Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories: , ,

    Detected in the Wild – How We Identified A Real Threat Actor Exploiting an Unpatched Fortinet Product Read more

    Detected in the Wild – How We Identified A Real Threat Actor Exploiting an Unpatched Fortinet Product
  • Categories: , ,

    CounterCraft’s Version 3.4 release of The Platform™ introduces several key new features to improve the threat intelligence delivered by our powerful deception technology. Read more

    The Platform™ v3.4: Now with A New Tool for Reporting Threat Intelligence Incidents
  • Categories:

    As we reflect on the year 2023, we are incredibly proud of the progress we have made as a company and the positive impact we have had on our customers’ security posture. We have faced many challenges along the way, but our team has demonstrated resilience, innovation, and an unwavering commitment to delivering a cutting-edge… Read more

    A Letter from Our Leadership Team
  • Categories: ,

    Since the start of the Internet, honeypots have been a very valuable defensive strategy. No matter how simple or complex they are, they definitely add a lot of value to your security posture. Clifford Stoll and his marvelous book The Cuckoo’s Egg is always referenced as one of the first deception use cases in cybersecurity,… Read more

    Why Credibility is Key: The Truth about Honeypots
  • Categories: ,

    Find Out How CounterCraft Delivers Actionable Adversary-Generated Threat Intelligence Read more

    {VIDEO} How CounterCraft Delivers Actionable Adversary-Generated Threat Intelligence
  • Categories: ,

    ICS security is challenging. See how Red Electrica used deception technology to prevent attacks on their OT systems. Read more

    {Datasheet} ICS Security : Protecting OT Systems with Active Defense
  • Categories: ,

    Stay One Step Ahead with Adversary-Generated Threat Detection Read more

    {VIDEO} Stay One Step Ahead with Adversary-Generated Threat Detection

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration