Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Tracking Citrix Netscaler CVE-2026-3055 Across 13 Days of Honeypot Telemetry (defusedcyber.com)
2 points by waihtis 3 days ago | past | discuss
Sleeper Shells: Attackers Are Planting Dormant Backdoors in Ivanti EPMM (defusedcyber.com)
149 points by waihtis 55 days ago | past | 52 comments
React2Shell Exploitation: A Short Summary of Honeypot Activity (defusedcyber.com)
3 points by waihtis 3 months ago | past
SharePoint Exploit Intelligence with Honeypots (defusedcyber.com)
2 points by waihtis 8 months ago | past
Tracking Ransomware-Exploited Vulnerabilities by Likelihood of Exploitation (defusedcyber.com)
1 point by waihtis 10 months ago | past
Lockbit SQL Dump Visualizer (defusedcyber.com)
2 points by waihtis 11 months ago | past
Deception Plays a Large Role in NIST SP 800-160 (defusedcyber.com)
3 points by waihtis on Oct 2, 2024 | past
Cyber Deception Has Use Cases You Aren't Thinking Of (defusedcyber.com)
3 points by waihtis on Sept 25, 2024 | past
A Crypto Turfwar with Cloud Decoys (defusedcyber.com)
1 point by waihtis on Sept 19, 2024 | past
Cyber Deception vs. Honeypots (defusedcyber.com)
1 point by waihtis on Aug 1, 2024 | past
Misconceptions of AI-Driven Attacks in Infosec (defusedcyber.com)
1 point by waihtis on June 29, 2024 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: