Five ways hackers can take over your email
Email accounts provide threat operators with a vast treasure trove of personally identifiable information (PII) that they can steal or exploit. They also provide a…
Email accounts provide threat operators with a vast treasure trove of personally identifiable information (PII) that they can steal or exploit. They also provide a…
Email systems are an essential communication tool for companies that let them collaborate and engage with colleagues, partners, vendors and customers. In seconds, firms can…
With more enterprises making the move towards digital transformation, many conventional methods of completing business processes have seen a substantial update. As a result, the…
Galaxkey already supports the data protection needs of global organisations with our cutting-edge security solutions. But we also believe that as a responsible company, our…
The insidious ransomware gang known as Vice Society recently published documents and data that it stole from the Los Angeles Unified School District (LAUSD) in…
In terms of a cyberattack, social engineering is a collective word that covers many different types of malicious activities that are carried out through human…
During September 2022, Sir George Zambellas, Chairman at Galaxkey Ltd, lectured at the Alex Brown Center for Entrepreneurship & Innovation at the University of Maryland…
A previously undetected threat operator that cybersecurity researchers have dubbed ‘Metador’ has been infiltrating universities, internet services providers (ISPs) and telecommunications for around two years.
On 15th September 2022, Sir George Zambellas, Chairman at Galaxkey Ltd, gave a thought-provoking speech. The subject was “Resilience in Innovation”. His host was bwtech@UMBC…
Optus, the second largest telecommunications company in Australia, with over 10 million subscribers on its database, recently reported it has been the victim of a…