[Infographic] : Some figures about phishing
Phishing is a common type of social engineering attack. According to a Proofpoint survey, “83% of respondents say their organisation...
Keep control of your life on the Internet
The Internet is used by everyone, from the youngest to the oldest. Who would give up surfing the Web today?...
Cyber or not Cyber ?
Once a month, get the latest cyber news by subscribing to the TEHTRIS newsletter.

The latest news on TEHTRIS products
XDR Use case: MTD & SOAR vs Hook RAT
Why do you need MTD protection ? There is no need to state that...
XDR USE CASE: shall we play a game?
In November 2022, a Linux server located in Poland (Europe) was exposed on the...
LockBit ransomware: Double extorsion attack & protection by TEHTRIS’ XDR Platform
LockBit ransomware group is a malicious actor exceptionally active in the threat landscape. They...
XDR SUCCESS USE CASE: blocking advanced cyber-attacks at an early stage
Thwarting the advanced cyberattacks faced by our customers is the daily work of TEHTRIS’...
Protect your strategic data against industrial cyber-espionage
On July 6th, 2022, for the first time, the Directors of the British MI5...
Anti-virus or EDR? understanding the differences and their advantages
Protecting your company with an antivirus or an EDR? Not a trivial question. Faced...
Cybersecurity for SMBs: How to protect yourself effectively?
Cybersecurity concerns both large structures and SMEs. Small companies sometimes make the mistake of...
XDR vs EDR : understanding the differences and their advantages
We hear about these new technologies every day, but are we really aware of...
Interoperability and hyperautomation, two of the strengths of the TEHTRIS XDR Platform
As the threat landscape continues to evolve, the needs expressed by companies are changing....
What is an Open XDR Platform?
While XDR (eXtended Detection & Response) technology has become the benchmark in the cyber...