Phishing campaign targets Indonesian Instagram use...
By CybersecAsia editors | Mar 29, 2023 | News, Newsletter | 0
Fake search engine ads being used in the region to...
By CybersecAsia editors | Mar 27, 2023 | News, Newsletter | 0
Suspected China espionage threat actors go after n...
By CybersecAsia editors | Mar 27, 2023 | News, Newsletter | 0
US$400,000 worth of crypto stolen via new form of clipboard injector malware
By CybersecAsia editors | Mar 30, 2023 | News, Newsletter
The trojan lies in wait for victims to copy a crypto wallet address into the system clipboard, whereupon it pounces …
Read MorePhishing campaign targets Indonesian Instagram users and banking customers
By CybersecAsia editors | Mar 29, 2023 | News, Newsletter
Beware: the next trusted post by your favorite Instagram influencer could contain phishing links to steal your bank login credentials
Read MoreFake search engine ads being used in the region to distribute RATs
By CybersecAsia editors | Mar 27, 2023 | News, Newsletter
To snare Chinese-language web users, cybercriminals used ads linking to spoofed websites of popular software to spread a remote access trojan
Read MoreSuspected China espionage threat actors go after network-security device vulnerabilities
By CybersecAsia editors | Mar 27, 2023 | News, Newsletter
UNC3886 has been implicated in attacks that employ a novel malware to compromise sensitive government and defense networks via zero-day backdoors
Read MoreInterviews of 37 CEOs yields four cyber leadership mindsets worth noting
By CybersecAsia editors | Mar 27, 2023 | News, Newsletter
They hail from enterprises worth US$12bn and with workforces averaging 40,000 employees, but their candid responses hold lessons for all CEOs
Read MoreElevation of Privilege was 2022’s #1 vulnerability in Microsoft products
By CybersecAsia editors | Mar 27, 2023 | News, Newsletter
For the third year running, this vulnerability accounted for around 55% of the total number of CVEs and related security bulletins
Read MoreWatch what your children play on your office laptop at home!
By CybersecAsia editors | Mar 22, 2023 | Cyberthreat Landscape, News, Newsletter
One cybersecurity firm saw a 57% increase in 2022 attacks on users whose work computers were used for gaming by kids
Read MorePhishing content can now contain three novel ways to evade AI filters
By CybersecAsia editors | Mar 21, 2023 | News, Newsletter
The newly-deployed tactics are either improvisations of existing evasion methods such as typo-squatting, or new approaches to foil AI detection
Read MoreNew vishing techniques surfacing in South Korea
By CybersecAsia editors | Mar 17, 2023 | News, Newsletter
When a financial services app you are using causes an unexpected incoming call announcing irresistible offers, it is probably a scam
Read MoreStalkerware abuse: time to tighten the noose?
By CybersecAsia editors | Mar 16, 2023 | News, Newsletter
Whether abusers are installing stalkerware casually or for malicious purposes, the world needs to eye them closely to regulate digital violence
Read MoreAre cybersecurity personnel more immune to layoffs this year?
By CybersecAsia editors | Mar 15, 2023 | News, Newsletter
While most respondents in a multi-country survey on recession trends foresaw layoffs ahead, cybersecurity/IT talent were seen as highly marketable
Read MoreWith more concern over cloud security, too many tools could be counterproductive
By CybersecAsia editors | Mar 14, 2023 | Cloud Security, News, Newsletter
While increased cloud adoption and awareness of cloud-specific security issues are a good thing, tools sprawl was a dampener: survey
Read MoreName a key misconception about cloud data management that has persisted for four years
By CybersecAsia editors | Mar 13, 2023 | News, Newsletter
If you do not know the answer instantly, you could be putting your organization’s public cloud data at risk!
Read MoreAnalysis of top 100 breaches in 2022 reveal a common denominator
By CybersecAsia editors | Mar 13, 2023 | News, Newsletter
Among the top five factors leading to major global cyber incidents, one cyber weakness stood out in the Asia Pacific region…
Read MoreVastly expanded attack surfaces in 2022 had to result in greater cyberattacks
By CybersecAsia editors | Mar 10, 2023 | Cyberthreat Landscape, News, Newsletter
With state-sponsored threats and hacktivism thrown into the mix, one cybersecurity firm’s telemetry reflected the aggregated outcome for 2022
Read MoreAre IT teams around the world confident of dealing with email-based attacks?
By CybersecAsia editors | Mar 9, 2023 | Cyberthreat Landscape, News, Newsletter
One 2022 survey is showing that the increasing sophistication of such attacks has left some respondents unconfident of their defense capabilities
Read MoreData suggests threat actors and cyber scammers are changing tactics
By CybersecAsia editors | Mar 9, 2023 | Cyberthreat Landscape, News, Newsletter
With record numbers of crypto jacking attacks amid a substantial drop in global ransomware volume, researchers smell something brewing for 2023
Read MoreEach ransomware payment funds up to 10 more future cyberattacks
By CybersecAsia editors | Mar 7, 2023 | Malware & Ransomware, News, Newsletter
The monies also lead to bolder repeat attacks and across-the-board exacerbation of industry-specific cyber risks, according to one meta-analysis
Read MoreSecurity layers in MS 365 and Google Workspace “too thin”: survey
By CybersecAsia editors | Mar 6, 2023 | News, Newsletter
With emails remaining the number one cyber threat vector, why are the two collaboration software suites still so cyber impotent?
Read MoreOfficial app stores still hosting malware disguised as useful apps
By CybersecAsia editors | Mar 3, 2023 | News, Newsletter
One cybersecurity firm saw a doubling of such apps last year, a signal that cybercriminals are closing in on cavalier mobile users
Read More
Voters-draw
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
BB HTC
News
Middle-sidebar-banner
Whitepapers
A SANS Survey: Rethinking the Sec in DevSecOps: Security as Code
List of the top AppSec trends and interesting new innovations in 2022.Download WhitepaperDevelopers Guide: Top 10 OWASP API Security Issues
A developer’s technical guide to the top 10 Open Web Application Security Project (OWASP) API …Download WhitepaperConversational Microsoft 365 Data Backup
All you need to know about conversation Microsoft 365 data backup and recoveryDownload WhitepaperThe Global Enterprise Authentication Practices
Learn the global enterprise authentication practices in this Yubico survey research in partnership with Censuswide.Download Whitepaper
More News
Case Studies
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & Access Management
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & …Read moreGrace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead more