The current intel (detailed TTPs and IoCs) from the attack
Benefits of using cyber deception to detect external threats targeting your attack surface
How easy it is to deploy cyber deception and obtain adversary intelligence