SEA’s financial sector prone to spear phishing att...
By CybersecAsia editors | Jul 27, 2020 | Cyber Intelligence, News, Newsletter | 0
Up close and mercenary with cyber-espionage hacking group BAHAMUT
By CybersecAsia editors | Nov 5, 2020 | Cyber Intelligence, Cyberthreat Landscape, Newsletter
Numerously elected as one of the most elusive and sophisticated threat groups, BAHAMUT is now a star of dogged cybercrime researchers.
Read MoreThe world’s most valuable company could have made customers the most vulnerable
By CybersecAsia editors | Oct 13, 2020 | Cyber Intelligence, Cyberthreat Landscape, Newsletter
Fortunately, the company responded quickly and positively to the vulnerability disclosures.
Read MoreSEA’s financial sector prone to spear phishing attacks
By CybersecAsia editors | Jul 27, 2020 | Cyber Intelligence, News, Newsletter
Recall the US$81m cyber-heist by the Lazarus group in 2016? We are reminded that threat intelligence is critical for solid cybersecurity. In view of...
Read MoreAre contact tracing mandates compatible with data protection laws?
By Leonard Cheong, Managing Director, Singapore and Vietnam, ADNOVUM | Jul 2, 2020 | Cyber Intelligence, Newsletter, Opinions
Hoping to mine all that valuable contact-tracing data your business collects? Think again—the privacy watchdogs stand firm on data protection. May...
Read MoreCyber-intelligence researchers warn of planned cyber-attack campaign against 6 countries
By CybersecAsia editors | Jun 19, 2020 | Cyber Intelligence, News, Newsletter
Weekend blitz to target nations that have announced fiscal support schemes for citizen and business to tide over the COVID-19 pandemic. CYFIRMA, a...
Read More‘Lure and decoy’ cyber-threats exploit COVID-19
By CybersecAsia editors | Mar 9, 2020 | Cyber Intelligence, News, Newsletter, Tips
Cyber lure is a key social engineering tactic employed by state-sponsored and financially motivated cybercriminals. CrowdStrike Intelligence has...
Read MoreHalf of organizations feel unprepared to respond well to cyber attack or data breach
By CybersecAsia editors | Nov 6, 2019 | Cyber Intelligence, Data Breaches, News
A recent online survey has shed light on organizational attitudes towards cyber security initiatives and the differences across geographical...
Read MoreInternational SOS enhances security intelligence with analytics and AI
By CybersecAsia editors | Oct 16, 2019 | Case Study, Cyber Intelligence
Global workforce protected with Geospark Analytics’ Hyperion AI strengthening its analysis of emerging issues and trends. Driving innovation in...
Read MoreSeptember 2019’s most wanted malware
By CybersecAsia editors | Oct 11, 2019 | Cyber Intelligence, Features, News
Check Point’s researchers reported that the notorious Emotet botnet has been reactivated and is spreading active campaigns again after a...
Read MoreKroll: Social media emerges as a growing business risk
By CybersecAsia editors | Oct 2, 2019 | Cyber Intelligence, Features, News
Kroll revealed adversarial social media activity as a factor in 29% of significant incidents. Adversarial social media activity was a relevant...
Read MoreCarbon Black Global Threat Report
By CybersecAsia editors | Sep 30, 2019 | Cyber Intelligence, Cyberthreat Landscape, Infographic
Carbon Black’s Global Threat Report takes a deep dive into the escalating threat environment and rapidly evolving patterns
Read MoreIoT a hot topic in the cybercriminal underground
By CybersecAsia editors | Sep 17, 2019 | Cyber Intelligence, Cyberthreat Landscape, News
Trend Micro's global underground analysis reveals increased monetization of IoT attacks.
Read MoreArmy of network-based threats continues its advance
By CybersecAsia editors | Sep 15, 2019 | Cyber Intelligence, Network & Infrastructure Security, News, Tips
CenturyLink threat report reveals top attacks and network protection tips.
Read MoreMore than half of incident response requests come too late
By CybersecAsia editors | Aug 30, 2019 | Cyber Intelligence, Cyberthreat Landscape, News
Around 56% of Incident Response (IR) requests occur after damage from a cyber-attack has been completed. Around 56% of Incident Response (IR)...
Read MoreKnow Thy Enemy: understanding the cybercriminal psyche
By L L Seow | Aug 23, 2019 | Cyber Intelligence, Cyber Warfare, Features
Attackers are constantly evolving their tools and their game, but knowing their base instincts helps us defend against them.
Read MoreThink and act like a hacker to protect your company’s assets
By RSA Conference | Aug 22, 2019 | Cyber Intelligence, Cybersecurity Strategies, Video
Featuring Paula Januszkiewicz, CEO, CQURE: The reality here is as follows: attacks happen and they will happen as long as there are humans on this...
Read MoreExecutive Guide: NTT Global Threat Intelligence Report 2019
By CybersecAsia editors | Jul 5, 2019 | Cloud Security, Cyber Intelligence, Cybersecurity Strategies, Cyberthreat Landscape, Whitepapers
For several years, Dimension Data has published an Executive Guide to the NTT Security Global Threat Intelligence Report, providing insights and analysis from its cybersecurity experts about the shifting threat...
Read More
Whitepapers
Tokenization helps Indonesian financial technology and service provider with PCI compliance
The company needed to comply with PCI-DSS to securely exchange data with customers and partners.Download WhitepaperWebinar: The 2021 threat forecast
Join this on-demand session for a peek into the threat landscape in 2021…Download Whitepaper2020 Gartner Magic Quadrant for Application Security Testing
Synopsys placed highest for both the ability to execute and completeness of vision.Download Whitepaper2020 Open Source Security and Risk Analysis report
Here’s your personal copy of one of the industry’s most important analysis report.Download Whitepaper
Case Studies
Idaptive reduces complexity, increases security for NZ agricultural organization
Challenge: find a single sign-on solution to reduce complexity, minimize calls for password assistance, increase …Read moreAre we ready for the next big breach?
How organizations across various industries prevent breaches, get deep visibility to detect and stop threats …Read moreEmail Security Threat Report 2020
Email and collaboration platforms are the connective tissue of most businesses and organizations, where information …Read moreLeading Malaysian developer zeroes in on threats with LogRhythm
Full visibility and intelligent detection eliminate cybersecurity blind spots and reduce response time for UDA. …Read more