HoneyMex Lab

Deception & Honeypots, Network Security, Threat Intel, Cybersecurity research and more.

Open Research Community - Honeynet Mexico Lab

TailBliss Hero
P1

About the project

HoneyMex Lab is an independent, open research cybersecurity group organized by volunteers with diverse backgrounds, including DFIR, Threat Hunting, System Administration, Threat Intelligence, and Cyber Deception/Honeypots.

HoneyMex Lab is a spin-off initiative of Mizton Labs to operate the Honeynet Mexico Chapter of The Honeynet Project and continue developing new projects inspired by the previous work of former UNAM-Chapter. The vision of HoneyMex Lab is to become a reference in the LATAM region.

Our members and collaborators come from both industry and academia. The team's roots trace back to projects developed or inspired by work within the former UNAM-CERT and The Honeynet Project as UNAM Chapter (Mirror archive).

Our Main Focus Areas Include:

  • - Deception and Honeypot Research & Development
  • - Threat Detection Engineering
  • - Network Security
  • - Network Forensics
  • - Malware Analysis
  • - Yes.. AI and CyberSecurity (LLM-based deception/honeypot, LLM Security, etc)

Our Blog and News

Check out our latest activity

Technical articles, security news, events, tutoriasl, and more.

/../assets/images/featured/bleeding_llama.png
Bleeding Llama: the critical memory leak exposing 300,000 local AI servers

CVE-2026-7482, a critical vulnerability in Ollama that allows any remote attacker to extract prompts, environment variables, and API tokens from server memory in just three unauthenticated HTTP requests.

Tags: News
obeedt, OscarRV, LuisZavMen

obeedt, OscarRV, LuisZavMen

10 min read
/../assets/images/featured/DirtyFrag_Linux.png
Dirty Frag: The Zero-Day Vulnerability That Broke the Embargo and Exposed All of Linux

Dirty Frag. A privilege escalation flaw in the Linux kernel affecting all major distributions, with no patches available and an embargo broken ahead of schedule.

Tags: News
obeedt, OscarRV, LuisZavMen

obeedt, OscarRV, LuisZavMen

5 min read
/../assets/images/featured/ScarCruft_BirdCall.jpg
ScarCruft and BirdCall: when a gaming platform becomes a spying weapon

ESET discovers how the North Korean group ScarCruft compromised the gaming platform sqgame to distribute the BirdCall backdoor on Windows and Android devices, in a supply-chain attack targeting ethnic Koreans in China.

Tags: News
obeedt, OscarRV, LuisZavMen

obeedt, OscarRV, LuisZavMen

6 min read