Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    Using our deception technology, we have detected several new threat actors in the wild, some of which we will be sharing weekly, right here. This is a series of posts in which we will describe the IOCs and TTPs of different threat actors we have uncovered, so be sure to check back or follow us… Read more

    Internet Noise: Threat Actor CC0632
  • Categories: ,

    2020 was a wild ride, and 2021 looks like more of the same. Join the two founders of CounterCraft, Dan Brett (CSO) and David Barroso (CEO) for a chat about cyber threats in 2021—found out what the experts are bracing for as David sums up each threat in just 20 seconds. Read more

    2021’s Top Cyber Threats…In 20 Seconds | Founder Chat
  • Categories:

    What We’re Reading

    Cybersecurity news in January. Click through to find out what our team of experts was reading and talking about this month. Read more

    What We’re Reading
  • Categories: , ,

    MITRE Shield finally gives Blue Teams a way to quantify their work and the ability to show how the security techniques they have deployed reduce the risk of attack. In this article we’ll show you how to use the Shield matrix to measure the coverage of your security deployment. Read more

    Depicting Risk and Quantifying Mitigation with MITRE Shield
  • Categories:

    CounterCraft will be working with the U.S. Department of Defense to dramatically enhance cyber threat detection and intelligence-gathering capabilities. Read more about the agreement with the Defense Innovation Unit (DIU) by clicking here. Read more

    CounterCraft Awarded Agreement with World’s Top Defense Client, U.S. Department of Defense
  • Categories: ,

    The two key challenges and why UK businesses look to cyber deception as a solution. Read as our UK Channel Manager delves into the subject of deception technology in the United Kingdom. Read more

    Real World Cases: Threat Intel to Detect External Threats by Governments

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration