Is it possible to easily create a 'tailor-made' deceptive file, let it get stolen on the Internet, and then notify the creator with the 'thief' details? This session will showcase a 90-day real-world use case that did exactly that, spreading '$100,000 worth' of bitcoin wallets on the Internet where all wallets were stolen. Interesting observations, an open source tool, and lessons learned will be shared.
Open Source Tools Protecting Data & the Supply Chain Ecosystem
data security hackers & threats threat intelligence deception-based security
Share With Your Community