Alithya

Belkins
Alithya is a leader in strategy and digital technology, with 2,000 highly skilled professionals in Canada, the US, and Europe. Our integrated offering positions us as a leading digital technology partner, highly skilled in designing innovative and efficient digital solutions for business challenges.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

UNPATCHED WINDOWS ZERO-DAY FLAWS EXPLOITED, MICROSOFT SAYS

SC Magazine | March 23, 2020

news image

Attackers are exploiting unpatched Windows zero day flaws, Microsoft said in a Monday security advisory. The company said “limited targeted attacks” could leverage two unpatched remote code executive (RCE) vulnerabilities in Windows “when the Windows Adobe Type Manager Library improperly handles a specially crafted multi-master font – Adobe Type 1 PostScript format.” Among the ways a hacker could exploit the flaws is convincing users to open “a specially craft...

Read More

NETWORK THREAT DETECTION

BLACKCLOAK UNVEILS NEW DECEPTION TECHNOLOGY TO CATCH CYBERATTACKS TARGETING EXECUTIVES & HIGH-PROFILE INDIVIDUALS

BlackCloak | November 16, 2021

news image

BlackCloak, Inc., the first Concierge Cybersecurity & Privacy™ Protection Platform for Executives and High-Profile Individuals, today officially unveiled proprietary deception technology to catch adversaries' brazen attempts to exploit a member's privacy, personal devices, or home networks. Commonly referred to as a honeypot, BlackCloak's deception technology lures attackers interacting with a service by simulating a real-world home network. Cybercriminals an...

Read More

UNCOVERING AGGRESSIVE METHODS USED BY RANSOMWARE OPERATORS TO DISRUPT REPUTATION OF VICTIMS

Cyware | March 07, 2020

news image

Ransomware has been one of the most prolific cyber threats in recent years and it is unlikely that the menace due to this malware will stop any time soon. The first ransomware attack The first instance of ransomware was observed in December 1989. Tracked as AIDS trojan, the ransomware was introduced to the world after it infected 20,000 floppy disks of delegates who had attended the World Health Organization’s AIDS conference in Stockholm.The disk contained malicious code that hid f...

Read More

CYBER-ATTACK ON US WATER COMPANY CAUSES NETWORK OUTAGE

Infosecurity | January 29, 2020

news image

A South Carolina water company is recovering from a cyber-attack that took its phone and online payment systems offline for nearly a week. The cyber-attack on Greenville Water triggered a payment system outage that began on Wednesday, January 22. Company spokesperson Emerald Clark said 500,000 customers were affected by the incident. An investigation has been launched into the cyber-attack, the exact nature of which is yet to be revealed by Greenville Water. It's not yet known who targeted t...

Read More

SC Magazine | March 23, 2020

news image

UNPATCHED WINDOWS ZERO-DAY FLAWS EXPLOITED, MICROSOFT SAYS

Attackers are exploiting unpatched Windows zero day flaws, Microsoft said in a Monday security advisory. The company said “limited targeted attacks” could leverage two unpatched remote code executive (RCE) vulnerabilities in Windows “when the Windows Adobe Type Manager Library improperly handles a specially crafted multi-master font – Adobe Type 1 PostScript format.” Among the ways a hacker could exploit the flaws is convincing users to open “a specially craft...

Read More

NETWORK THREAT DETECTION

BlackCloak | November 16, 2021

news image

BLACKCLOAK UNVEILS NEW DECEPTION TECHNOLOGY TO CATCH CYBERATTACKS TARGETING EXECUTIVES & HIGH-PROFILE INDIVIDUALS

BlackCloak, Inc., the first Concierge Cybersecurity & Privacy™ Protection Platform for Executives and High-Profile Individuals, today officially unveiled proprietary deception technology to catch adversaries' brazen attempts to exploit a member's privacy, personal devices, or home networks. Commonly referred to as a honeypot, BlackCloak's deception technology lures attackers interacting with a service by simulating a real-world home network. Cybercriminals an...

Read More

Cyware | March 07, 2020

news image

UNCOVERING AGGRESSIVE METHODS USED BY RANSOMWARE OPERATORS TO DISRUPT REPUTATION OF VICTIMS

Ransomware has been one of the most prolific cyber threats in recent years and it is unlikely that the menace due to this malware will stop any time soon. The first ransomware attack The first instance of ransomware was observed in December 1989. Tracked as AIDS trojan, the ransomware was introduced to the world after it infected 20,000 floppy disks of delegates who had attended the World Health Organization’s AIDS conference in Stockholm.The disk contained malicious code that hid f...

Read More

Infosecurity | January 29, 2020

news image

CYBER-ATTACK ON US WATER COMPANY CAUSES NETWORK OUTAGE

A South Carolina water company is recovering from a cyber-attack that took its phone and online payment systems offline for nearly a week. The cyber-attack on Greenville Water triggered a payment system outage that began on Wednesday, January 22. Company spokesperson Emerald Clark said 500,000 customers were affected by the incident. An investigation has been launched into the cyber-attack, the exact nature of which is yet to be revealed by Greenville Water. It's not yet known who targeted t...

Read More