Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories: ,

    CounterCraft 2.6 excels in the five stages of deception identified by Gartner, basic threat detection, detection and response, production of local IoC and MRTI, integrated proactive threat hunting and active attacker engagement. Read more

    CounterCraft unveils unrivalled enterprise cyber deception capabilities at RSA Conference 2020
  • Categories: , ,

    The market is full of security providers that offer Threat Intelligence solutions that seem interesting, but their usefulness in many environments is not so clear. Read more

    Threat Intelligence: Do You Have All You Need? Do You Need All You Have?
  • Categories: ,

    CounterCraft 2.6 is here, and as we throw ourselves into our fourth visit to San Francisco’s Moscone Centre in a few weeks for RSA, we can’t think of a better way to embark on this new decade. Read more

    CounterCraft peaks on the maturity curve with version 2.6
  • Categories: ,

    Nowadays, few computers use Windows XP. However, many of the existing tools used by current threat actors for internal lateral movements do work in this operating system. Now you can use Windows XP devices in our deception campaigns. Read more

    Fighting Ransomware with Active Defense
  • Categories:

    CounterCraft and PwC, leading cybersecurity companies, recently reached a global strategic collaboration agreement. PwC will provide digital counterintelligence consulting services and the CounterCraft Cyber Deception Platform ​​to large international companies Read more

    PwC and CounterCraft Sign a Global Strategic Collaboration Agreement
  • Categories:

    This is the perfect time to reflect on the year past and think about what the future will bring. So, before starting 2020 with renewed purposes about making your organization more secure, why not take a moment to re-read our top 5 blog posts of 2019? Read more

    Our top 5 cybersec blog posts of 2019

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration