Northsec Security Blog
  • Home
  • Tag
  • Author

Vulnerabilities

A collection of 1 post

Honeypot

Cyberattack patterns based on geographical locations - London

For the last few weeks I've let three T-Pot honeypots in different parts of the world run with the goal of identifying what kind of Internet-based attacks and reconnaissance is used based on

  • Mattias Nilsson
    Mattias Nilsson
7 min read
Northsec Security Blog © 2021
Latest Posts Twitter Ghost