Resecurity's honeypot deceived Scattered Lapsus$ Hunters, leading to a successful login to synthetic systems and prompting a subpoena for one data thief.
Resecurity lures attackers into honeypot after hack claim
Resecurity says attackers accessed a deliberately deployed honeypot with synthetic data, not real production systems, while defender teams monitored attacker activity.
Hacktivists deactivate after falling into researchers' trap
TwoNet hacktivists were deceived by a honeypot into compromising a fake water treatment plant, demonstrating real risks to ICS and critical infrastructure.