The current intel (detailed TTPs and IoCs) from the attack.

Benefits of using cyber deception to detect external threats targeting your attack surface.
How easy it is to deploy cyber deception and obtain adversary intelligence.