Skip to content
X-PHY®
  • Solutions
    • Mega Menu
      AI Embedded Cyber Secure SSD

      Hardware-based endpoint data
      security solution

      Cybersecurity Laptops

      World’s first AI integrated
      laptops for data security

      Fortress Server

      Integrated secured
      shared server solution

  • Resources
    • Mega Menu
      Cyber-attacks Impact on SME

      Discover the devastating impacts
      of ransomware on SMEs

      Safeguard IoT Edge Computing

      Find out what is IoT edge computing
      and how to safeguard it

      Kiosk Terminals in Healthcare

      Uncover why it is important to
      defend healthcare kiosk terminals

      X-PHY Vs. Cloud Backup

      Learn the difference between X-PHY and cloud-based solutions

      Use Cases

      Learn how X-PHY integrates
      with your tech infrastructure

      Application Reference

      Check out how X-PHY can be
      deployed to defend your data

      X-PHY White Paper

      Gain comprehensive insights
      into hardware-based cybersecurity

  • Support
  • Company
    • Company
      About Us

      What we do and who we
      are

      Advisory Board

      Our highly skilled and
      experienced advisors

      Events

      Exciting upcoming events
      and stay connected

      Newsroom

      Stay updated with the
      latest news from us

      Contact Us

      Get in touch with us
      today

Request Demo

X-PHY®
  • Solutions
    • Mega Menu
      AI Embedded Cyber Secure SSD

      Hardware-based endpoint data
      security solution

      Cybersecurity Laptops

      World’s first AI integrated
      laptops for data security

      Fortress Server

      Integrated secured
      shared server solution

  • Resources
    • Mega Menu
      Cyber-attacks Impact on SME

      Discover the devastating impacts
      of ransomware on SMEs

      Safeguard IoT Edge Computing

      Find out what is IoT edge computing
      and how to safeguard it

      Kiosk Terminals in Healthcare

      Uncover why it is important to
      defend healthcare kiosk terminals

      X-PHY Vs. Cloud Backup

      Learn the difference between X-PHY and cloud-based solutions

      Use Cases

      Learn how X-PHY integrates
      with your tech infrastructure

      Application Reference

      Check out how X-PHY can be
      deployed to defend your data

      X-PHY White Paper

      Gain comprehensive insights
      into hardware-based cybersecurity

  • Support
  • Company
    • Company
      About Us

      What we do and who we
      are

      Advisory Board

      Our highly skilled and
      experienced advisors

      Events

      Exciting upcoming events
      and stay connected

      Newsroom

      Stay updated with the
      latest news from us

      Contact Us

      Get in touch with us
      today

  • Login
eStore
eStore

Request Demo

Cyber News

Hackers tactics evolve, and businesses should be too

Hackers’ tactics evolve, and businesses should be too

Cyber News / May 25, 2023

In light of a data breach suffered by the UK’s Royal Mail in early 2023, our CEO Camellia Chan penned a letter to the editor at the Financial Times to …

Hackers’ tactics evolve, and businesses should be too Read More »

Beyond Anti-Virus' Shark Nets': Why Current Approaches to Cybersecurity Need to Change

Beyond Anti-Virus’ Shark Nets’: Why Current Approaches to Cybersecurity Need to Change

Cyber News / May 25, 2023

What do shark nets and anti-virus software have in common? According to our CEO Camellia Chan, they both suffer from three weaknesses: 1. A lack of control over the environment2. …

Beyond Anti-Virus’ Shark Nets’: Why Current Approaches to Cybersecurity Need to Change Read More »

How will Artificial Intelligence Affect the Development of Cryptocurrency Projects?

How will Artificial Intelligence Affect the Development of Cryptocurrency Projects?

Cyber News, AI Technologies / May 25, 2023

The past year was tough for crypto markets thanks to events like the Terra Luna meltdown, the FTX bankruptcy, and more. The industry also incurred losses of almost US$4 billion …

How will Artificial Intelligence Affect the Development of Cryptocurrency Projects? Read More »

Decade-long Toyota data breach puts two million customers at risk

Decade-long Toyota data breach puts two million customers at risk

Cyber News / May 12, 2023

Toyota’s recent incident highlights the grave consequences of human error in organizations. Our CEO, Camellia Chan, highlights the significance of removing the human factor and implementing AI to enhance data …

Decade-long Toyota data breach puts two million customers at risk Read More »

EU Largest Copper Producer Arubis Suffers Cyber Attack, IT Outage

EU Largest Copper Producer Arubis Suffers Cyber Attack, IT Outage

Blog, Cyber News / November 25, 2022

  The exponential growth of the Internet connectivity has led to a significant growth of cyber attack incidents often with disastrous and grievous consequences. Cyber attacks have become potentially more …

EU Largest Copper Producer Arubis Suffers Cyber Attack, IT Outage Read More »

Cyber-Attackers target Instagram Users with threats of copyright infringement

Cyber-Attackers target Instagram Users with threats of copyright infringement

Blog, Cyber News / November 25, 2022

  Social media has grown to be an effective communication tool for personal use and a necessity for official and business connections. With the increase in popularity of social platforms …

Cyber-Attackers target Instagram Users with threats of copyright infringement Read More »

Windows MoTW Zero-Day gets unofficial patch

Windows MoTW Zero-Day gets unofficial patch

Blog, Cyber News / November 9, 2022

Comparitech disclosed that over 8,000 zero-day vulnerabilities were published as of now in Q1 of 2022. A zero-day (or 0-day) attack is a software vulnerability exploited by attackers before it …

Windows MoTW Zero-Day gets unofficial patch Read More »

New Stealth Techniques used by Cranefly Espionage Hackers

New Stealth Techniques used by Cranefly Espionage Hackers

Blog, Cyber News / November 9, 2022

Web-based cybersecurity attackers use “stealthier techniques” which are not as “noisy” as active attacks, making it easier to continue undetected for a longer period of time. Stealthy techniques are employed …

New Stealth Techniques used by Cranefly Espionage Hackers Read More »

Google Publishes Emergency Patch for Chrome Zero-Day

Google Publishes Emergency Patch for Chrome Zero-Day

Blog, Cyber News / November 9, 2022

“Zero-day” is a broad term that describes security vulnerabilities which hackers can use to attack systems. The term “zero-day” refers to the fact that the vendor or developer has only …

Google Publishes Emergency Patch for Chrome Zero-Day Read More »

Azov Ransomware Attempts to Frame Researchers and Bleeping Computer

Azov Ransomware Attempts to Frame Researchers and BleepingComputer

Blog, Cyber News / November 1, 2022

  Ransomware is a type of malware that threatens to destroy or withhold a victim’s critical data and information unless a ransom is paid to the attacker with no guarantee …

Azov Ransomware Attempts to Frame Researchers and BleepingComputer Read More »

Hackers exploit fragile enterprise environments and vulnerabilities in a flash

Hackers Exploit Fragile Enterprise Environments and Vulnerabilities in a Flash

Blog, Cyber News / October 4, 2022

  Hackers are now ​​moving faster than ever when it comes to scanning vulnerability announcements from software vendors and insecure Web services to find exploitable weaknesses in enterprise environments, according …

Hackers Exploit Fragile Enterprise Environments and Vulnerabilities in a Flash Read More »

Yanluowang Ransomware Gang hacks Cisco

Yanluowang Ransomware Gang hacks Cisco

Blog, Cyber News / September 29, 2022

  Many lead stories are cataloging the cyber-attacks as an emerging “catastrophe” faced by every organization. The expanding online devices on a network are an alarming threat to the cybersecurity …

Yanluowang Ransomware Gang hacks Cisco Read More »

Posts navigation
1 2 Next Page →

Categories

  • AI Technologies (1)
  • Awards (4)
  • Blog (70)
  • Company (4)
  • Cyber News (21)
  • Feature Spotlight (4)
  • Global InfoSec Awards 2023 (1)
  • Incident Response (20)
  • Insights (15)
  • Media Release (1)
  • Media Releases (10)
  • News (5)
  • Reviews (3)
  • Sector Specific Use Cases (13)

Recent News

  • Mastering the Cybersecurity Game: Unleashing AI’s Power Effectively
  • Beyond the Cloud: Entering the Web3.0 horizon for greater security
  • Flexxon CEO Camellia Chan named one of Singapore’s 100 Women in Tech
  • MISI Joins Maryland’s Global Gateway Soft Landing Program
  • Securing Tomorrow’s Metaverse Today: Why Safety in the New Frontier Must Leverage on Hardware
x-phy logo
  • US Office
    7000 Columbia Gateway Dr Dreamport, Suite 150,
    Columbia, MD 21046, United States
  • +1 518 520 4122 (US), +1 667 786 9752 (US)
  • [email protected]

  • SG Office
    28 Genting Lane #09-03/4/5 Platinum 28,
    Singapore 349585
  • +65-6493 5035

Products

  • X-PHY® AI Embedded Cyber Secure SSD
  • X-PHY-1st AI Cybersecurity Laptop
  • X-PHY® Fortress Cyber Secure Server

Subscribe to our newsletter

Loading

Copyright © 2023 X-PHY® All Rights Reserved.

Privacy Policy