honeypots
Researcher sets up honeypot to counterattack, identifies attackers
I believe that most infosec professionals have, at one time or other, wished they could fight back when some of the resources they are tasked with protecting came under attack …
Understanding basic honeypot concepts
The EU cyber security Agency ENISA is launching an in-depth study on 30 different digital traps or honeypots that can be used by CERTs to proactively detect cyber attacks. The …
Do you need a honeypot?
It might seem like a strange question, but I wonder how many readers are running a honeypot network in their infrastructure? If you’re not then let me be the first to …
Ghost USB honeypot released
Ghost is a honeypot for malware that spreads via USB storage devices. It detects infections with such malware without the need of any further information. The honeypot …
What’s in your daily slice of spam?
Just as the original spam – the tinned meat of 50 years ago – prompted people to wonder just what it contained, so too does the spam of the internet age. …
Portable multi-boot security suite Katana 2.0 released
Katana is a portable multi-boot security suite which brings together all of the best security distributions to run from one USB drive. Katana includes distributions which …
Featured news
Sponsored
Don't miss
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity