article thumbnail

No, I Did Not Hack Your MS Exchange Server

Krebs on Security

The group looks for attacks on Exchange systems using a combination of active Internet scans and “honeypots” — systems left vulnerable to attack so that defenders can study what attackers are doing to the devices and how. “We have been testing 367 known web shell paths via scanning of Exchange servers.”

Honeypots 348
article thumbnail

Evolution of threat landscape for IoT devices – H1 2018

Security Affairs

The researchers set up a honeypot to collect data on infected IoT devices, the way threat actors infect IoT devices and what families of malware are involved. The first data that emerged from the study is that threat actors continue to look at the IoT devices with increasing interest. What is infecting IoT devices and how?

IoT 80
article thumbnail

Facebook, Twitter, and the Senate Hearings: It’s The Business Model, Period.

John Battelle's Searchblog

To quote Dorsey (emphasis mine): “Today we’re committing to the people and this committee to do that work and do it openly. To my mind, that will require objective study of tech’s business models, and an open mind toward changing them. We’re here to contribute to a healthy public square, not compete to have the only one.