Skip to content
  • Home
  • About
  • Contact
  • HoneyPi
  • Recommended Reading
  • Useful Links

TopSpin commercial gets funding

Interesting commercial offering:

http://www.geektime.com/2016/01/04/israeli-topspin-whirls-up-a-7m-series-a-for-honeypot-cyber-security-solutions/

This entry was posted in Post on January 5, 2016 by Jonathan.

Great overview of Honeypots

Superb write up and overview of what honeypots can be used for and can provide (a little weak on the details, but then again this is a huge domain once you start to scratch the surface 🙂

http://archive.hack.lu/2015/Dr.Honeypots_Worskhop_Hack.lu2015_Rist_Arcas%20.pdf

This entry was posted in Post on October 29, 2015 by Jonathan.

Deception for security

Some interesting takes on an old topic: https://www.cerias.purdue.edu/site/deception/

This entry was posted in Post on August 9, 2015 by Jonathan.

Trip down memory lane

Please check out this excellent write up by David Watson: http://www.honeynet.org/node/1267

This entry was posted in Post and tagged honeypots, low interaction honeypots on August 9, 2015 by Jonathan.

IoT’s and honeypots

Getting ready for the rapid emergence of the IoT space, the guys out of Japan are showing how relevant honeypots are: http://ipsr.ynu.ac.jp/iot/index.html#desctiption

This entry was posted in Post and tagged honeypots, Internet of things, IoT on August 9, 2015 by Jonathan.

Interesting paper

Some new and interesting work building on an in-kernel module for high interaction honeypots: http://arxiv.org/pdf/1507.03117v1.pdf

This entry was posted in Post and tagged high interaction, honeypot, kernel on July 21, 2015 by Jonathan.

Honeypot decoys

An idea I’d also thought needed to reach production ready status, thankfully the folks at Cymmetria are promising the goods. The proof of a true ‘plug’n’play’ nature will only be evident once the technology can be rolled out, but the concept is great:

http://www.cymmetria.com/

YC-Backed Cymmetria Uses Virtual Machines To Decoy And Detect Hackers

This entry was posted in Post and tagged decoys, honeypots, virtual machines on July 8, 2015 by Jonathan.

Interesting breakdown

14 days running a secret Dark Web pedophile honeypot (and why I now think Tor is the devil): http://geekslop.com/2015/catching-pedophiles-running-secret-dark-web-tor-honeypot

This entry was posted in Post and tagged dark web, pedophile honeypot on July 8, 2015 by Jonathan.

MHN Overview

A nice breakdown of MHN and overview of what ThreatStream are up to: https://www.youtube.com/watch?v=Zd1Br8TW1mk

This entry was posted in Post and tagged honeypots, Threatstream on May 5, 2015 by Jonathan.

Elastic search honeypot

Nothing too exciting here, however with the industry clamoring for Big Data analysis and elastic search being a tool of choice for many, this could have real future implications.

http://jordan-wright.github.io/blog/2015/03/23/introducing-elastichoney-an-elasticsearch-honeypot/

This entry was posted in Post and tagged elastic search, honeypot on April 1, 2015 by Jonathan.

Post navigation

← Older posts

Archive

  • January 2016
  • October 2015
  • August 2015
  • July 2015
  • May 2015
  • April 2015
  • February 2015
  • October 2014
  • September 2014