Global awareness of cyber warfare heightened by th...
By L L Seow | Jan 30, 2023 | Cyber Warfare, News, Newsletter | 0
Ukraine-Russia conflict: war also occurs in cybers...
By CybersecAsia editors | Feb 28, 2022 | Cyber Warfare, News, Newsletter | 0
Spy vs spy: battling the unseen global persistent ...
By Carlo Cordova | Aug 30, 2021 | Cyber Warfare, Features | 0
Ransomware still the #1 cyber threat: report
By CybersecAsia editors | Jan 30, 2023 | Cyber Warfare, News, Newsletter
With stolen credentials and Ransomware-as-a-Service kits being sold cheaper than ever on the Dark Web, expect more cybercrime this year!
Read MoreGlobal awareness of cyber warfare heightened by the Ukraine-Russia war: survey
By L L Seow | Jan 30, 2023 | Cyber Warfare, News, Newsletter
That increased awareness has varying levels of impact on respondents’ cyber warfare preparedness, as preliminary findings suggest
Read MoreUkraine-Russia conflict: war also occurs in cyberspace
By CybersecAsia editors | Feb 28, 2022 | Cyber Warfare, News, Newsletter
One threat intelligence firm confirms that pro-Russian ransomware and phishing groups have stepped up efforts against Ukrainian military personnel and civilians.
Read MoreSpy vs spy: battling the unseen global persistent threats of US-China tensions
By Carlo Cordova | Aug 30, 2021 | Cyber Warfare, Features
Beneath the veneer of global APT attacks lies a complex crossfire of political enmity, perfidy and cyber greed. Manchurian candidates, anyone?
Read MoreUnderstanding Myanmar’s intensifying digital disruptions
By CybersecAsia editors | Apr 7, 2021 | Cyber Warfare, News, Newsletter
The citizenry is resorting to VPN and privacy-centric apps to beat the junta’s censorship and digital blackouts, according to one report.
Read MoreCyber Murder Mystery
By Check Point Software Technologies | May 21, 2020 | Cyber Espionage, Cyber Warfare, Cyber-forensics, Cyber-terrorism, Video
If there was a hack, then there was a hacker – cyber threat analysis is a detective’s job, like an Agatha Christie novel. See how Check Point...
Read MoreCyber-defending our national airspace
By Victor Ng | Jan 15, 2020 | Cyber Warfare, Features
Warfare has moved from the physical world to the cyberworld, and from airspace to cyberspace. A huge amount of data is processed with each flight or...
Read More2019 was a glorious year for malicious actors
By CybersecAsia editors | Dec 3, 2019 | Cyber Espionage, Cyber Warfare, Cyberthreat Landscape, Features
A report on high-tech crime trends shows up 2019’s alarming growth of state-sponsored threats and other innovative attack vectors coming our way....
Read MoreSecuring the world’s critical public services, multiple cities at a time
By L L Seow | Nov 19, 2019 | Cyber Warfare, Cybersecurity Strategies, Features
Ever heard of the GRF or OT-ISAC? They crowdsource security intelligence that could well save our lives during synchronized cyberattacks! In...
Read MoreGroup-IB’s CyberCrimeCon event makes full-fledged debut in Singapore
By CybersecAsia editors | Nov 19, 2019 | Cyber Espionage, Cyber Warfare, News, Sponsored
Group-IB is bringing its signature event CyberCrimeCon to Singapore. Group-IB’s CyberCrimeCon is a global Threat Hunting & Intelligence...
Read MorePKPLUG: Chinese cyber-espionage group targeting Asia
By CybersecAsia editors | Oct 21, 2019 | Cyber Espionage, Cyber Warfare, News
Palo Alto Networks’ threat intelligence arm Unit 42 has released a report detailing the movements of PKPLUG, a previously unnamed Chinese...
Read MoreFireeye and the Cyber Security Agency of Singapore look to expand strategic partnership
By CybersecAsia editors | Oct 14, 2019 | Cyber Warfare, Data Protection, Information Security, News
International cybersecurity company aims to strengthen Singapore’s cyber security ecosystem through continued capability development and threat...
Read MoreCyberwar: Why not prevention?
By Edwin Doyle, Global Security Strategist, Check Point Software Technologies | Oct 5, 2019 | Cyber Warfare, Opinions
What should we do when breaches are no longer a laughing matter? Let’s reminisce about the good old days. Remember when simple computer viruses...
Read MoreFrom securing devices to securing nations
By Sharat Sinha, Vice President/GM, APAC, Check Point Software Technologies | Sep 25, 2019 | Cyber Warfare, Opinions
As the Internet evolved rapidly with accelerated adoption, cybersecurity became increasingly a challenge to grapple with. While commercial Internet...
Read MoreSuggested measures for national cyber defense
By Sanjay Aurora, Managing Director, Asia Pacific, Darktrace | Sep 17, 2019 | Cyber Warfare, Opinions
Some lessons that the Singapore government’s Public Sector Data Security Review Committee can learn from the private sector and other governments....
Read MoreTokyo 2020: Olympics with all the smarts
By L L Seow and Victor Ng | Aug 27, 2019 | Cyber Warfare, Cyber-terrorism, Features
As the Olympic Games 2020 approaches, Tokyo wants to demonstrate its cyber mettle to the world. But what about cybersecurity? When Tokyo hosts the...
Read MoreKnow Thy Enemy: understanding the cybercriminal psyche
By L L Seow | Aug 23, 2019 | Cyber Intelligence, Cyber Warfare, Features
Attackers are constantly evolving their tools and their game, but knowing their base instincts helps us defend against them.
Read More
Voters-draw
Gamification listing
PARTICIPATE NOW |
|
Vote Now -Placment
BB HTC
News
Top-Sidebar-banner
Whitepapers
eBook: Ransomware Deception Use Cases
Learn how Metallic ® ThreatWiseTM , from Commvault, can provide proactive and advanced data protectionDownload WhitepaperPost-Pandemic APAC Digital Transformation and OT Cyber Security
All you need to know about digital transformation and OT cybersecurity in Asia in the …Download WhitepaperFour Things to Consider to Successfully and Securely Run Critical Applications in the Cloud
Use this checklist to securely and successfully run critical applications in the cloud and maximize …Download WhitepaperCriteria Guide When Choosing An Endpoint Detection and Response (EDR) Solution
Use this checklist to make a more informed decision when choosing an endpoint detection and …Download Whitepaper
More News
Middle-sidebar-banner
Case Studies
Maxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead moreCase Study: Metallic ® ThreatWiseTM Data Protection Use Cases
How Metallic ThreatWise helped customers across industriesRead moreFortinet Security Fabric Protects Yedpay’s New Cloud Environment
Yedpay Power Its Business Growth with Fortinet Security FabricRead more