Want to see if someone is attempting a known CVE in your infrastructure? Just collect logs
Something really cool about honeypots and deception technology, in general, is that you can see a hacker or a penetration tester in action with very little false positive notifications. Deception also...