If you can setup a segregated network with a partition that has very uniform activity, a defender can use it to create very high fidelity alerting on unusual behaviour.
T-Mobile say they detected a recent breach attempt using this method:
Reported by @lhn
[#]cybersecurity #firewall
=> More informations about this toot | View the thread | More toots from merospit@infosec.exchange
=> View lhn@mastodon.online profile
=> View cybersecurity tag | View firewall tag This content has been proxied by September (3851b).Proxy Information
text/gemini