Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    The founders of CounterCraft talk about CounterCraft The Pulse, a new threat intel feed powered by deception. Watch the video now Read more

    CounterCraft Integrates With… VirusTotal
  • Categories: ,

    The founders of CounterCraft talk about CounterCraft The Pulse, a new threat intel feed powered by deception. Watch the video now Read more

    The Pulse™, Our New Intel Feed | Founder Chat
  • Categories: ,

    Learn how deception is uniquely positioned to help protect financial services. Download the data sheet for more information Read more

    Deception-Powered Threat Intelligence for Oil & Gas {Data Sheet}
  • Categories: , ,

    Working towards achieving zero trust in an organization is a move in the right direction to protect against cyberattacks. However, to truly defend against cybersecurity threats, an organization has to take an active defense approach to cybersecurity threats. Read more

    Zero Trust and Deception Technology – A comprehensive security strategy
  • Categories: ,

    The Pulse™ is a threat intelligence feed of prepared incident data from CounterCraft. CounterCraft The Pulse is detailed threat intelligence on live incidents, powered by cyber deception. Read more

    Contextualized, Real-Time Threat Intel with CounterCraft The Pulse™
  • Categories:

    Visit Us at Black Hat 2022!

    CounterCraft will be at Black Hat 2022. Come visit us at Booth IC60 and schedule a meeting today! Read more

    Visit Us at Black Hat 2022!

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration