Cyber deception is the most effective way to identify threat actors in any organization’s network. CounterCraft delivers actionable threat intelligence across industries.
-
Threat Intelligence: Do You Have All You Need? Do You Need All You Have?
The market is full of security providers that offer Threat Intelligence solutions that seem interesting, but their usefulness in many environments is not so clear. Read more
-
Fighting Ransomware with Active Defense
Nowadays, few computers use Windows XP. However, many of the existing tools used by current threat actors for internal lateral movements do work in this operating system. Now you can use Windows XP devices in our deception campaigns. Read more
-
How deception is closing the gap: interview with CounterCraft Product Manager, Richard Barrell
A passion for process and a hacker mentality have enabled Product Manager Richard Barrell to take CounterCraft from an MVP to a full spectrum cyber deception platform in a matter of years. Read more
-
Key benefits of using deception for threat hunting plus use cases
We identify four main key benefits of using deception to hunt cyber threats. Critically, we’re reducing the window of opportunity for the threat actor by detecting them quickly and moving them out of the production environment. Read more
-
Using Deception to Protect Active Directory Pt. 2
This is part two of a two-part series to describe how CounterCraft deception technology can be used to protect Microsoft Active Directory. Read more
-
Using Deception to Protect Active Directory Pt. 1
Active Directory (AD) a very obvious target for attackers. The purpose of this blog post is to describe an example of how deception technology can be used to detect (and therefore control) an attacker as they attempt to breach your AD installation Read more