Cracking Formbook malware: Blind deobfuscation and quick response techniques
Threat analysts have to respond quickly to an attack. When dealing with well‐obfuscated code, shortcuts sometimes... Read more
- Updated on

Threat analysts have to respond quickly to an attack. When dealing with well‐obfuscated code, shortcuts sometimes... Read more
- Updated on
While we all stand in unity with cyber and IT teams who have been working tirelessly... Read more
For the first half of May 2024, TEHTRIS honeypots hosted in Germany have been hit almost... Read more
Introduction Our experts managed to intercept a pre‑release sample of a new Ransomware‑as‑a‑Service (RaaS) variant called... Read more
- Updated on
The CVE-2024-3273 (CVSSv3: N/A) was disclosed on the 3rd of April. It refers to a command... Read more
RustyStealerDropper Use case A reminder: what are malware droppers?How do they stay in your systems?Deobfuscating a... Read more
The following report consists of TEHTRIS observations on our worldwide honeypots network to provide you with... Read more
The following report consists of TEHTRIS observations on our worldwide honeypots network to provide you with... Read more
The following report consists of TEHTRIS observations on our worldwide honeypots network to provide you with... Read more
If you are a SMB owner trying to strengthen your cybersecurity quickly but, most importantly, efficiently,... Read more
RustyStealerDropper Use case A reminder: what are malware droppers?How do they stay in your systems?Deobfuscating a... Read more
TEHTRIS AI R&D team has developed from scratch an Artificial Intelligence based module called Cyberia eGuardian.... Read more