BOOK A DEMO/POV NOW

Book a DEMO / POV

The best date for you ?

Select a date
Please select a date
Please select a date

What time works?

Select a time
Please indcate the time
Please indcate the time
Your First Name
Field is required!
Field is required!
Your Last Name
Field is required!
Field is required!
Your E-mail Address
Field is required!
Field is required!
Your phone number
Please enter a phone number
Please enter a phone number
  • – select a option –
  • Demo
  • Presentation
  • Both
– select a option –
Please select an action
Please select an action
  • – select a product –
  • Darktrace (Ai Cyberdefense)
  • Nexusguard (Ddos)
  • Cymulate (Cybersecurity assessment)
  • Pcysys (Automated pe testing)
  • Consulting Services
  • Remediations services
  • IT Services
  • Telcos and ISP- Sandvine
  • Boostedge
– select a product –
Please select a product
Please select a product

BOOK A DEMO/POV NOW

Book a DEMO / POV

The best date for you ?

Select a date
Please select a date
Please select a date

What time works?

Select a time
Please indcate the time
Please indcate the time
Your First Name
Field is required!
Field is required!
Your Last Name
Field is required!
Field is required!
Your E-mail Address
Field is required!
Field is required!
Your phone number
Please enter a phone number
Please enter a phone number
  • – select a option –
  • Demo
  • Presentation
  • Both
– select a option –
Please select an action
Please select an action
  • – select a product –
  • Darktrace (Ai Cyberdefense)
  • Nexusguard (Ddos)
  • Cymulate (Cybersecurity assessment)
  • Pcysys (Automated pe testing)
  • Consulting Services
  • Remediations services
  • IT Services
  • Telcos and ISP- Sandvine
  • Boostedge
– select a product –
Please select a product
Please select a product

Cyware Feed
coercion-in-the-age-of-ransomware:-new-tactics-for-extorting-payments

Coercion in the Age of Ransomware: New Tactics for Extorting Payments

A ransomware report by GuidePoint Security offers valuable information on the current ransomware threat scenario and highlights the coercion tactic utilized by significant ransomware groups such as double extortion and DDoS attack. In the education sector, there was a 17% rise in publicly disclosed victims during the same period, with Vice Society being responsible for […]

Cyware Feed
atomic-–-new-macos-info-stealer-in-town

Atomic – New macOS Info-stealer in Town

Private Telegram channels are being abused by cybercriminals to sell a new macOS malware variant that can infect over 50 cryptocurrency extensions to steal data. Dubbed Atomic, the malware author provides its buyers a ready-to-use web panel for easy victim management, a cryptocurrency checker, a MetaMask brute-forcer, a dmg installer, and the ability to receive […]

Cyware Feed
new-trafficstealer-malware-monetizes-network-traffic

New TrafficStealer Malware Monetizes Network Traffic

TrendMicro uncovered a new risk to Docker containers from a piece of malware called TrafficStealer. It influences web traffic and ad interaction via the use of containers to generate illegal income. TrafficStealer uses a combination of two techniques: web crawling and click simulation. Experts recommend implementing zero-trust security for all container environments and auditing for any […]