• Homepage
  • Products
    • Secure Email
    • Secure Workspace
    • Secure Sign
    • Secure Files & Rights Management
    • Secure Messaging – LockChat
    • Galaxkey Shield
  • Contact Us
  • Login
Galaxkey
  • Home
  • Products
    • Secure Email
    • Secure Workspace
    • Secure Sign
    • Secure Files & Rights Management
    • Secure Messaging – LockChat
    • Galaxkey Shield
  • Contact Us
  • Login
Search site...

Galaxkey 4 top ransomware attack vectors and how to avoid them
  • Malware Detected Warning Screen

    4 top ransomware attack vectors and how to avoid them

    Accelerated by an increase in remote working and digital transformation, ransomware attacks continue to remain on the rise. While 2021’s Colonial Pipeline attack stole headlines…

    12 December 2022
    Secure Communications
  • Backdoor to access the code

    Hackers employ fake application to steal crypto

    The infamous North Korean hacking group known as Lazarus has been connected to a brand new attack spreading bogus cryptocurrency applications under a made-up brand.

    12 December 2022
    Cyberattack
  • concept of leaky software, data with a tap sticking out

    Data breach makes UK water company suffer

    Financial data belonging to customers of the British water supply company Cambridge Water have been exposed following a cyberattack. The UK data breach has resulted…

    10 December 2022
    Data Leak
  • Google apps on Android phone

    Android malware infects devices to steal social media accounts

    According to cybersecurity researchers, an Android-based malware campaign that masquerades an infection as education and reading applications has been operating since 2018. It has been…

    8 December 2022
    Cyberattack
  • Electronic Document Signing

    Streamline the way you work with electronic document signing

    Being able to begin, carry out and complete projects quickly is a defining characteristic of every successful business. As a result, finding tools that facilitate…

    6 December 2022
    Electronic Signatures
  • Data Breach Security Hack Breaking Through 3d Illustration

    What to do when your firm faces a data breach

    If your company is hacked, it can have serious consequences. If personal data that you retain on your customers, suppliers and partners is exposed during…

    4 December 2022
    Data Protection
  • Information concept: data collection on digital background

    Stolen Twitter user data released for free

    More than 5.4 million user records for the social media platform Twitter were recently shared free of charge on a hacker forum on the dark…

    2 December 2022
    Cyberattack, Cybersecurity
  • Galaxkey encryption

    Understanding the human causes of ransomware attacks

    A continuing trend in cybercrime, ransomware attacks impact enterprises of all sizes in every corner of the world. Government offices and educational institutions like colleges…

    30 November 2022
    Secure Communications
  • Secure File Transfer

    Shocking ransomware gang extortion figures revealed

    US law enforcement department Federal Bureau of Investigation (FBI) recently released statistics regarding the success rate of the infamous ransomware gang known as Hive. Figures…

    28 November 2022
    Cyberattack
  • Malware Detected Warning Screen

    Chinese attackers use Google Drive to deploy malware on government systems

    According to cyber security researchers, state financed Chinese hackers have launched a spear phishing campaign to launch bespoke malware stored within Google Drive to international…

    26 November 2022
    Cyberattack
Previous
12…1112131415…8990
Next
  • The Technology
  • FAQs
  • Legal
  • News & Our Thoughts
  • About Us
  • Compliance
  • Case Studies
  • Privacy Policy

Galaxkey Leap Limited
1st Floor Annexe, New Barnes Mill,
Cotton Mill Lane, St Albans, AL1 2HA
+44 (0) 333 150 6660
sales@galaxkey.com

© Copyright 2025  Galaxkey. All Rights Reserved. Galaxkey® and LockChat® are registered trademark of Galaxkey Limited, UK