This is a most excellent place for technology news and articles.
You can also run honeypots.. Even at home, if you can configure your VM and network securely. Like this: https://github.com/telekom-security/tpotce
You could lurk users/bots into hacking your honeypot and then report it to let's say: https://www.abuseipdb.com/
You can also run honeypots.. Even at home, if you can configure your VM and network securely. Like this: https://github.com/telekom-security/tpotce
You could lurk users/bots into hacking your honeypot and then report it to let's say: https://www.abuseipdb.com/