BOOK A DEMO/POV NOW

Book a DEMO / POV

The best date for you ?

Select a date
Please select a date
Please select a date

What time works?

Select a time
Please indcate the time
Please indcate the time
Your First Name
Field is required!
Field is required!
Your Last Name
Field is required!
Field is required!
Your E-mail Address
Field is required!
Field is required!
Your phone number
Please enter a phone number
Please enter a phone number
  • – select a option –
  • Demo
  • Presentation
  • Both
– select a option –
Please select an action
Please select an action
  • – select a product –
  • Darktrace (Ai Cyberdefense)
  • Nexusguard (Ddos)
  • Cymulate (Cybersecurity assessment)
  • Pcysys (Automated pe testing)
  • Consulting Services
  • Remediations services
  • IT Services
  • Telcos and ISP- Sandvine
  • Boostedge
– select a product –
Please select a product
Please select a product

BOOK A DEMO/POV NOW

Book a DEMO / POV

The best date for you ?

Select a date
Please select a date
Please select a date

What time works?

Select a time
Please indcate the time
Please indcate the time
Your First Name
Field is required!
Field is required!
Your Last Name
Field is required!
Field is required!
Your E-mail Address
Field is required!
Field is required!
Your phone number
Please enter a phone number
Please enter a phone number
  • – select a option –
  • Demo
  • Presentation
  • Both
– select a option –
Please select an action
Please select an action
  • – select a product –
  • Darktrace (Ai Cyberdefense)
  • Nexusguard (Ddos)
  • Cymulate (Cybersecurity assessment)
  • Pcysys (Automated pe testing)
  • Consulting Services
  • Remediations services
  • IT Services
  • Telcos and ISP- Sandvine
  • Boostedge
– select a product –
Please select a product
Please select a product

Cyware Feed
scammers-found-exploiting-youtube-to-launch-crypto-scams

Scammers Found Exploiting YouTube to Launch Crypto Scams

Researchers discovered a massive network of fake YouTube videos that cybercriminals are using to launch crypto scams. These fake videos advertise fraudulent web-based apps for USDT. To make the channels look legitimate, threat actors automated copy-pasting comments to videos. Many of these videos also encouraged victims to invite friends and family to participate, asking for a […]

Cyware Feed
new-frebniis-malware-abuses-iis-features-for-secret-communications

New Frebniis Malware Abuses IIS Features for Secret Communications

There’s a new malware threat to Microsoft Internet Information Services (IIS) servers dubbed Frebniss. Discovered by Symantec’s Threat Hunter Team, the malware abuse ‘Failed Request Event Buffering’ (FREB) feature of IIS that is responsible for collecting request metadata such as IP addresses, HTTP headers, and cookies. By abusing the FREB component, it becomes relatively easier […]

Cyware Feed
new-variant-of-mirai-targets-13-known-iot-device-vulnerabilities

New Variant of Mirai Targets 13 Known IoT Device Vulnerabilities

Researchers at Unit42 laid bare a Mirai botnet variant dubbed V3G4 that compromised hosts by abusing several vulnerabilities in products from DrayTek, Geutebruck, FreePBX, Atlassian, and others. The botnet infected exposed servers and networking devices running on Linux OS. Successful exploitation of the bugs could let hackers take full control of the hosts and make […]