Cyber deception is the most effective way to identify threat actors in any organization’s network. CounterCraft delivers actionable threat intelligence across industries.
-
Malicious Docker Images Still Used for Mining Purposes
Malicious docker images are part of the latest technique. Our deception technology has detected evidence of the use of malicious Docker images available at Docker Hub Read more
-
Escaping Docker Privileged Containers for Mining Crypto Currencies
TeamTNT is abusing open Docker daemons and they are using a neat trick to escape from the container and install the crypto miner in the real host. Read about it here. Read more
-
How to Improve Situational Awareness of a Cyber Attack
Being aware of what is happening in your field of operations, especially in the cyber realm, is key to a successful cybersecurity response. This blog will take you through the ways we answer these questions using deception techniques and provide unequaled situational awareness for our users Read more
-
Questions to Ask Your Threat Intel & Deception Technology Vendors
When shopping around for cybersecurity vendors, it can be hard to determine which vendors are the best. This is especially true with deception, a technology in a sector that is still growing and developing rapidly. Read more
-
Profiling Adversaries
Real-time threat intelligence provides TTPs, IoCs, and important information that allows organizations to profile cyber adversaries. That means being sure that the response is the right one at the right time. Read more
-
Big Data vs Right Data
Harnessing big data can be a powerful tool. But right data can help you identify threat actor behavior much more quickly. Read on to find out. Read more