Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories: ,

    CounterCraft celebrates Cybersecurity Awareness Month hand in hand with the National Cybersecurity Alliance Read more

    It’s Cybersecurity Awareness Month!
  • Categories: ,

    See the success our clients have found using a deception-powered threat intelligence platform to detect lateral movement within a network. Read more

    Real World Cases: Threat Intel to Detect Lateral Movement in the Banking Industry
  • Categories:

    What We’re Reading

    Cybersecurity news in August. Click through to find out what our team of experts was reading and talking about this month. Read more

    What We’re Reading
  • Categories: , ,

    Malicious docker images are part of the latest technique. Our deception technology has detected evidence of the use of malicious Docker images available at Docker Hub Read more

    Malicious Docker Images Still Used for Mining Purposes
  • Categories:

    What is Cloud?

    CounterCraft Cloud is a cyber-deception-as-a-service that identifies and profiles cyber threats before they attack your online IT assets, remote workers, and networks.Watch this video to find out how it works Read more

    What is Cloud?
  • Categories: , ,

    TeamTNT is abusing open Docker daemons and they are using a neat trick to escape from the container and install the crypto miner in the real host. Read about it here. Read more

    Escaping Docker Privileged Containers for Mining Crypto Currencies

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration