Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    Emotet malware detonates with a gesture as simple as opening a malicious Excel spreadsheet, and the effects can range from data leakage to other malware risks. Read this detailed analysis of an Emotet infection via a malicious Excel macro Read more

    Analysis of an Emotet infection via a malicious Excel macro
  • Categories:

    What We’re Reading

    Cybersecurity news in October. Click through to find out what our team of experts was reading and talking about this month Read more

    What We’re Reading
  • Categories:

    En este webinar, Mario Castro, jefe del departamento de telecomunicaciones de Red Eléctrica, operador global de infraestructuras esenciales, charlará con CounterCraft sobre cómo han utilizado la tecnología de cyber deception para recopilar inteligencia sobre sus potenciales atacantes. Porque las medidas de ciberseguridad tradicionales no son suficientes para mitigar el riesgo en una instalación de infraestructura… Read more

    {Webinar} Amenazas actuales en infraestructuras críticas, con Red Eléctrica
  • Categories:

    CounterCraft helps CISOs mitigate risk. Find out how in this post for Cybersecurity Awareness Month, an initiative of the National Cybersecurity Alliance Read more

  • Categories:

    CounterCraft has been awarded a sole-source contract from the U.S. government, with a ceiling of more than $26MM, allowing the entire U.S. Department of Defense and federal government access to their innovative deception technology for active cyber defense. This is an especially important announcement as CounterCraft continues their ongoing mission to support U.S. cybersecurity initiatives. Read more

    U.S. Government Awards CounterCraft $26MM Ceiling Contract to Support Advanced Cyber Operations
  • Categories:

    What We’re Reading

    Cybersecurity news in September. Click through to find out what our team of experts was reading and talking about this month Read more

    What We’re Reading

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration