Hit enter to search or ESC to close
GalaxkeyGalaxkey
  • Welcome
  • Products
    • Email Security
    • Document Security
    • Secure Workspace
    • Digital Document Signing
  • Technology
    • What Is The Product?
    • Who Do We Help?
  • Resources
    • FAQ
    • Case Studies
    • Compliance
    • Legal
    • Downloads
    • Datasheets
  • Connect
    • Contact
    • Book A Demo
    • Trial
    • Support
    • Partners
  • About Us
    • Our Executive Team
    • Our Investment Team
  • Blog
  • LOGIN
  • BUY
Category

Uncategorized

Recent Posts

  • New malware uncovered by experts examining SolarWinds strike
  • It’s perfectly safe to send email attachments…isn’t it?
  • Finnish government struck by cybercrime attack
  • Top data loss prevention protocols for email
  • Three types of Distributed Denial of Service (DDoS) attacks

Archives

  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • November 2019
  • June 2019
  • May 2019
  • April 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • November 2017
  • June 2017
  • March 2017
  • January 2017
  • December 2016
  • October 2016
  • September 2016
  • July 2016
  • June 2016
  • May 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • September 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • October 2014
  • September 2014
  • May 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • April 2012

Categories

  • Business
  • Clickjacking
  • Cyberattack
  • Data Protection
  • Electronic Signatures
  • Email
  • Encryption News
  • File Integrity Monitoring
  • Middle East & Asia
  • News
  • Phishing
  • Ransomware
  • Release News
  • Spoofing
  • Trojan
  • Uncategorised

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About The Blog

Aiming to bring you the latest news and articles from the world of cybersecurity.

Recent Posts

  • New malware uncovered by experts examining SolarWinds strike 22nd January 2021
  • It’s perfectly safe to send email attachments…isn’t it? 21st January 2021
  • Finnish government struck by cybercrime attack 20th January 2021
  • Top data loss prevention protocols for email 19th January 2021
  • Three types of Distributed Denial of Service (DDoS) attacks 18th January 2021

Contact

2 Falcon Gate Shire Park
Welwyn Garden City
AL7 1TW

+44 (0) 333 150 6660

info@galaxkey.com


Discover

  • Case Studies
  • FAQ
  • Compliance
  • Legal

Galaxkey Tweets

GalaxkeyFollow

Galaxkey
GalaxkeyGalaxkey@Galaxkey·
14h

After a ransomware assault on Foxconn CTBG MX’s, their website was rendered inaccessible to visitors and displaying an error message.

Read the full article: Electronics multinational faces $34m ransom
▸ https://lttr.ai/cCTC

#LatestArticle #GalaxkeyBlog #Encryption

Reply on Twitter 1352577848016576512Retweet on Twitter 1352577848016576512Like on Twitter 13525778480165765121Twitter 1352577848016576512
GalaxkeyGalaxkey@Galaxkey·
17h

Deploying malicious software via phishing emails and social engineering tactics, cybercriminals infect systems and lock enterprises out of essential and private records

Read more 👉 https://lttr.ai/cB7v

#MinimiseRansomwareRisks #LatestArticle #GalaxkeyBlog #Encryption

Reply on Twitter 1352537602113605633Retweet on Twitter 1352537602113605633Like on Twitter 13525376021136056331Twitter 1352537602113605633
GalaxkeyGalaxkey@Galaxkey·
18h

When a network relies solely on IP addresses in order to authenticate a computer it connects with, this is called a trust relationship.

Read more 👉 https://lttr.ai/cBzw

#NetworkSpoofer #Encryption #Cybersecurity #Spoofing #StepsWorthImplementing

Reply on Twitter 1352522536265936902Retweet on Twitter 1352522536265936902Like on Twitter 13525225362659369021Twitter 1352522536265936902
GalaxkeyGalaxkey@Galaxkey·
21 Jan

As a target organisation trusts the watering hole site, its users may download infected attachments without ever realising the threat they contain.

Read more 👉 https://lttr.ai/cAXA

#ZeroDayVulnerabilities #LatestArticle #GalaxkeyBlog #Encryption #Cybersecurity

Reply on Twitter 1352329974737477635Retweet on Twitter 1352329974737477635Like on Twitter 1352329974737477635Twitter 1352329974737477635
GalaxkeyGalaxkey@Galaxkey·
21 Jan

Hacker group used a freshly disclosed bug in Microsoft Exchange that allowed it to evade multi-factor authentication security protocols.

Read more 👉 https://lttr.ai/b9AJ

#MassiveCyberattackHits #LatestArticle #GalaxkeyBlog #Encryption #Cybersecurity #Cyberattack

Reply on Twitter 1352215464404004866Retweet on Twitter 13522154644040048661Like on Twitter 13522154644040048661Twitter 1352215464404004866

2010-2021 Galaxkey Limited. All Rights Reserved

  • Welcome
  • Products
    • Email Security
    • Document Security
    • Secure Workspace
    • Digital Document Signing
  • Technology
    • What Is The Product?
    • Who Do We Help?
  • Resources
    • FAQ
    • Case Studies
    • Compliance
    • Legal
    • Downloads
    • Datasheets
  • Connect
    • Contact
    • Book A Demo
    • Trial
    • Support
    • Partners
  • About Us
    • Our Executive Team
    • Our Investment Team
  • Blog
  • LOGIN
  • BUY
  • Download
  • Trial
  • Support