Catch threat actors crawling in your network with Honeypots

In the macro view of the circle of life (and in the slightly narrower view of nature) we can easily see how some predators utilize some advanced techniques to lure their prey.

This is very common with bugs, spiders for example:

Bolas spiders go after a specific meal: male moths. They produce a large ball of sticky silk, which they…

--

--

--

Cloud and Security technologies, Career, sometimes Music and Gaming easter eggs. Technical Specialist @Microsoft. Opinions are my own.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Remembering Barnaby Jack — The Forgotten Pioneer of ATM Jackpotting

Privacy- A Myth ft. Social Media

Video Monitoring | Intrusion Detection System for Warehouse

Chronicle Cybersecurity Predictions: Crimeware, Cloud and Beyond

Blunder: HackTheBox

How to set up a professional email using your domain name

Official airdrop announcement!

The number of Linux malicious programs increased by 35% last year

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Andre Camillo

Andre Camillo

Cloud and Security technologies, Career, sometimes Music and Gaming easter eggs. Technical Specialist @Microsoft. Opinions are my own.

More from Medium

It’s Not You! Windows Security Logs Don’t Make Sense

It’s the right time for you to Threat Model — here’s why and how

Light Roast 112: How to Avoid Vulnerability Whack-a-Mole

Join us for Google Cloud Security Talks: Threat Detection & Response Edition