The original post: /r/netsec by /u/cydan99 on 2024-08-11 07:26:54.
TL;DR I deployed canary tokens in various public places on the Internet, logged all access attempts, and discovered intriguing patterns on credential discovery and attack methodologies of threat actors.
You must log in or register to comment.