Newly-discovered Linux malware is not even a stand...
By CybersecAsia editors | Jun 20, 2022 | Malware & Ransomware, News, Newsletter | 0
Ransomware: true cost to business 2022
By Cybereason | Jun 16, 2022 | Infographic, Malware & Ransomware, Newsletter | 0
Ransomware collateral costs 7x more than ransoms p...
By CybersecAsia editors | May 9, 2022 | Malware & Ransomware, News, Newsletter | 0
Are we equipped to stay ahead of ransomware?
By Victor Ng | Jun 27, 2022 | Features, Malware & Ransomware
Success in stopping ransomware still seems out of our reach. Can AI and automation, a ‘zero trust’ approach, or a hybrid SOC help us deal more effectively with this fast-growing...
Read MoreNewly-discovered Linux malware is not even a standalone executable
By CybersecAsia editors | Jun 20, 2022 | Malware & Ransomware, News, Newsletter
The financially-motivated malware is a shared object library with sophisticated evasive activities that are “nearly impossible to detect”.
Read MoreRansomware: true cost to business 2022
By Cybereason | Jun 16, 2022 | Infographic, Malware & Ransomware, Newsletter
We are currently witnessing the greatest volume of ransomware attacks across the globe. But what’s the true cost to business?
Read MoreRansomware collateral costs 7x more than ransoms paid: study
By CybersecAsia editors | May 9, 2022 | Malware & Ransomware, News, Newsletter
That does not mean corporations should just pay up rather than save on the costs of response, restoration and legal protection.
Read MoreReport: Complex RansomOps fuel growth in ransomware economy
By CybersecAsia editors | Apr 21, 2022 | Cyberthreat Landscape, Malware & Ransomware, News, Newsletter
Singapore, Australia and India top the 2021 list of most-attacked countries in APAC, as willingness of victims to meet ransom demands fuels explosive growth in the ransomware economy.
Read MoreCybersecurity firm reports record ransomware casualties in its 2021 user base
By CybersecAsia editors | Apr 8, 2022 | Malware & Ransomware, News, Newsletter
Hackers had used the ‘name-and-shame’ technique to pressure victim organizations to pay up.
Read MoreWhat you need to know about the Okta breach by Lapsus$
By Victor Ng | Mar 24, 2022 | Malware & Ransomware, News, Newsletter
While it’s a relief to know the impact is limited, organizations need to be aware of the potential threat of the Lapsus$ cyber gang.
Read MoreWidespread impact of ransomware in Asia Pacific
By Claroty | Feb 4, 2022 | Infographic, Malware & Ransomware, Newsletter
4 in 5 organizations in Asia Pacific affected by ransomware, with more than half paying the ransom.
Read MoreNew trick up ransomware actors’ sleeves: financial blackmail
By CybersecAsia editors | Dec 9, 2021 | Malware & Ransomware, News, Newsletter
With almost half of incident response requests comprising ransomware, one cybersecurity firm predicts more devious extortion tactics in 2022.
Read MoreRansomware attackers don’t take holidays!
By Cybereason | Nov 19, 2021 | Infographic, Malware & Ransomware, Newsletter
With the holiday season coming up, the emerging pattern of cyber-attacks occurring over the weekends or holidays is concerning for businesses.
Read MoreRansomware: how your data can be your best defense
By Victor Ng | Nov 8, 2021 | Data Protection, Features, Malware & Ransomware
Cybercriminals are targeting your data for ransom, but true data immutability and visibility can be your best defense.
Read More“Good rain knows the best time to fall”: fraudster motto
By L L Seow | Nov 1, 2021 | Features, Malware & Ransomware, Newsletter, Tips
Summary: This quote from Squid Game mirrors what fraudsters and hackers are basing their phishing campaigns on: trendjacking!
Read MoreWhich cyber defense tech works best to stave off ransomware threats?
By CybersecAsia editors | Oct 14, 2021 | Malware & Ransomware, News, Newsletter
Is it UEBA or NGFW or ZTNA? According to one survey, the answer may surprise you …
Read MoreCritical security flaw puts hundreds of millions of Apple devices at risk
By Victor Ng | Sep 15, 2021 | Features, Malware & Ransomware, News, Newsletter
Pegasus spyware uses zero-click exploit to secretly break into Apple devices and take over control without requiring users to click on any link or download anything.
Read MoreWhy APAC remains the most targeted region for ransomware
By Victor Ng | Aug 23, 2021 | Features, Malware & Ransomware, Newsletter
Many nations maintain hard-and-fast policies of not negotiating with terrorist organizations, especially when it comes to paying ransom. However, the situation is quite different in the cyber-world.
Read MoreWhy industrial organizations need better network visibility
By Victor Ng | Aug 16, 2021 | Features, Malware & Ransomware
No industrial operation is free of risk, and different industrial organizations would legitimately have different appetites for certain types of risks.
Read MoreTHE “Silent Night” malware Zloader/Zbot
By Malwarebytes & HYAS | May 22, 2020 | Malware & Ransomware, Whitepapers
Malwarebytes and HYAS have teamed up to jointly produce a paper which features the discovery of a new but elusive malware. Coined “Silent Night”, the malware has been discovered to...
Read MorePrevalent malware exploiting COVID-19
By McAfee | May 8, 2020 | Infographic, Malware & Ransomware
McAfee’s recent research paints a picture of the malware landscape since the beginning of COVID-19. Check it out here.
Read MoreMarch 2020’s most wanted malware: Dridex banking Trojan
By CybersecAsia editors | Apr 14, 2020 | Malware & Ransomware, News, Newsletter
An updated Dridex has spread via multiple spam campaigns to deliver targeted ransomware, increasing the risk from the long-established trojan. The...
Read MoreNew features of MyKings cryptominer set to wreak havoc next year: report
By CybersecAsia editors | Dec 23, 2019 | Malware & Ransomware, News
Well-known for hiding virus code in a Taylor Swift JPG photo, MyKings has new tricks up its sleeve for 2020.
Read More
Gamification listing
PARTICIPATE NOW |
|
sponsors-RCA

Whitepapers
Whitepaper: IT and OT Infrastructure Cybersecurity Threats
Industrial cybersecurity threats that can bring down critical infrastructuresDownload WhitepaperSecurity Challenges of Work-From-Anywhere
Work-from-anywhere enterprise security challenges and solutionsDownload WhitepaperStruggling to Securely Keep Up with Digital Acceleration
Digital acceleration is posing security challenges and solutions for enterprisesDownload Whitepaper2021 Human Factor Report
How ransomware, email threats, and other threat actors evolved and the latest techniques used in …Download Whitepaper
Case Studies
Retail wealth management firm taps API technology for secure personalized outreach
A wealthtech firm managed to handle the deluge of panic enquiries at the beginning of …Read moreStock exchange reaches for the Cloud to meet compliance, agility targets
Improving data management automation, data-driven services and regulatory compliance levels sets the pace for India’s …Read moreTransport industry a major cyber target: Indonesia acts to ramp up defenses
The country’s largest taxi operator turns to AI-driven cybersecurity upgrades to protect its critical national …Read morePhilippines payment platform hardens cloud application security infrastructure
This includes rooting out vulnerabilities in container images and serverless functions, cloud misconfigurations, and hidden …Read more