Case study – preventing Malgent trojan horse
Intro Yesterday (September 12th, 2024) our Active Endpoint Deception platform prevented a new variant of Malgent trojan horse that was built just a few hours prior to the attack on
Intro Yesterday (September 12th, 2024) our Active Endpoint Deception platform prevented a new variant of Malgent trojan horse that was built just a few hours prior to the attack on
Deceptive Bytes’ research team detected in recent days a wave of attacks on European organizations, while the attacks are not that sophisticated, they employ social engineering to make users run
More and more firms are turning to remote working and, while doing so, expect staff members to remain on top of their jobs using a variety of different devices. This
Artificial Intelligence (AI) and Machine Learning (ML) are considered the next evolution in computer science as they allow computers to perform complex decisions and tasks that were up until now
There are several reasons why cyber security experts urge people to change their thinking when it comes to security… We are informed Like many in their respective fields, we keep
There are various security measures you can take in order to protect your endpoint, some might be heavy on the machine and not necessarily that helpful, for instance, the traditional