Skip to content
X-PHY®
  • Solutions
    • Mega Menu
      AI Embedded Cyber Secure SSD

      Hardware-based endpoint data
      security solution

      Cybersecurity Laptops

      World’s first AI integrated
      laptops for data security

      Fortress Server

      Integrated secured
      shared server solution

  • Resources
    • Mega Menu
      Cyber-attacks Impact on SME

      Discover the devastating impacts
      of ransomware on SMEs

      Safeguard IoT Edge Computing

      Find out what is IoT edge computing
      and how to safeguard it

      Kiosk Terminals in Healthcare

      Uncover why it is important to
      defend healthcare kiosk terminals

      X-PHY Vs. Cloud Backup

      Learn the difference between X-PHY and cloud-based solutions

      Use Cases

      Learn how X-PHY integrates
      with your tech infrastructure

      Application Reference

      Check out how X-PHY can be
      deployed to defend your data

      X-PHY White Paper

      Gain comprehensive insights
      into hardware-based cybersecurity

  • Support
  • Company
    • Company
      About Us

      What we do and who we
      are

      Advisory Board

      Our highly skilled and
      experienced advisors

      Events

      Exciting upcoming events
      and stay connected

      Newsroom

      Stay updated with the
      latest news from us

      Contact Us

      Get in touch with us
      today

Request Demo

X-PHY®
  • Solutions
    • Mega Menu
      AI Embedded Cyber Secure SSD

      Hardware-based endpoint data
      security solution

      Cybersecurity Laptops

      World’s first AI integrated
      laptops for data security

      Fortress Server

      Integrated secured
      shared server solution

  • Resources
    • Mega Menu
      Cyber-attacks Impact on SME

      Discover the devastating impacts
      of ransomware on SMEs

      Safeguard IoT Edge Computing

      Find out what is IoT edge computing
      and how to safeguard it

      Kiosk Terminals in Healthcare

      Uncover why it is important to
      defend healthcare kiosk terminals

      X-PHY Vs. Cloud Backup

      Learn the difference between X-PHY and cloud-based solutions

      Use Cases

      Learn how X-PHY integrates
      with your tech infrastructure

      Application Reference

      Check out how X-PHY can be
      deployed to defend your data

      X-PHY White Paper

      Gain comprehensive insights
      into hardware-based cybersecurity

  • Support
  • Company
    • Company
      About Us

      What we do and who we
      are

      Advisory Board

      Our highly skilled and
      experienced advisors

      Events

      Exciting upcoming events
      and stay connected

      Newsroom

      Stay updated with the
      latest news from us

      Contact Us

      Get in touch with us
      today

  • Login
eStore
eStore

Request Demo

Incident Response

Security experts weigh in on Snake malware operation

Security experts weigh in on Snake malware operation

Incident Response / May 22, 2023

Snake malware lay undetected in organisations in over 50 countries, stealing sensitive data and documents from NATO member governments, journalists and other targets of interest. Our CEO Camellia Chan shared,”Traditional …

Security experts weigh in on Snake malware operation Read More »

Popular IoT SDKs Leave Critical Infrastructure Wide Open to Cyberattacks

Popular IoT SDKs Leave Critical Infrastructure Wide Open to Cyberattacks

Blog, Incident Response / December 27, 2022

  In a succession of malicious incidents, Chinese threat actors tracked as RedEcho have hitherto utilized the unsafe and pervasive Boa server to penetrate the electrical grid in India. DarkReading …

Popular IoT SDKs Leave Critical Infrastructure Wide Open to Cyberattacks Read More »

Timing Attack - X-PHY

Timing Attack

Blog, Incident Response / June 6, 2022

Use Case in the Daily Usage Jerry attended a meeting in London last week. As a manager, he keeps crucial information on his laptop which has a built-in X-PHY® storage …

Timing Attack Read More »

HelloKitty Ransomware Prevention with X-PHY SSD

HelloKitty Ransomware Prevention with X-PHY SSD

Blog, Incident Response / November 22, 2021

The HelloKitty ransomware (aka FiveHands), has its earliest traces from November 2020, discovered by FBI in January 2021, and has potential ties with the DeathRansom. This Ransomware was highly active …

HelloKitty Ransomware Prevention with X-PHY SSD Read More »

What is WannaCry ransomware and How to protect your data from the WannaCry ransomware?

What is WannaCry ransomware and How to protect your data from the WannaCry ransomware?

Blog, Incident Response / November 9, 2021

What is WannaCry Ransomware? WannaCry Ransomware is a type of malware/computer worm that targets the windows operating system. It is also known as WannaCrypt0r, WannaCrypt, WCRY and WRypt. WannaCry has …

What is WannaCry ransomware and How to protect your data from the WannaCry ransomware? Read More »

X-PHY’s Zero Trust model that eliminates human intervention

X-PHY’s Zero Trust model that eliminates human intervention

Blog, Incident Response / November 4, 2021

What is the Zero-Day Attack? Before we dive into the topic of Zero-Day Attack, let’s take a look at the three common cyber security terms used when discuss about Zero-Day …

X-PHY’s Zero Trust model that eliminates human intervention Read More »

How to protect against netwalker ransomware?

How to protect against netwalker ransomware?

Blog, Incident Response / October 6, 2021

What is Netwalker Ransomware? With the world continuing to suffer from the COVID-19 crisis, cyber-criminals are taking advantage of the situation to spread new variants of ransomware via related topics …

How to protect against netwalker ransomware? Read More »

LockBit Ransomware – A Use Case Of Accenture

LockBit Ransomware – A Use Case Of Accenture

Blog, Incident Response / September 16, 2021

LockBit ransomware gang recently hit Accenture, one of the top technological consulting organizations in the world. The Dublin-based company cited that the attack was not classified as a ransomware attack …

LockBit Ransomware – A Use Case Of Accenture Read More »

The Ransomware Threat in the Contemporary Organizations

The Ransomware Threat in the Contemporary Organizations

Blog, Incident Response / May 28, 2021

Ransomware attacks are costly to organizations when the hackers become successful in locking the company data and demanding certain reimbursement for the files to be released. Take, for example, the …

The Ransomware Threat in the Contemporary Organizations Read More »

Cyber Attacks on Point-of-Sale via Rdasrv Malware

Cyber Attacks on Point-of-Sale via Rdasrv Malware

Blog, Incident Response / April 9, 2021

Point of Sale (POS) Attack is a technique utilized by cybercriminals to obtain credit card and debit card information at the point of sale and payment terminals, using POS malware. …

Cyber Attacks on Point-of-Sale via Rdasrv Malware Read More »

NotPetya Ransomware – Cyber-Attack on Pfizer for COVID-19 Vaccine Data

Blog, Incident Response / April 1, 2021

According to Yonhap News Agency, South Korea’s National Intelligence Service (NIS) accuses that North Korea launched a cyber-attack on Pfizer, using NotPetya ransomware, targeting information about the COVID-19 vaccine they …

NotPetya Ransomware – Cyber-Attack on Pfizer for COVID-19 Vaccine Data Read More »

Ryuk Ransomware

Ryuk Ransomware – Healthcare Organizations at Risk

Blog, Incident Response / April 1, 2021

Healthcare organizations are the leading target for cybercriminals due to the perceived high value of data obtained on a successful attack. The RYUK ransomware healthcare attacks have been a major …

Ryuk Ransomware – Healthcare Organizations at Risk Read More »

Posts navigation
1 2 Next Page →

Categories

  • AI Technologies (1)
  • Awards (4)
  • Blog (70)
  • Company (4)
  • Cyber News (21)
  • Feature Spotlight (4)
  • Global InfoSec Awards 2023 (1)
  • Incident Response (20)
  • Insights (15)
  • Media Release (1)
  • Media Releases (10)
  • News (5)
  • Reviews (3)
  • Sector Specific Use Cases (13)

Recent News

  • Mastering the Cybersecurity Game: Unleashing AI’s Power Effectively
  • Beyond the Cloud: Entering the Web3.0 horizon for greater security
  • Flexxon CEO Camellia Chan named one of Singapore’s 100 Women in Tech
  • MISI Joins Maryland’s Global Gateway Soft Landing Program
  • Securing Tomorrow’s Metaverse Today: Why Safety in the New Frontier Must Leverage on Hardware
x-phy logo
  • US Office
    7000 Columbia Gateway Dr Dreamport, Suite 150,
    Columbia, MD 21046, United States
  • +1 518 520 4122 (US), +1 667 786 9752 (US)
  • [email protected]

  • SG Office
    28 Genting Lane #09-03/4/5 Platinum 28,
    Singapore 349585
  • +65-6493 5035

Products

  • X-PHY® AI Embedded Cyber Secure SSD
  • X-PHY-1st AI Cybersecurity Laptop
  • X-PHY® Fortress Cyber Secure Server

Subscribe to our newsletter

Loading

Copyright © 2023 X-PHY® All Rights Reserved.

Privacy Policy