• About Stormshield
    • The European cybersecurity choice
    • Our staff
    • Our ecosystem
    • Our history
    • Our sales offices
    • Our environmental approach
  • Join us
  • Contact
  • En
    • Fr
Stormshield Stormshield Stormshield Stormshield Stormshield
Menu
  • Our difference
  • Our solutions & products
      • By industry
          • Aviation
          • Public Administration and Government
          • Critical communication
          • Defense and Military Organizations
          • Water Industry
          • Facility Management & Warehouse
          • Electric utilities
          • Navy
          • Health and Healthcare Facilities
          • Land transport
          • MSSPs and Other Service Providers
        • Close
      • All our products
        • Network security
          • Hardware firewalls
          • Virtual Appliances
          • Administration tools
          • Firmware
          • VPN Client
          • Features
          • Firewall comparison
        • Data security
          • Data encryption in Google Workspace
          • Data encryption in Gmail
          • Data encryption in Outlook
          • Data encryption in SharePoint and OneDrive
          • Data encryption on workstations
          • SDS range
        • Endpoint security
          • EDR
          • Protection for terminals
          • Protection for servers
        • Operational security
          • Features
          • Product range
        • Buy a solution Stormshield
        • Close
    • Close
  • Our support
      • With our partners
      • Services
          • Maintenance
          • Technical Support
          • Training
          • Professional Services
          • Threat Intelligence
          • Stormshield Academy
        • Close
      • Marketing documentation
      • Technical documentation
      • Cybersecurity, first steps
    • Close
  • Partner
    • Why become a partner
    • Join our network
    • All our partners
    • Supporting your customers
    • Close
  • News
    • Cybersecurity, by Stormshield
    • Cybersecurity, first steps

    • Corporate
    • Recruitment news
    • Partner news
    • Products & Services
    • Alert
    • Security Monitoring
    • Opinion articles
    • Technical posts
    • Close
Menu
  • Our difference
  • Our solutions & products
      • By industry
          • Aviation
          • Public Administration and Government
          • Critical communication
          • Defense and Military Organizations
          • Water Industry
          • Facility Management & Warehouse
          • Electric utilities
          • Navy
          • Health and Healthcare Facilities
          • Land transport
          • MSSPs and Other Service Providers
        • Close
      • All our products
        • Network security
          • Hardware firewalls
          • Virtual Appliances
          • Administration tools
          • Firmware
          • VPN Client
          • Features
          • Firewall comparison
        • Data security
          • Data encryption in Google Workspace
          • Data encryption in Gmail
          • Data encryption in Outlook
          • Data encryption in SharePoint and OneDrive
          • Data encryption on workstations
          • SDS range
        • Endpoint security
          • EDR
          • Protection for terminals
          • Protection for servers
        • Operational security
          • Features
          • Product range
        • Buy a solution Stormshield
        • Close
    • Close
  • Our support
      • With our partners
      • Services
          • Maintenance
          • Technical Support
          • Training
          • Professional Services
          • Threat Intelligence
          • Stormshield Academy
        • Close
      • Marketing documentation
      • Technical documentation
      • Cybersecurity, first steps
    • Close
  • Partner
    • Why become a partner
    • Join our network
    • All our partners
    • Supporting your customers
    • Close
  • News
    • Cybersecurity, by Stormshield
    • Cybersecurity, first steps

    • Corporate
    • Recruitment news
    • Partner news
    • Products & Services
    • Alert
    • Security Monitoring
    • Opinion articles
    • Technical posts
    • Close
Technical posts
09 04 2024

Technical analysis of ransomware Crypt888

Technical posts
25 05 2023

HiddenEyeZ cybercrime group: identity card

Technical posts
10 05 2023

RedLine malware: from a Chrome extension to a large-scale malware campaign

Technical posts
02 01 2023

OrBit: advanced analysis of a Linux dedicated malware

Technical posts
28 08 2018

A walk through the AcridRain Stealer

Technical posts
29 03 2018

In-depth Formbook malware analysis – Obfuscation and process injection

Technical posts
20 03 2018

De-obfuscating Jump Chains with Binary Ninja

Technical posts
02 03 2018

Spot the Agent

Technical posts
12 01 2018

Analyzing an Agent Tesla campaign: from a word document to the attacker credentials

Show more
Loading...
Want to find out more? Fill in your preferences and keep up to date with our latest news
Update your email preferences
  • Products
    • Stormshield XDR
    • Stormshield Network Security
    • Stormshield Endpoint Security
    • Stormshield Data Security
    • Stormshield Log Supervisor
    • Stormshield Management Center
    • Certified and qualified products
    • Datasheets
    • Customer cases
    • Advisories Stormshield
  • Partner network
    • Partner finder
    • Apply for a partnership
    • MyStormshield
  • Services
    • Technical Support
    • Professional Services
    • Training calendar
    • Threat Intelligence
    • Stormshield Academy
    • Technical Documentation
    • Marketing documentation
    • Security Portal
  • About us
    • Teams
    • Backstage
    • News
    • Websites
Sales team

+33 (0)9 69 32 96 29

Send us your request

Follow us

  • Legal notice
  • Standard Terms and Conditions of Sale and Service
  • Personal data