Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    CounterCraft will be at FS-ISAC in Orlando, Florida on March 27-30. Come visit us at Booth #1 or schedule a meeting with us today Read more

    Visit Us at Booth #1 at FS-ISAC, March 27-30 in Orlando, FL
  • Categories:

    CounterCraft is a proud sponsor of the Hack the Port, the Maritime and Control Systems Cybersecurity Conference Read more

    Hack the Port 22: CounterCraft Sponsors the Maritime and Control Systems Cybersecurity Conference
  • Categories:

    CounterCraft’s Cyber Deception Platform and expert threat intelligence services are now available on the Department of Homeland Security Continuous Diagnostics & Mitigation Approved Products List Read more

    CounterCraft on Department of Homeland Security’s Continuous Diagnostics & Mitigation Approved Products List
  • Categories:

    This is what the CVE-2022-26134 vulnerability looks like in action. Read on for the simple but effective method threat actors are using to scan the Internet looking for vulnerable Confluence servers, including an efficient method for compromising hundreds or even thousands of vulnerable machines connected to the Internet. Read more

    Confluence CVE-2022-26134 active exploitation
  • Categories:

    See the IoCs from a recent attack on Ukrainian Government Infrastructure, a very interesting incident carried out by exploiting CVE 2021 4034 and detected by our deception environments Read more

    IOCs from the Attacks on Ukrainian Government Infrastructure
  • Categories:

    We Stand with Ukraine

    CounterCraft supports Ukraine Read more

    We Stand with Ukraine

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration