Cyber deception is the most effective way to identify threat actors in any organization’s network. CounterCraft delivers actionable threat intelligence across industries.
-
Categories: Product Features
Why we Added Support for Windows XP in Deception Director
Nowadays, few computers use Windows XP. However, many of the existing tools used by current threat actors for internal lateral movements do work in this operating system. Now you can use Windows XP devices in our deception campaigns. Read more
-
Detect Threats Earlier with CounterCraft’s Threat Intelligence Services
Stop cyber threats in their tracks and protect your remote workforce with the all new CounterCraft’s Threat Intelligence Services against VPN threats, pre-breach activities and spear phishing campaigns. Read more
-
Categories: Product Features
CounterCraft raises $5 million in a funding round led by Adara Ventures, and joined by new investors eCAPITAL and Red Eléctrica Group
The financing round was led by Adara Ventures, joined by new investors eCAPITAL and Red Eléctrica Group, with participation from existing investors including Evolution Equity Partners, ORZA, and Wayra. Read more
-
CounterCraft unveils unrivalled enterprise cyber deception capabilities at RSA Conference 2020
CounterCraft 2.6 excels in the five stages of deception identified by Gartner, basic threat detection, detection and response, production of local IoC and MRTI, integrated proactive threat hunting and active attacker engagement. Read more
-
CounterCraft peaks on the maturity curve with version 2.6
CounterCraft 2.6 is here, and as we throw ourselves into our fourth visit to San Francisco’s Moscone Centre in a few weeks for RSA, we can’t think of a better way to embark on this new decade. Read more
-
Categories: Product Features
From check to checkmate: Interview with Nahim Fazal, CounterCraft’s Head of Cyber Intelligence
In a world of state-sponsored threat actors, anyone who has an online presence is at risk, argues CounterCraft’s Head of Cyber Intelligence, Nahim Fazal. Yet the growing sophistication and complexity of attacks has not kept pace with an increase in security budgets, resources or availability of talent. Read more