Identity theft: Causes and Consequences of a Dreadful Threat
The mathematician Jean Sylvain Bailly had no idea how meaningful this sentence could still be today.... Read more

The mathematician Jean Sylvain Bailly had no idea how meaningful this sentence could still be today.... Read more
The use of packing, shellcode execution and in-memory Dynamic Loaded Library (DLL) loading is very common... Read more
On the 24th of November, Alibaba security expert Chen Zhaojun reported the vulnerability known as CVE-2021-44228.... Read more
Attackers may be right to believe in Santa Claus. One only has to look at the... Read more
Cybersecurity is not an exact science. That's why we've chosen to talk about challenges rather than... Read more
As the threat landscape continues to evolve, the needs expressed by companies are changing. Chief Information... Read more
The “Grand Défi Cybersecurité” call for projects, set up by the French government and operated by... Read more
The primary goal of TEHTRIS is to constantly evolve. Our teams continually monitor the cybersecurity news... Read more
When it comes to innovation, cybercriminal gangs are known to be particularly gifted. Some are even... Read more
If you are a SMB owner trying to strengthen your cybersecurity quickly but, most importantly, efficiently,... Read more
RustyStealerDropper Use case A reminder: what are malware droppers?How do they stay in your systems?Deobfuscating a... Read more
TEHTRIS AI R&D team has developed from scratch an Artificial Intelligence based module called Cyberia eGuardian.... Read more