Remove Honeypots Remove IoT Remove Mining Remove Ransomware
article thumbnail

Top Deception Tools for 2022

eSecurity Planet

It identifies unauthorized queries attempting to mine AD for data, hides sensitive or privileged AD query results (such as AD domain admins, domain controllers, SPNs, and others), and inserts fake results that point to decoy systems. Decoys mimic hosts running operating systems as well as IoT (Internet of Things) hosts.

Cloud 129