Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    CounterCraft will be at several events across the globe this month. Visit us at RSA, Gartner, FIC and other industry-wide conferences. Get all the details here Read more

    Visit CounterCraft This Month: RSA, Gartner and more
  • Categories:

    What We’re Reading

    Cybersecurity news in May. Click through to find out what our team of experts was reading and talking about this month Read more

    What We’re Reading
  • Categories:

    Active exploitation of Apache CouchDB CVE-2022-24706 Read more

    Active exploitation of Apache CouchDB CVE-2022-24706
  • Categories:

    During the last few days there have been many articles describing BPFDoor, a UNIX backdoor allegedly used by Chinese threat actors. BPFDoor is a smart backdoor that does not need to open additional ports when the attacker wants to connect to the compromised host. It is able to hijack current open ports, sniff the traffic,… Read more

    A Step-by-step BPFDoor Compromise
  • Categories: ,

    The founders of CounterCraft talk about MITRE Engage: what it is, what it does, and how to use it strategically. Watch the video now Read more

    What is MITRE Engage and How to Use It | Founder Chat
  • Categories:

    CounterCraft will be at two events in the Nordics this month, V2 Security and the eCrime and Cybersecurity Congress Nordics Read more

    Visit Us at V2 SECURITY 2022 and the e-Crime & Cybersecurity Congress Nordics

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration