What are Unified Endpoint Security (UES) systems & do you need them?
Definition : what is an UES ?What does it matter at this time ?Endpoint monitoring and... Read more

Definition : what is an UES ?What does it matter at this time ?Endpoint monitoring and... Read more
A vulnerability named Zerologon, with the number CVE-2020-1472, has been made public on August 11, 2020... Read more
As the threat landscape evolves at a breakneck pace and grows in complexity, organizations are now... Read more
As everyone knows, there is currently a resurgence of attacks with ransomware all over the world.... Read more
A vulnerability named SIGRed and numbered CVE-2020-1350 was discovered in 2020 May by the Checkpoint Security... Read more
When reviewing logs from a company, TEHTRIS CERT found multiple instances where an IP address had... Read more
Data is a necessary evil when it comes to our new world that’s run by technology.... Read more
Trapping attackers to take their exploitation techniques is possible and even highly recommended to build a... Read more
At TEHTRIS, we strongly believe that innovation is extremely important in cybersecurity. We place it at... Read more
If you are a SMB owner trying to strengthen your cybersecurity quickly but, most importantly, efficiently,... Read more
RustyStealerDropper Use case A reminder: what are malware droppers?How do they stay in your systems?Deobfuscating a... Read more
TEHTRIS AI R&D team has developed from scratch an Artificial Intelligence based module called Cyberia eGuardian.... Read more