In our commitment to promoting strong cyber defense, Phoenix Security Labs is analyzing attack trends as they happen. This is done through the use of a honeypot, which is a virtual device designed to lure hackers into attacking it. A detailed write-up about honeypots can be found on our blog.
In the coming weeks, we will be including live data here, showing the attack attempts on the honeypot in real time. We will also be analyzing this traffic to determine several factors:
- Where are the majority of the attacks coming from?
- What are the most common attack vectors being used?
- Can we pick out any 0days?
This information can help us see how attackers are working in the real world, identify new vulnerabilities that may not have been discovered yet, and help develop new methods for strengthening cyber defense.