Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    CounterCraft will be at several events across the globe this month. Visit us at RSA, Gartner, FIC and other industry-wide conferences. Get all the details here Read more

    Visit CounterCraft This Month: At RSA and SOF Week
  • Categories: , ,

    In a recent interview with David Brown, the driving force behind strategic alignment at our organization, and CounterCraft partner Bosch CyberCompare, we delved into the latest advances in threat intelligence solutions, focusing on the power of deception technology to deliver specific, actionable intel in real-time. With a wealth of experience in international sales management across… Read more

    Talking the Future of Threat Intelligence with CounterCraft CEO, David Brown
  • Categories: , ,

    Detected in the Wild – How We Identified A Real Threat Actor Exploiting an Unpatched Fortinet Product Read more

    Detected in the Wild – How We Identified A Real Threat Actor Exploiting an Unpatched Fortinet Product
  • Categories: , ,

    CounterCraft’s Version 3.4 release of The Platform™ introduces several key new features to improve the threat intelligence delivered by our powerful deception technology. Read more

    The Platform™ v3.4: Now with A New Tool for Reporting Threat Intelligence Incidents
  • Categories:

    As we reflect on the year 2023, we are incredibly proud of the progress we have made as a company and the positive impact we have had on our customers’ security posture. We have faced many challenges along the way, but our team has demonstrated resilience, innovation, and an unwavering commitment to delivering a cutting-edge… Read more

    A Letter from Our Leadership Team
  • Categories: ,

    Since the start of the Internet, honeypots have been a very valuable defensive strategy. No matter how simple or complex they are, they definitely add a lot of value to your security posture. Clifford Stoll and his marvelous book The Cuckoo’s Egg is always referenced as one of the first deception use cases in cybersecurity,… Read more

    Why Credibility is Key: The Truth about Honeypots
  • Categories: ,

    Find Out How CounterCraft Delivers Actionable Adversary-Generated Threat Intelligence Read more

    {VIDEO} How CounterCraft Delivers Actionable Adversary-Generated Threat Intelligence

Top resources.

  • Webinars

    Technical Evidence of Attacks on Ukrainian Government Infrastructure

  • Ebook

    Are You Ready for Deception Technology?

  • Ebook

    Inside the Mind of the Enemy / Profiling Cyber Adversaries

  • Datasheet

    ActiveBehavior™

  • Datasheet

    Deception Techniques for Every Stage of A Cyber Attack

  • Datasheet

    Active Defense: The Tech Behind The Platform™

  • Ebook

    Digital Twin: Finding the Digital Adversary Before They Find You

  • Webinars

    Destroying the Barrier to Sophisticated Detection and Response

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration