CREAPLUS

CREAPLUS

CREAPLUS is a consulting, implementation, value added distribution and software development firm foc

Mobile uploads 08/04/2024
16/02/2024

In order to minimize cyber risks, it is crucial to identify and address vulnerabilities as quickly as possible. Security threats are evolving rapidly and exploiting new vulnerabilities within changing IT environments. Combined with increasing pressure from regulations and company leaders, it is now essential for companies to achieve high standards of cybersecurity.

At the HEK.SI 2024 conference, Miha Lavrič introduced an automated pe*******on simulation solution by Picus Security, as a means to effectively measure and strengthen cyber resilience. He highlighted the limitations of traditional methods like annual pe*******on testing and red teaming, advocating for Picus Security's continuous testing approach.

Transform Your Security Operations Center With AI 16/02/2024

SOC analysts are overwhelmed with security alerts, spending hours manually triaging while attackers infiltrate within minutes. AI can automate responses, freeing analysts to focus on real threats and respond instantly. By predicting attacks and stopping them before they start, AI becomes the SOC's secret weapon in today's ever-evolving threat landscape.

Transform Your Security Operations Center With AI Attackers aren't slowing down and are using new methods to infiltrate orgs. To limit their impact, automation in the SOC is more critical now than ever.

Deepfake face swap attacks on ID verification systems up 704% in 2023 13/02/2024

Deepfakes pose a significant threat to remote identity verification, and attackers are increasingly using sophisticated tools to create convincing forgeries.

Deepfake face swap attacks on ID verification systems up 704% in 2023 Threat actors are increasingly using virtual cameras and emulators for digital injection attacks.

Security pros are being hospitalized by after-effects of ransomware hacks 12/02/2024

The Royal United Services Institute (RUSI) released a concerning report highlighting the mental and physical toll that cybersecurity professionals face due to ransomware attacks. Through interviews with individuals who directly dealt with such attacks, the study revealed widespread stress-related illnesses, financial strain, reputational damage, and social isolation among cybersecurity workers.

Security pros are being hospitalized by after-effects of ransomware hacks Psychological, physical, social and financial harm are all results of cyberattack

Credential Harvesting Vs. Credential Stuffing Attacks: What’s the Difference? 11/02/2024

Cybercriminals have an arsenal of techniques to breach user accounts and infiltrate organizations. Surprisingly, nearly half of their successful attacks rely on a single vulnerability: stolen or compromised login credentials. But how do they get their hands on these valuable keys to the kingdom?

Two seemingly similar methods dominate this shady scene: credential harvesting and credential stuffing. While often confused, they differ in their approach to acquiring and using stolen credentials.

Credential Harvesting Vs. Credential Stuffing Attacks: What’s the Difference? Credential stuffing and harvesting, although similar, have nuanced differences particularly in how credentials are stolen, acquired and used.

China Caught Dropping RAT Designed for FortiGate Devices 10/02/2024

Why break down the door when you have the key? Instead of brute force, the Chinese government used a sophisticated tool to exploit a vulnerability.

Dutch intelligence uncovered a Chinese state-sponsored cyberespionage campaign utilizing a new, persistent malware called "Coathanger." The malware exploited a vulnerability in FortiGate devices to gain access to sensitive information.

China Caught Dropping RAT Designed for FortiGate Devices Dutch military intelligence warns that new malware, called "Coathanger," was found in multiple FortiGate devices during an incident response, and that Chinese-state actors are using the persistent RAT for espionage.

US Warns of Destructive Chinese Cyber-Attacks 09/02/2024

US and allies warn of potential cyberattacks by Chinese group on critical infrastructure like communications, energy, transportation, and water. Officials urge vigilance and action to counter the threat. Recent takedown of compromised routers shows the seriousness of the situation.

US Warns of Destructive Chinese Cyber-Attacks The US claims to have discovered Chinese Volt Typhoon intrusions in multiple critical infrastructure sectors

What is an eSignature? | Ascertia | Blog 08/02/2024

E-signatures (electronic signatures) are gaining popularity as businesses embrace digital transformation. They allow for paperless signing of documents, streamlining processes and offering benefits like efficiency, cost savings, security, and sustainability. Ascertia's blog explains what e-signatures are, their growing use, and how to easily create them in your business.

What is an eSignature? | Ascertia | Blog Businesses across the globe are embracing the digital transformation, and eSignatures are at the forefront of this evolution. But what is an eSignature?

Russian spies impersonating Western researchers in ongoing hacking campaign 08/02/2024

Criminal hackers suspected to be working for Russian intelligence are impersonating Western researchers in a cyber campaign targeting their colleagues' email accounts. They send emails disguised as fellow researchers, requesting feedback on fabricated articles or documents like an op-ed on Moscow sanctions. Clicking on malicious links within these emails grants the criminals access to the target's credentials.

This campaign, impacting researchers in the US, Europe, and potentially elsewhere, aims to gather intelligence and potentially discredit researchers critical of Russia.

Russian spies impersonating Western researchers in ongoing hacking campaign An ongoing Russian campaign is trying to gain access to the email accounts of academics and researchers, according to messages and files seen by Recorded Future News and independently analyzed by two cybersecurity companies.

AI will increase the number and impact of cyberattacks, intel officers say 07/02/2024

The UK's intelligence agency, GCHQ, warns that artificial intelligence (AI) will significantly increase the number and impact of cyberattacks over the next two years. They predict ransomware will see the biggest boost, as AI lowers barriers for new criminals to enter the scene. Experienced attackers will also leverage AI to identify vulnerabilities and bypass defenses faster.

AI presents a concerning development in the cyber threat landscape, potentially leading to more frequent, impactful attacks across different levels of sophistication.

AI will increase the number and impact of cyberattacks, intel officers say Ransomware is likely to be the biggest beneficiary in the next 2 years, UK's GCHQ says.

Deepfake CFO tricks Hong Kong biz out of $25 million 06/02/2024

A multinational's Hong Kong-based finance worker fell victim to a sophisticated $25 million scam, tricked by deepfakes impersonating their London-based CFO and colleagues in a video call.

This incident highlights the growing threat of deepfake technology and underscores the urgent need for robust security protocols to combat financial fraud.

Deepfake CFO tricks Hong Kong biz out of $25 million Recordings of past vidchats suspected as source of fakery – so there's another class of data you need to lock down

5 Steps for Preventing and Mitigating Corporate Espionage 06/02/2024

Corporate espionage, particularly involving insiders, is a growing threat demanding robust protection of sensitive information.

5 Steps for Preventing and Mitigating Corporate Espionage Companies must take steps to enhance their protection against corporate espionage and safeguard their assets.

2024 quantum predictions in computing, AI and cybersecurity 03/02/2024

Quantum industry experts from technology companies and analyst firms anticipate a remarkable year of quantum technology and hardware advancements, with a heightened emphasis on safeguarding the digital landscape from quantum-based threats.

2024 quantum predictions in computing, AI and cybersecurity In 2024, quantum experts predict a year rich in quantum technology and hardware advancements and deployments, with a focus on cybersecurity.

The life and times of Cozy Bear, the Russian hackers who just hit Microsoft and HPE 02/02/2024

Cozy Bear, a Russian criminal hacker group known for their sophisticated cyberattacks, has targeted Microsoft and Hewlett-Packard Enterprise in recent weeks. These attacks are believed to be part of a broader campaign to steal intellectual property and other sensitive information.

The life and times of Cozy Bear, the Russian hackers who just hit Microsoft and HPE Hacks by Kremlin-backed group continue to hit hard.

The life and times of Cozy Bear, the Russian hackers who just hit Microsoft and HPE 01/02/2024

Cozy Bear, a Russian criminal hacker group known for their sophisticated cyberattacks, has targeted Microsoft and Hewlett-Packard Enterprise in recent weeks. These attacks are believed to be part of a broader campaign to steal intellectual property and other sensitive information.

Cozy Bear is a skilled and persistent group that often takes months or even years to compromise their targets.

The life and times of Cozy Bear, the Russian hackers who just hit Microsoft and HPE Hacks by Kremlin-backed group continue to hit hard.

Migration to Post-Quantum Cryptography | NCCoE 30/01/2024

Quantum computing technology is rapidly advancing and has the potential to compromise many of the current cryptographic algorithms used to protect digital information, especially public-key cryptography. These algorithms, which are widely used to safeguard online transactions, communications, and sensitive data, rely on mathematical problems that are intractable for classical computers but could be easily solved by quantum computers. Once practical quantum computers become available, all public-key algorithms and associated protocols will be vulnerable to exploitation by adversaries, including criminals, competitors, and other malicious actors.

This poses a significant threat to the security of our digital infrastructure and the data it protects. To address this looming challenge, it is crucial to initiate a proactive approach to replace hardware, software, and services that rely on public-key algorithms with post-quantum algorithms. These algorithms are designed to be resilient to quantum computer-based attacks and will ensure that our data remains secure even in the face of evolving technological threats.

Migration to Post-Quantum Cryptography | NCCoE Project AbstractThe initial scope of this project is to demonstrate the discovery tools that can provide automated assistance in identifying where and how public-key cryptography is being used in hardware, firmware, operating systems, communication protocols, cryptographic libraries, and application...

Red Bull Augments Microsoft EOP 28/01/2024

When put to the test, the Perception Point's Advanced Email Security demonstrates its superior performance. Learn how Perception Point outperformed 16 email security vendors in Red Bull's rigorous evaluation process.

Red Bull chose Perception Point as its email security provider because of its high detection accuracy for all threat types, its patented next-gen sandbox technology for advanced persistent threats (APTs) and zero-day attacks, its managed Incident Response service, and its platform agility.

Since implementing Perception Point's Advanced Email Security, Red Bull's EDR has registered a remarkable 65% decline in critical events.

Red Bull Augments Microsoft EOP When given the opportunity to put our solution up to the test, Perception Point’s Advanced Email Security proved to be a cut above the rest.

The need for post-quantum cryptography in the quantum decade - EDN 27/01/2024

As quantum computers become more powerful, they pose a significant threat to our current cybersecurity measures. PQC, QKD, crypto agility, and robust KMS are key strategies for ensuring the resilience of our digital systems in the face of this quantum risk.

The need for post-quantum cryptography in the quantum decade - EDN The quantum computing revolution can be overshadowed by this technology's ability to dismantle cybersecurity and encryption infrastructure.

UK Intelligence Fears AI Will Fuel Ransomware, Exacerbate Cybercrime 26/01/2024

UK intelligence agency NCSC warns that AI is set to fuel cybercrime in the next 2 years. Threat actors are already using AI to create more sophisticated phishing messages and malware, and to analyze large amounts of data quickly and effectively. However, the report also finds that AI can be used to enhance cybersecurity resilience.

UK Intelligence Fears AI Will Fuel Ransomware, Exacerbate Cybercrime A report from the cybersecurity unit of the UK's GCHQ says AI 'will almost certainly increase the volume and impact of cyberattacks' in the near term.

Deloitte predicts 2024 will be a breakthrough year for post-quantum cryptography 25/01/2024

Post-quantum cryptography is becoming a major concern for organizations of all sizes, and the industry is taking steps to prepare for the transition. Organizations should take action now to assess their quantum readiness and develop a plan for adoption of PQC.

Deloitte predicts 2024 will be a breakthrough year for post-quantum cryptography In 2024, Deloitte’s Colin Soutar anticipates “post-quantum cryptography will come of age,” driven by the upcoming NIST PQC standard release.

Here's what the IoT industry needs to learn about trust 20/01/2024

The Internet of Things (IoT) industry has a trust problem. To remedy this, it should take a page out of the financial services industry's playbook when it comes to security.

Here's what the IoT industry needs to learn about trust The IoT industry is overlooking some vital elements when trying to gain the trust of its prospective users. Here's what it can learn.

5 Differences Between Legacy SIEM and Next-gen SIEM? 17/01/2024

https://techbullion.com/5-differences-between-legacy-siem-and-next-gen-siem/

5 Differences Between Legacy SIEM and Next-gen SIEM? Legacy and next-gen SIEM are the two most basic types of this security tool. Continue reading here to discover the major differences between the two.

Email Security: Threats, Solutions, and 10 Critical Best Practices 16/01/2024

Email is a critical tool for communication and collaboration, but it is also a significant target for cyberattacks. Keep your business safe from cyber threats by protecting your emails. The email security solution by Perception Point is designed to help you keep your data secure and prevent malicious actors from accessing your accounts.

Email Security: Threats, Solutions, and 10 Critical Best Practices Email security is the practice of protecting email accounts and communications from unauthorized access, loss, or compromise, due to threats such as malware, spam, and phishing attacks. Some ways to protect your email include sender authentication, blocking spam, avoiding attachments and links, and....

Augmenting Microsoft Defender with Perception Point 14/01/2024

Learn how Perception Point leveraged agile deployment alongside existing Microsoft Defender to prevent advanced email security attacks from reaching users’ inboxes for a leading multinational oil & gas enterprise.

The customer required a modern Integrated Cloud Email Security (ICES) solution that could deploy on top of Microsoft Defender.

Augmenting Microsoft Defender with Perception Point Perception Point leverages agile deployment alongside existing Microsoft Defender to prevent advanced email security attacks.

Top 3 Cybersecurity Trends for SME Business Leaders in 2024 12/01/2024

"Executives in 2024 will be challenged to boost security awareness, expertise & capability — without adding costly headcount," explains Cynet Security co-founder & COO Netanel Amar.

Cybersecurity is crucial for small to medium-sized businesses (SMEs) seeking growth. It should be embedded in every decision-making process, from product development to supply chain management. By collaborating with technology teams and embracing new approaches to holistic risk management, business leaders can strengthen their organizations' resilience in 2024.

Top 3 Cybersecurity Trends for SME Business Leaders in 2024 As Cynet’s COO, my team and I get to work closely with risk management executives at small-to-medium enterprises (SMEs) around the world.

Cyberattack exposes Swiss Air Force documents on the darknet 11/01/2024

A US security company has been hacked, and many clients' data, including the Swiss Air Force, have been leaked on the darknet. The hacker group ALPHV is suspected to be responsible for the attack. The leaked documents include contracts, emails, and payment receipts that adversaries could use better to understand the Swiss Air Force's capabilities and vulnerabilities. The extent of the damage is still unknown, but it could pose a severe threat to Switzerland's national security.

To thwart cyberattacks, you need a layered approach that provides automated 24/7/365 monitoring, detection, isolation, mitigation and remediation in real-time of any suspicious behavior on your files, systems, networks and mailboxes, backed by an MDR/SOC. In addition, IT security awareness training is crucial as it improves employee behavior.

Cyberattack exposes Swiss Air Force documents on the darknet A US security company fell victim to a cyberattack. The Swiss Air Force was among the entities affected.

Zeppelin ransomware source code sold for $500 on hacking forum 10/01/2024

A threat actor is trying to sell the source code and a cracked version of the Zeppelin ransomware builder for just $500. This means that anyone with basic programming skills could create ransomware and start extorting victims.

KELA, a threat intelligence company, spotted the post on a cybercrime forum and provided critical insights into selling Zeppelin ransomware source code.

Zeppelin ransomware source code sold for $500 on hacking forum A threat actor announced on a cybercrime forum that they sold the source code and a cracked version of the Zeppelin ransomware builder for just $500.

Cybersecurity and Zero Trust 09/01/2024

Strong security at each layer of an IT infrastructure is crucial to avoid threats and attacks at every possible entry point. A Zero Trust Architecture framework addresses this requirement and is a crucial enabler for complete protection.

General purpose (GP) hardware security modules (HSMs) are the Root of Trust for Zero Trust Architecture. Based on their core capabilities, which are secure generation, processing, and storage of cryptographic keys, HSMs provide many advantages compared to other key generation and storage methods.

Download Utimaco's white paper below to learn why HSMs are the ideal foundation for your individual Zero Trust Architecture.

Cybersecurity and Zero Trust This white paper provides in-depth insight into the importance of following a Zero Trust approach - a critical requirement for building up any organization’s IT security infrastructure

"A real Achilles' heel": Medical devices could be hacked next, health officials fear 07/01/2024

Concerns about medical device hacking have been simmering for some time, and 2024 could be a tipping point. The growing media coverage has spotlighted the vulnerability of medical devices - this could attract more attackers and encourage existing ones to focus on this lucrative target.

"A real Achilles' heel": Medical devices could be hacked next, health officials fear Health care is made up of a complex tapestry of potential targets when it comes to medical devices.

Want your business to be the top-listed Computer & Electronics Service in Ljubljana?
Click here to claim your Sponsored Listing.

Videos (show all)

The Picus Security Cyber Defense Validation Platform's helps identify if Microsoft Defender EDR logging policies are set...
The average data breach in 2022 took 277 days to identify and contain, costing $4.4 million globally. Organizations usin...
Teams succeed when their technology, processes and people are strategically aligned. Watch as Anthony Roberts from Cynet...
New collaboration channels mean new gaps and new security blind spots for cybercriminals. It would help if you had compl...
Security products are getting more complicated to deploy, maintain, and use, leaving lean security teams struggling to d...
Does your organization need a single solution that prevents all threats from your main attack vectors? Perception Point'...
The largest taxi service in Russia Yandex Taxi was hacked by the Anonymous collective. A traffic jam took place in the c...
The Locked Shields 2022 Excercise
Did you ever think that keeping your organisation safe from cybersecurity threats is just like flying an airliner? Think...
Software development job @CREAplus

Telephone

Address


Dolenjska Cesta 242B
Ljubljana
1000

Opening Hours

Monday 08:00 - 16:00
Tuesday 08:00 - 16:00
Wednesday 08:00 - 16:00
Thursday 08:00 - 16:00
Friday 08:00 - 16:00

Other Information Technology Companies in Ljubljana (show all)
Outbrain Ljubljana Outbrain Ljubljana
Dunajska Cesta 5
Ljubljana, 1000

Trusted Content Discovery and Programmatic Ad Technology Built for Engagement

Smart AD Smart AD
Parmova Ulica 14
Ljubljana, 1000

Online Ad Network

CtrlArt CtrlArt
Smrekarjeva Ulica 22A
Ljubljana, 1000

CtrlArt creates dynamic and immersive Augmented Reality. Constructing memorable experiences and enga

Renderspace Renderspace
Vilharjeva 36
Ljubljana, 1000

We are a digital born consulting agency in Ljubljana, Slovenia. We are digital transformation enable

Presentia Presentia
Dunajska 5
Ljubljana, 1000

Našim novim in obstoječim strankam želimo ponuditi odlične, napredne in ugodne storitve v svetu

MUK TRADING Slovenia MUK TRADING Slovenia
Šlandrova Ulica 4b, 1231 Črnuče
Ljubljana, 1000

The company’s core business is the distribution of integrated solutions and systems from leading.

Hookd Hookd
Kamniška 47
Ljubljana, 1000

Esc2VR Esc2VR
Ljubljana

Esc2vr specializes in developing virtual reality games for business owners operating in the VR arcade and family entertainment industries. Our solutions are suitable for both new...

REEBA XR REEBA XR
Dalmatinova Ulica 2
Ljubljana, 1000

Fully immersive and interactive 3D virtual platform with customizable 3D environments for company events and meetings.

Baldinistudio Slovenija Baldinistudio Slovenija
Trubarjeva Cesta 7
Ljubljana, 1000

Podjetje Baldinistudio d.o.o. je zastopnik programske opreme, ki je zasnovana za gradbene, arhitekturne in strojne industrije. Poleg zastopništva je ena izmed glavnih dejavnosti us...

ARGOxr - Know-how at your fingertips ARGOxr - Know-how at your fingertips
Poljanska Cesta 25
Ljubljana, 1000

An enterprise platform for streamlining operational and maintenance know-how in manufacturing and infrastructure.

ISF Team ISF Team
Ulica Jožeta Jame 14
Ljubljana, 1000

With our highly experienced experts we help our customers better secure their information systems an