Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories: , , ,

    Stop cyber threats in their tracks and protect your remote workforce with the all new CounterCraft’s Threat Intelligence Services against VPN threats, pre-breach activities and spear phishing campaigns. Read more

    Detect Threats Earlier with CounterCraft’s Threat Intelligence Services
  • Categories: ,

    Cyber Deception Platforms have reached the Peak of the Hype Cycle for Security Operations and CounterCraft has been recognized as a sample vendor. Am I ready for deception? Is the level of maturity in your security operation relevant? Read more

    Am I Ready for Cyber Deception? Gartner Hype Cycle for Security Operations.
  • Categories: ,

    Deception technology allows a CISO to address key pain points causing major operational challenges right now, and provides valuable clarity to help keep leadership teams on-side. Read more

    How Deception Technology Helps the Modern CISO
  • Categories:

    The CounterCraft Cyber Deception Platform can collect telemetry from any asset with an incredible detail. Once we collect such telemetry data, we need to extract the relevant events, and map them to MITRE ATT&CK, in order to convert all the raw data into TTPs. Read more

    From Telemetry to TTPs: a Sample Analysis of a Mining Linux Botnet, Using Cyber Deception
  • Categories:

    The financing round was led by Adara Ventures, joined by new investors eCAPITAL and Red Eléctrica Group, with participation from existing investors including Evolution Equity Partners, ORZA, and Wayra. Read more

    CounterCraft raises $5 million in a funding round led by Adara Ventures, and joined by new investors eCAPITAL and Red Eléctrica Group
  • Categories: ,

    Users need threat intelligence to be specific to them and actionable. By using deception technology you can generate highly actionable threat intelligence that is specific and delivered in real time. Read more

    Are You Getting Value From Your Threat Intelligence Service?

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration