#honeypot

[ follow ]
fromThe Hacker News
1 week ago

ThreatsDay Bulletin: RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories

The company said it set up a honeytrap account populated with fake data designed to resemble real-world business data and planted a fake account on an underground marketplace for compromised credentials after it uncovered a threat actor attempting to conduct malicious activity targeting its resources in November 2025 by probing various publicly facing services and applications. The threat actor is also said to have targeted one of its employees who had no sensitive data or privileged access.
Information security
Information security
fromTheregister
2 weeks ago

Resecurity traps former ShinyHunters in honeypot

Resecurity's honeypot deceived Scattered Lapsus$ Hunters, leading to a successful login to synthetic systems and prompting a subpoena for one data thief.
#data-breach
fromDataBreaches.Net
2 weeks ago
Information security

Threat actors insisted that Resecurity's honeypot was real data. We found no evidence that it was. - DataBreaches.Net

fromDataBreaches.Net
2 weeks ago
Information security

ShinyHunters claims to have compromised Resecurity, but it looks like they fell for a honeypot - DataBreaches.Net

fromDataBreaches.Net
2 weeks ago
Information security

Threat actors insisted that Resecurity's honeypot was real data. We found no evidence that it was. - DataBreaches.Net

fromDataBreaches.Net
2 weeks ago
Information security

ShinyHunters claims to have compromised Resecurity, but it looks like they fell for a honeypot - DataBreaches.Net

Information security
fromTechzine Global
2 weeks ago

Resecurity lures attackers into honeypot after hack claim

Resecurity says attackers accessed a deliberately deployed honeypot with synthetic data, not real production systems, while defender teams monitored attacker activity.
Web development
fromCSS-Tricks
3 months ago

Building a Honeypot Field That Works | CSS-Tricks

Honeypot fields remain effective in 2025 when disguised, not hidden inline, and given realistic names and class names to avoid bot detection.
Information security
fromTheregister
3 months ago

Hacktivists deactivate after falling into researchers' trap

TwoNet hacktivists were deceived by a honeypot into compromising a fake water treatment plant, demonstrating real risks to ICS and critical infrastructure.
Roam Research
fromThe Hacker News
7 months ago

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

Threat actor ViciousTrap has compromised over 5,300 network devices globally, exploiting a critical Cisco vulnerability to create honeypot networks.
[ Load more ]