Blog  

The latest in cybersecurity and deception technology.

Subscribe for updates—fresh insight delivered to your inbox.

{Webinar} BPFDoor and So Much More: An Analysis of Linux Network Passive Backdoors

READ MORE

Browse By Category

Select a category to see more related content


Recent Articles

21 Jun

{Webinar} BPFDoor and So Much More: An Analysis of Linux Network Passive Backdoors

READ MORE

Passive backdoors are implants designed to be stealthier than common backdoors, especially by avoiding listening on ports or pinging back to a Command and Control server.

16 Jun

How to Set up a Deception Web Server | Threat Deception in A Minute

READ MORE

Our team works constantly to make the CounterCraft The Platform easy and intuitive to use. Many of the functions of the cyber deception platform can be deployed with just a few clicks of the mouse.

14 Jun

Three Strategies to Prevent Supply Chain Compromise Using Cyber Deception

READ MORE

Operational technology (OT) security poses one of the most serious challenges in cyber today (see more about why in this post). A huge piece of this security puzzle lies in the manufacturing supply chain.

9 Jun

A BPFDoor Compromise | Founder Chat

READ MORE

BPFDoor, a UNIX backdoor allegedly used by Chinese threat actors, is a smart backdoor that does not need to open additional ports when the attacker wants to connect to the compromised host.

6 Jun

Confluence CVE-2022-26134 active exploitation

READ MORE

On June 2, Atlassian published an advisory for CVE-2022-26134, a critical zero-day remote code execution vulnerability in Confluence Server and Data Center. The vulnerability currently affects all supported versions of Confluence Server and Confluence Data Center.

Page 1 of 51

Top Videos

SEE ALL

Inside the mind of the Enemy-Ebook

A Guide to Profiling Cyber Criminals

GET IT NOW

What is Deception Technology?

READ THE GUIDE