all InfoSec news
Catching Threat Actors using honeypots (Part 2)
April 22, 2023, 12:17 p.m. | /u/TachiPy
cybersecurity www.reddit.com
I am very happy to share the second part of my honeypot research today!
https://burningmalware.com/Catching-Threat-Actors-using-honeypots!-(Part2)/
Since my last post caught some interest, I decided to also share part 2 with you folks.
In this part, we will finally take a look at some data generated by the honeypots. The focus will mainly be on Cowrie data.
I also decided to share the malware samples I collected so far. If you are interested in downloading it, you can find it …
caught cowrie cybersecurity data find focus free generated honeypot honeypots interest malware questions research server share threat threat actors
More from www.reddit.com / cybersecurity
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
DevSecOps Engineer
@ LinQuest | Beavercreek, Ohio, United States
Senior Developer, Vulnerability Collections (Contractor)
@ SecurityScorecard | Remote (Turkey or Latin America)
Cyber Security Intern 03416 NWSOL
@ North Wind Group | RICHLAND, WA
Senior Cybersecurity Process Engineer
@ Peraton | Fort Meade, MD, United States
Sr. Manager, Cybersecurity and Info Security
@ AESC | Smyrna, TN 37167, Smyrna, TN, US | Santa Clara, CA 95054, Santa Clara, CA, US | Florence, SC 29501, Florence, SC, US | Bowling Green, KY 42101, Bowling Green, KY, US