GLOBAL SITUATIONMONITORING
482 published briefsUTCSun, Apr 5 17:31:03
Intelligence Tag

Cyber deception

Operational guidance for building and monitoring honeypots with synthetic data.

1 intelligence brief← Intelligence Hub
  • Resecurity honeypot trap sparks breach debate

    Resecurity honeypot trap sparks breach debate

    Resecurity says the breach claims against it touched only a synthetic-data honeypot, while the attackers insist they stole real records. We break down how the decoy was built, what telemetry it produced, and the controls you need to run deception without creating new risk.

    5–7 minutes