article thumbnail

Robocall Results from a Telephony Honeypot

Schneier on Security

A group of researchers set up a telephony honeypot and tracked robocall behavior : NCSU researchers said they ran 66,606 telephone lines between March 2019 and January 2020, during which time they said to have received 1,481,201 unsolicited calls -- even if they never made their phone numbers public via any source. Research paper.

Honeypots 102
article thumbnail

Apache Log4j Zero Day Exploit Puts Large Number of Servers at Severe Risk

eSecurity Planet

Open-source projects like Paper, the server used by Minecraft, have begun patching Log4j 2. Deutsche Telekom officials said in a tweet that they “are observing attacks in our honeypot infrastructure coming from the TOR network.”.

Risk 135
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malware Training Sets: FollowUP

Security Affairs

Some of them are listed here, but many others papers, articles and researches have been released (just ask to Google). I am so glad that many international researches used my classified Malware dataset as building block for making great analyses and for improving the state of the art on Malware research.

article thumbnail

The Information Management Umbrella

Brandeis Records Manager

I partner with our Chief Info Security Officer on projects and share his vigilance under the broader governance umbrella, but I am not responsible for endpoint detection and response, authentication protocols, malware interception, and honeypots. Interesting stuff, but beyond my job function.

article thumbnail

Challenges faced while training an AI to combat abuse

Elie

this paper. Collecting ground truth with honeypots. The main difficulty with honeypots is to make sure that the collected data is representative of the set of the attacks experienced by production systems. Overall, honeypots are very valuable, but it takes a significant investment to get them to collect meaningful attacks.

article thumbnail

Challenges faced while training an AI to combat abuse

Elie

this paper. Collecting ground truth with honeypots : Honeypots. The main difficulty with honeypots is to make sure that the collected data is representative of the set of the attacks experienced by production systems. main paper), better known as GAN, to. data augmentation techniques. tuning the learning rate.

article thumbnail

Inside Mirai the infamous IoT Botnet: A Retrospective Analysis

Elie

joint paper. By its second day, Mirai already accounted for half of all Internet telnet scans observed by our collective set of honeypots, as shown in the figure above. Together, we uncovered the Mirai backstory by combining our telemetry and expertise. This blog post recounts Mirai’s tale from start to finish. It is based on the.

IoT 107