Tag Archive for: companies

Best Cybersecurity Companies In India 2023


The internet is HUGE! Cybersecurity companies do any and everything to safeguard the users. There are images, videos, links, and web pages on innumerable servers.

cybersecurity companies

Almost every person is connected to these servers that are responsible for taking care of all the data you once held, now hold, and will ever hold. Yes! Somewhere out there the data that you thought you deleted a long time ago exists. So, can this data be exploited? Can it be used against you? Can anyone extract your information without your permission?

Well, not everyone but some people specialise in exploiting the hundreds of thousands of GigaBytes of data on these servers. People who exploit someone’s data to gain personal profit or out of malice are called “Black hat hackers“. Black hat hackers are capable of violating cyber security for malicious use, so naturally, some people use the same knowledge to protect your data on the servers. These opposing forces are called “Cybersecurity Experts“.

In simple terms, Cybersecurity experts are black hat hackers who are the good guys. They master the skills used by these hackers and use them to make countermeasures and protect the data that black hat hackers aim to steal. You know the classic drama thriller premise, you need to think like a criminal to beat the criminal.

Cybersecurity experts are often confused by people as “White Hat Hackers” but there is one basic difference between the two.

A Cyber Security expert learns hacking to protect those who don’t know how to protect their systems from a potential breach, whereas a White Hat Hacker is someone who officially hacks into a server with a permit to check if there is a potential breach in the server. Many renowned companies hire white hat hackers to breach into their servers so that they can then improve and remove the breach.

Realistically, an average person doesn’t need to hire a white hat hacker to identify any breach in their systems. That’s why most of us rely on Cybersecurity companies who protect our systems for us. Today we will tell you about the top 10 best Indian Cybersecurity Companies that will always have your back, digitally of course.

10 Best Indian Cybersecurity Companies

veracode

Source…

North Korea’s Lazarus hackers are exploiting Log4j flaw to hack US energy companies


Security researchers have linked a new cyber espionage campaign targeting U.S., Canadian and Japanese energy providers to the North Korean state-sponsored Lazarus hacking group.

Threat intelligence company Cisco Talos said Thursday that it has observed Lazarus — also known as APT38 — targeting unnamed energy providers in the United States, Canada and Japan between February and July this year. According to Cisco’s research, the hackers used a year-old vulnerability in Log4j, known as Log4Shell, to compromise internet-exposed VMware Horizon servers to establish an initial foothold onto a victim’s enterprise network, before deploying bespoke malware known as “VSingle” and “YamaBot” to establish long-term persistent access. YamaBot was recently attributed to the Lazarus APT by Japan’s national cyber emergency response team, known as CERT.

Details of this espionage campaign were first revealed by Symantec in April this year, which attributed the operation to “Stonefly,” another North Korean hacking group that has some overlaps with Lazarus.

However, Cisco Talos also observed a previously unknown remote access trojan — or RAT — named “MagicRAT,” attributed to Lazarus Group, which the hackers use for reconnaissance and stealing credentials.

“The main goal of these attacks was likely to establish long-term access into victim networks to conduct espionage operations in support of North Korean government objectives,” wrote Talos researchers Jung soo An, Asheer Malhotra and Vitor Ventura. “This activity aligns with historical Lazarus intrusions targeting critical infrastructure and energy companies to establish long-term access to siphon off proprietary intellectual property.”

The Lazarus Group is a financially motivated hacking group backed by the North Korean state that is best known for the high-profile Sony hack in 2016 and the WannaCry ransomware attack in 2017. Lazarus is also driven by efforts to support North Korea’s state objectives, including military research and development and evasion of international sanctions.

However, the group has in recent months turned its attention to blockchain and cryptocurrency organizations. It has been linked to…

Source…

Israel: Former PM Bennett In Talks With High-tech Companies To Join Their Ranks


‘Bennett is going from time to time to meet with high-tech companies and others as well,’ his office confirms

Israel’s former prime minister Naftali Bennett is currently in talks with various high-tech companies to join their ranks after the November 1 legislative elections, according to Sunday reports.

On August 16, Bennett reportedly visited the company Talon Cyber Security, which offers a solution for secure access to applications and corporate data from any operating system. In early August, the company announced a $100 million fundraising round, despite the recent economic downturn that has hit the industry.

“Bennett is going from time to time to meet with high-tech companies and others as well,” his office confirmed, according to media reports. 

“Nothing has been agreed upon, however,” his office continued.

Before he entered politics, Bennett had several years of experience in the high-tech industry. As a result, he has already earned more than $15 million, according to a study conducted by Forbes Israel magazine.

In 2005, six years after founding the Cyota computer security company with Dr. Michal Tzur, Ben Anush and Lior Golan, Bennett and his partners sold it to the US company RSA for $145 million, earning him about $5 million.

Four years later, he was appointed CEO of Soloto by entrepreneurs Yishai Green and Tomer Dvir, who developed a remote support service for personal computers and mobile devices.

Bennett also invested back in 2010 in Wisestamp, a start-up company that provides solutions for small business owners.

Shortly before he was appointed prime minister, over a year ago, he made at least $5 million from a public offering of the company Payoneer, which he had invested in 14 years earlier.

Video poster

Source…

ThreatX Recognized on 2022 Inc. 5000 List of Fastest-Growing Companies


BOSTON, August 16, 2022–(BUSINESS WIRE)–ThreatX, the leading API protection platform, today announced it has been ranked 1446 in the 2022 Inc. 5000 list, a yearly list of 5000 companies that have achieved significant growth and success over the course of 12 months. ThreatX was selected for this list due to its positive revenue growth and record of achievements throughout 2021 and 2022.

ThreatX sets itself apart from other API protection companies by offering customers the ability to block complex attacks in real time, including complex botnets, DDoS and multi-mode attacks. Through the use of artificial intelligence and machine learning, the company can identify suspicious activity, and immediately respond based on risk. Instead of relying on post-attack analysis like other solutions on the market, ThreatX’s proactive abilities enable a more comprehensive security program.

“Our team is thrilled to be included on this year’s Inc. 5000 list because it’s further evidence that our efforts are paying off. After a record-breaking start to our year, we’ve not only met our company goals, but exceeded them by helping our customers block millions of threats to their APIs and web applications,” said Gene Fay, CEO at ThreatX.

ThreatX has made significant strides this past year that highlight the company’s growth. For both the first half of 2022 and second quarter 2022, ThreatX bookings were more than 200% compared to the same fiscal periods in 2021. ThreatX continues hiring across the organization, including engineering, sales and marketing.

In addition to its recognition on the Inc. 5000 list, ThreatX has also been named a finalist in the 2022 SINET 16. Official winners of the awards will be announced in September.

For more information about ThreatX, please visit: www.threatx.com.

About ThreatX

ThreatX’s API protection platform makes the world safer by protecting APIs from all threats, including DDoS attempts, bot attacks, API abuse, exploitations of known vulnerabilities, and zero-day attacks. Its multi-layered detection capabilities accurately identify malicious actors and dynamically initiate appropriate action. ThreatX effectively and efficiently protects APIs for companies in…

Source…