Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    Knowing that attackers prefer short paths or attack trees and rarely attempt long paths, we, as defenders, need to exploit that weakness by using attack paths in deception campaigns. Deploy breadcrumbs everywhere, so the attacker can use them in order to shorten their attack paths and design an attack path as long as needed after… Read more

    Attack Trees in Deception Campaigns
  • Categories:

    The popularity of MITRE ATT&CK is a good indication that we have a common language to describe the TTPs that threat actors are using. CounterCraft uses MITRE ATT&CK to create tailored deception campaigns targeting the threat actors. Read more

    How to Effectively Use MITRE ATT&CK and Deception Campaigns to Engage with Threat Actors
  • Categories: ,

    The healthcare sector is facing significant cyber security challenges due to the COVID-19 pandemic. How can Cyber Deception enhance perimeter security and ensure sensitive data is better protected? Read more

    Data Protection for the Healthcare Sector and Laboratories
  • Categories: , ,

    With most employees working from home amid today’s COVID-19 outbreak, VPN and remote access had drastically increased. How can Deception Technology help organizations tackle the risks associated with it? Read more

    Remote Access & VPN Risks in the New Cybersecurity Scenario
  • Categories: ,

    Cyber Deception Technology can help organisations block spear phishing campaigns, a threat on the rise due to remote work. Read more

    How to Use Cyber Deception Technology to Block Targeted Phishing Campaigns
  • Categories: ,

    How can cyber deception technology help organisations affected by the increasing number of cyber-attacks in the midst of the COVID-19 crisis? Read more

    Proactive cybersecurity during COVID-19 and beyond

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration