Blog  

The latest in cybersecurity and deception technology.

Subscribe for updates—fresh insight delivered to your inbox.

Analysis of an Emotet infection via a malicious Excel macro

READ MORE

Browse By Category

Select a category to see more related content


Recent Articles

14 Jun

Three Strategies to Prevent Supply Chain Compromise Using Cyber Deception

READ MORE

Operational technology (OT) security poses one of the most serious challenges in cyber today (see more about why in this post). A huge piece of this security puzzle lies in the manufacturing supply chain.

9 Jun

A BPFDoor Compromise | Founder Chat

READ MORE

BPFDoor, a UNIX backdoor allegedly used by Chinese threat actors, is a smart backdoor that does not need to open additional ports when the attacker wants to connect to the compromised host.

6 Jun

Confluence CVE-2022-26134 active exploitation

READ MORE

On June 2, Atlassian published an advisory for CVE-2022-26134, a critical zero-day remote code execution vulnerability in Confluence Server and Data Center. The vulnerability currently affects all supported versions of Confluence Server and Confluence Data Center.

2 Jun

Visit CounterCraft This Month: RSA, Gartner and more

READ MORE

CounterCraft is excited to announce that we will be attending conferences across the United States and Europe this month. In the United States, you can find us at RSA, Gartner, and HxGN LIVE Global 2022.

31 May

What We're Reading

READ MORE

The news of this month includes some fascinating threat intel discoveries as well as talking about some of our favorite tools, like MITRE Engage. Read on to find out what our team is talking about this month.

Page 7 of 57

Top Videos

SEE ALL

Cyber Deception for Insider Theats

Cyber Deception for Insider Theats

GET IT NOW

What is Deception Technology?

READ THE GUIDE