Cyber deception is the most effective way to identify threat actors in any organization’s network. CounterCraft delivers actionable threat intelligence across industries.
-
Categories: Threat Intelligence
A Distributed Anonymizing Network Abusing SSH
CounterCraft’s team of experts has discovered a unique scheme in which threat actors are abusing SSH servers on captured machines as part of the final layer of traffic delivery. This allows a variety of threat activity to pass by security controls on all kinds of websites. We discovered this traffic thanks to one of our own deception environments. Read on to find out more. Read more
-
{INFOGRAPHIC} The Anatomy of a Cyber Attack
This infographic breaks down the stages of a typical cybersecurity incident and shows you how to stop it. Read more
-
The Anatomy of a Cyber Attack
Every cyber attack consists of various stages, from pre breach to the moment of impact. We believe every stage is an opportunity to trip up and trap cyber criminals. Keep reading to get a breakdown of the stages of a typical cybersecurity incident.100 character intro: An infographic that shows how a typical cybersecurity incident unfolds. Read more
-
Why Threat Intel is Broken
The purpose of threat intelligence is to gather information that helps you understand an attacker so that you can proactively take action against them. The current generic threat intel won’t help get you to that goal. Deception will. 100 character intro: Generic threat intel just isn’t enough to keep systems secure. Read more
-
The Truth About IoCs | Founder Chat
The founders of CounterCraft chat about IoCs—what they are, how they can be used and when they can be trusted. Watch the video ‘The Truth About IoCs’ for insight into the world of IoCs. Read more
-
Can You Trust Your IoCs?
Context is key to an IoC. If your lockpiled IoCs are outdated or have no context, they are useless. So are IoCs still valid? Read this post by CEO and founder David Barroso to find out the answer. Read more