- Security Blog
- By Catalin Cimpanu
- March 8th, 2016
Google and Dell Open-Source Two Security Tools
Dell open-sources an AD honeypot server, Google releases some questionnaires for assessing a company's security status
- Server related
- By Catalin Cimpanu
- March 3rd, 2016
These Are the Top Usernames and Passwords Attackers Use When Hacking Your Server
Most hackers think servers are protected by the password "x"
- Security
- By Catalin Cimpanu
- February 18th, 2016
Dark Web Honeypot Shows How Quickly Leaked Passwords Attract Hackers
The conclusion: Don't reuse your passwords
- Security
- By Catalin Cimpanu
- February 14th, 2016
Phishing Campaign Targets Cybercriminals for Once
AlphaBay phishing campaign detected in the wild
- Hacking News
- By Catalin Cimpanu
- January 5th, 2016
Infamous Hacking Forum Hell Returns Online, Raises Questions of Trust
Most users believe it to be a blatant honeytrap
- Security
- By Catalin Cimpanu
- December 23rd, 2015
Hackers Are Already Using the Secret Juniper Firewall Backdoor in Their Attacks
Honeypot experiment shows growing interest from attackers in vulnerable Juniper NetScreen firewall equipment
- Security
- By Catalin Cimpanu
- December 14th, 2015
Researchers Fail to Set Up Proper Honeypots UPDATE
Weak honeypots means unimportant security intel
- Security
- By Ionut Ilascu
- May 11th, 2015
Honeypot Records 8,000 Attacks Exploiting RCE Flaw in Elasticsearch
Most of the assaults originate from machines in China
- Security
- By Ionut Ilascu
- January 15th, 2015
Pirate Party President Logs WiFi Traffic at Major Security Conference in Sweden
Around 100 people connected to the insecure network
- Security Blog
- By Ionut Ilascu
- August 2nd, 2014
Raspberry Pi Used for Building Honeypots on a Budget
Intern at security company builds cheap honeypot sensors
- Security Fixes and Improvements
- By Ionut Ilascu
- July 28th, 2014
Honeypot Solution HoneyDrive Receives Update to Version 3
Includes new honeypot-related software and tools for researchers
- Security
- By Ionut Ilascu
- June 20th, 2014
Easier Honeypot Deployment and Management with Modern Honey Network
Open source tool for automating the setup and management of honeypots
- Web Blog
- By Lucian Parfeni
- August 16th, 2013
Copyright Troll Caught Seeding the Torrents It Then Sued People Over
Prenda Law was actively sharing the movies, it then alleged people were pirating
- Security
- By Eduard Kovacs
- March 20th, 2013
Expert Sets Up ICS Honeypots to See Where Most Attacks Come From
39 cyberattacks were recorded during a 29-day period
- Security
- By Eduard Kovacs
- November 23rd, 2012
ENISA Releases Report on the Use of Honeypots to Detect Cyberattacks
CERTs are not using such resources as much as they should
- Security Blog
- By Eduard Kovacs
- June 15th, 2012
Ghost Honeypot Released to Capture Malware That Spreads via USB
Here's a video in which one of the developers shows how it works