Protect your strategic data against industrial cyber-espionage
On July 6th, 2022, for the first time, the Directors of the British MI5 and the... Read more

On July 6th, 2022, for the first time, the Directors of the British MI5 and the... Read more
This week, on TEHTRIS Deceptive Response Network, our Threat Research team monitored exploit attempts on vulnerable... Read more
This week, TEHTRIS observed the following activity on its computer decoys deployed all around the world.... Read more
Have you ever heard of "stalkerware"? It is the contraction of "stalker" and "software". It is... Read more
In the healthcare sector, cyber attacks are not limited to hospitals, pharmaceutical companies, insurers, medical analysis... Read more
A new version of the Ransomware as a Service (RaaS) Redeemer has been launched earlier this... Read more
The number of organizations adopting Artificial Intelligence (AI) technologies has increased by more than 270% since... Read more
Several researchers have revealed the existence of applications available on the Google Play Store containing a... Read more
10,000 organizations since September 2021 have been hit by a massive phishing campaign that stole victims'... Read more
Only 17% of SMBs (1) rate their cybersecurity capabilities as ‘effective’ or ‘somewhat effective’. And a... Read more
If you are a SMB owner trying to strengthen your cybersecurity quickly but, most importantly, efficiently,... Read more
RustyStealerDropper Use case A reminder: what are malware droppers?How do they stay in your systems?Deobfuscating a... Read more