Cyber deception is the most effective way to identify threat actors in any organization’s network. CounterCraft delivers actionable threat intelligence across industries.
-
Detecting malicious artifacts using an ETW consumer in kernel mode
Post-exploitation tooling is becoming increasingly sophisticated and often evades detection by EDRs, meaning sometimes we will not be able to detect when an attacker is able to load his code into memory. Here’s a way to detect artifacts that are already loaded in memory from kernel and in real time Read more
-
Categories: Deception Technology
What We’re Reading
Cybersecurity news in December. Click through to find out what our team of experts was reading and talking about this month Read more
-
Categories: Deception Technology
How to Set up a Deception Host | Threat Deception in A Minute
Threat Deception in a Minute highlights just how simple it is to get powerful deception technology set up in your network. This edition features how to set up a deception host. Whether you’re a current customer or wondering what it’s like to utilize deception, you’ll find these videos quick, interesting and helpful Read more
-
Categories: Deception Technology
What We’re Reading
Cybersecurity news in February. Click through to find out what our team of experts was reading and talking about this month. Read more
-
Profiling Adversaries: What is the Motive of the Cyber Criminal?
Watch Rich Barrell, cyber deception product manager, speak on how profiling cyber criminals can help keep networks safe Read more
-
{Ebook} Inside the Mind of the Enemy: A Guide to Profiling Cyber Criminals
Download our ebook today to learn about the science and the strategy behind profiling cyber criminals. Read more