Galaxkey announced as finalist in Cyber Security Awards 2022

Galaxkey has been announced as a finalist at the 2022 Cyber Security Awards. Secure Workspace is an ultra-secure and easy to use file management platform and has been recognised as a significant contributor to the security of data in 2022. It has been shortlisted in the category of Cloud-Based Product of the Year. Finals take […]

Read More… from Galaxkey announced as finalist in Cyber Security Awards 2022

What are the different types of Trojan malware?

A diverse range of different malware are deployed against enterprises, educational institutions and even government departments in today’s threat landscape. However, perhaps one of the most insidious options available to modern cybercriminals is the Trojan, or Trojan Horse. Like it’s mythical ancient Greek namesake, this type of malware appears to be an innocent offering, but […]

Read More… from What are the different types of Trojan malware?

Galaxkey partners with Advantage Technologies to protect the data of enterprises across the US

Galaxkey has today revealed a new platinum partnership with Advantage Technologies, an IT Services & Security Solutions company headquartered in Charleston, West Virginia. Under the new partnership, Galaxkey and Advantage will focus on providing world-class data security to businesses across the Mid-Atlantic region of the USA. The partnership will combine the respective skills, resources, and […]

Read More… from Galaxkey partners with Advantage Technologies to protect the data of enterprises across the US

Three types of data exchange that benefit from encryption

Collaborating and communicating are key processes for most successful enterprises. However, when data is exchanged that regards confidential company deals or the personally identifiable information (PII) of staff members, customers and members of the public, it is essential that security measures are adopted for protection. […]

Read More… from Three types of data exchange that benefit from encryption

Ransomware gang targets remote desktop services

A recent report has revealed that the malicious minds behind the Venus Ransomware group are currently targeting Remote Desktop services that are publicly exposed to encrypt devices running Windows. A relatively new threat group, Venus Ransomware is believed to have started operating in mid-August this year, with wide-ranging attacks that have seen victim’s systems encrypted […]

Read More… from Ransomware gang targets remote desktop services

Zero-day flaw leads to severe server hack

Close to 900 servers were recently hacked employing critical vulnerability in Zimbra Collaboration Suite, which had a zero-day status without a security patch for around six weeks. The known vulnerability (CVE-2022-41352) is a remote code execution (RCE) flaw that enables threat operators to transmit an email with a malicious attachment that deploys a web shell […]

Read More… from Zero-day flaw leads to severe server hack

Understanding the difference between common malware types.

Malware unleashed on today’s enterprises takes many forms. As a result, there is often a great deal of confusion regarding what these insidious programs are designed to do and what level of harm they can cause. In this blog, we’ll take an in-depth look at three different attack types that your firm must be aware […]

Read More… from Understanding the difference between common malware types.