TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Rippling suing Deel for espionage after Slack honeypot worked

38 点作者 paulgb2 个月前

2 条评论

paulgb2 个月前
I linked to the press release because I know X links are frowned upon, but I think it doesn’t do the story justice.<p>Parker Conrad’s X thread is good: <a href="https:&#x2F;&#x2F;x.com&#x2F;parkerconrad&#x2F;status&#x2F;1901615179718406276" rel="nofollow">https:&#x2F;&#x2F;x.com&#x2F;parkerconrad&#x2F;status&#x2F;1901615179718406276</a><p>Here’s the full complaint: <a href="https:&#x2F;&#x2F;rippling2.imgix.net&#x2F;Complaint.pdf" rel="nofollow">https:&#x2F;&#x2F;rippling2.imgix.net&#x2F;Complaint.pdf</a>
评论 #43390043 未加载
lvh2 个月前
This is a fantastic example of applying deception strategies in practice as part of a detection &amp; response plan. The most common use case is as a canary, but it absolutely works as evidence of compromise, too.<p>I won&#x27;t comment on the specifics of the case (the complaint comes across as very convincing), but I will remind people that it&#x27;s common for investigations to ostensibly show an employee doing bad things, when in reality it&#x27;s e.g. that employee&#x27;s credentials&#x2F;devices that are compromised.