The Difference Between Sandboxing, Honeypots & Security Deception

Dark Reading

A deep dive into the unique requirements and ideal use cases of three important prevention and analysis technologies

Deception: Why It's Not Just Another Honeypot

Dark Reading

The technology has made huge strides in evolving from limited, static capabilities to adaptive, machine learning deception

Podcast: The Evolution of Deception Technology


IoT Podcasts Deception Technology honeypot Honeypots medical devices SCADADeception technology is an emerging category of cyber defense that is particularly useful when it comes to IoT devices, SCADA systems and medical devices.

New Threat Actor ‘Rocke’: A Rising Monero Cryptomining Menace


A threat actor been spotted on a number of honeypots looking to download and execute malicious cryptomining malware. Hacks Malware Cryptominer cryptomining Cryptomining Malware honeypot malware Monero oracle web logic server rocke shell script threat actor

Automated Bots Growing Tool For Hackers


Hacks RSAC Automated Bot bot hack hacker honeypot RSAThe use of automated bots is becoming more prevalent for novice attackers as tools become more available, researchers found.

Tools 60

Even 'Regular Cybercriminals' Are After ICS Networks

Dark Reading

A Cybereason honeypot project shows that ordinary cybercriminals are also targeting weakly secured environments

Researchers Offer 'a VirusTotal' for ICS

Dark Reading

Free online sandbox, honeypot tool simulates a real-world industrial network environment

Misleading Cyber Foes with Deception Technology

Dark Reading

Today's deception products go far beyond the traditional honeypot by catching attackers while they are chasing down non-existent targets inside your networks

How Cybercriminals are Targeting free Wi-Fi Users?

Security Affairs

Fake Honeypots. The fake honeypots are quite similar to the fake Wi-Fi access points, but the only difference is that the honeypot is set in a more sophisticated manner. Free Wi-Fi is convenient, but it is also unsafe and puts users at great risk.

Evolution of threat landscape for IoT devices – H1 2018

Security Affairs

The researchers set up a honeypot to collect data on infected IoT devices, the way threat actors infect IoT devices and what families of malware are involved. Security experts from Kaspersky have published an interesting report on the new trends in the IoT threat landscape.

IoT 89

Hacking the hackers – IOT botnet author adds his own backdoor on top of a ZTE router backdoor

Security Affairs

The code by Scarface targets devices on a different port, 8083 though( justifying why our NewSky honeypots are seeing a surge of this vulnerability usage on port 8083 instead of the standard 80/8080 ports).

IoT 109

Shellbot Botnet Targets IoT devices and Linux servers

Security Affairs

The experts used the credentials from one of the commands injected into the honeypots, they noticed the files’ contents often changed on the server and modification, deletion and addition of files mostly happened during daytime in Central European Time/CET.

IoT 106

Ngrok Mining Botnet

Security Affairs

In my previous post I discussed the initial prototyping of a Docker Honeypot / Sandbox called Whaler. There’s a clear correlation between the honeypot first appearing on Shodan and an immediate wave of attacks.

Mining 102

Weekly podcast: ICS attacks, Reddit and SIM swap arrests

IT Governance

Cybereason’s researchers recently set up a honeypot environment with a network architecture that replicated that of “typical power substation” and waited.

Chalubo, a new IoT botnet emerges in the threat landscape

Security Affairs

These types of simple attacks on our honeypots are quite common, but what made this stand out was the libsdes sample.”

IoT 85

Q&A: How emulating attacks in a live environment can more pervasively protect complex networks

The Last Watchdog

We’ve set up honeypots around the world, which we use to harvest and categorize malware. Most large enterprises today can point to multi-millions of dollars expended over the past two decades erecting “layered defenses” to protect their digital systems. Yet catastrophic network breaches continue apace. Turns out there’s a downside to “defense in depth.”. Related: Obsolecense creeps into legacy systems.

Challenges faced while training an AI to combat abuse


Collecting ground truth with honeypots : Honeypots. The main difficulty with honeypots is to make sure that the collected data is representative of the set of the attacks experienced by production systems.

Podcast Episode 109: What’s The US Freedom Army? Ask Russia.

The Security Ledger

When the firm Cyberreason set up a honeypot network designed to look just like a functioning industrial control system environment, they were expecting to attract a few flies. In this week’s episode of the Security Ledger Podcast (#109): What lurks in the dark recesses of online information operations? How about a secret “US Freedom Army” organized by Russia linked online “info ops?” ” Dave Aitel of Cyxtera joins us to talk about it.

Facebook, Twitter, and the Senate Hearings: It’s The Business Model, Period.

John Battelle's Searchblog

“We weren’t expecting any of this when we created Twitter over 12 years ago, and we acknowledge the real world negative consequences of what happened and we take the full responsibility to fix it.”

Leopard Spots and Zebra Stripes: Big Data and Identity Management

Thales Data Security

Because behavioral biometric data can contain confidential and personal information, and reveal sensitive insight, it can also be a high value target and represent a honeypot for attackers.

Google+ Won (Or Why Google Never Needed A Social Network)

John Battelle's Searchblog

The post Google+ Won (Or Why Google Never Needed A Social Network) appeared first on John Battelle's Search Blog. Since the news that Google+ chief Vic Gundotra has abruptly left the company , the common wisdom holds that Google’s oft-derided Facebook clone will not be long for this world.

The Information Management Umbrella

Brandeis Records Manager

I partner with our Chief Info Security Officer on projects and share his vigilance under the broader governance umbrella, but I am not responsible for endpoint detection and response, authentication protocols, malware interception, and honeypots. George Despres, CRM. Program Director for University Records Management, Brandeis University. The content in this blog reflects the opinions of the author, and not of Brandeis University.).

Inside Mirai the infamous IoT Botnet: A Retrospective Analysis


By its second day, Mirai already accounted for half of all Internet telnet scans observed by our collective set of honeypots, as shown in the figure above. This post provides a retrospective analysis of Mirai — the infamous Internet-of-Things botnet that took down major websites via massive distributed denial-of-service using hundreds of thousands of compromised Internet-Of-Things devices. At its peak in September 2016, Mirai temporarily crippled several high-profile services such as.