Proxy Ressource Footprint

When it comes to honeypots in the embedded—especially automotive—domain, the proxy-based approach used by the CROWSI framework comes with clear advantages. By shifting the actual honeypot to an isolated backend infrastructure and exposing it through a lightweight proxy on the edge device, we minimize both risk and resource demand at the edge. Of course, the … Read more

Gemini vs. CROWSI: A Script Kiddie’s Tale

Last weekend, I asked myself a couple of questions: To find the answers, I used my personal demo setup, which consists of a Raspberry Pi exposing a CROWSI deployment and asked Gemini to instruct me on how to perform a penetration test on this Raspberry Pi, just as a typical script kiddie would do. The … Read more

Introducing GenAIDecoy: CROWSI’s AI-Powered Honeypot Decoy Framework

Distracting attackers from actual assets and wasting their resources is one of the major advantages of honeypots. To achieve this effectively, the system decoys must be convincing to attackers and provide sufficient interaction opportunities to keep them engaged. Such honeypots are typically referred to as high-interaction honeypots, and creating them for a specific ecosystem is … Read more

Build your own! How to develop and integrate your own CROWSI honeypot decoy

Honeypots offer numerous advantages for your cybersecurity framework, enhancing cyber threat intelligence and deceptive security measures. They provide early warnings of malicious activity, offer invaluable insights into threat behavior and protect critical assets by diverting attackers, while tying up their resources. For a deeper dive into these benefits, check out our earlier blog post. But, … Read more