Resecurity honeypot
Details on the Resecurity honeypot dispute and how the decoy was structured.
-

Resecurity honeypot trap sparks breach debate
Resecurity says the breach claims against it touched only a synthetic-data honeypot, while the attackers insist they stole real records. We break down how the decoy was built, what telemetry it produced, and the controls you need to run deception without creating new risk.
