[Infographic] : Some figures about phishing
Phishing is a common type of social engineering attack. According to a Proofpoint survey, “83% of respondents say their organisation...
Keep control of your life on the Internet
The Internet is used by everyone, from the youngest to the oldest. Who would give up surfing the Web today?...
Cyber or not Cyber ?
Once a month, get the latest cyber news by subscribing to the TEHTRIS newsletter.

The latest news on TEHTRIS products
TEHTRIS XDR Usage: discover the strengths of Cyberia eGuardian, our SOC analysts e-assistant
TEHTRIS AI R&D team has developed from scratch an Artificial Intelligence based module called...
TURLA – MITRE Engenuity ATT&CK Evaluations: Enterprise
For the first time, TEHTRIS participated in the 2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise....
How does AI enhance XDR platforms?
A malware powered by Artificial Intelligence is now capable to adapt itself to the...
Use case: USB flash drive attack
In an Industrial Control System environment, let’s imagine the standard maintenance procedure in which...
XDR Use case: MTD & SOAR vs Hook RAT
Why do you need MTD protection ? There is no need to state that...
XDR USE CASE: shall we play a game?
In November 2022, a Linux server located in Poland (Europe) was exposed on the...
LockBit ransomware: Double extorsion attack & protection by TEHTRIS’ XDR Platform
LockBit ransomware group is a malicious actor exceptionally active in the threat landscape. They...
XDR SUCCESS USE CASE: blocking advanced cyber-attacks at an early stage
Thwarting the advanced cyberattacks faced by our customers is the daily work of TEHTRIS’...
Protect your strategic data against industrial cyber-espionage
On July 6th, 2022, for the first time, the Directors of the British MI5...
Anti-virus or EDR? understanding the differences and their advantages
Protecting your company with an antivirus or an EDR? Not a trivial question. Faced...