Today > 1 Critical | 2 Medium vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
The article discusses the importance of keeping enrichment data up-to-date for analyzing honeypot attacks. Various sources like Internet Storm Center, URLhaus, SPUR, and VirusTotal are used to enrich data collected from honeypots. The author examines how frequently this data changes and its accurac…