Remove Government Remove Honeypots Remove Industry Remove Security
article thumbnail

Free Tool: Honey Feed

Security Affairs

Cybersecurity expert Marco Ramilli shared another tool of his arsenal that extracts suspicious IPs from undesired connections, his HoneyPots. In other words: HoneyPots. I run a personal HoneyPot network which stands from years and over time it harvested numerous IP addresses which could be, potentially, malicious (typically scanners).

article thumbnail

Bad Packets warns of over 14,500 Pulse secure VPN endpoints vulnerable to CVE-2019-11510

Security Affairs

BadPackets experts observed on August 22 a mass scanning activity targeting Pulse Secure “Pulse Connect Secure” VPN endpoints vulnerable to CVE-2019-11510. On August 22, BadPackets experts observed a mass scanning activity targeting Pulse Secure “Pulse Connect Secure” VPN endpoints vulnerable to CVE-2019-11510.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos

The Security Ledger

In this episode of The Security Ledger Podcast (#255) host Paul Roberts interviews Niels Provos of Lacework about his mission to use EDM to teach people about cybersecurity. The post Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos appeared first on The Security Ledger with Paul F. Click the icon below to listen.

article thumbnail

Weekly podcast: ICS attacks, Reddit and SIM swap arrests

IT Governance

This week, we discuss new research into attacks on industrial control systems, Reddit’s recent breach, and an apparent crackdown on SIM swap fraud. Hello and welcome to the IT Governance podcast for Friday, 10 August. The security basics are really what’s going to prevent a bad day from becoming a catastrophic day”.

article thumbnail

Catches of the Month: Phishing Scams for May 2023

IT Governance

Another ChatGPT threat vector emerges Since the emergence of ChatGPT last year, IT Governance has covered the cyber security implications it’s having in comprehensive detail. Research from the cyber security firm Check Point discovered 13,295 newly registered domains imitating OpenAI and ChatGPT. Can you spot a scam?

article thumbnail

Malware Training Sets: FollowUP

Security Affairs

I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna. I do have experience on security testing since I have been performing penetration testing on several US electronic voting systems. Pierluigi Paganini.

article thumbnail

The Hacker Mind Podcast: Incident Response in the Cloud

ForAllSecure

James Campbell, CEO of Cado Security , shares his experience with traditional incident response, and how the cloud, with its elastic structure, able to spin up and spin down instances, is changing incident response. MUSIC] VAMOSI: If you haven’t been paying attention, cloud security is critical right now. So that's great.

Cloud 40