Poorly Secured Docker Image Comes Under Rapid Attack
A honeypot experiment shows just how quickly cybercriminals will move to compromise vulnerable cloud infrastructure. Continue reading Poorly Secured Docker Image Comes Under Rapid Attack
Collaborate Disseminate
A honeypot experiment shows just how quickly cybercriminals will move to compromise vulnerable cloud infrastructure. Continue reading Poorly Secured Docker Image Comes Under Rapid Attack
We are trying to implement a system of honeypots at a relatively large organization. What we are having trouble with is how many sensors or VMs need to be deployed. For example, given a network of 1000 endpoints does only 1 honeypot need t… Continue reading Appropriate network coverage for Honeypots
For a project I need to evaluate a model that tries to predict whether a certain cyber-attack (i.e. connection to a low level honeypot) is just a random access, a new attack-wave or an already known attack-wave. Therefore I am looking for … Continue reading Database that contains timespans of cyber attacks in the web [closed]
The honeypot demonstrates the various security concerns plaguing vulnerable industrial control systems. Continue reading Fake Smart Factory Honeypot Highlights New Attack Threats
There is a virtual machine ( Virtual Box) managed by OS Xubuntu and a kippo( ssh-trap) on this one. NAT have been adjusted in the VM’s setups with port forwarding by this way: ssh tcp 195.x.x.x 22 10.0.2.15 22 (rule’s name—pr… Continue reading Honeypot logs VM’s gateway IP instead of incoming ones [on hold]
Since 2008, cyber-criminals have been creating malware to attack IoT-devices. How do we deal with that? The best option for tracking attacks, catching malware and getting an overview of attacks in this area is to use honeypots. Continue reading IoT: a malware story
I am working on a SaaS application that handles sensitive data. I had the idea of planting various canaries across our application / infrastructure to get early warnings of people being a bit too much interested in our work.
… Continue reading Do blue teams plant CTF like canaries across infrastructure?
I would like to create a honeypot (bot) to hunt browser zero-days (and browser extensions). What is the best way to find those 0days automatically (I would like to create a sandboxed bot which would visit websites and check i… Continue reading Honeypot for hunting browser zero-days, rootkits and malware [on hold]
Isn’t it better to “open” our doors, ajar, leaving a bit of honey behind the door, instead of trying to close what makes it more interesting for the hacker to keep on the operation?
Maybe using a trap behind the open door?
… Continue reading Why are we still attempting to smart off hackers? [on hold]
To help train government and industry organizations on how to prevent cyberattacks, as part of a research project for the U.S. Army, scientists at The University of Texas at San Antonio, developed the first framework to score the agility of cyber attac… Continue reading First framework to score the agility of cyber attackers and defenders