Skip to main content
Skip to footer
Solutions
Partners
Resources
Contact Us
Book a demo
Solutions
Partners
Resources
Contact Us
Tag:
malware
Case study – preventing Malgent trojan horse
12/09/2024
Intro Yesterday (September 12th, 2024) our Active Endpoint Deception platform prevented a new variant of Malgent trojan horse that was…
Do you trust your EDR? Why it is not the endpoint savior (some) vendors claim it to be
31/05/2023
Let’s start off by acknowledging that 10 years ago, the EDR brought a major paradigm change in the world of…
Recent attacks on European organizations
24/11/2021
Deceptive Bytes' research team detected in recent days a wave of attacks on European organizations, while the attacks are not…
Predictions for 2019
19/12/2018
The new year is around the corner and as we prepare for it, we wanted to take a look at…
Improve your security without installing additional security software
18/12/2017
There are various security measures you can take in order to protect your endpoint, some might be heavy on the…
Hello new and innovative security technologies
03/11/2016
In my previous post, I wrote that Anti-malware signatures are dead. Just days after, Check Point published on their blog…
Skip to content
Open toolbar
Accessibility tools
Accessibility tools
Enlarge text
Enlarge text
Reducing text
Reducing text
Shades of gray
Shades of gray
High contrast
High contrast
Negative contrast
Negative contrast
Light background
Light background
Links Underline
Links Underline
Readable font
Readable font
Reset
Reset