Cyber deception is the most effective way to identify threat actors in any organization’s network. CounterCraft delivers actionable threat intelligence across industries.
-
Categories: Deception Technology
What We’re Reading
Cybersecurity news in August. Click through to find out what our team of experts was reading and talking about this month. Read more
-
Shellcode Detection Using Real-Time Kernel Monitoring
Looking at how to use real time kernel monitoring for shellcode detection. Alonso Candado discusses the challenges faced when trying to detect shellcode at runtime, usin the examples of hooking syscalls via hypervisor EPT feature and detecting shellcodes from kernel callback. Read more
-
Categories: Deception Technology
What We’re Reading
Cybersecurity news in August. Click through to find out what our team of experts was reading and talking about this month. Read more
-
How to Improve Situational Awareness of a Cyber Attack
Being aware of what is happening in your field of operations, especially in the cyber realm, is key to a successful cybersecurity response. This blog will take you through the ways we answer these questions using deception techniques and provide unequaled situational awareness for our users Read more
-
Questions to Ask Your Threat Intel & Deception Technology Vendors
When shopping around for cybersecurity vendors, it can be hard to determine which vendors are the best. This is especially true with deception, a technology in a sector that is still growing and developing rapidly. Read more
-
Categories: Deception Technology
What We’re Reading
Cybersecurity news in July. Click through to find out what our team of experts was reading and talking about this month. Read more