Increasing the knowledge gap of attackers and understanding where they go to gather their intel is a powerful capability for security professionals as it allows them to strategically deploy their deception components.
Researchers at Cybereason have been analysing a complex network honeypot operation, and the results should make every CISO pause for thought.
Malicious actors kept busy late last year adding new weapons to their arsenal while placing others on the backburner as they attempted to profit from new honey pots like cryptocurrency mining and boosting the amount of old favourites.
Cyber threats are evolving quickly. Fortunately, so is incident detection and response (IDR), powered by data explains Eric Sun, with techniques such as honeypots identifying suspect behaviour.
If researchers paid more attention to the Shadow Brokers dump of alleged National Security Agency hacking tools back in April, the WannaCry and NotPetya attacks may have never happened.
Darran Rolls discusses proactive IAM techniques organisations can use to stay protected
New research claims to show that up to three percent of hidden services directories, the backbone of the Tor anonymous router system, have been compromised, which could enable the identification of users in some cases.
A free honeypot chock full of fake domain credentials has been created to educate administrators on trapping and blocking attackers.