Deception in cyber defense Using deception for cyber defense isn't a new concept. Honeypots, computers with false data designed to have vulnerabilities to lure attackers to keep them occupied, have been around since before the turn of the century. Honeynets, networks of honeypots intended to mimic a legitimate network, were not far behind. By providing some "low-hanging fruit" for attackers to spend their time on,...Read MoreThe post Phantom Users: Deception and Pass the Hash Attacks appeared first on Sword & Shield.