How HyperBUNKER was born?

How HyperBUNKER was born?

This project started from InfoLAB, the leading European Data Recovery & Security Lab. Operating on European market for over 30 years, During the last few years we are starting to face  more and more cyberattacks and data breaches.

In almost every support case, we always have questions; how to better protect data? What to do so that this never happens again?

We knew what was needed to truly safeguard data. The idea of HyperBUNKER was born. The solution that stands when everything else fails: »doomsday seed vault« for data. After we spent 3 years on development, where infoLAB team spent thousands of hours, we came to innovative solution unique approach to cybersecurity on advanced level. From the idea to ready to ship product.

Mario Keleković, system, hardware
Hrvoje Marošević, hardware, software
Stjepan Novak, software, testing
Denis Eškić, CISSO, system, documentation
Alma Eškić, operations
…and HyperBUNKER was born.

Upon the recommendation of US patent attorneys, we start to prepare patent documentation. Process and creation of patent documentation was mentored by Dr. Amor Chowdhury (Maribor University). USA patent application was successfully filed on October 23rd, 2024. USPTO Application 18/924,633

Since it is a project intended for the world market, we have teamed up with new experts. In the process of building the Hyperbunker, Matt Peterman (investor and advisor), Boštjan Kirm (CEO), Mladen Milavić (CRO) and Brad Mattick (advisor) joined us as an Investor and advisor to the company.

Mr. Boštjan Kirm (Ex. T-2)

Mr. Mladen Milavić (Ex. Microsoft, Ex. SAP)

Mr. Matt Peterman (Dodona Analytics & Extensity.ai)

Mr. Brad Mattick (Ex. Slack ,Ex. Salesforce, Ramp)

Ms. Ines Eškić

Thanks to all external experts: system administrators, IT infrastructure architects, cybersecurity experts, data security engineers, microelectronic developers, white hackers, who participated in the creation and evaluation of the HyperBUNKER functionality.

Special thanks to our investors from Luxembourg, Germany and Slovenia for recognizing the potential of our project and supporting us.

I.N.Eškić, The Founder

HyperBUNKER Development Timeline

From its inception in 1993 to its anticipated future advancements, the timeline captures the evolution of innovative ideas, experiments, and collaborations that have shaped HyperBUNKER into a cutting-edge solution for data storage.

 HyperBUNKER

Cybersecurity News Cybersecurity NewsCybersecurity News Cybersecurity News

  • December 5, 2025

    In today’s relentless cybersecurity landscape, businesses face unprecedented threats from ransomware, hackers, and data breaches that can cripple operations overnight. HyperBUNKER emerges as a revolutionary solution, offering patented technology that creates an impenetrable offline data vault. This innovative system safeguards critical information through air-gapped, immutable storage, ensuring no cyber threat can reach or compromise your most valuable assets.​ HyperBUNKER was meticulously crafted by the expert team at InfoLAB, drawing on over 30 years of hands-on experience in data recovery and cybersecurity operations. Having successfully resolved more than 50,000 data recovery cases from catastrophic infections to hardware failures, this seasoned collective transformed frontline battle-tested insights into a revolutionary solution. Their deep focus on cybersecurity, honed through decades of confronting evolving threats like advanced persistent threats and zero-day exploits, directly informed HyperBUNKER’s architecture, ensuring it addresses real-world vulnerabilities that conventional systems overlook. Unlike cloud-dependent solutions vulnerable to network attacks, […]

  • December 8, 2025

    HyperBUNKER is thrilled to announce our participation in the prestigious 65th Edition of The IT Press Tour, taking place December 9-10, 2025, in the historic city of Athens, Greece. This landmark event brings together innovative leaders in IT infrastructure, cloud, networking, data management, storage, big data, analytics, and AI ransomware, precisely the domains where HyperBUNKER excels as a revolutionary cybersecurity solution.​ Strategic Platform for Cybersecurity Innovation The IT Press Tour stands as a globally recognized media event since 2010, connecting cutting-edge companies with top-tier journalists from Europe and beyond. This edition marks a milestone with 354 distinct companies and 605 sessions to date, featuring first-time participants like 9LivesData, Enakta Labs, Ewigbyte, HyperBUNKER, Plakar, and Severalnines. HyperBUNKER joins this elite group to showcase our patent-pending offline data vault, designed to deliver unmatched ransomware-proof protection through air-gapped, immutable backups.​ In Athens, we will demonstrate how HyperBUNKER integrates seamlessly into […]

  • November 28, 2025

    In the cybersecurity landscape of 2025, major threats like ransomware, phishing, and zero-day exploits dominate headlines and organizational defense priorities. While these threats demand attention, there are critical yet underreported risks that quietly expose organizations to catastrophic damage. Addressing these overlooked vulnerabilities is vital to strengthening cyber defenses beyond common threat vectors. One frequently ignored risk is the exploitation of vulnerable, digitally signed drivers used in enterprise environments. These drivers often go unnoticed by endpoint detection and response (EDR) systems because they appear legitimate. Yet attackers increasingly leverage these “BYO-Vulnerable Drivers” to gain kernel-level privileges swiftly, allowing them to control compromised systems stealthily. Many organizations hesitate to block these drivers due to fears of operational disruptions, creating a dangerous blind spot for privilege escalation attacks that penetration testers regularly exploit.​ Another significant underreported issue is poor management of privileged credentials and shared secrets within network environments. Many […]

  • November 21, 2025

    The HyperBUNKER team recently attended the Munich Defence Innovation Day, discussing with defense professionals, innovators, and military representatives to showcase the unique strengths of the HyperBUNKER product. This event, positioned at the crossroads of military technology and cyber-resilience, proved to be the perfect platform for introducing HyperBUNKER as a revolutionary solution for safeguarding critical data against modern cyber and physical threats.​ Showcasing the HyperBUNKER Advantage Attendees at the event were introduced to HyperBUNKER, a military-grade, air-gapped data vault designed to withstand ransomware and hacking attempts by keeping the most critical backups permanently offline. The product features a combination of optocoupler technology and rugged hardware. HyperBUNKER’s architecture, which includes optocoupler-based isolation and tamper-evident logs, attracted significant attention for both its advanced technology and its practical, hands-off approach to data security.​ Engaging with Defense Stakeholders During the event, the HyperBUNKER team demonstrated how their system addresses a persistent problem […]

  • November 14, 2025

    In an age of quantum firewalls, AI-driven defenses, and self-healing systems, cybersecurity often seems like a matter of pure technology. Yet, year after year, global reports show that the majority of breaches originate not from sophisticated zero-day exploits, but from simple human mistakes. Password reuse, phishing emails, misplaced USB drives… vulnerabilities that can’t be patched with software updates. As hyperconnected systems evolve, the human factor becomes both the weakest link and, if guided correctly, the greatest strength in a company’s digital defense strategy. Cybersecurity isn’t just about what technology can do; it’s about how people use and trust it. The Psychology Behind the Breach Every attack begins with behavior. Social engineering, for example, is a discipline built on understanding human belief systems, emotional triggers, and cognitive shortcuts. Hackers don’t always need brute force when they can exploit trust, an email that looks like a legitimate invoice or […]

  • November 8, 2025

    Ransomware attacks have become one of the defining threats of the digital age, leaving no sector or organization truly safe. Recent cybersecurity data reveals an unprecedented acceleration in both the frequency and financial impact of ransomware incidents. As of this year, a ransomware attack is estimated to occur somewhere in the world every 19 seconds…  a dramatic escalation from the more sporadic campaigns seen just five years ago. This relentless surge underscores the urgency for every business, from small startups to global enterprises, to treat ransomware as not just a possibility but an imminent risk.​ Why Ransomware Keeps Growing Ransomware has transformed from amateur malware into a professional, criminal enterprise. Attackers have developed diverse strategies, ranging from automated mass infections to sophisticated, targeted campaigns aimed at high-value victims. The numbers are staggering: daily ransomware attacks have skyrocketed, with over 11,000 projected each day this year, reflecting a […]

  • October 31, 2025

    Phishing is one of the oldest and most successful cyberattack methods, yet it remains a top cause of data breaches and security incidents worldwide. It works by tricking individuals into giving away sensitive information like usernames, passwords, credit card details, or even access to company systems, by impersonating trusted contacts or organizations. What makes phishing especially dangerous is the human factor: attackers exploit trust, curiosity, and urgency to bypass sophisticated technical defenses. Phishing attempts have evolved from crude emails full of typos to sophisticated campaigns using realistic emailing, targeted messaging, and social engineering tactics that can fool even vigilant users. Attackers often craft emails that mimic legitimate companies, complete with official logos, email templates, and plausible-looking URLs. Some phishing campaigns use urgent calls to action, warning about account suspensions or financial penalties, driving hurried clicks. Recognizing Phishing Attempts Being able to identify phishing attacks is the first […]

  • October 24, 2025

    Sometimes the cyber world feels like a digital battlefield, hackers, data leaks, ransomware, and endless updates. But every once in a while, the tech universe delivers something unexpected, entertaining, and downright hilarious. This week, the hyper-connected world of cybersecurity served up some intriguing surprises, from AI-generated “hacktivist” personas to a cybersecurity challenge hidden inside a video game. The first comes from a community of white-hat hackers who turned digital defense into an art form. A group of penetration testers developed an AI that creates fictional hackers with full personalities, online handles, and even backstories. The AI was trained on years of cybersecurity forums, creating dozens of realistic cyber identities, each with unique “motives.” The catch? None of them exist. It was part of a research experiment to test social engineering resilience. Ironically, several of these AI-generated “hackers” were added to public security watchlists before the truth came out. […]

  • October 17, 2025

    The digital battlefield has never been more active. According to recent threat analyses from ENISA, IBM, and Hornetsecurity, cybercrime damage is expected to exceed $10.5 trillion globally by the end of 2025, with artificial intelligence driving both the attack and defense sides of cybersecurity. This surge is rewriting how organizations protect their digital assets, proving that traditional network-based defenses are no longer sufficient.​ AI-powered malware, autonomous phishing campaigns, and polymorphic ransomware are now the defining threats of this era. Cybercriminals are leveraging advanced machine learning models to mutate malicious code in real-time, detect sandbox environments, and bypass conventional antivirus tools before security teams can react. These attacks don’t just evolve, they adapt dynamically.​ The AI War Beneath the Surface The new reality of cybersecurity is an AI-versus-AI conflict. Defensive frameworks increasingly rely on artificial intelligence to identify anomalies, predict breaches, and automate incident response. Yet, the same algorithms are being […]

  • October 15, 2025

    HyperBunker has raised seed funding led by Fil Rouge Capital and Sunfish Venture Capital to bring ransomware protection to companies across EMEA and the US. Built after 50,000 real-world data recovery cases, HyperBunker protects critical information in a physical, offline vault—keeping operations running even when networks are compromised. Sunfish Partner Max Moldenhauer called it “an innovative shield against one of the most dangerous digital weapons of our time,” while Fil Rouge’s Dr. Aleš Pustovrh emphasized the company’s strong market traction and capacity-constrained production.