Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    Five years ago, CounterCraft was born from a shared vision for an industry-disrupting cyber security platform. Our company now handles deception-based threat intelligence for everyone from the world’s largest retailer to global banks. Read more

    Celebrating Five Years of CounterCraft
  • Categories: ,

    Watch the two founders of CounterCraft, Dan Brett (CSO) and David Barroso (CEO), sit down for a chat about ransomware—and what you can do to protect your business. Read more

    How to Prevent Ransomware | Founder Chat
  • Categories:

    What We’re Reading

    Cybersecurity news in November. Click through to find out what our team of experts was reading and talking about this month. Read more

    What We’re Reading
  • Categories:

    CounterCraft worked hand-in-hand over the last six months with NATO to design and execute a groundbreaking defense experiment. Click to read more. Read more

    CounterCraft Helps NATO Ready for Cyber Threats
  • Categories: ,

    The CounterCraft Cyber Deception Platform will provide you with a mapping of the attackers’ TTPs and IOCs in real time and simultaneously generate the MITRE Shield matrix, which will enable you to understand what controls have failed in thwarting the attackers. Read more

    Your Cybersecurity Roadmap Toward a More Secure Organization with Active Defense
  • Categories:

    Nowadays, few computers use Windows XP. However, many of the existing tools used by current threat actors for internal lateral movements do work in this operating system. Now you can use Windows XP devices in our deception campaigns. Read more

    Why we Added Support for Windows XP in Deception Director

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration