Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories: ,

    The founders of CounterCraft talk about Cobalt Strike and how to detect it. Watch the video Read more

    Cobalt Strike Explained—What it is and How to Detect it | Founder Chat
  • Categories:

    CounterCraft’s Cyber Deception Platform and expert threat intelligence services are now available on iGov’s GSA Schedule and GSA Advantage Read more

    CounterCraft Threat Intel Software and Services on GSA Schedule
  • Categories:

    From highly technical posts with practical applications to in depth looks at deception technology, our blog featured all manner of articles written by experts in the field. Read on to get the best of what everyone was reading on our website in 2021 Read more

    Top Cybersecurity Threats to Watch In 2022
  • Categories:

    What We’re Reading

    Cybersecurity news in December. Click through to find out what our team of experts was reading and talking about this month Read more

    What We’re Reading
  • Categories:

    The founders of CounterCraft talk about 2021 and what is in the works for 2022 at CounterCraft, the world’s leading threat deception platform. Watch the video Read more

    A Look Back at 2021 | Founder Chat
  • Categories:

    Letter from the Founders

    2021 has been a remarkable year for everyone around the world, and the same holds true for the team at CounterCraft. CounterCraft has grown more than 350%. We have left our “start-up” status behind and are heading into “scale-up” territory. 2022 will be a year for massive growth and investment into our team as the… Read more

    Letter from the Founders

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration