Blog
Articles about honeypots, malware analysis, and other cyber security topics.
How cybercriminals make money with cryptojacking
Catch a crypto jacking malware and analyze how cybercriminals make money with it using a LLM honeypot.
user: Mario Candela, date: 08/02/2025SSH LLM Honeypot caught a real threat actor
Discover how a real threat actor was captured and analyzed using an SSH LLM honeypot.
user: Mario Candela, date: 24/12/2024LLM Honeypot
LLM Honeypot with Beelzebub framework
user: Mario Candela, date: 25/06/2024How cybercriminals attacks your company
How cybercriminals attacks your company
user: Mario Candela, date: 08/10/2024