Intentar ORO - Gratis
Cyberattacks On Cloud Honeypots
Enterprise IT World
|April 2019
Contrary to popular belief, every device is worth hacking when the process is automated.
It doesn’t matter who or where you are, if you own a company big or small, or have technology in the home – every device can be monetized by an enterprising criminal. Brute force login attempts are likely occurring on any online device. Yet the speed and scale of the problem can boggle the mind. Criminals are relentless and often competitive with one another to find, take over, and monetize your smart devices.
The research you’ll find here, using honeypot devices across the internet, is a first step in attempting to quantify the issue. In cybersecurity terms, a honeypot is an open, vulnerable device, configured to deliberately lure a cybercriminal to attack. When the criminal starts to interact with the device, they are in fact triggering alarms to alert a business or individual to their presence and track their activity.
There are many types of honeypots, but in this paper we focus on two main distinctions: high and low interaction.
A low-interaction honeypot is a honeypot that, once found by the hacker, will not be of much use to them. In our case, the attacker is presented with a login prompt they have no way of getting past. This logs and stores any attempts to log in, providing information on the attacker’s IP address of origin (which can be attributed to a location), and the username and password used in the login attempt.
A high-interaction honeypot permits the attacker to go further in order to gather additional information about their intentions. In the context of this paper where high interaction honeypots are referenced, we allowed the attacker to log in to the honeypot with a designated set of usernames and passwords, and stored any command the attacker attempted to use.
Esta historia es de la edición April 2019 de Enterprise IT World.
Suscríbete a Magzter GOLD para acceder a miles de historias premium seleccionadas y a más de 9000 revistas y periódicos.
¿Ya eres suscriptor? Iniciar sesión
MÁS HISTORIAS DE Enterprise IT World
Enterprise IT World
INDIA-JAPAN SEMICONDUCTOR FORUM CHARTS PATH FOR TRUSTED GLOBAL COLLABORATION
SEMICON Japan 2025 sets the stage for resilient, sustainable, and competitive semiconductor value chains through bilateral cooperation.
1 mins
January 2026
Enterprise IT World
CYCOGNITO PREDICTS FIVE ATTACK-SURFACE TRENDS THAT WILL REDEFINE ENTERPRISE SECURITY IN 2026
AI-driven adversaries, regulatory complexity, and unmanaged assets will push organizations toward outcome-based cybersecurity strategies.
2 mins
January 2026
Enterprise IT World
FROM ENABLER TO ARCHITECT: HOW CIOS ARE DRIVING DIGITAL-FIRST TRANSFORMATION
Technology is no longer a support function it's the strategic engine powering growth and resilience. CIOs like Rajeev Pradhan are reimagining legacy systems, embedding responsible Al, and building cyber-secure frameworks to thrive amid disruption. His roadmap offers a blueprint for enterprises determined not just to adapt but to lead in a digital-first world.
9 mins
January 2026
Enterprise IT World
Exotel's Al-Driven Turnaround in FY25
Exotel has scripted a remarkable comeback in FY2024-25, transforming from an EBITDA loss of ₹31 crore in FY24 to a positive ₹34 crore in FY25.
1 min
January 2026
Enterprise IT World
HEALING WITHOUT HARM: BUILDING DATA PRIVACY INTO AI-POWERED HEALTHCARE
AI is transforming healthcare-from diagnostics to drug discovery-at an unprecedented scale. But innovation without trust is fragile. This story explores why embedding privacy into AI systems is not just a compliance requirement but a moral imperative for sustainable healthcare transformation.
2 mins
January 2026
Enterprise IT World
2026 WILL BE THE YEAR OF COGNITIVE THREATS: SEQRITE WARNS OF HUMAN-MIMICKING CYBERATTACKS
India Cyber Threat Report 2026 predicts Al-driven attacks that combine intelligence and automation, demanding a new era of cognitive resilience.
2 mins
January 2026
Enterprise IT World
WHY AI ALONE WON'T SAVE MALAYSIAN BUSINESSES FROM CYBERCRIME
AI is a powerful ally, not a lone savior. True cyber resilience demands human insight, layered defenses and continuous vigilance.
2 mins
January 2026
Enterprise IT World
CYBERCRIME'S NEXT FRONTIER: WHY 2026 COULD BE THE MOST DANGEROUS YEAR YET
From autonomous AI hackers to deepfakes and wearable data theft, experts warn that cyber threats are evolving faster than defences.
1 mins
January 2026
Enterprise IT World
2026: THE YEAR INTELLIGENT ENTERPRISES MOVE FROM ADOPTION TO ORCHESTRATION
Workforce readiness will become a C-suite survival metric. Enterprises that foster continuous learning and effective human-machine collaboration will gain a decisive edge.
1 mins
January 2026
Enterprise IT World
COFORGE BETS BIG ON AI: ACQUIRES ENCORA TO BUILD A US$2.5 BILLION ENGINEERING POWERHOUSE
The landmark deal positions Coforge as a global leader in Al-driven engineering, creating a scaled enterprise core of Al, Cloud, and Data services for the new era.
3 mins
January 2026
Translate
Change font size
