Honeytoken Deployment and Monitoring for Spear-Phishing Detection.
to
Developed a tool for configuring, deploying, and monitoring honeytokens to enhance organizational cybersecurity.
Go to projects index
Honeytoken Deployment and Monitoring for Spear-Phishing Detection.
to
Developed a tool for configuring, deploying, and monitoring honeytokens to enhance organizational cybersecurity.
Go to projects index
As part of the Defraudify (ITEA) project at Almende, I contributed to the spear-phishing use case by developing a tool for organizations to configure, deploy, and monitor honeytokens—mock digital assets that track unauthorized access via open-source intelligence techniques. This tool integrated with a Grafana-based dashboard to provide key insights, helping end-user organizations strengthen their cybersecurity posture. The broader Defraudify initiative aimed to adapt law enforcement fraud detection tools for private businesses, offering a systematic approach to fraud prevention and risk assessment.