Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories: ,

    The founders of CounterCraft talk about the threat actors they are finding and classifying among internet noise using deception machines. Watch the video. Read more

    Classifying Internet Noise | Founder Chat
  • Categories:

    What We’re Reading

    Cybersecurity news in August. Click through to find out what our team of experts was reading and talking about this month. Read more

    What We’re Reading
  • Categories:

    Using our deception technology, we have detected several new threat actors in the wild, some of which we will be sharing weekly, right here. This is a series of posts in which we will describe the IOCs and TTPs of different threat actors we have uncovered, so be sure to check back or follow us… Read more

    Internet Noise: Threat Actor CC0630
  • Categories: , ,

    Being aware of what is happening in your field of operations, especially in the cyber realm, is key to a successful cybersecurity response. This blog will take you through the ways we answer these questions using deception techniques and provide unequaled situational awareness for our users Read more

    How to Improve Situational Awareness of a Cyber Attack
  • Categories:

    We welcome our new strategic advisor, Maria Vello. A cybercrime veteran, she brings many decades of cybersecurity experience bridging the gap between public and private sectors. Read more

    Maria Vello, CounterCraft’s New Strategic Advisor
  • Categories:

    Using our deception technology, we have detected several new threat actors in the wild, some of which we will be sharing weekly, right here. This is a series of posts in which we will describe the IOCs and TTPs of different threat actors we have uncovered, so be sure to check back or follow us… Read more

    Internet Noise: Threat Actor CC0629

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration