NEWS
- 10 March | ForumIAS Residential Coaching (FRC) Student secures Rank 6 in CSE 2025! →
- 10 March | SFG Folks! This dude got Rank 7 in CSE 2025 with SFG! →
- 10 March | SFG Folks! She failed prelims 3 times. Then cleared the exam in one go! Watch Now! →
- According to a Sophos report titled ‘Exposed:Cyberattacks on Cloud Honeypots’ more than five million attacks were attempted on the global network of 10 honeypots within a 30-day period.This demonstrates how cybercriminals are automatically scanning for weak open cloud buckets.
- Cybercriminals has also attacked a Mumbai cloud server honeypot with more than 6.7 Lakh attempts over a 30-day period.It is second to a US-based honeypot at Ohio that recorded more than 9.5 Lakh login attempts during the same period.
- A honeypot is a system designed to mimic likely targets of cyber-attackers so that security researchers can monitor cyber criminal behaviour.
- The types of honeypots are (a)A low-interaction honeypot is a honeypot that once found by the hacker,will not be of much use to them and (b)A high-interaction honeypot permits the attacker to go further in order to gather additional information about their intentions.




