Deceptive technology
Deceptive technology allows us to decoy attackers to focus on a trap or decoy in order to detect them and potentially identify what secrets they are after or have in their hands. In the next sections, we focus on open source and free solutions that all companies should deploy.
Honeypots
Honeypots are devices that are created to be deliberately attacked to alert the blue team and to keep evidence of the activity. They must generally look vulnerable but shouldn't provide any real system access to an attacker.
There are various approaches when it comes to honeypots. One of them is to deploy them externally to detect and profile attackers and to catch zero-day based attacks. While it can be a great resource for research and CTI purposes, when it comes to detection, it can be overwhelming for a blue team. On the other hand, managing a device that must look vulnerable but not be exploitable at the same time might be a tricky task.
Another approach is...