honeypots
Why every security-conscious organization needs a honeypot
You’ve probably heard the phrase about “canaries in a coal mine.” In the mid 1900s, a guy named John Haldane figured out that birds die pretty quickly when …
Infographic: Honeypot cloud security data
New infographic data on hackers reveals that Russia stealing passwords is the least of our cyber worries. Recent data reveals that China and India are attacking U.S. servers …
Deploying and monitoring honeypots made easy
At the Black Hat conference, LogRhythm released a new analytics suite that monitors honeypots to track would-be attackers, enabling customers to analyze nefarious tactics and …
DEF CON contest to help track down illegal robocalls
The Federal Trade Commission is looking to expand the technological arsenal that can be used in the battle against illegal phone spammers by challenging DEF CON 22 attendees …
Researcher sets up honeypot to counterattack, identifies attackers
I believe that most infosec professionals have, at one time or other, wished they could fight back when some of the resources they are tasked with protecting came under attack …
Understanding basic honeypot concepts
The EU cyber security Agency ENISA is launching an in-depth study on 30 different digital traps or honeypots that can be used by CERTs to proactively detect cyber attacks. The …
Do you need a honeypot?
It might seem like a strange question, but I wonder how many readers are running a honeypot network in their infrastructure? If you’re not then let me be the first to …
Ghost USB honeypot released
Ghost is a honeypot for malware that spreads via USB storage devices. It detects infections with such malware without the need of any further information. The honeypot …
What’s in your daily slice of spam?
Just as the original spam – the tinned meat of 50 years ago – prompted people to wonder just what it contained, so too does the spam of the internet age. …
Portable multi-boot security suite Katana 2.0 released
Katana is a portable multi-boot security suite which brings together all of the best security distributions to run from one USB drive. Katana includes distributions which …
Featured news
Resources
Don't miss
- Redis patches critical “RediShell” RCE vulnerability, update ASAP! (CVE-2025-49844)
- Leaked Oracle EBS exploit scripts expected to drive new wave of attacks (CVE-2025-61882)
- How to get better results from bug bounty programs without wasting money
- Hackers launch data leak site to extort 39 victims, or Salesforce
- Cl0p exploits Oracle E-Business Suite zero-day in data theft, extortion campaign (CVE-2025-61882)