The presentation discusses the analysis of 8.5 million web honeypot events collected over 52 months to identify specific CVEs being targeted in large global attack campaigns and to understand attacker tactics and trends. The data-driven defense approach is emphasized.
- Partnership with Deflexio to collect data from web sensors in hundreds of honeypots worldwide
- 8.5 million events analyzed using Python, Pandas, NumPy, Jupiter Notebooks, and Elasticsearch
- Identification of specific CVEs targeted in global attack campaigns and understanding of attacker tactics and trends
- Data-driven defense approach emphasized