honeypots

  • Blog

    Microsoft creates fake Azure tenants to pull phishers into honeypots

    Microsoft is using deceptive tactics against phishing actors by spawning realistic-looking honeypot tenants with access to Azure and lure cybercriminals in to collect intelligence about them. With the collected data, Microsoft can map malicious infrastructure, gain a deeper understanding of sophisticated phishing operations, disrupt campaigns at scale, identify cybercriminals, and significantly slow down their activity. The tactic and its damaging effect on…

    Read More »
  • Blog

    The NCSC wants to know how your business is using honeypots to combat hackers

    The UK’s National Cyber Security Centre (NCSC) is calling for industry comment on the use of cyber deception in cyber defense. The center said it recognizes the potential value of using cyber deception technologies and techniques to support cyber defense in certain situations. And as a result, it’s aiming to establish an evidence base for use cases on a national…

    Read More »
Back to top button
close