are still too many …

Wi-Fi honeypots: Alive and well at RSAC 2018
It was a gorgeous, sunny week in San Francisco as the best and brightest security experts around the globe gathered to attend one of the leading cybersecurity tradeshows in …

Attacks within the Dark Web
For six months, Trend Micro researchers operated a honeypot setup simulating several underground services on the Dark Web. The goal of their research was to see if those …

Dell open sources DCEPT, a honeypot tool for detecting network intrusions
Dell SecureWorks researchers have developed a tool that allows Windows system administrators to detect network intrusion attempts and pinpoint them to the original source …

Which passwords to avoid for Internet-facing systems?
For the last year or so, Rapid7 has been collecting login credentials via “Heisenberg,” a network of low-interaction honeypots that the company has set up to analyze login …
The GasPot experiment: Hackers target gas tanks
Physically tampering with gasoline tanks is dangerous enough, given how volatile gas can be. Altering a fuel gauge can cause a tank to overflow, and a simple spark can set …
How to develop effective honeypots
Honeypots – decoy systems used for learning cyber attackers’ capabilities and potential objectives – can be very useful to organizations, businesses, and …
Discovering connections between attackers
In the last few years, Pedram Hayati, founder of Australian IT company Security Dimension, has been developing a custom honeypot intelligence system called Smart Honeypot. …

Fox-IT launches cyberthreat management platform
Fox-IT launched at RSA Conference 2015 in San Francisco its Cyberthreat Management Platform, a suite of solutions, integration tools and expert services designed to provide …
(IN)SECURE Magazine issue 43 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 43 has been released today. Table of contents: …
Featured news
Resources
Don't miss
- Redis patches critical “RediShell” RCE vulnerability, update ASAP! (CVE-2025-49844)
- Leaked Oracle EBS exploit scripts expected to drive new wave of attacks (CVE-2025-61882)
- How to get better results from bug bounty programs without wasting money
- Hackers launch data leak site to extort 39 victims, or Salesforce
- Cl0p exploits Oracle E-Business Suite zero-day in data theft, extortion campaign (CVE-2025-61882)