BOOK A DEMO/POV NOW

Book a DEMO / POV

The best date for you ?

Select a date
Please select a date
Please select a date

What time works?

Select a time
Please indcate the time
Please indcate the time
Your First Name
Field is required!
Field is required!
Your Last Name
Field is required!
Field is required!
Your E-mail Address
Field is required!
Field is required!
Your phone number
Please enter a phone number
Please enter a phone number
  • – select a option –
  • Demo
  • Presentation
  • Both
– select a option –
Please select an action
Please select an action
  • – select a product –
  • Darktrace (Ai Cyberdefense)
  • Nexusguard (Ddos)
  • Cymulate (Cybersecurity assessment)
  • Pcysys (Automated pe testing)
  • Consulting Services
  • Remediations services
  • IT Services
  • Telcos and ISP- Sandvine
  • Boostedge
– select a product –
Please select a product
Please select a product

BOOK A DEMO/POV NOW

Book a DEMO / POV

The best date for you ?

Select a date
Please select a date
Please select a date

What time works?

Select a time
Please indcate the time
Please indcate the time
Your First Name
Field is required!
Field is required!
Your Last Name
Field is required!
Field is required!
Your E-mail Address
Field is required!
Field is required!
Your phone number
Please enter a phone number
Please enter a phone number
  • – select a option –
  • Demo
  • Presentation
  • Both
– select a option –
Please select an action
Please select an action
  • – select a product –
  • Darktrace (Ai Cyberdefense)
  • Nexusguard (Ddos)
  • Cymulate (Cybersecurity assessment)
  • Pcysys (Automated pe testing)
  • Consulting Services
  • Remediations services
  • IT Services
  • Telcos and ISP- Sandvine
  • Boostedge
– select a product –
Please select a product
Please select a product

Cyware Feed
nvidia’s-code-signing-certificates-stolen-and-abused-in-attacks

NVIDIA’s Code Signing Certificates Stolen and Abused in Attacks

Lapsus$, responsible for the recent attack on Nvidia, reportedly released two of the company’s old code-signing certificates, and threat actors have started abusing it. In some cases, the stolen certificates were used to sign Cobalt Strike beacons, Mimikatz, backdoors, and remote access trojans. Admins are suggested to configure Windows Defender Application Control policies to control […]

Cyware Feed
updated-sharkbot-variant-makes-its-way-into-google-play-store

Updated SharkBot Variant Makes its Way into Google Play Store

Researchers exposed cybercriminals distributing the SharkBot banking trojan via Google Play Store. The malware is using Automatic Transfer Systems (ATS) to transfer money by abusing the Accessibility permission on devices and grants itself additional required permissions. Smartphone users are requested to be careful with the type of apps they download from various app stores and […]