Open in app

Sign In

Write

Sign In

Px Mx
Px Mx

127 Followers

Home

About

Published in Compass True North

·Nov 28, 2022

Simple Bad Bot Mitigation With Signal Sciences

There is a ton of bot activity on the Internet. Anyone tasked with defending high-traffic websites will know this well. Some bots are good and desired — think search engine crawlers. Some bots are benign such as scripts making API calls or monitoring site availability. But often, bots can be…

Application Security

5 min read

Simple Bad Bot Mitigation With Signal Sciences
Simple Bad Bot Mitigation With Signal Sciences
Application Security

5 min read


Nov 28, 2022

HoneyDB Payload History

HoneyDB is excited to release a new payload-history endpoint to HoneyDB’s Threat Information API. This new API endpoint provides access to historical payload data going back to 2014. The data behind this endpoint has been distilled down to key attributes from honeypot interactions. Examples of this data include commands issued…

Cybersecurity

3 min read

HoneyDB Payload History
HoneyDB Payload History
Cybersecurity

3 min read


Nov 17, 2022

What Is Cyber Deception?

In recent years many cybersecurity professionals have become more familiar with cyber deception as this space continues to mature. There are also those security professionals that may have heard of it but are not familiar with what it is in a practical sense. If you do a search on cyber…

Cybersecurity

3 min read

What Is Cyber Deception?
What Is Cyber Deception?
Cybersecurity

3 min read


Jul 9, 2019

Anyone Can Have a Bad Day

Anyone can have a bad day. Take for example, in professional baseball, the league’s top-performing pitcher. This pitcher could be unhittable for most of the season, but then have a single game where he just can’t find the strike zone or the opposing team is hitting and scoring with ease…

Cloud Computing

7 min read

Anyone Can Have a Bad Day
Anyone Can Have a Bad Day
Cloud Computing

7 min read


Jun 6, 2019

HoneyDB on DigitalOcean Marketplace

The HoneyDB project continues to evolve to make it easier for developers, security researchers, and network defenders to deploy honeypots on the Internet. As a new step forward in this evolution, I’m happy to announce the HoneyDB Agent is available as a 1-Click deployment in the DigitalOcean Marketplace! …

Digitalocean

2 min read

HoneyDB on DigitalOcean Marketplace
HoneyDB on DigitalOcean Marketplace
Digitalocean

2 min read


Apr 15, 2019

Simple Tool for Testing CVE Mitigation in Web Apps

With Internet exposed web applications prompt mitigation of CVE (Common Vulnerabilities and Exposures) is critical. When a new CVE has been announced the response drill is all too familiar to InfoSec teams. First, evaluate the details of the CVE to determine if any of their applications are impacted. In many…

Cybersecurity

4 min read

Simple Tool for Testing CVE Mitigation in Web Apps
Simple Tool for Testing CVE Mitigation in Web Apps
Cybersecurity

4 min read


Mar 4, 2019

Protect All Your Home Devices From Malware & Hackers

We do a lot to protect our homes. After all, the home is meant to be our safe place, where we can find comfort and have privacy. To protect our safe place we have fences, locks on doors, alarm systems with sensors, surveillance cameras, and even video doorbells. Oh, and…

Networking

9 min read

Protect All Your Home Devices From Malware & Hackers
Protect All Your Home Devices From Malware & Hackers
Networking

9 min read


Feb 11, 2019

Cybersecurity Predictions and Cybersecurity Shutdowns

In early Fall of 2018, I drafted a cybersecurity predictions article for 2019, which was published by DARK Reading. Since drafting the article I have seen various reports of incidents that confirmed some of the items I talked about. While we are still only just getting started in 2019, I…

Cybersecurity

4 min read

Cybersecurity Predictions and Cybersecurity Shutdowns
Cybersecurity Predictions and Cybersecurity Shutdowns
Cybersecurity

4 min read


Nov 15, 2018

How To Capture Malware Samples With HoneyDB

Does malware analysis peak your interest? Are you looking for sources of malware for research, or just to practice your craft? Honeypots are a great way to identify sources of malware. There are numerous honeypots available that will help you find or even capture malware samples. However, in this post…

Honeypot

6 min read

How To Capture Malware Samples With HoneyDB
How To Capture Malware Samples With HoneyDB
Honeypot

6 min read


Published in Signal Sciences Labs

·Nov 7, 2018

Dear RASP: We Need to Talk About the Friction in Our Relationship

Dear RASP, It is finally time for me to write you this letter. When we first met you were something new and exciting. I had never seen anything in application security (AppSec) like you before. You were a different and promising solution to mitigate the risks we all worry about…

Rasp

6 min read

Dear RASP: We Need to Talk About the Friction in Our Relationship
Dear RASP: We Need to Talk About the Friction in Our Relationship
Rasp

6 min read

Px Mx

Px Mx

127 Followers

http://linkedin.pxmx.io

Following
  • Marcos Ortiz

    Marcos Ortiz

  • Kevin Beaumont

    Kevin Beaumont

  • Aan

    Aan

  • Mike Mackintosh

    Mike Mackintosh

  • Cristian Randieri, Phd

    Cristian Randieri, Phd

See all (57)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech