Skip to main content
Skip to footer
Solutions
Partners
Resources
Contact Us
Book a demo
Solutions
Partners
Resources
Contact Us
Category:
Security
Overcoming The Challenges Of Managing Endpoint Protection Solutions
28/10/2021
More and more firms are turning to remote working and, while doing so, expect staff members to remain on top…
Why you can’t be complacent when it comes to Cybersecurity
24/02/2021
Despite the numerous advances and innovations in the viruses and malware that cybercriminals have been able to develop, far too…
The little virus that took down an empire
05/03/2020
Every day, all around the world, malware is attacking organizations and businesses from all sizes, affecting their day-to-day activities and…
Deceptive Bytes integrated Windows Defender & Firewall to its platform
21/01/2020
Deceptive Bytes latest version and first release of 2020 brings with it an additional boost to organizations' cyber security stack…
The “Early Bird Special” – a new twist on the “Early Bird” injection technique
10/10/2019
There are many injection techniques used by malware authors, from simply calling CreateRemoteThread to advance ones like AtomBombing, PROPagate…
Deception in real-world situations
04/09/2019
A few days ago it was reported that Israel’s Defense Forces has used deception against Hezbollah, making the latter believe…
Chernobyl disaster main lessons for CyberOps in 2019
15/08/2019
So, what can be learned from the Chernobyl disaster and how it can be implemented in Cyber security operations? Lately,…
Endpoint protection & misconceptions
09/07/2019
#1 - Agentless is not really agentless While it’s true that with agentless products you don’t install the vendor’s components…
AVs: The Windows update that broke them all!
12/05/2019
OK, maybe not all of them, but here’s the story.. Last month Microsoft released its usual OS updates to Windows…
Why ML/AI is not cyber and endpoint security savior
28/01/2019
Artificial Intelligence (AI) and Machine Learning (ML) are considered the next evolution in computer science as they allow computers to…
←
1
2
3
→
Skip to content
Open toolbar
Accessibility tools
Accessibility tools
Enlarge text
Enlarge text
Reducing text
Reducing text
Shades of gray
Shades of gray
High contrast
High contrast
Negative contrast
Negative contrast
Light background
Light background
Links Underline
Links Underline
Readable font
Readable font
Reset
Reset