April 22, 2023, 12:17 p.m. | /u/TachiPy

cybersecurity www.reddit.com

Ohayo!

I am very happy to share the second part of my honeypot research today!

https://burningmalware.com/Catching-Threat-Actors-using-honeypots!-(Part2)/

Since my last post caught some interest, I decided to also share part 2 with you folks.

In this part, we will finally take a look at some data generated by the honeypots. The focus will mainly be on Cowrie data.

I also decided to share the malware samples I collected so far. If you are interested in downloading it, you can find it …

caught cowrie cybersecurity data find focus free generated honeypot honeypots interest malware questions research server share threat threat actors

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

DevSecOps Engineer

@ LinQuest | Beavercreek, Ohio, United States

Senior Developer, Vulnerability Collections (Contractor)

@ SecurityScorecard | Remote (Turkey or Latin America)

Cyber Security Intern 03416 NWSOL

@ North Wind Group | RICHLAND, WA

Senior Cybersecurity Process Engineer

@ Peraton | Fort Meade, MD, United States

Sr. Manager, Cybersecurity and Info Security

@ AESC | Smyrna, TN 37167, Smyrna, TN, US | Santa Clara, CA 95054, Santa Clara, CA, US | Florence, SC 29501, Florence, SC, US | Bowling Green, KY 42101, Bowling Green, KY, US