Global awareness of cyber warfare heightened by th...
By L L Seow | Jan 30, 2023 | Cyber Warfare, News, Newsletter | 0
Ukraine-Russia conflict: war also occurs in cybers...
By CybersecAsia editors | Feb 28, 2022 | Cyber Warfare, News, Newsletter | 0
Spy vs spy: battling the unseen global persistent ...
By Carlo Cordova | Aug 30, 2021 | Cyber Warfare, Features | 0
Ransomware still the #1 cyber threat: report
By CybersecAsia editors | Jan 30, 2023 | Cyber Warfare, News, Newsletter
With stolen credentials and Ransomware-as-a-Service kits being sold cheaper than ever on the Dark Web, expect more cybercrime this year!
Read MoreGlobal awareness of cyber warfare heightened by the Ukraine-Russia war: survey
By L L Seow | Jan 30, 2023 | Cyber Warfare, News, Newsletter
That increased awareness has varying levels of impact on respondents’ cyber warfare preparedness, as preliminary findings suggest
Read MoreUkraine-Russia conflict: war also occurs in cyberspace
By CybersecAsia editors | Feb 28, 2022 | Cyber Warfare, News, Newsletter
One threat intelligence firm confirms that pro-Russian ransomware and phishing groups have stepped up efforts against Ukrainian military personnel and civilians.
Read MoreSpy vs spy: battling the unseen global persistent threats of US-China tensions
By Carlo Cordova | Aug 30, 2021 | Cyber Warfare, Features
Beneath the veneer of global APT attacks lies a complex crossfire of political enmity, perfidy and cyber greed. Manchurian candidates, anyone?
Read MoreUnderstanding Myanmar’s intensifying digital disruptions
By CybersecAsia editors | Apr 7, 2021 | Cyber Warfare, News, Newsletter
The citizenry is resorting to VPN and privacy-centric apps to beat the junta’s censorship and digital blackouts, according to one report.
Read MoreCyber Murder Mystery
By Check Point Software Technologies | May 21, 2020 | Cyber Espionage, Cyber Warfare, Cyber-forensics, Cyber-terrorism, Video
If there was a hack, then there was a hacker – cyber threat analysis is a detective’s job, like an Agatha Christie novel. See how Check Point...
Read MoreCyber-defending our national airspace
By Victor Ng | Jan 15, 2020 | Cyber Warfare, Features
Warfare has moved from the physical world to the cyberworld, and from airspace to cyberspace. A huge amount of data is processed with each flight or...
Read More2019 was a glorious year for malicious actors
By CybersecAsia editors | Dec 3, 2019 | Cyber Espionage, Cyber Warfare, Cyberthreat Landscape, Features
A report on high-tech crime trends shows up 2019’s alarming growth of state-sponsored threats and other innovative attack vectors coming our way....
Read MoreSecuring the world’s critical public services, multiple cities at a time
By L L Seow | Nov 19, 2019 | Cyber Warfare, Cybersecurity Strategies, Features
Ever heard of the GRF or OT-ISAC? They crowdsource security intelligence that could well save our lives during synchronized cyberattacks! In...
Read MoreGroup-IB’s CyberCrimeCon event makes full-fledged debut in Singapore
By CybersecAsia editors | Nov 19, 2019 | Cyber Espionage, Cyber Warfare, News, Sponsored
Group-IB is bringing its signature event CyberCrimeCon to Singapore. Group-IB’s CyberCrimeCon is a global Threat Hunting & Intelligence...
Read MorePKPLUG: Chinese cyber-espionage group targeting Asia
By CybersecAsia editors | Oct 21, 2019 | Cyber Espionage, Cyber Warfare, News
Palo Alto Networks’ threat intelligence arm Unit 42 has released a report detailing the movements of PKPLUG, a previously unnamed Chinese...
Read MoreFireeye and the Cyber Security Agency of Singapore look to expand strategic partnership
By CybersecAsia editors | Oct 14, 2019 | Cyber Warfare, Data Protection, Information Security, News
International cybersecurity company aims to strengthen Singapore’s cyber security ecosystem through continued capability development and threat...
Read MoreCyberwar: Why not prevention?
By Edwin Doyle, Global Security Strategist, Check Point Software Technologies | Oct 5, 2019 | Cyber Warfare, Opinions
What should we do when breaches are no longer a laughing matter? Let’s reminisce about the good old days. Remember when simple computer viruses...
Read MoreFrom securing devices to securing nations
By Sharat Sinha, Vice President/GM, APAC, Check Point Software Technologies | Sep 25, 2019 | Cyber Warfare, Opinions
As the Internet evolved rapidly with accelerated adoption, cybersecurity became increasingly a challenge to grapple with. While commercial Internet...
Read MoreSuggested measures for national cyber defense
By Sanjay Aurora, Managing Director, Asia Pacific, Darktrace | Sep 17, 2019 | Cyber Warfare, Opinions
Some lessons that the Singapore government’s Public Sector Data Security Review Committee can learn from the private sector and other governments....
Read MoreTokyo 2020: Olympics with all the smarts
By L L Seow and Victor Ng | Aug 27, 2019 | Cyber Warfare, Cyber-terrorism, Features
As the Olympic Games 2020 approaches, Tokyo wants to demonstrate its cyber mettle to the world. But what about cybersecurity? When Tokyo hosts the...
Read MoreKnow Thy Enemy: understanding the cybercriminal psyche
By L L Seow | Aug 23, 2019 | Cyber Intelligence, Cyber Warfare, Features
Attackers are constantly evolving their tools and their game, but knowing their base instincts helps us defend against them.
Read More
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
BB HTC
Middle-sidebar-banner
Whitepapers
451 Research Business Analyst Report On Cloud Security Delivery
Learn what to choose between native and third-party when delivering cloud security.Download WhitepaperState of Email Security Report for 2023
Mimecast’s seventh annual State of Email Security report comes as organisations all over the world …Download WhitepaperGartner Report on Choosing the Right Key Management as a Service
Learn how to mitigate your organization’s cloud data security and privacy risks.Download WhitepaperThe Next-Gen CSPM Buyer’s Guide
All you need to know about choosing your next-generation CSPM.Download Whitepaper
Case Studies
Mastercard ramps up fraud protection for e-commerce merchants with Vesta
Tie-up offers Mastercard Payment Gateway Services customers access to Vesta’s Payment Guarantee and Payment Protect …Read moreSome Q1 2023 DDoS trends point to hackers changing tack
They are now quicker to abandon unsuccessful attacks while beefing up campaigns on non-traditional targets, …Read morePharma firm reaps efficiency benefits after outgrowing network attached storage
By upgrading to a cloud-based and integrated data protection-and-cybersecurity platform, BDR Pharmaceuticals was finally exceeding …Read moreNTT Ltd expects to save US$5m annually after successful cloud migration test case
The firm recognizes that strong growth has led to inefficiencies and complexities that need to …Read more