ioc.exchange is one of the many independent Mastodon servers you can use to participate in the fediverse.
INDICATORS OF COMPROMISE (IOC) InfoSec Community within the Fediverse. Newbies, experts, gurus - Everyone is Welcome! Instance is supposed to be fast and secure.

Administered by:

Server stats:

1.3K
active users

#cyberdeception

0 posts0 participants0 posts today
Stratosphere Research Laboratory<p>🎓 Meet the CÉDRIC BLANCHER SCHOLARSHIP RECIPIENTS 🎓</p><p>We're proud to present the six outstanding students awarded the Cédric Blancher Scholarship to attend The Honeynet Project Annual Workshop 2025 in Prague! These students represent the next generation of cybersecurity talent!</p><p>As part of their award, each student receives full access to the workshop's technical briefings and hands-on trainings from leading experts in the field.</p><p>👏 Join us in welcoming them to the Honeynet community!</p><p>📅 June 2–4, 2025<br> 📍 NTK, Prague<br> 🔗 <a href="https://prague2025.honeynet.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">prague2025.honeynet.org/</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Honeynet2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Honeynet2025</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Scholarship" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Scholarship</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/CyberDeception" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberDeception</span></a> <a href="https://infosec.exchange/tags/Honeypots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Honeypots</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a></p>
Stratosphere Research Laboratory<p>🎭 Can influence operations really deceive cyber adversaries?</p><p>Don’t miss Ondrej Nekovar's Lightning Talk at <a href="https://infosec.exchange/tags/Honeynet2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Honeynet2025</span></a>, on Cyber Counterintelligence, where he’ll explore how deception and influence operations intersect to mislead attackers and protect strategic interests. Learn why deception isn’t just useful—it’s essential in today’s cyber domain.</p><p>🗓️ June 2–4, 2025<br>🔗 <a href="https://prague2025.honeynet.org" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">prague2025.honeynet.org</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/CyberDeception" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberDeception</span></a> <a href="https://infosec.exchange/tags/Counterintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Counterintelligence</span></a> <a href="https://infosec.exchange/tags/InfluenceOperations" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfluenceOperations</span></a> <a href="https://infosec.exchange/tags/Honeynet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Honeynet</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/SecurityConference" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityConference</span></a></p>
Stratosphere Research Laboratory<p>🚨 The wait is over — the full program of briefings for the Honeynet Project Workshop 2025 in Prague is now live! 🎉</p><p>We’re proud to present an incredible lineup of speakers from across the globe, sharing cutting-edge work in cyber deception, honeypots, threat intelligence, and more. 🐝🌍</p><p>📍 NTK, Prague<br>🗓 June 2–4, 2025<br>👉 Register today: <a href="https://prague2025.honeynet.org/program/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">prague2025.honeynet.org/progra</span><span class="invisible">m/</span></a></p><p><a href="https://infosec.exchange/tags/Honeynet2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Honeynet2025</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/deception" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deception</span></a> <a href="https://infosec.exchange/tags/cyberdeception" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberdeception</span></a> <a href="https://infosec.exchange/tags/TI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TI</span></a> <a href="https://infosec.exchange/tags/TTPs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TTPs</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a></p>
Stratosphere Research Laboratory<p>🎺 Training alert!</p><p>Join Federico Pacheco at <a href="https://infosec.exchange/tags/Honeynet2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Honeynet2025</span></a> in Prague for a hands-on training on Translating Threats into Deception Strategies. This session walks you through a practical 4-phase approach to turning TTPs into deception activities — from behavior extraction to storytelling design.</p><p>🛠️ Learn how to extract behaviors, design scenarios, and align deception with real threats.<br>🪑 Limited seats available – don’t wait!<br>🔗 Register now: <a href="https://prague2025.honeynet.org" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">prague2025.honeynet.org</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/CyberDeception" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberDeception</span></a> <a href="https://infosec.exchange/tags/TTPs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TTPs</span></a> <a href="https://infosec.exchange/tags/TI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TI</span></a></p>
Stratosphere Research Laboratory<p>🎺 Training alert!</p><p>Join Tim Pappa at <a href="https://infosec.exchange/tags/Honeynet2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Honeynet2025</span></a> in Prague for a hands-on training on designing behaviorally based sock puppets. Tim will guide you through crafting and operating realistic deception artifacts—perfect for both beginners and seasoned practitioners.</p><p>🛠️ Learn how to embed behavioral foundations into sock puppet design<br>🪑 Limited seats available – don’t wait! <br>🔗 Register now: <a href="https://prague2025.honeynet.org" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">prague2025.honeynet.org</span><span class="invisible"></span></a> </p><p><a href="https://infosec.exchange/tags/CyberDeception" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberDeception</span></a> <a href="https://infosec.exchange/tags/training" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>training</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/SockPuppets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SockPuppets</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a></p>
Sasha the Dancing Flamingo<p>Guess who just got their web debut? Moi.</p><p>My human <span class="h-card" translate="no"><a href="https://infosec.exchange/@rnbwkat" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>rnbwkat</span></a></span> finally wrote Part 1 of our story: how we built a fake company, confused a bunch of hackers, and served up just enough cyber bait to keep things spicy. Spoiler: it involves VLANs, deception, and me, Sasha the Flamingo, showing up in logs where no bird should be. <a href="https://infosec.exchange/tags/honeypots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>honeypots</span></a> </p><p>Waddle on over and read Confound and Delay: Planting the Trap—the first in a multi-part series about our <a href="https://infosec.exchange/tags/honeypot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>honeypot</span></a> company adventures. No feathers were ruffled (well, maybe a few threat actors’).</p><p>Read it here: <a href="https://bsideschicago.org/kat-skratches/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsideschicago.org/kat-skratche</span><span class="invisible">s/</span></a></p><p><a href="https://infosec.exchange/tags/CyberDeception" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberDeception</span></a> <a href="https://infosec.exchange/tags/SashaSeesAll" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SashaSeesAll</span></a> <a href="https://infosec.exchange/tags/FlamingoOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FlamingoOps</span></a> <a href="https://infosec.exchange/tags/Wazuh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wazuh</span></a> <a href="https://infosec.exchange/tags/ConfoundAndDelay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ConfoundAndDelay</span></a></p>
Sasha the Dancing Flamingo<p>🦩✨ Sasha’s Step 2: Now With Extra Chaos ✨🦩</p><p>So, you built a <a href="https://infosec.exchange/tags/honeypot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>honeypot</span></a>. You watched a few bots faceplant into your fake SSH server. You got a taste of deception and now you're craving MORE.</p><p>Let me introduce you to your next obsession: ADHD (Active Defense Harbinger Distribution) from the fine humans at Black Hills InfoSec.</p><p>💻 It’s a full Linux distro pre-loaded with tools for:<br>🎣 Honeypots<br>🚨 Honeytokens<br>🪤 Tarpits<br>🧃 Credential bait<br>⚠️ And general attacker frustration</p><p>ADHD is like a honeypot buffet—with all the weird sauces already installed. Want to frustrate attackers with Endless SSH? Drop them in a Maze. Want to play with Kippo, Glastopf, or Artillery without building from scratch? ADHD says, “Come on in, the traps are fine.”</p><p>BUT LISTEN: This is not something you drop on your public-facing VPS or neighbor’s Comcast router. This is <a href="https://infosec.exchange/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> territory only. Sandboxed. Segmented. Safe. (Or Sasha will give you The Look™.)</p><p>Download it here:<br>👉 <a href="https://www.blackhillsinfosec.com/tools/adhd/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">blackhillsinfosec.com/tools/ad</span><span class="invisible">hd/</span></a></p><p>Flap wisely, my friends.<br><a href="https://infosec.exchange/tags/Honeypots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Honeypots</span></a> <a href="https://infosec.exchange/tags/CyberDeception" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberDeception</span></a> <a href="https://infosec.exchange/tags/SashaTheDancingFlamingo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SashaTheDancingFlamingo</span></a> <a href="https://infosec.exchange/tags/InfosecFun" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfosecFun</span></a> <span class="h-card" translate="no"><a href="https://infosec.exchange/@rnbwkat" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>rnbwkat</span></a></span></p>