Leveraging a powerful combination of expertise, round-the-clock availability, and extensive technical resources, Acuative simplifies the entire process of managing your technology. We specialize in delivering service-focused technology solutions for the enterprise, service provider, financial, retail, and public sector markets.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

IT-HARVEST RESEARCH: ROOM FOR CYBER THREAT INTELLIGENCE GROWED BY 3% IN 1H 2020

prnewswire | September 17, 2020

news image

IT-Harvest, an independent research firm covering the cybersecurity industry, has published a "Cyber Threat Intelligence Market Research Report 1H 2020" – Richard Stiennon and Ron Moritz on the cyber threat intelligence (CTI) sector. The report includes 61 vendors that provide threat intelligence to the enterprise or collect and manage threat intelligence. These include, Recorded Future acquired by Insight Partners in 2019, Anomali, LookingGlass Cyber Solutions, ZeroFOX, and Ints...

Read More

MICROSOFT: MASSIVE COVID-19 THEMED PHISHING CAMPAIGN UNDERWAY TO GAIN REMOTE ACCESS

Microsoft | May 21, 2020

news image

Microsoft states a massive COVID-19 themed phishing campaign is underway, as a component of which attackers set up the NetSupport Manager remote access device. The brand-new campaign, which was found by the Microsoft Security Intelligence group, began ...

Read More

HACKER LEAKS MORE THAN 500,000 TELNET CREDENTIALS

CISOMAG | January 20, 2020

news image

As reported by ZDNet, a hacker who seems to be a DDoS-for-hire (DDoS booter) service operator, has published a massive list of 515,000 Telnet credentials consisting passwords of servers, home routers, and IoT (Internet of Things) devices. The published list also includes IP address of each device along with a username and password of its Telnet service. Telnet is a remote access protocol that can be used to control devices over the internet. The hacker compiled the leaked list by scanning the in...

Read More

Data Security

S2W HAS SIGNED CONTRIBUTION AGREEMENT WITH INTERPOL FOR CTI SOLUTION XARVIS ENTERPRISE

S2W | January 03, 2022

news image

Data Intelligence company S2W announced that INTERPOL has recently signed a contribution agreement introducing S2W's cyber threat intelligence (CTI) solution "S2-XARVIS ENTERPRISE" to strengthen its ability to analyze new cyber threats such as dark web and ransomware. S2W has been supporting INTERPOL to identify and prevent "third-world dark web crimes" as part of its "binding the gap among member countries for a safer world," and recently conduct...

Read More
news image

IT-HARVEST RESEARCH: ROOM FOR CYBER THREAT INTELLIGENCE GROWED BY 3% IN 1H 2020

prnewswire | September 17, 2020

IT-Harvest, an independent research firm covering the cybersecurity industry, has published a "Cyber Threat Intelligence Market Research Report 1H 2020" – Richard Stiennon and Ron Moritz on the cyber threat intelligence (CTI) sector. The report includes 61 vendors that provide threat intelligence to the enterprise or collect and manage threat intelligence. These include, Recorded Future acquired by Insight Partners in 2019, Anomali, LookingGlass Cyber Solutions, ZeroFOX, and Ints...

Read More
news image

MICROSOFT: MASSIVE COVID-19 THEMED PHISHING CAMPAIGN UNDERWAY TO GAIN REMOTE ACCESS

Microsoft | May 21, 2020

Microsoft states a massive COVID-19 themed phishing campaign is underway, as a component of which attackers set up the NetSupport Manager remote access device. The brand-new campaign, which was found by the Microsoft Security Intelligence group, began ...

Read More
news image

HACKER LEAKS MORE THAN 500,000 TELNET CREDENTIALS

CISOMAG | January 20, 2020

As reported by ZDNet, a hacker who seems to be a DDoS-for-hire (DDoS booter) service operator, has published a massive list of 515,000 Telnet credentials consisting passwords of servers, home routers, and IoT (Internet of Things) devices. The published list also includes IP address of each device along with a username and password of its Telnet service. Telnet is a remote access protocol that can be used to control devices over the internet. The hacker compiled the leaked list by scanning the in...

Read More
news image

Data Security

S2W HAS SIGNED CONTRIBUTION AGREEMENT WITH INTERPOL FOR CTI SOLUTION XARVIS ENTERPRISE

S2W | January 03, 2022

Data Intelligence company S2W announced that INTERPOL has recently signed a contribution agreement introducing S2W's cyber threat intelligence (CTI) solution "S2-XARVIS ENTERPRISE" to strengthen its ability to analyze new cyber threats such as dark web and ransomware. S2W has been supporting INTERPOL to identify and prevent "third-world dark web crimes" as part of its "binding the gap among member countries for a safer world," and recently conduct...

Read More