Create a Post
Showing results for 
Search instead for 
Did you mean: 

How to easily protect yourself with Canary Tokens (HoneyTokens)

Canary tokens, also known as honeytokens can be useful as a source of information.
They can be understood as unique identifiers that can be embedded in different places.
If they are touched, an alert is triggered.

We can use canary tokens in different scenarios:

  • Embedded into applications to help in reverse-engineering detection
  • Detect when someone triggers the canary by activating the token (for example, via a “target file” especially dropped in a private folder. When this file is accessed by an unauthorized user, an alert is generated)
  • Protect your cloud drives
  • More....


learn how to implement Canary Tokens by watching the following video:


Related Links:

TO READ THE FULL POST it's simple and free