HoneyMex Lab

Deception & Honeypots, Network Security, Threat Intel, Cybersecurity research and more.

Open Research Community - Honeynet Mexico Lab

TailBliss Hero
P1

About the project

HoneyMex Lab is an independent, open research cybersecurity group organized by volunteers with diverse backgrounds, including DFIR, Threat Hunting, System Administration, Threat Intelligence, and Cyber Deception/Honeypots.

HoneyMex Lab is a spin-off initiative of Mizton Labs to operate the Honeynet Mexico Chapter of The Honeynet Project and continue developing new projects inspired by the previous work of former UNAM-Chapter. The vision of HoneyMex Lab is to become a reference in the LATAM region.

Our members and collaborators come from both industry and academia. The team's roots trace back to projects developed or inspired by work within the former UNAM-CERT and The Honeynet Project as UNAM Chapter (Mirror archive).

Our Main Focus Areas Include:

  • - Deception and Honeypot Research & Development
  • - Threat Detection Engineering
  • - Network Security
  • - Network Forensics
  • - Malware Analysis
  • - Yes.. AI and CyberSecurity (LLM-based deception/honeypot, LLM Security, etc)

Our Blog and News

Check out our latest activity

Technical articles, security news, events, tutoriasl, and more.

/../assets/images/featured/LinuxCF.jpg
CVE-2026-31431: How a Simple `cp` Is Enough to Become Root on Linux

A memory handling flaw during data copy operations allows any unprivileged user to gain full control of a Linux system.

Tags: News
obeedt, OscarRV, LuisZavMen

obeedt, OscarRV, LuisZavMen

6 min read
/../assets/images/featured/nginx_rift_cve.png
NGINX Rift: The 18-Year-Old Vulnerability Turning the World's Most-Used Web Server Into an Entry Point for Attackers

Researchers reveal that CVE-2026-42945, a critical flaw in NGINX's rewrite module, went undetected since 2008. With a CVSS score of 9.2, it allows a remote, unauthenticated attacker to crash servers or execute malicious code on systems without active memory protections.

Tags: News
obeedt, OscarRV, LuisZavMen

obeedt, OscarRV, LuisZavMen

9 min read
/../assets/images/featured/bleeding_llama.png
Bleeding Llama: the critical memory leak exposing 300,000 local AI servers

CVE-2026-7482, a critical vulnerability in Ollama that allows any remote attacker to extract prompts, environment variables, and API tokens from server memory in just three unauthenticated HTTP requests.

Tags: News
obeedt, OscarRV, LuisZavMen

obeedt, OscarRV, LuisZavMen

10 min read