Through Cyber Trapper platform, we will collect information on ongoing live IIoT attacks at hundreds of locations worldwide. We will collect data from our IIoT clones โ traps as well as productions systems, analyse them in real time (in less than 10 milliseconds) and create dynamic threat feed lists with malicious compromise indicators used to prevent attacks at customer premises. This approach achieves the effect of “Crowd Immunity” – after the first attempt of an attacker to interact with the CyberTrapper at one of the group members, the entire group acquires immunity to that attacker and its attack vector.