Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories: ,

    Working towards achieving zero trust in an organization is a move in the right direction to protect against cyberattacks. However, to truly defend against cybersecurity threats, an organization has to take an active defense approach to cybersecurity threats. Read more

    How Cyber Deception Fits Into an Automated Moving Target Defense (AMTD) Strategy
  • Categories: , ,

    Working towards achieving zero trust in an organization is a move in the right direction to protect against cyberattacks. However, to truly defend against cybersecurity threats, an organization has to take an active defense approach to cybersecurity threats. Read more

    How CounterCraft Supports Zero Trust
  • Categories:

    Cybersecurity News June Edition. Click through to find out what our team of experts was reading and talking about this month. Read more

    What We’re Reading : June Edition
  • Categories: ,

    The United States National Security Agency (NSA) issued a Cybersecurity Advisory on a recently discovered use of Living Off the Land Binaries (LOLBins) techniques by Volt Typhoon to evade detection by EDR, XDR and SIEM solutions. CounterCraft’s deception technology alerts on LOLBins automatically—and we ran a test this week to prove it. Read more

    How to Detect Living off the Land Attacks in Real Time: LOLBins and Deception Technology
  • Categories: ,

    EDR—the cybersecurity solution that is a vast improvement over mere endpoint protection and anti-virus solutions….right? Well, there is one small hitch—EDR is a reactive approach. EDR tools function on a reliance of behavioral analysis, meaning the attacks have already happened and now your team has to race against time to remediate them. EDR avoidance is… Read more

    {Webinar} EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More
  • Categories: ,

    Everybody is doing it—threat hunting, that is. 88% of CISOs and IT Managers believe that threat hunting is rapidly becoming essential and are including it as part of their cybersecurity strategy. Many organizations have realized, traditional defense mechanisms just aren’t enough and need to shift their security defense approach towards a more proactive defense. As… Read more

    Tool Up Your Threat Hunting With Deception Technology

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration