Cyber deception is the most effective way to identify threat actors in any organization’s network. CounterCraft delivers actionable threat intelligence across industries.
-
Categories: Cybersecurity Trends
We React to the Hafnium Microsoft Exchange Exploit
The Hafnium Microsoft Exchange exploit could very well be bigger than SolarWinds. Our cybersecurity experts explain what happened and what companies should have done to prevent this type of exploit from happening. Read more
-
Real World Cases: Threat Intel to Detect Insider Threats
See the success our clients have found detecting and managing insider threat, one of the most challenging security issues. CounterCraft’s deception-powered threat intelligence platform deploys deception environments that trick insiders into exposing their movements. Read more
-
The Case of the Crypto Miners: When Attackers Use Deception
The BISMUTH data breach showed that current approaches to cyber protection aren’t good enough. Do we carry on following the same approach and hope it’s not us next, or do we try and take a more intelligence-led approach to protecting our corporate infrastructure? Read more
-
Categories: Deception Technology
What We’re Reading
Cybersecurity news in February. Click through to find out what our team of experts was reading and talking about this month. Read more
-
The Cyber Kill Chain and What You Need to Know
For that reason, it is vital for businesses to keep their attackers on the left side of the kill chain, ideally in the Recon phase. In this video, our Head of Cyber Threat Intelligence, Nahim Fazal, enumerates the many reasons controlling the attackers’ position on this kill chain can give businesses a cutting edge in… Read more
-
Deception in the Data Center
A data center is a prime target for cyber attackers, so it is important to have a strong cyber defense in place. Deception technology is a useful technique for keeping a data center safe. Deception can help detect intruders quickly and prevent downtime, lowering business cost and mitigating risk. Read more