Smart Honeypot Blog https://blog.smarthoneypot.com Know your enemy prior to building your defence Mon, 26 Nov 2018 09:06:19 +0000 en-US hourly 1 https://wordpress.org/?v=4.5.15 #HITB2015AMS Presentation: Uncovering Secret Connections among Attackers https://blog.smarthoneypot.com/hitb2015ams-presentation-uncovering-secret-connections-among-attackers/ https://blog.smarthoneypot.com/hitb2015ams-presentation-uncovering-secret-connections-among-attackers/#respond Mon, 01 Jun 2015 07:02:39 +0000 https://blog.secdim.com/?p=274 https://blog.smarthoneypot.com/hitb2015ams-presentation-uncovering-secret-connections-among-attackers/feed/ 0 #HITB2015, Amsterdam, 28th May, Uncovering Secret Connections Using Network Theory and Custom Honeypots. Looking forward to see you at our talk! https://blog.smarthoneypot.com/hitb2015-amsterdam-28th-may-uncovering-secret-connections-using-network-theory-and-custom-honeypots-looking-forward-to-see-you-at-our-talk/ Wed, 13 May 2015 23:08:39 +0000 https://blog.secdim.com/?p=271 Come and join our presentation, So you think all those attacks are originated from China? Let’s go through a journey of an in-depth investigation of attacks by using custom honeypots. 2nd May, 14:03pm #WAHCKon [2], Perth https://blog.smarthoneypot.com/come-and-join-our-presentation-so-you-think-all-those-attacks-are-originated-from-china-lets-go-through-a-journey-of-an-in-depth-investigation-of-attacks-by-using-custom-honeypots-2nd-may-1403p/ Fri, 01 May 2015 08:30:12 +0000 https://blog.secdim.com/?p=267 What active defence is and is not https://blog.smarthoneypot.com/what-active-defence-is-and-is-not/ Tue, 21 Apr 2015 04:01:31 +0000 https://blog.secdim.com/?p=258 5 effective use-cases of a honeypot system for enterprises https://blog.smarthoneypot.com/5-effective-use-cases-of-a-honeypot-system-for-enterprises/ https://blog.smarthoneypot.com/5-effective-use-cases-of-a-honeypot-system-for-enterprises/#respond Wed, 01 Apr 2015 07:16:57 +0000 https://blog.secdim.com/?p=243 https://blog.smarthoneypot.com/5-effective-use-cases-of-a-honeypot-system-for-enterprises/feed/ 0 Thanks to everyone who’s joined our talk at @BsidesLjubljana. We will be also presenting this year at @WAHckon and then @HITBSecConf https://blog.smarthoneypot.com/thanks-to-everyone-whos-joined-our-talk-at-bsidesljubljana-we-will-be-also-presenting-this-year-at-wahckon-and-then-hitbsecconf/ Fri, 20 Mar 2015 06:12:10 +0000 https://blog.secdim.com/?p=238 Tomorrow (12 March), 3pm, Track 1, come and join our presentation on “Uncovering the secret connections among online attackers using network theory and custom honeypots” at #BsidesLjubliana, http://bsidesljubljana.si/schedule/ https://csa-cee-summit.eu/ #CSA #CEE Summit 2015 https://blog.smarthoneypot.com/bsidesljubliana-presentation-12-march-2015/ Wed, 11 Mar 2015 12:40:10 +0000 https://blog.secdim.com/?p=230 Your Amazon EC2 attack profile changes on different geographic region https://blog.smarthoneypot.com/your-amazon-ec2-attack-profile-changes-on-different-geographic-region/ https://blog.smarthoneypot.com/your-amazon-ec2-attack-profile-changes-on-different-geographic-region/#respond Thu, 18 Dec 2014 04:40:50 +0000 http://blog.smarthoneypot.com/?p=87 https://blog.smarthoneypot.com/your-amazon-ec2-attack-profile-changes-on-different-geographic-region/feed/ 0 An in-depth analysis of SSH attacks on Amazon EC2 https://blog.smarthoneypot.com/in-depth-analysis-of-ssh-attacks-on-amazon-ec2/ https://blog.smarthoneypot.com/in-depth-analysis-of-ssh-attacks-on-amazon-ec2/#comments Sat, 30 Aug 2014 23:20:16 +0000 http://blog.smarthoneypot.com/?p=35 https://blog.smarthoneypot.com/in-depth-analysis-of-ssh-attacks-on-amazon-ec2/feed/ 1 Your EC2 intance can mine a bitcoin. Well, not for you! https://blog.smarthoneypot.com/your-ec2-intance-can-mine-a-bitcoin-well-not-for-you/ https://blog.smarthoneypot.com/your-ec2-intance-can-mine-a-bitcoin-well-not-for-you/#respond Wed, 14 May 2014 20:34:38 +0000 http://blog.smarthoneypot.com/?p=8 https://blog.smarthoneypot.com/your-ec2-intance-can-mine-a-bitcoin-well-not-for-you/feed/ 0