
Sign up to save your podcasts
Or
Honeypots are not only vessels for the sweet and sugary substance known as honey. They are also tools used by cybersecurity researchers and enthusiasts alike to lure in threat actors and analyze their movements, actions, malware, etc. In this episode, we will take a look at the use cases and goals of honeypots, as well as things to keep in mind or be wary of if you want to set one up yourself. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at [email protected]
More info about honeypots: https://us.norton.com/blog/iot/what-is-a-honeypot
Follow Us:
5
33 ratings
Honeypots are not only vessels for the sweet and sugary substance known as honey. They are also tools used by cybersecurity researchers and enthusiasts alike to lure in threat actors and analyze their movements, actions, malware, etc. In this episode, we will take a look at the use cases and goals of honeypots, as well as things to keep in mind or be wary of if you want to set one up yourself. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at [email protected]
More info about honeypots: https://us.norton.com/blog/iot/what-is-a-honeypot
Follow Us:
264 Listeners
154 Listeners
7,862 Listeners
5,923 Listeners
135 Listeners
91 Listeners
354 Listeners
19 Listeners
330 Listeners
5 Listeners