Skip to main content
Skip to footer
Solutions
Partners
Resources
Contact Us
Book a demo
Solutions
Partners
Resources
Contact Us
Tag:
deception
Case study – preventing Malgent trojan horse
12/09/2024
Intro Yesterday (September 12th, 2024) our Active Endpoint Deception platform prevented a new variant of Malgent trojan horse that was…
Do you trust your EDR? Why it is not the endpoint savior (some) vendors claim it to be
31/05/2023
Let’s start off by acknowledging that 10 years ago, the EDR brought a major paradigm change in the world of…
Deceptive Bytes’ interview to CyberNews
13/04/2022
Hen Lamay, Deceptive Bytes: "every organization should review its cybersecurity posture to make sure it can prevent, detect, and recover…
Deception in real-world situations
04/09/2019
A few days ago it was reported that Israel’s Defense Forces has used deception against Hezbollah, making the latter believe…
Why ML/AI is not cyber and endpoint security savior
28/01/2019
Artificial Intelligence (AI) and Machine Learning (ML) are considered the next evolution in computer science as they allow computers to…
Improve your security without installing additional security software
18/12/2017
There are various security measures you can take in order to protect your endpoint, some might be heavy on the…
Skip to content
Open toolbar
Accessibility tools
Accessibility tools
Enlarge text
Enlarge text
Reducing text
Reducing text
Shades of gray
Shades of gray
High contrast
High contrast
Negative contrast
Negative contrast
Light background
Light background
Links Underline
Links Underline
Readable font
Readable font
Reset
Reset