Print

In our commitment to promoting strong cyber defense, Phoenix Security Labs is analyzing attack trends as they happen. This is done through the use of a honeypot, which is a virtual device designed to lure hackers into attacking it. A detailed write-up about honeypots can be found on our blog.

In the coming weeks, we will be including live data here, showing the attack attempts on the honeypot in real time. We will also be analyzing this traffic to determine several factors:

This information can help us see how attackers are working in the real world, identify new vulnerabilities that may not have been discovered yet, and help develop new methods for strengthening cyber defense.