Countercept defends organizations against highly targeted attacks.
We live in a world where nation-states and advanced criminal groups actively aim to disrupt, steal from, and compromise businesses, organizations, and governments.
That’s why we’re here – to enable you to run your business without the impact of a cyber attack.
Our latest news & articles
Abusing Windows Library Files for Persistence
We explore how attackers can exploit this little known persistence technique and provide tips on how to hunt for it.
Hunting for Gargoyle Memory Scanning Evasion
Most of the techniques we see used in the wild leave enough artefacts that they can be detected reliably from user-mode. However, sometimes we come across a technique which is best analysed from kernel mode.
What our customers say
" Countercept has been a great complement to our existing team and technology and has helped us rapidly step-up our detection and response capabilities. Particularly, since on-boarding Countercept we have significantly and demonstrably improved our ability to defend against targeted attacks "Anon, Cyber Security Director, Security Company
" Countercept has given us marked improvement in our detection and response capability and confidence as a business that we're able to defend our organisation against cyber-attacks. Partnering with Countercept, we have been able to successfully prevent a number of incidents that could have caused millions of dollars in business impact "Anon, Chief Information Security Officer, National Bank
" We particularly like how Countercept uses insight gained through both independent research and real-world incident response to provide a true threat hunting service, constantly evolving in line with the latest techniques. In our view, this unique approach sets Countercept apart from the competition "Anon, Information Security Manager, Legal Firm