Remove Government Remove Honeypots Remove Mining Remove Tools
article thumbnail

Free Tool: Honey Feed

Security Affairs

Cybersecurity expert Marco Ramilli shared another tool of his arsenal that extracts suspicious IPs from undesired connections, his HoneyPots. Hi folks, today I’d like to point you out another tool of mine which extracts suspicious IPs from undesired connections. In other words: HoneyPots. HoneyPot Page.

article thumbnail

Pro-Ukraine attackers compromise Docker images to launch DDoS attacks on Russian sites

Security Affairs

Pro-Ukraine hackers, likely linked to Ukraine IT Army , are using Docker images to launch distributed denial-of-service (DDoS) attacks against a dozen websites belonging to government, military, and media. “Container and cloud-based resources are being abused to deploy disruptive tools. ” reported Crowdstrike.

Honeypots 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Deception Tools for 2022

eSecurity Planet

If an attacker is spending time and energy breaking into a decoy server, the defender is not only protecting valuable assets, but also learning about the attacker’s objectives, tools, tactics, and procedures. That is the basic premise behind deception tools and technologies. Read next: Best Incident Response Tools and Software.

Cloud 131
article thumbnail

The Hacker Mind Podcast: Incident Response in the Cloud

ForAllSecure

You know, because what we had to do is actually go out physically obtain the data, bring it back to a central location, copy the data across to another drive, process it one by one with a whole bunch of tools and open source solutions, etc, etc. They do like crypto mining and containers and stuff. This was a more traditional attack.

Cloud 40
article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

CLEMENS: Shadow Dragon is a company that builds innovative open source intelligence tools to help the investigator focus on the information that's relevant. Mine was 2000. All those exercises, the honeypot or honeynet challenges I think that's what they were called in. It was just a different outcome and different tools.

IT 40