Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories: ,

    Industrial Control Systems (ICS) have many unique characteristics that make defensive countermeasures against cyber attacks a challenging job. Cyber deception can be a great way to protect these assets without imposing any burden on the normal operation of services. Read more

    Insider Threats: Five Indicators of Risk & What to Do
  • Categories:

    What We’re Reading

    Cybersecurity news in November. Click through to find out what our team of experts was reading and talking about this month. Read more

    What We’re Reading
  • Categories: , ,

    From ransomware to malware affecting critical infrastructure, cyber attacks are more mainstream and more damaging than ever. Keeping up with all the attack vectors and evolving threats gets more challenging by the day. IDG’s recently released 2021 Security Priorities study is an important look at the state of security strategies today. This 2021 report provides… Read more

    Deception Tops List of Technologies in 2021 IDG Security Priorities Study
  • Categories:

    KuppingerCole recently named CounterCraft as an overall leader in their Distributed Deception Platforms Leadership Compass report. CounterCraft appears as an Overall Leader, a Product Leader, and an Innovation Leader. Read more

    CounterCraft Named Overall Leader by KuppingerCole
  • Categories: ,

    The National Institute of Standards and Technology (NIST) has highlighted deception in several documents as an important part of cybersecurity. Take a look at what has been outlined in the these publications for some insight into how deception can help Read more

    NIST Documents Highlight Deception Technology
  • Categories: ,

    Cloud computing has its share of major security threats, and there are some that are both consistent and insistent. One of them is the H2Miner/Kinsing malware. The people behind it use high severity, public vulnerabilities to continue installing their RAT and miner, such as the recent Apache Path Traversal CVE 2021 41773, the last vulnerability… Read more

    CVE-2021-41773 Actively Exploited by H2Miner

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration