Home SecurityPhysical Security Cybersecurity firm turns tables on threat actors with decoy data trap