Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Sleeper Shells: Attackers Are Planting Dormant Backdoors in Ivanti EPMM (defusedcyber.com)
149 points by waihtis 20 days ago | past | 52 comments
React2Shell Exploitation: A Short Summary of Honeypot Activity (defusedcyber.com)
3 points by waihtis 84 days ago | past
SharePoint Exploit Intelligence with Honeypots (defusedcyber.com)
2 points by waihtis 7 months ago | past
Tracking Ransomware-Exploited Vulnerabilities by Likelihood of Exploitation (defusedcyber.com)
1 point by waihtis 9 months ago | past
Lockbit SQL Dump Visualizer (defusedcyber.com)
2 points by waihtis 9 months ago | past
Deception Plays a Large Role in NIST SP 800-160 (defusedcyber.com)
3 points by waihtis on Oct 2, 2024 | past
Cyber Deception Has Use Cases You Aren't Thinking Of (defusedcyber.com)
3 points by waihtis on Sept 25, 2024 | past
A Crypto Turfwar with Cloud Decoys (defusedcyber.com)
1 point by waihtis on Sept 19, 2024 | past
Cyber Deception vs. Honeypots (defusedcyber.com)
1 point by waihtis on Aug 1, 2024 | past
Misconceptions of AI-Driven Attacks in Infosec (defusedcyber.com)
1 point by waihtis on June 29, 2024 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: