honeypots
Researcher sets up honeypot to counterattack, identifies attackers
I believe that most infosec professionals have, at one time or other, wished they could fight back when some of the resources they are tasked with protecting came under attack …
Understanding basic honeypot concepts
The EU cyber security Agency ENISA is launching an in-depth study on 30 different digital traps or honeypots that can be used by CERTs to proactively detect cyber attacks. The …
Do you need a honeypot?
It might seem like a strange question, but I wonder how many readers are running a honeypot network in their infrastructure? If you’re not then let me be the first to …
Ghost USB honeypot released
Ghost is a honeypot for malware that spreads via USB storage devices. It detects infections with such malware without the need of any further information. The honeypot …
What’s in your daily slice of spam?
Just as the original spam – the tinned meat of 50 years ago – prompted people to wonder just what it contained, so too does the spam of the internet age. …
Portable multi-boot security suite Katana 2.0 released
Katana is a portable multi-boot security suite which brings together all of the best security distributions to run from one USB drive. Katana includes distributions which …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege