Bogdan Botezatu
๐ค SpeakerAppearances Over Time
Podcast Appearances
That's a computer or a connected system that poses like it's a victim.
A honeypot is used by cybersecurity researchers to attract cybercriminals.
And they will attempt to hack into that machine, thinking that it's a real user on the internet.
It's somebody's computer.
And they will attempt to exercise their prowess to hack into that.
And the machine, instead of just letting it through, it records every step of the attack for us.
to be able to decompose the way cybercriminals got in.
That brings a lot of value for us because it helps us understand how the criminals are operating on the internet, what tactics and tools they're using, how they're approaching this puzzle of hacking into somebody's computer, and what are the telltale signs that we can
use in an early stage of the attack to block them.
We use honeypots for various things, for collecting virus samples, for instance.
We use honeypots for IoT devices to see how cybercriminals are harvesting IoT devices and building large armies of zombie devices that they're using then to attack civilian targets.
We are using honeypots
or recording scam conversations and extracting red flags in that conversation that will help the victim identify when they're being scammed.
So that's very short definition of the honeypot.
So honeypot is the good guy's tools.
Yes, a honeypot is normally somebody's way of staying up to date with the latest tactics in the hacking world.
Okay, so I'm glad that exists.
Pretty much everything is real because we're starting to use the internet.
We have started to use the internet for real stuff a while ago.
Nuclear power plants are being controlled over the internet.