Honeypots: activity of the week 45
TEHTRIS honeypot analysis provides information on the types of scans and malicious actions performed by cyber... Read more

TEHTRIS honeypot analysis provides information on the types of scans and malicious actions performed by cyber... Read more
After Black Friday, Cyber Monday, Christmas shopping is just around the corner, so here's a little... Read more
To know the threat for better adjusting defense: that is the wish of every cybersecurity analyst!... Read more
In week 44, the IP addresses responsible for most of the malicious network activity on TEHTRIS... Read more
Cyber attacks have been ranked as the fifth most important risk. Cyber attacks have never been... Read more
In October 2022, a TEHTRIS customer was protected from the threat known as Purple Fox thanks... Read more
During week 43, TEHTRIS chose to highlight 4 malicious activities observed on its international honeypot network.... Read more
For week 42 analysis, TEHTRIS focused on studying two malicious activities monitored on its honeypot network.... Read more
TEHTRIS observed the activity on its honeypot network during week 41. Some trends remain the same... Read more
If you are a SMB owner trying to strengthen your cybersecurity quickly but, most importantly, efficiently,... Read more
RustyStealerDropper Use case A reminder: what are malware droppers?How do they stay in your systems?Deobfuscating a... Read more
TEHTRIS AI R&D team has developed from scratch an Artificial Intelligence based module called Cyberia eGuardian.... Read more