ZHtrap botnet uses honeypot to harvest infected devices
Guest Post: Analysis of a new type of botnet.
Guest Post: Analysis of a new type of botnet.
A new feature in DASH allows users to receive recurring reports of their network’s top offending IP addresses.
APNIC has a tool which looks at malicious traffic. So let’s take a deep dive!
Peek behind the scenes of APNIC’s Honeynet project to see what open source tools are being used.
The APNIC Community Honeynet Project seeks to help network engineers and network security personnel understand their online adversaries.
Honeypots can be useful tools for security research, teaching us about attackers’ methods.
Guest Post: The SISSDEN project operates a network of honeypots that detect on average around 10,000 amplification DDoS attacks per day.
I first learned about the Modern Honeypot (MHN) at the ThreatStream’s booth while I was attending the FIRST.org Annual Conference and AGM in Boston last June.
I had the opportunity to do a three-day Network Security workshop at bdNOG – with a few other colleagues from IIJ, ICANN & and BDCERT. It was the first time …