Attack Scenarios

Fake Company, Real Threats: Logs From a Smart Factory Honeypot

To determine threat actors' degree of knowledge in compromising a smart factory, we deployed our most elaborate honeypot to date. The incidents we observed show the kinds of attacks that can easily affect poorly secured manufacturing environments.

Read more