Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    What We’re Reading

    Cybersecurity news in February. Click through to find out what our team of experts was reading and talking about this month. Read more

    What We’re Reading
  • Categories:

    Join a webinar on March 2, 2022 about the technical evidence our deception directors have picked up of attacks on Ukrainian government infrastructure, featuring our Customer Success Manager Nicole Carignan and CEO David Barroso Read more

    {Webinar} Technical Evidence of Attacks on Ukrainian Government Infrastructure
  • Categories:

    What appear to be Russian threat actors have attempted to exploit the CVE-2021-4034 vulnerability in one of our deception decoys on the web, in order to get admin access to run commands as privileged users Read more

    What CVE-2021-4034, Old-School Perl IRC Bots, Cryptominers and the Russia/Ukraine Situation Have in Common
  • Categories: , ,

    Watch Rich Barrell, cyber deception product manager, speak on how profiling cyber criminals can help keep networks safe Read more

    Profiling Adversaries: What is the Motive of the Cyber Criminal?
  • Categories: , ,

    Download our ebook today to learn about the science and the strategy behind profiling cyber criminals. Read more

    {Ebook} Inside the Mind of the Enemy: A Guide to Profiling Cyber Criminals
  • Categories: ,

    Planning is an important part of building a deception campaign. Find out everything you need to know about how to define and build a credible deception campaign here Read more

    Deception Isn’t Plug and Play

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration