Deceptive Bytes’ interview to Private Internet Access
I recently got a chance to do an interview for Private Internet Access by Marko Velimirovic, link to interview and what I had to say can be found here
I recently got a chance to do an interview for Private Internet Access by Marko Velimirovic, link to interview and what I had to say can be found here
Deceptive Bytes’ research team detected in recent days a wave of attacks on European organizations, while the attacks are not that sophisticated, they employ social engineering to make users run
Our CEO, Sagi Lamay, was interviewed to Safety Detectives by Aviva Zack, and this is what he had to say, link to interview can be found here
More and more firms are turning to remote working and, while doing so, expect staff members to remain on top of their jobs using a variety of different devices. This
Holon, Israel – 13/09/2021 – Deceptive Bytes, a leader in endpoint deception technology, announces it has secured a new patent from USPTO (the U.S. Patent & Trademark Office). The patent
Despite the numerous advances and innovations in the viruses and malware that cybercriminals have been able to develop, far too many businesses do not take their security as seriously as
Background DLL hijacking (aka spoofing) is an attack on an application where the attacker uses a DLL the application tries to load that is missing or from an unexpected location
Every day, all around the world, malware is attacking organizations and businesses from all sizes, affecting their day-to-day activities and causing businesses losses which can be significant. When you think
Deceptive Bytes latest version and first release of 2020 brings with it an additional boost to organizations’ cyber security stack as we added the capability to control Windows Defender &
There are many injection techniques used by malware authors, from simply calling CreateRemoteThread to advance ones like AtomBombing, PROPagate & others. How basic DLL injections work? Usually when a malware