Why focusing on chokepoints can help SOC teams to do more with less
Cybersecurity has become a battle of machine versus machine, with AI being used by both attackers... Read more

Cybersecurity has become a battle of machine versus machine, with AI being used by both attackers... Read more
The hidden threat no one is talking about... Yet! Lefebvre Fabien (CTI), Pezier Pierre-Henri (CTI) LegionLoader,... Read more
A complete overview of mobile fleet protection Smishing, man-in-the-middle, jailbreaking/rooting… All these attacks are on the... Read more
As an owner of a small or medium-sized business (SMB), you are unfortunately a prime target... Read more
In a rapidly evolving threat landscape, the configurations of your solutions are becoming a strategic differentiator... Read more
Cryptbot is an advanced malware tool used in cyber-attacks, primarily targeting credentials, personal data, and cryptocurrency... Read more
Threat analysts have to respond quickly to an attack. When dealing with well‐obfuscated code, shortcuts sometimes... Read more
- Updated on
While we all stand in unity with cyber and IT teams who have been working tirelessly... Read more
For the first half of May 2024, TEHTRIS honeypots hosted in Germany have been hit almost... Read more
If you are a SMB owner trying to strengthen your cybersecurity quickly but, most importantly, efficiently,... Read more
RustyStealerDropper Use case A reminder: what are malware droppers?How do they stay in your systems?Deobfuscating a... Read more
TEHTRIS AI R&D team has developed from scratch an Artificial Intelligence based module called Cyberia eGuardian.... Read more