Canarytokens.org - Quick, Free, Detection for the Masses
Introduction This is part 2 in a series of posts on our 2015 BlackHat talk, and covers our Canarytokens work. You'll be familiar with web bugs, the transparent images which track when someone opens an email. They work by embedding a unique URL in a page's image tag, and monitoring incoming GET requests. Imagine doing that, but for file reads, database queries, process executions, patterns in log files, Bitcoin transactions or even Linkedin Profile views. Canarytokens does all this and more, letting you implant traps in your production systems rather than setting up separate honeypots . [ Read More ]