Hi All
Has anyone revisited lately the concept of a Honeypot to redirect at attacker towards resources, which do not exist in order to protect and organisation?
These days it has evolved and there are organisations who actually implemented and maintained, evolved such techniques? What lessons have you learnt?
Have you applied modern techniques?
https://www.acalvio.com/active-defense/from-honeypots-to-ai-driven-defense-the-evolution-of-cyber-de...
Any further examples which have been implemented?
Regards
Caute_Cautim