Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories: ,

    Here at CounterCraft, we have created a deception product that addresses the problem of ransomware, and we are currently offering the chance to deploy this cutting-edge ransomware defense campaign at no cost to your organization. Read more

    How to Sign Up for CounterCraft’s Ransomware Cloud Public Beta Program
  • Categories: ,

    Here at CounterCraft, we have created a deception product that addresses the problem of ransomware, and we are currently offering the chance to deploy this cutting-edge ransomware defense campaign at no cost to your organization. Read more

    Presenting… CounterCraft’s Ransomware Cloud Public Beta Program
  • Categories:

    Our Security Secret Sauce

    Dan Brett, CounterCraft CSO, and Xabier Eizmendi, Lead Software Architect, have the CounterCraft Security Secret Sauce in hand in this new video. They explain the elements of CounterCraft’s Cyber Deception Platform and the security thinking behind them. Read more

    Our Security Secret Sauce
  • Categories: ,

    CounterCraft’s team of experts has discovered a unique scheme in which threat actors are abusing SSH servers on captured machines as part of the final layer of traffic delivery. Founders Dan and David talk about it in the latest Founder Chat. Read more

    The Discovery of a New Traffic Anonymizing Network | Founder Chat
  • Categories:

    CounterCraft’s team of experts has discovered a unique scheme in which threat actors are abusing SSH servers on captured machines as part of the final layer of traffic delivery. This allows a variety of threat activity to pass by security controls on all kinds of websites. We discovered this traffic thanks to one of our… Read more

    A Distributed Anonymizing Network Abusing SSH
  • Categories:

    What We’re Reading

    Cybersecurity news in May. Click through to find out what our team of experts was reading and talking about this month. Read more

    What We’re Reading

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration