CONFidence 2025: Jacek Lipkowski - YouPot - where the attacker is the honeypot
youtube.com 1 miesiąc temu
Turn attackers into your sensors. Learn how a protocol-agnostic honeypot captures worms, bots, and malicious traffic by utilizing the attacker’s own machine.
Find out more at: https://confidence-conference.org/