Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories: ,

    Post-exploitation tooling is becoming increasingly sophisticated and often evades detection by EDRs, meaning sometimes we will not be able to detect when an attacker is able to load his code into memory. Here’s a way to detect artifacts that are already loaded in memory from kernel and in real time Read more

    Detecting malicious artifacts using an ETW consumer in kernel mode
  • Categories:

    What We’re Reading

    Cybersecurity news in December. Click through to find out what our team of experts was reading and talking about this month Read more

    What We’re Reading
  • Categories:

    CounterCraft is counting down the days to MITRE ATT&CKcon 3.0, where our CEO David Barroso will be speaking at the conference. The conference, dedicated to the MITRE ATT&CK community, will take place on March 29 30, 2022, at the MITRE headquarters in McLean, Virginia. With a focus on how to make the most of ATT&CK,… Read more

    CounterCraft Partners with Hexagon US Federal to Offer a Comprehensive Cybersecurity Strategy
  • Categories:

    Join us in celebrating Cyber Deception Day. You can tune in virtually to round tables and chats with MITRE and Kevin Fiscus Read more

    April 1 is Cyber Deception Day!
  • Categories:

    Threat Deception in a Minute highlights just how simple it is to get powerful deception technology set up in your network. This edition features how to set up a deception host. Whether you’re a current customer or wondering what it’s like to utilize deception, you’ll find these videos quick, interesting and helpful Read more

    How to Set up a Deception Host | Threat Deception in A Minute
  • Categories:

    CounterCraft is counting down the days to MITRE ATT&CKcon 3.0, where our CEO David Barroso will be speaking at the conference. The conference, dedicated to the MITRE ATT&CK community, will take place on March 29 30, 2022, at the MITRE headquarters in McLean, Virginia. With a focus on how to make the most of ATT&CK,… Read more

    Mapping ATT&CK Techniques to Engage Activities: CEO David Barroso to Speak at MITRE ATT&CKcon 3.0

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration