Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    What We’re Reading

    Cybersecurity news in December. Click through to find out what our team of experts was reading and talking about this month. Read more

    What We’re Reading
  • Categories:

    Before the Omicron virus was a coronavirus, it was a computer virus that flipped screen content horizontally once a month. Read more from our founder Fernando Braquehais. Read more

    From the Files: The Original Omicron Virus
  • Categories: , ,

    Nicole Carignan, Head of Customer Success at CounterCraft, spoke at AUSA CyberWorld 2022 about deception technology in the cyber domain. In this presentation, Carignan gives an inside look at the unique technology behind CounterCraft’s deception platform and explains how your organization can gather adversary-generated threat intelligence Read more

    Deception Technology in the Cyber Domain | Nicole Carignan at AUSA CyberWorld 2022
  • Categories:

    What We’re Reading

    Cybersecurity news in November. Click through to find out what our team of experts was reading and talking about this month. Read more

    What We’re Reading
  • Categories: ,

    Learn how deception is uniquely positioned to help protect the retail industry. Download the data sheet for more information Read more

    Protecting the Retail Industry from Cyber Attacks {Data Sheet}
  • Categories:

    Emotet malware detonates with a gesture as simple as opening a malicious Excel spreadsheet, and the effects can range from data leakage to other malware risks. Read this detailed analysis of an Emotet infection via a malicious Excel macro Read more

    Analysis of an Emotet infection via a malicious Excel macro

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration