Security Congress Abstract
What happens when you set up honeypots and open proxy servers all over the internet? This talk will examine how security researchers set up and configured honeypots on multiple service providers globally to gather threat intelligence information. The talk will showcase how attackers interacted with the honeypots, and how social engineering was used to gather the intentions and motive of the attackers. Lastly, we will take a look at how deceptive cybersecurity solutions can be used by large enterprise organizations to help increase their threat awareness against their own systems.