Blog  

The latest in cybersecurity and deception technology.

Subscribe for updates—fresh insight delivered to your inbox.

What We're Reading

READ MORE

Browse By Category

Select a category to see more related content


Recent Articles

12 Jul

IOCs, Intel, and Additional Resources from the BPFDoor Compromise

READ MORE

Our team detected a BPFDoor using deception techniques, and we recently hosted a webinar talking through our findings. BPFDoor uses a variety of techniques, including particularly clever ones that allow it to enable backdoors without opening ports.

7 Jul

How to Boost NIS2 Compliance Efforts in Six Important Categories

READ MORE

With the implementation of the new European NIS2 directive right around the corner, it’s essential that organizations that fall under the directive are prepared. Keep reading to better understand what the NIS2 directive is, what organizations can do to prepare for this change in how cybersecurity is handled, and how CounterCraft can help with future compliance.

5 Jul

The Human Behind the Keyboard: Analyzing Behavior to Gather Intelligence

READ MORE

Engaging red teams and learning from them is an exercise we typically find quite useful. In this red/blue team exercise, they are our adversaries, and sometimes we get really interesting results.

30 Jun

What We're Reading

READ MORE

This month’s news was about new attack methods and reanalyzing old claims that cryptographic keys are safe from attackers. This and more was on our mind and in the news this month.

28 Jun

Protecting Financial Services Using Cyber Deception and SWIFT

READ MORE

According to a recent article in the Financial Times, worries about attacks on the SWIFT banking platform have only grown since the Russian invasion of Ukraine, which prompted the ousting of seven Russian banking lenders from the global payment network.

Page 6 of 57

Top Videos

SEE ALL

Cyber Deception for Insider Theats

Cyber Deception for Insider Theats

GET IT NOW

What is Deception Technology?

READ THE GUIDE