Hidden Lynx – Professional Hackers for Hire

The group likely offers a “hackers for hire” operation and is tasked with retrieving specific information from a wide range of corporate and government targets. They are a highly efficient team who can undertake multiple campaigns at once, breach some of the world’s best-protected organizations and can change their tactics quickly to achieve their goal. They usually attack using multiple customized Trojans designed for specific purposes. Backdoor.Moudoor is used for larger campaigns and has seen widespread distribution while Trojan. Naid is reserved for special operations against high value targets. The group uses cutting-edge attack techniques which makes this team stand out from other major attack groups.

Spotlight

Prot-On

Prot-On is a software that ensures that the files you send by email, upload to the cloud or share on social networks will only be accessible to authorized users. Encrypt your documents, pictures, videos, audios or emails and decide who, how and when can access them. You can also track document use. WHO USES PROT-ON? Companies worried about information leaks, regulatory compliance and the security of their information stored in cloud based systems. Government Agencies that need to protect State secrets and control information that is shared with other agencies or other countries. Professionals users who want to protect their files and intellectual property by assigning permissions to edit copy, view or print. Home users who want to know who’s viewed or forwarded documents or photos they’ve shared on the internet, uploaded to the cloud or put on a USB. HOW MUCH DOES PROT-ON COST? Prot-On offers a Free service to home users, offers a Premium service for professionals who need to protect t

OTHER WHITEPAPERS
news image

Cybersecurity for Industry

whitePaper | November 24, 2022

This white paper provides an overview of “Cybersecurity for Industry.” It describes the threats and hazards to which industrial automation systems and production plants are exposed and introduces concepts for minimizing these risks and instituting a level of protection that’s acceptable on economic as well as security grounds.

Read More
news image

Cloud Native Security Model

whitePaper | December 23, 2022

Moving to the cloud is more than a technical transition to a new platform. It is a core part of an enterprise's growth strategy and while strategically important, it can also be potentially disruptive.

Read More
news image

HackerPowered Security Report 2022 By HackerOne

whitePaper | March 14, 2023

Security automation cannot replace the creativity of humans. In fact, 92% of ethical hackers say they can find vulnerabilities scanners can’t. For the past six years, we’ve been surveying hackers to learn more about how they see the evolving security testing industry. We combine these insights with the world’s largest dataset of vulnerabilities to identify trends that inform our customers how to build an impactful security strategy.

Read More
news image

NMS Security Architecture Considerations & Approaches

whitePaper | August 26, 2022

The SolarWinds compromise became public in December 2020 and was a massive wake up to the industry. Likely a state-sponsored attack, it compromised potentially thousands of governments and other high-profile organisations across the globe. Many organisations are currently in damage control following the breach. Many of them are unsure if the perpetrators have entered, spread and are still persistent within their environment - even after they shut down the SolarWinds Platforms.

Read More
news image

Brivo Access Information Security White Paper

whitePaper | August 26, 2022

As a provider of physical security services, we at Brivo believe that information security is of paramount importance to maintaining the safety and security of your facilities, and the privacy of your data. That’s why information security has been a consideration since day one.

Read More
news image

Google Cloud security foundations guide

whitePaper | April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Read More

Spotlight

Prot-On

Prot-On is a software that ensures that the files you send by email, upload to the cloud or share on social networks will only be accessible to authorized users. Encrypt your documents, pictures, videos, audios or emails and decide who, how and when can access them. You can also track document use. WHO USES PROT-ON? Companies worried about information leaks, regulatory compliance and the security of their information stored in cloud based systems. Government Agencies that need to protect State secrets and control information that is shared with other agencies or other countries. Professionals users who want to protect their files and intellectual property by assigning permissions to edit copy, view or print. Home users who want to know who’s viewed or forwarded documents or photos they’ve shared on the internet, uploaded to the cloud or put on a USB. HOW MUCH DOES PROT-ON COST? Prot-On offers a Free service to home users, offers a Premium service for professionals who need to protect t

Events