Blog  

The latest in cybersecurity and deception technology.

Subscribe for updates—fresh insight delivered to your inbox.

Protecting the Retail Industry from Cyber Attacks {Data Sheet}

READ MORE

Browse By Category

Select a category to see more related content


Recent Articles

7 Jul

How to Boost NIS2 Compliance Efforts in Six Important Categories

READ MORE

With the implementation of the new European NIS2 directive right around the corner, it’s essential that organizations that fall under the directive are prepared. Keep reading to better understand what the NIS2 directive is, what organizations can do to prepare for this change in how cybersecurity is handled, and how CounterCraft can help with future compliance.

5 Jul

The Human Behind the Keyboard: Analyzing Behavior to Gather Intelligence

READ MORE

Engaging red teams and learning from them is an exercise we typically find quite useful. In this red/blue team exercise, they are our adversaries, and sometimes we get really interesting results.

30 Jun

What We're Reading

READ MORE

This month’s news was about new attack methods and reanalyzing old claims that cryptographic keys are safe from attackers. This and more was on our mind and in the news this month.

28 Jun

Protecting Financial Services Using Cyber Deception and SWIFT

READ MORE

According to a recent article in the Financial Times, worries about attacks on the SWIFT banking platform have only grown since the Russian invasion of Ukraine, which prompted the ousting of seven Russian banking lenders from the global payment network.

21 Jun

{Webinar} BPFDoor and So Much More: An Analysis of Linux Network Passive Backdoors

READ MORE

Passive backdoors are implants designed to be stealthier than common backdoors, especially by avoiding listening on ports or pinging back to a Command and Control server.

Page 6 of 57

Top Videos

SEE ALL

Cyber Deception for Insider Theats

Cyber Deception for Insider Theats

GET IT NOW

What is Deception Technology?

READ THE GUIDE