Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories: ,

    CounterCraft’s version 2.8 is here. The latest release brings bigger, more powerful tools, introducing technology that will mark a before and after in deception. Find out more about the latest cyber deception platform release. Read more

    An Unprecedented Level of Deception Credibility with CounterCraft Version 2.8
  • Categories:

    Alongside global health and climate change, cybersecurity is one of this century’s greatest threats to the world economy. Read for CounterCraft founder David Barroso’s predictions on the top 7 cyber security threats that will make headlines in 2021. Read more

    Top Cybersecurity Threats to Watch In 2021
  • Categories: ,

    A Look Inside…Version 2.8

    Take a look inside CounterCraft’s version 2.8. The latest release of this powerful Cyber Deception Platform includes exciting new technology. Watch the video to find out more. Read more

    A Look Inside…Version 2.8
  • Categories:

    What We’re Reading

    Cybersecurity news in December. Click through to find out what our team of experts was reading and talking about this month. Read more

    What We’re Reading
  • Categories: ,

    CounterCraft wins the Cyber Startup Challenge 2020, organized by the Cyber-Defence Campus at armasuisse Science and Technology. The Swiss Army chooses deception technology as its innovative technology bet for 2021. Read more

    Swiss Army Confirms 2021 is the Year for Deception
  • Categories: ,

    Over 90% of cyber attacks begin with spear phishing. This widespread problem is a difficult one to mitigate, because spear phishing doesn’t rely on an easily detected spam campaign. Instead, spear phishing campaigns are highly targeted, meaning that no matter what security may be in place, there is always the possibility that someone, somewhere will… Read more

    Real World Cases: Threat Intel to Stop Spear Phishing in the Insurance Industry

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration