Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
Sleeper Shells: Attackers Are Planting Dormant Backdoors in Ivanti EPMM
(
defusedcyber.com
)
149 points
by
waihtis
20 days ago
|
past
|
52 comments
React2Shell Exploitation: A Short Summary of Honeypot Activity
(
defusedcyber.com
)
3 points
by
waihtis
84 days ago
|
past
SharePoint Exploit Intelligence with Honeypots
(
defusedcyber.com
)
2 points
by
waihtis
7 months ago
|
past
Tracking Ransomware-Exploited Vulnerabilities by Likelihood of Exploitation
(
defusedcyber.com
)
1 point
by
waihtis
9 months ago
|
past
Lockbit SQL Dump Visualizer
(
defusedcyber.com
)
2 points
by
waihtis
9 months ago
|
past
Deception Plays a Large Role in NIST SP 800-160
(
defusedcyber.com
)
3 points
by
waihtis
on Oct 2, 2024
|
past
Cyber Deception Has Use Cases You Aren't Thinking Of
(
defusedcyber.com
)
3 points
by
waihtis
on Sept 25, 2024
|
past
A Crypto Turfwar with Cloud Decoys
(
defusedcyber.com
)
1 point
by
waihtis
on Sept 19, 2024
|
past
Cyber Deception vs. Honeypots
(
defusedcyber.com
)
1 point
by
waihtis
on Aug 1, 2024
|
past
Misconceptions of AI-Driven Attacks in Infosec
(
defusedcyber.com
)
1 point
by
waihtis
on June 29, 2024
|
past
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: