Remove Honeypots Remove Mining Remove Phishing Remove Risk
article thumbnail

Top Deception Tools for 2022

eSecurity Planet

From bank transfer cons to CEO fraud to elaborate phishing and spear phishing campaigns, cyber criminals have been quick to use deception as a major means of infiltrating networks and systems, and for remaining undetected while inside. But it can work the other way. This hinders an adversary’s ability to move laterally undetected.

Cloud 131
article thumbnail

The Hacker Mind Podcast: Incident Response in the Cloud

ForAllSecure

You shouldn't be embracing these sorts of technologies, but it starts to bring in a new risk, which you didn't have before, necessarily in the on premise world. They do like crypto mining and containers and stuff. Other than reputational risk and um, you know, obviously that's, that's one that's hard to quantify and to value.

Cloud 40