USE CASE: Blitz WarGames
This use case is a summary of the Blitz WarGames, which was organized during the TEHTRIS week in France. We partnered with Whaller to provide a French sovereign platform to our players so that they...
View ArticleTURLA – MITRE Engenuity ATT&CK Evaluations: Enterprise
For the first time, TEHTRIS participated in the 2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise. Using TEHTRIS XDR and EDR Optimus, we successfully demonstrated our robust threat detection...
View ArticleOur selection of alerts on honeypots: report 18 – September 2023
The following report consists of TEHTRIS observations on our honeypots to provide you with information on what is going on the Internet. Keeping track of trends and keeping an eye on what is actively...
View ArticleTEHTRIS XDR Usage: discover the strengths of Cyberia eGuardian, our SOC...
TEHTRIS AI R&D team has developed from scratch an Artificial Intelligence based module called Cyberia eGuardian. The aim of this module is to help, directly from the XDR Platform, SOC analysts to...
View ArticleOur selection of alerts on honeypots: report 19 – October 2023
The following report consists of TEHTRIS observations on our worldwide honeypots network to provide you with information on what is going on the Internet. This actionable cyber threat intelligence is...
View ArticleOur selection of alerts on honeypots: report 20 – November 2023
The following report consists of TEHTRIS observations on our worldwide honeypots network to provide you with information on what is going on the Internet. This actionable cyber threat intelligence is...
View ArticleTEHTRIS CTI performs a complete extraction of the MedusaLocker configuration
MedusaLocker is extremely active malware at the time of writing, including in France. It first appeared in September 2019 and is making a comeback this year. This type of threat is part of the RAAS...
View ArticleOur selection of alerts on honeypots: report 21 – November 2023
The following report consists of TEHTRIS observations on our worldwide honeypots network to provide you with information on what is going on the Internet. This actionable cyber threat intelligence is...
View Article