TadiforTadi Heckstadi.hashnode.net·Aug 28, 2022SSH Honey Pot Results: 30-Day ExperimentIt's been just over 30 days since I set up my first honey pot and I am excited to share the results with all of you. You can watch the video here if you aren't all that into reading... In total there were 48,496 log-in attempts via SSH, which is mind...Discuss·150 readsBlogssh
Abiodun Awoyemiforabiodun's blogaagbotemi.hashnode.net·Jan 14, 2023Solidity Attack Vectors #8 - HoneypotA honeypot is a smart contract that purports to leak cash to an arbitrary user due to a clear vulnerability in its code in exchange for extra payments from that user. A honeypot is a trap to catch hackers. Combining two exploits, reentrancy and hidin...Discuss·32 readsSmart Contracts
ZuraDigitalforZuraDigitalzuradigital.hashnode.net·May 20, 2020No reCaptcha No Honeypot: Identify Spam, Invalid, and Junk Emails in MarketoWe have a custom solution that handles such Email entries junk, spam, and invalid Emails after form fills in Marketo. Each lead in Marketo has a dollar value linked with it, use our simple yet effective enterprise-level solution hosted in secure AWS ...Discusswebhooks
Soujanya AinforGitGuardiangitguardian.hashnode.net·Apr 20, 2023Launching GitGuardian Honeytoken: your powerful ally to detect any breaches in the supply chain!Today, after months of hard work and discovery with security teams, we are excited to launch the new Honeytoken module to protect your software supply chain against attackers targeting Source Control Management (SCM) systems, Continuous Integration, ...Discusssoftware-supply-chain-security
prg skids trgskids.hashnode.net·Apr 3, 2023Uncovering Self-Proclaimed Korean Hackers' Use of Social Engineering and Fake 0-Days to Hack "Researchers"Informed by T1G I was enjoying my morning when I was prompted by T1G (alias) regarding a self-proclaimed Korean hacking group that managed to hack a "Security Researcher" in February. While I was not overly interested, I was curious about what had ha...Discuss·114 readskorea
Dwayne McDanielforGitGuardiangitguardian.hashnode.net·Feb 24, 2023Intrusion Detection Through Cyber Deception: Disrupting Attacks With An Active DefenseWe should do our best to ensure our network and pipeline perimeters are secure and make it hard for attackers to gain access. However, the reality is that intruders will stop at nothing to gain access, as evidenced by the Uber, CircleCI, and Dropbox ...DiscussHoneypot
Abiodun Awoyemiaagbotemi.hashnode.net·Jan 14, 2023Solidity Attack Vectors #8 - HoneypotA honeypot is a smart contract that purports to leak cash to an arbitrary user due to a clear vulnerability in its code in exchange for extra payments from that user. A honeypot is a trap to catch hackers. Combining two exploits, reentrancy and hidin...Discuss·32 readsSmart Contracts
Taditadi.hashnode.net·Aug 28, 2022How To Set Up An SSH Honey PotBefore we get into the meat and potatoes, here is a general overview of this whole SSH honeypot thing… https://youtu.be/7AcS3Jcbwl4 Requirements Access to a cloud hosting platform of your choice (Linode, AWS, etc) That’s it lol If you cannot affo...Discuss·194 readsBlog#cybersecurity
Taditadi.hashnode.net·Aug 28, 2022SSH Honey Pot Results: 30-Day ExperimentIt's been just over 30 days since I set up my first honey pot and I am excited to share the results with all of you. You can watch the video here if you aren't all that into reading... In total there were 48,496 log-in attempts via SSH, which is mind...Discuss·150 readsBlogssh
ZuraDigitalzuradigital.hashnode.net·May 20, 2020No reCaptcha No Honeypot: Identify Spam, Invalid, and Junk Emails in MarketoWe have a custom solution that handles such Email entries junk, spam, and invalid Emails after form fills in Marketo. Each lead in Marketo has a dollar value linked with it, use our simple yet effective enterprise-level solution hosted in secure AWS ...Discusswebhooks