Blog
Articles about honeypots, malware analysis, and other cyber security topics.
Securing Kubernetes: Using Honeypots to Detect and Prevent Lateral Movement Attacks
This article examines lateral movement threats in Kubernetes clusters and demonstrates how to configure and deploy the Beelzebub honeypot system using Helm to detect and prevent these attacks.
user: Mario Candela, date: 30/03/2025How cybercriminals make money with cryptojacking
Catch a crypto jacking malware and analyze how cybercriminals make money with it using a LLM honeypot.
user: Mario Candela, date: 08/02/2025SSH LLM Honeypot caught a real threat actor
Discover how a real threat actor was captured and analyzed using an SSH LLM honeypot.
user: Mario Candela, date: 24/12/2024LLM Honeypot
LLM Honeypot with Beelzebub framework
user: Mario Candela, date: 25/06/2024How cybercriminals attacks your company
How cybercriminals attacks your company
user: Mario Candela, date: 08/10/2024