Thanks to the use of honeypots (open a new window)and the analysis of the data they generate we can scope the magnitude of the problem we face, obtaining valuable data regarding:
Attack tendencies.
Exploited vulnerabilities.
Services that are intended on being compromised.
Most active countries in cyberattacks.
Malware samples unidentified by antivirus engines.
Techniques used by attackers.
Malware distributors.
Systems belonging to Botnets.
Command and Control Centers (C&C).
more here...........https://www.incibe.es/blogs/post/Security/SecurityBlog/Article_and_comments/honeystation_EN
Attack tendencies.
Exploited vulnerabilities.
Services that are intended on being compromised.
Most active countries in cyberattacks.
Malware samples unidentified by antivirus engines.
Techniques used by attackers.
Malware distributors.
Systems belonging to Botnets.
Command and Control Centers (C&C).
more here...........https://www.incibe.es/blogs/post/Security/SecurityBlog/Article_and_comments/honeystation_EN