{"version":"1.0","provider_name":"InprOTech","provider_url":"https:\/\/inprotech.es\/en\/","author_name":"admin","author_url":"https:\/\/inprotech.es\/en\/author\/moon\/","title":"Industrial Honeypots: Know Your Enemy - InprOTech","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"iF1Xpdw3Zl\"><a href=\"https:\/\/inprotech.es\/en\/techpaper-industrial-honeypots-know-your-enemy\/\">Industrial Honeypots: Know Your Enemy<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/inprotech.es\/en\/techpaper-industrial-honeypots-know-your-enemy\/embed\/#?secret=iF1Xpdw3Zl\" width=\"600\" height=\"338\" title=\"&#8220;Industrial Honeypots: Know Your Enemy&#8221; &#8212; InprOTech\" data-secret=\"iF1Xpdw3Zl\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/inprotech.es\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/inprotech.es\/wp-content\/uploads\/2025\/03\/honeypots-industriales.jpg","thumbnail_width":1200,"thumbnail_height":630,"description":"In an increasingly interconnected world, where cyberattacks threaten not only information but also critical infrastructure, the need for innovative defense strategies has become essential. Among them, honeypots\u2014systems designed to simulate vulnerabilities and attract potential attackers\u2014have become a key tool in the fight against digital threats. Although their use began in Information Technology (IT) environments, their..."}