Honeypot v2: second-month captures
Five months of running the high-interaction honeypot. The captures continue to be the highest-value source of post-compromise intelligence I have access to. Three more sanitised observations and what each teaches.
Long-form thinking on cyber defence, detection, and resilience — from Slackware-era honeypots through to AI-driven SOC analytics.
Showing posts tagged post-compromise — 1 result.
Five months of running the high-interaction honeypot. The captures continue to be the highest-value source of post-compromise intelligence I have access to. Three more sanitised observations and what each teaches.