Skip to main content
Skip to footer
Solutions
Partners
Resources
Contact Us
Book a demo
Solutions
Partners
Resources
Contact Us
Tag:
cyber security
Case study – preventing Malgent trojan horse
12/09/2024
Intro Yesterday (September 12th, 2024) our Active Endpoint Deception platform prevented a new variant of Malgent trojan horse that was…
Do you trust your EDR? Why it is not the endpoint savior (some) vendors claim it to be
31/05/2023
Let’s start off by acknowledging that 10 years ago, the EDR brought a major paradigm change in the world of…
Deceptive Bytes’ interview to CyberNews
13/04/2022
Hen Lamay, Deceptive Bytes: "every organization should review its cybersecurity posture to make sure it can prevent, detect, and recover…
Recent attacks on European organizations
24/11/2021
Deceptive Bytes' research team detected in recent days a wave of attacks on European organizations, while the attacks are not…
Overcoming The Challenges Of Managing Endpoint Protection Solutions
28/10/2021
More and more firms are turning to remote working and, while doing so, expect staff members to remain on top…
Chernobyl disaster main lessons for CyberOps in 2019
15/08/2019
So, what can be learned from the Chernobyl disaster and how it can be implemented in Cyber security operations? Lately,…
Why ML/AI is not cyber and endpoint security savior
28/01/2019
Artificial Intelligence (AI) and Machine Learning (ML) are considered the next evolution in computer science as they allow computers to…
Skip to content
Open toolbar
Accessibility tools
Accessibility tools
Enlarge text
Enlarge text
Reducing text
Reducing text
Shades of gray
Shades of gray
High contrast
High contrast
Negative contrast
Negative contrast
Light background
Light background
Links Underline
Links Underline
Readable font
Readable font
Reset
Reset