Hoplon

Hoplon company information, Employees & Contact Information

Explore related pages

Related company profiles:

HOPLON is a game developer and publisher, specialized in multiplayer/free-to-play games since its foundation in 2000. With headquarters in Brazil, Hoplon is a global company, publishing games worldwide and bringing fun and joy to players in all continents. By focusing on original productions and respectful relationship with its players, Hoplon is today one of the largest and most important game companies in Brazil. Certified as a Great Place to Work (2019). In 2018 the company received the FIESC award for education, due to Hoplon’s programs for professional development of each employee. Hoplon has a wide range of benefits for the professionals, such as courses, workshops, idiom school, fruits and coffee breaks, monthly celebration (with more food!), partnerships with local commerce, and of course, the gamer community who loves to play together in the free times! Interested in joining this team? Visit our career website and leave your resumé: http://www.hoplon.com/site/careers.php To learn more, visit www.hoplon.com and follow us on our social networks: Facebook: www.facebook.com/HoplonInfotainment Twitter: www.twitter.com/hoplongames YouTube: www.youtube.com/HoplonInfotainment

Company Details

Employees
60
Founded
-
Address
Rua Niberto Haase, 100, Edifício Santa Mônica Office,brazil
Industry
Computer Games
NAICS
Software Publishers
Website
hoplon.com
HQ
Florianópolis, Santa Catarina
Looking for a particular Hoplon employee's phone or email?

Hoplon Questions

News

🚫 Free PDF Converter = Free Malware Risk Those “Download PDF Now” sites often hide adware, pop-ups, or even data trackers. Before you install anything: ✅ Use built-in “Print → Save as PDF” ✅ Export directly from Docs or Office ✅ Choose only verified, rep - LinkedIn

🚫 Free PDF Converter = Free Malware Risk Those “Download PDF Now” sites often hide adware, pop-ups, or even data trackers. Before you install anything: ✅ Use built-in “Print → Save as PDF” ✅ Export directly from Docs or Office ✅ Choose only verified, rep LinkedIn

Vistina, a Subsidiary of Hoplon Capital, and HPS Investment Partners Announce Collaboration to Expand Asset-Based Financing Origination to Borrowers - Yahoo Finance

Vistina, a Subsidiary of Hoplon Capital, and HPS Investment Partners Announce Collaboration to Expand Asset-Based Financing Origination to Borrowers Yahoo Finance

Not every cybersecurity threat comes from outside the organization. Sometimes, the biggest risk is inside. 👤 What is an Insider Threat? When an employee, contractor, or trusted partner misuses access — intentionally or unintentionally — leading to data theft, l - LinkedIn

Not every cybersecurity threat comes from outside the organization. Sometimes, the biggest risk is inside. 👤 What is an Insider Threat? When an employee, contractor, or trusted partner misuses access — intentionally or unintentionally — leading to data theft, l LinkedIn

Shieldon Hoplon pocket knife review – Is it your next EDC pocket knife? - The Gadgeteer

Shieldon Hoplon pocket knife review – Is it your next EDC pocket knife? The Gadgeteer

Local tech company Hoplon proposes geofencing for school safety in Metro schools - WZTV

Local tech company Hoplon proposes geofencing for school safety in Metro schools WZTV

Hoplon Capital Announces Formation of Vistina Structured Credit and Inaugural Structured Finance Advisory Mandate - Yahoo Finance

Hoplon Capital Announces Formation of Vistina Structured Credit and Inaugural Structured Finance Advisory Mandate Yahoo Finance

🚨 DATA BREACH? Act fast! 🚨 Don't panic—get prepared. Watch this reel for critical steps you must take immediately to protect your data, identity, and assets after a security incident. Action is the best defense against further damage! Follow Hoplon Infosec for - LinkedIn

🚨 DATA BREACH? Act fast! 🚨 Don't panic—get prepared. Watch this reel for critical steps you must take immediately to protect your data, identity, and assets after a security incident. Action is the best defense against further damage! Follow Hoplon Infosec for LinkedIn

Wayzata spinout Hoplon targets second fund in challenging market - Buyouts

Wayzata spinout Hoplon targets second fund in challenging market Buyouts

Dark Web 101 — what it is, how it works, and why it matters. The dark web isn’t the same as the deep web, but it is where stolen data often ends up. Breaches and scams leak passwords, cards, and IDs that are traded on hidden marketplaces—sometimes with - LinkedIn

Dark Web 101 — what it is, how it works, and why it matters. The dark web isn’t the same as the deep web, but it is where stolen data often ends up. Breaches and scams leak passwords, cards, and IDs that are traded on hidden marketplaces—sometimes with LinkedIn

Your notes can become a breach path when: • Weak passwords protect the app (or none at all) • Shared accounts blur accountability and spread access • Third-party integrations read/sync your data by default Hoplon Infosec tips: Use strong, unique password - LinkedIn

Your notes can become a breach path when: • Weak passwords protect the app (or none at all) • Shared accounts blur accountability and spread access • Third-party integrations read/sync your data by default Hoplon Infosec tips: Use strong, unique password LinkedIn

Hidden camera scams are real—and rising. Before you settle into a hotel, Airbnb, or changing room, do a 30-second sweep: kill the lights and look for tiny reflections, scan with your phone flashlight, check the Wi-Fi devices list, and unplug anything suspicious. - LinkedIn

Hidden camera scams are real—and rising. Before you settle into a hotel, Airbnb, or changing room, do a 30-second sweep: kill the lights and look for tiny reflections, scan with your phone flashlight, check the Wi-Fi devices list, and unplug anything suspicious. LinkedIn

Attackers don’t just “guess” passwords—they automate brute force, craft convincing phishing flows, and deploy keyloggers via risky software or extensions. Effective defense is consistency: unique passwords via a manager, 2FA/passkeys on critical accounts, a - LinkedIn

Attackers don’t just “guess” passwords—they automate brute force, craft convincing phishing flows, and deploy keyloggers via risky software or extensions. Effective defense is consistency: unique passwords via a manager, 2FA/passkeys on critical accounts, a LinkedIn

Red Hat has confirmed unauthorized access to a consulting GitLab. Useful reminder that even mature orgs face risk—and that basics still matter. Stay safe: reset passwords, enabletwo-factor authentication (2FA), watch for phishing attempts, and review your ac - LinkedIn

Red Hat has confirmed unauthorized access to a consulting GitLab. Useful reminder that even mature orgs face risk—and that basics still matter. Stay safe: reset passwords, enabletwo-factor authentication (2FA), watch for phishing attempts, and review your ac LinkedIn

Why do personalized ads feel like surveillance? Because your online behavior—searches, clicks, and even device settings—creates a digital fingerprint. In this quick explainer, we unpack browser tracking, cookie syncing, and ad network profiling—then share - LinkedIn

Why do personalized ads feel like surveillance? Because your online behavior—searches, clicks, and even device settings—creates a digital fingerprint. In this quick explainer, we unpack browser tracking, cookie syncing, and ad network profiling—then share LinkedIn

🚨 Cybersecurity News: Boyd Gaming Breach 🚨 Hackers compromised Boyd Gaming’s IT systems, exposing employee data that could be used for fraud or identity theft. Stay secure: change passwords, enable 2FA, and stay alert for suspicious activity. Follow H - LinkedIn

🚨 Cybersecurity News: Boyd Gaming Breach 🚨 Hackers compromised Boyd Gaming’s IT systems, exposing employee data that could be used for fraud or identity theft. Stay secure: change passwords, enable 2FA, and stay alert for suspicious activity. Follow H LinkedIn

Myth: a phone number alone can “hack your phone.” Reality: the number enables social engineering (carrier support), SIM-swap fraud, and SMS interception, which can compromise accounts. Action items: carrier PIN, authenticator/security key (not SMS), audi - LinkedIn

Myth: a phone number alone can “hack your phone.” Reality: the number enables social engineering (carrier support), SIM-swap fraud, and SMS interception, which can compromise accounts. Action items: carrier PIN, authenticator/security key (not SMS), audi LinkedIn

Most breaches start with a stolen password. 2FA stops logins—even when attackers have the password. • Prefer an authenticator app or security key (skip SMS if you can) • Enable 2FA on email first, then socials and banking • Save backup codes securely Foll - LinkedIn

Most breaches start with a stolen password. 2FA stops logins—even when attackers have the password. • Prefer an authenticator app or security key (skip SMS if you can) • Enable 2FA on email first, then socials and banking • Save backup codes securely Foll LinkedIn

Congrats, you’ve won a free iPhone!” — a line that has tricked thousands. Fake contests and giveaways are a growing scam tactic, luring people into giving away sensitive information. Watch our quick reel to learn how these scams operate and how to stay saf - LinkedIn

Congrats, you’ve won a free iPhone!” — a line that has tricked thousands. Fake contests and giveaways are a growing scam tactic, luring people into giving away sensitive information. Watch our quick reel to learn how these scams operate and how to stay saf LinkedIn

Clone account scams are simple and effective: copy a real profile, trigger urgency, harvest money or data. Your defense is process: confirm identity via a trusted channel, never send funds or credentials over DMs, and escalate by reporting the imposter. A 30-s - LinkedIn

Clone account scams are simple and effective: copy a real profile, trigger urgency, harvest money or data. Your defense is process: confirm identity via a trusted channel, never send funds or credentials over DMs, and escalate by reporting the imposter. A 30-s LinkedIn

Cyberattacks aren’t just tech problems. They affect our businesses, our data, and even our daily lives. From ransomware shutting down hospitals to supply chain attacks infiltrating Fortune 500 companies, these 5 real-life cyber incidents remind us why cyberse - LinkedIn

Cyberattacks aren’t just tech problems. They affect our businesses, our data, and even our daily lives. From ransomware shutting down hospitals to supply chain attacks infiltrating Fortune 500 companies, these 5 real-life cyber incidents remind us why cyberse LinkedIn

AI in Cybersecurity: A Double-Edged Sword Artificial Intelligence is reshaping cybersecurity, but is it a force for good or bad? 🤖🔒 How AI Helps: • Automation of tedious security tasks • Real-time threat detection using machine learning • Enhanced predictive ca - LinkedIn

AI in Cybersecurity: A Double-Edged Sword Artificial Intelligence is reshaping cybersecurity, but is it a force for good or bad? 🤖🔒 How AI Helps: • Automation of tedious security tasks • Real-time threat detection using machine learning • Enhanced predictive ca LinkedIn

Voicemail Scam Awareness: Do Not Call Back Unknown Numbers Voicemail phishing (vishing) uses recorded messages that impersonate banks, delivery services, or law enforcement to create urgency and trigger a call-back. During the call, impostors reques - LinkedIn

Voicemail Scam Awareness: Do Not Call Back Unknown Numbers Voicemail phishing (vishing) uses recorded messages that impersonate banks, delivery services, or law enforcement to create urgency and trigger a call-back. During the call, impostors reques LinkedIn

What is Ethical Hacking? Certified professionals perform authorized security testing (pen-tests/bug bounties) to find vulnerabilities before attackers do. The workflow: scope & permission → simulate attacks → report findings → remediation. Your part: strong, un - LinkedIn

What is Ethical Hacking? Certified professionals perform authorized security testing (pen-tests/bug bounties) to find vulnerabilities before attackers do. The workflow: scope & permission → simulate attacks → report findings → remediation. Your part: strong, un LinkedIn

Critical ASP.NET Core Vulnerability Exposed - LinkedIn

Critical ASP.NET Core Vulnerability Exposed LinkedIn

Abry Partners and Hoplon Capital Complete Acquisition of Concentrix - Insurance Innovation Reporter

Abry Partners and Hoplon Capital Complete Acquisition of Concentrix Insurance Innovation Reporter

Tatiana Moreira, Hoplon’s Head of Marketing and Publishing, explores the challenges behind creating global communities. - Game Developer

Tatiana Moreira, Hoplon’s Head of Marketing and Publishing, explores the challenges behind creating global communities. Game Developer

MyLotto24’s Hoplon ILS to take EUR4.8m loss after jackpot win - Artemis.bm

MyLotto24’s Hoplon ILS to take EUR4.8m loss after jackpot win Artemis.bm

Hoplon II Insurance brings more MyLotto24 jackpot risk to ILS market - Artemis.bm

Hoplon II Insurance brings more MyLotto24 jackpot risk to ILS market Artemis.bm

MyLotto24 expands Hoplon coverage, investors coupon increased - Artemis.bm

MyLotto24 expands Hoplon coverage, investors coupon increased Artemis.bm

Top Hoplon Employees

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant