Timing Attack
Use Case in the Daily Usage Jerry attended a meeting in London last week. As a manager, he keeps crucial information on his laptop which has a built-in X-PHY® storage …
Use Case in the Daily Usage Jerry attended a meeting in London last week. As a manager, he keeps crucial information on his laptop which has a built-in X-PHY® storage …
The pandemic has certainly increased the opportunities for human error to cause indescribable damage to corporate systems. But even as a new form of normalcy returns to corporate life, the …
How to close the weakest link in your cyber defenses Read More »
The annual cost of cybercrime is set to hit $10.5 trillion by 2025. The losses caused by theft, fraud and embezzlement are compounded by the disruption that follows. Forensic investigations, …
Camellia Chan, CEO and founder of X-PHY, a Flexxon brand, discusses what bank robberies can teach us about the need for physical cyber security As we witness the so-called ‘tech …
Importance of Firmware-based cyber security solution Read More »
What are insider threats? Most organizations make efforts to strengthen their cybersecurity to protect themselves from external attacks. They take measures to narrow down their attack surface on which an …
Zero Trust Model against insider threats with X-PHY® SSD Read More »
Data Protection with Encryption It’s been a long while that cyberattacks have been disrupting operations of organizations. It is often reported that a threat actor got access to a system, …
Encryption in NAND Storage Devices – Data Safety as a Priority Read More »
Among the stealthiest of cyberattacks, Ransomware-as-a-Service (RaaS) is known to have a reputation. Ransomware attacks have been going uphill on the graph for a couple years now. Given the opportunity …
Third-party Cyber attacks; MSPs and MSSPs Although third-party breaches are nothing new and the cyber world holds many examples of that, getting breached due to a third-party appointed solely for …
Why MSSPs should implement X-PHY AI Embedded CyberSecure SSD Read More »
The HelloKitty ransomware (aka FiveHands), has its earliest traces from November 2020, discovered by FBI in January 2021, and has potential ties with the DeathRansom. This Ransomware was highly active …
What is WannaCry Ransomware? WannaCry Ransomware is a type of malware/computer worm that targets the windows operating system. It is also known as WannaCrypt0r, WannaCrypt, WCRY and WRypt. WannaCry has …
What is WannaCry ransomware and How to protect your data from the WannaCry ransomware? Read More »
What is the Zero-Day Attack? Before we dive into the topic of Zero-Day Attack, let’s take a look at the three common cyber security terms used when discuss about Zero-Day …
X-PHY’s Zero Trust model that eliminates human intervention Read More »
What is Netwalker Ransomware? With the world continuing to suffer from the COVID-19 crisis, cyber-criminals are taking advantage of the situation to spread new variants of ransomware via related topics …