How HyperBUNKER was born?

How HyperBUNKER was born?

This project started from InfoLAB, the leading European Data Recovery & Security Lab. Operating on European market for over 30 years, During the last few years we are starting to face  more and more cyberattacks and data breaches.

In almost every support case, we always have questions; how to better protect data? What to do so that this never happens again?

We knew what was needed to truly safeguard data. The idea of HyperBUNKER was born. The solution that stands when everything else fails: »doomsday seed vault« for data. After we spent 3 years on development, where infoLAB team spent thousands of hours, we came to innovative solution unique approach to cybersecurity on advanced level. From the idea to ready to ship product.

Mario Keleković, system, hardware
Hrvoje Marošević, hardware, software
Stjepan Novak, software, testing
Denis Eškić, CISSO, system, documentation
Alma Eškić, operations
…and HyperBUNKER was born.

Upon the recommendation of US patent attorneys, we start to prepare patent documentation. Process and creation of patent documentation was mentored by Dr. Amor Chowdhury (Maribor University). USA patent application was successfully filed on October 23rd, 2024. USPTO Application 18/924,633

Since it is a project intended for the world market, we have teamed up with new experts. In the process of building the Hyperbunker, Matt Peterman (investor and advisor), Boštjan Kirm (CEO), Mladen Milavić (CRO) and Brad Mattick (advisor) joined us as an Investor and advisor to the company.

Mr. Boštjan Kirm (Ex. T-2)

Mr. Mladen Milavić (Ex. Microsoft, Ex. SAP)

Mr. Matt Peterman (Dodona Analytics & Extensity.ai)

Mr. Brad Mattick (Ex. Slack ,Ex. Salesforce, Ramp)

Ms. Ines Eškić

Thanks to all external experts: system administrators, IT infrastructure architects, cybersecurity experts, data security engineers, microelectronic developers, white hackers, who participated in the creation and evaluation of the HyperBUNKER functionality.

Special thanks to our investors from Luxembourg, Germany and Slovenia for recognizing the potential of our project and supporting us.

I.N.Eškić, The Founder

HyperBUNKER Development Timeline

From its inception in 1993 to its anticipated future advancements, the timeline captures the evolution of innovative ideas, experiments, and collaborations that have shaped HyperBUNKER into a cutting-edge solution for data storage.

 HyperBUNKER

Cybersecurity News Cybersecurity NewsCybersecurity News Cybersecurity News

  • October 31, 2025

    Phishing is one of the oldest and most successful cyberattack methods, yet it remains a top cause of data breaches and security incidents worldwide. It works by tricking individuals into giving away sensitive information like usernames, passwords, credit card details, or even access to company systems, by impersonating trusted contacts or organizations. What makes phishing especially dangerous is the human factor: attackers exploit trust, curiosity, and urgency to bypass sophisticated technical defenses. Phishing attempts have evolved from crude emails full of typos to sophisticated campaigns using realistic emailing, targeted messaging, and social engineering tactics that can fool even vigilant users. Attackers often craft emails that mimic legitimate companies, complete with official logos, email templates, and plausible-looking URLs. Some phishing campaigns use urgent calls to action, warning about account suspensions or financial penalties, driving hurried clicks. Recognizing Phishing Attempts Being able to identify phishing attacks is the first […]

  • October 24, 2025

    Sometimes the cyber world feels like a digital battlefield, hackers, data leaks, ransomware, and endless updates. But every once in a while, the tech universe delivers something unexpected, entertaining, and downright hilarious. This week, the hyper-connected world of cybersecurity served up some intriguing surprises, from AI-generated “hacktivist” personas to a cybersecurity challenge hidden inside a video game. The first comes from a community of white-hat hackers who turned digital defense into an art form. A group of penetration testers developed an AI that creates fictional hackers with full personalities, online handles, and even backstories. The AI was trained on years of cybersecurity forums, creating dozens of realistic cyber identities, each with unique “motives.” The catch? None of them exist. It was part of a research experiment to test social engineering resilience. Ironically, several of these AI-generated “hackers” were added to public security watchlists before the truth came out. […]

  • October 17, 2025

    The digital battlefield has never been more active. According to recent threat analyses from ENISA, IBM, and Hornetsecurity, cybercrime damage is expected to exceed $10.5 trillion globally by the end of 2025, with artificial intelligence driving both the attack and defense sides of cybersecurity. This surge is rewriting how organizations protect their digital assets, proving that traditional network-based defenses are no longer sufficient.​ AI-powered malware, autonomous phishing campaigns, and polymorphic ransomware are now the defining threats of this era. Cybercriminals are leveraging advanced machine learning models to mutate malicious code in real-time, detect sandbox environments, and bypass conventional antivirus tools before security teams can react. These attacks don’t just evolve, they adapt dynamically.​ The AI War Beneath the Surface The new reality of cybersecurity is an AI-versus-AI conflict. Defensive frameworks increasingly rely on artificial intelligence to identify anomalies, predict breaches, and automate incident response. Yet, the same algorithms are being […]

  • October 15, 2025

    HyperBunker has raised seed funding led by Fil Rouge Capital and Sunfish Venture Capital to bring ransomware protection to companies across EMEA and the US. Built after 50,000 real-world data recovery cases, HyperBunker protects critical information in a physical, offline vault—keeping operations running even when networks are compromised. Sunfish Partner Max Moldenhauer called it “an innovative shield against one of the most dangerous digital weapons of our time,” while Fil Rouge’s Dr. Aleš Pustovrh emphasized the company’s strong market traction and capacity-constrained production.      

  • October 11, 2025

    As autumn settles in across the globe, the technology and cybersecurity landscape is seeing a flurry of innovation, surprising partnerships, and ever-evolving threats. Here’s a roundup of the latest developments shaking up the digital world, and why “old-school” approaches are suddenly in the spotlight again. Offline Vaults Go Mainstream: HyperBUNKER’s Moment While cloud adoption and AI-driven automation keep accelerating, October 2025 has seen a surprising twist: an increased focus on offline, physically isolated backup solutions. HyperBUNKER, a European upstart, is making headlines with its one-way “data diode” vaults, drawing attention from critical infrastructure and military buyers alike. These devices are designed to store backups completely offline, immune to ransomware and network intrusions—a safety net in a world where no online perimeter is ever fully secure. The approach has gained traction after a series of breaches targeting “unhackable” cloud services. Notably, large enterprises and government clients are adopting […]

  • October 5, 2025

    In the ever-evolving world of cybersecurity, one truth remains constant: no organization is immune to digital threats. Over the past decade, we’ve seen cyberattacks that not only disrupted operations but also reshaped how the world views data protection. Yet, in each case, one question lingers, could smarter infrastructure and proactive defense have changed the outcome? At HyperBUNKER, we believe the answer is a resounding yes. The Breaches That Changed Everything From Sony Pictures in 2014 to Colonial Pipeline in 2021, major breaches have exposed how vulnerable even the largest institutions can be. Sony’s data leak revealed sensitive corporate information and unreleased films. Colonial Pipeline, on the other hand, was forced to shut down fuel delivery across the U.S. East Coast due to a ransomware attack, resulting in real-world chaos. Then there was Equifax in 2017, one of the most devastating cybersecurity incidents in history, where the personal […]

  • September 26, 2025

    At HyperBUNKER, we’ve always believed that the only true guarantee of resilience against ransomware, destructive attacks, and insider sabotage is a physically isolated, immutable backup vault. Our one-way, write-only system is designed to ensure that once data enters the vault, it cannot be tampered with, exfiltrated, or erased. Seeing this vision recognized and analyzed by leading technology publications is not only gratifying, it’s a sign that the industry is catching up to the critical need for last-resort recovery solutions. TechRadar: Offline Backups Could Have Changed the Story TechRadar recently published a feature exploring how “unhackable backup storage” could have altered the outcome of the high-profile Marks & Spencer hack. The article highlights the growing consensus that keeping data physically offline remains one of the most effective defenses against ransomware and catastrophic breaches. While the coverage was broader than HyperBUNKER itself, it placed our approach front and center […]

  • September 20, 2025

    Cyber threats are evolving at a breakneck pace. Every week, new vulnerabilities, attacks, and policy changes emerge that can affect both individuals and organizations. Below are a few of the latest stories making headlines, what they mean for cybersecurity, and practical takeaways to help you protect your digital bunker. Vietnam Investigates Cyberattack on Credit Data Vietnam’s National Credit Information Center, managed by the State Bank of Vietnam, is under investigation after a cyberattack compromised personal data including names, credit histories, and risk analyses. The hacker group ShinyHunters is suspected to be behind the breach. Despite the incident, the credit information service remains operational while authorities work to determine the full scale of the impact. What it means: Large data stores even those under robust agencies or banks are always targets. When personal or financial information is exposed, it not only hurts trust but also leads to long-term […]

  • September 12, 2025

    Cybersecurity often sounds intimidating. Firewalls, encryption, zero-day exploits it can feel like something reserved for hackers in hoodies or IT professionals who thrive on late-night coffee. But the truth is, you don’t need to be an expert to strengthen your defenses. You just need a handful of practical habits. Think of it as maintaining your bunker: keeping the doors locked, the walls reinforced, and the supply rooms organized. 1. Passwords Are Secret Codes, Not Sticky Notes Using weak passwords is the digital equivalent of leaving your bunker door open. Create long, unusual, and unique passwords for each account. Instead of “password123,” turn a random phrase into a passphrase, like “PineappleRocket77Dance.” Even better, use a password manager. It’s like a vault inside your bunker, one master key unlocks everything else safely. 2. Two-Factor Authentication Means Double Bunker Doors Your accounts should not rely on a single point of […]

  • September 7, 2025

    When most people hear “spring cleaning,” they think about sweeping floors, dusting shelves, and maybe finally tackling that mysterious box in the garage. But here at HyperBUNKER, we know better: your digital bunker deserves the same attention. After all, what good is a reinforced steel door if your hard drive is a chaotic wasteland? Step 1: Evict the Digital Dust Bunnies You’d be surprised how much clutter builds up on your devices. Old downloads, blurry selfies, and documents with names like “final_final_reallyFINAL.docx” are clogging your bunker systems. Freeing up space isn’t just about neatness, it speeds up your gear. Think of it as clearing the bunker tunnels so supplies can actually get through. Step 2: Patch the Cracks in the Walls Software updates are like bunker reinforcements. Skip them, and you’re basically leaving your vault door open. Hackers don’t need a battering ram when there’s a wide […]