2023 Honeypotting in the Cloud Report


In today’s cloud environments, cybercriminals seek to exploit vulnerabilities and misconfigurations to gain unauthorized access to valuable resources.


Recently, our Orca Research Pod launched a honeypot research project that simulated misconfigured resources in the cloud, and then monitored whether bad actors would take the bait. They did. The results provide important insights on the latest attacker tactics and techniques, helping teams better understand how to fortify their cloud defenses.


We’ve compiled those insights and takeaways for security teams into a report that breaks down

  • The most targeted cloud services
  • How long it takes attackers to access resources and leaked secrets
  • Common attack routes and methods
  • Key takeaways to help increase your defenses

You might also be interested in…