Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    Parsons, an innovative solutions provider focused on defense, intelligence and critical infrastructure markets, and CounterCraft have recently signed an agreement to work together to support the US DoD Read more

    Parsons + CounterCraft Team Up to Support US DoD Cyber Operations
  • Categories:

    MITRE Engage replaces the MITRE Shield knowledge base, focusing on the areas of denial, deception, and adversary engagement. Engage is wholly focused on strategic planning and analysis within the framework of denial, deception, and adversary engagement, in an effort to create more meaningful results from the MITRE knowledge base Read more

    MITRE Shield is Dead, Long Live MITRE Engage
  • Categories:

    CounterCraft has been awarded a production contract in order to more easily scale our deception technology solution across the United States Department of Defense. Read more

    CounterCraft Awarded Production Contract by the U.S. Department of Defense
  • Categories:

    New Threat Actor Alert: CC0628

    Using our deception technology, we have detected several new threat actors in the wild, some of which we will be sharing weekly, right here. This is the first in a series of posts in which we will describe the IOCs and TTPs of different threat actors we have uncovered, so be sure to check back… Read more

    New Threat Actor Alert: CC0628
  • Categories: ,

    When shopping around for cybersecurity vendors, it can be hard to determine which vendors are the best. This is especially true with deception, a technology in a sector that is still growing and developing rapidly. Read more

    Questions to Ask Your Threat Intel & Deception Technology Vendors
  • Categories: ,

    What to See at Black Hat 2021

    Black Hat is back! Read about what to see at the 2021 Black Hat Conference here. Read more

    What to See at Black Hat 2021

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration