Ukraine: what is this destructive malware disguised as ransomware?
The crisis between Russia and Ukraine is not new. Its origin is historical but accelerated with... Read more

The crisis between Russia and Ukraine is not new. Its origin is historical but accelerated with... Read more
Malware analysis is part of the CTI team's daily routine. This article presents the analysis of... Read more
The Internet is used by everyone, from the youngest to the oldest. Who would give up... Read more
The mathematician Jean Sylvain Bailly had no idea how meaningful this sentence could still be today.... Read more
The use of packing, shellcode execution and in-memory Dynamic Loaded Library (DLL) loading is very common... Read more
On the 24th of November, Alibaba security expert Chen Zhaojun reported the vulnerability known as CVE-2021-44228.... Read more
Attackers may be right to believe in Santa Claus. One only has to look at the... Read more
Cybersecurity is not an exact science. That's why we've chosen to talk about challenges rather than... Read more
As the threat landscape continues to evolve, the needs expressed by companies are changing. Chief Information... Read more
If you are a SMB owner trying to strengthen your cybersecurity quickly but, most importantly, efficiently,... Read more
RustyStealerDropper Use case A reminder: what are malware droppers?How do they stay in your systems?Deobfuscating a... Read more
TEHTRIS AI R&D team has developed from scratch an Artificial Intelligence based module called Cyberia eGuardian.... Read more