{"id":85125,"date":"2019-04-12T16:26:44","date_gmt":"2019-04-12T10:56:44","guid":{"rendered":"http:\/\/factly.forumias.com\/?p=3619"},"modified":"2019-04-12T16:26:44","modified_gmt":"2019-04-12T10:56:44","slug":"report-reveals-risk-to-cloud-platform","status":"publish","type":"post","link":"https:\/\/forumias.com\/blog\/report-reveals-risk-to-cloud-platform\/","title":{"rendered":"Report reveals risk to cloud platform"},"content":{"rendered":"\n<ol class=\"wp-block-list\"><li>According to a Sophos report titled &#8216;Exposed:Cyberattacks on Cloud Honeypots&#8217; more than five million attacks were attempted on the global network of 10 honeypots within a 30-day period.This demonstrates how cybercriminals are automatically scanning for weak open cloud buckets.<\/li><li>Cybercriminals has also attacked a Mumbai cloud server honeypot with more than 6.7 Lakh attempts over a 30-day period.It is second to a US-based honeypot at Ohio that recorded more than 9.5 Lakh login attempts during the same period. <\/li><li>A honeypot is a system designed to mimic likely targets of cyber-attackers so that security researchers can monitor cyber criminal behaviour.<\/li><li>The types of honeypots are (a)A low-interaction honeypot is a honeypot that once found by the hacker,will not be of much use to them and (b)A high-interaction honeypot permits the attacker to go further in order to gather additional information about their intentions.<\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"<p>According to a Sophos report titled &#8216;Exposed:Cyberattacks on Cloud Honeypots&#8217; more than five million attacks were attempted on the global network of 10 honeypots within a 30-day period.This demonstrates how cybercriminals are automatically scanning for weak open cloud buckets. Cybercriminals has also attacked a Mumbai cloud server honeypot with more than 6.7 Lakh attempts over&hellip; <a class=\"more-link\" href=\"https:\/\/forumias.com\/blog\/report-reveals-risk-to-cloud-platform\/\">Continue reading <span class=\"screen-reader-text\">Report reveals risk to cloud platform<\/span><\/a><\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[1738],"tags":[2302,2303],"class_list":["post-85125","post","type-post","status-publish","format-standard","hentry","category-science-and-technology-daily-factly-articles","tag-cyberattack","tag-honeypot","entry"],"jetpack_featured_media_url":"","views":{"total":0,"cached_at":"","cached_date":1704889335},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/85125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/comments?post=85125"}],"version-history":[{"count":0,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/85125\/revisions"}],"wp:attachment":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/media?parent=85125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/categories?post=85125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/tags?post=85125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}