Gaps in vulnerability database, CAPEC and KEVs rai...
By CybersecAsia editors | May 27, 2022 | Cyberthreat Landscape, News, Newsletter | 0
Latest INTERPOL international sting operation stop...
By CybersecAsia editors | May 26, 2022 | News, Newsletter | 0
Conti ransomware attacks in Costa Rica and Peru dr...
By CybersecAsia editors | May 23, 2022 | News, Newsletter | 0
Before downloading a third party smart app to control your vehicle, read this!
By CybersecAsia editors | May 27, 2022 | News, Newsletter
Although they may offer features that the official vehicle manufacturer’s app does not provide, these apps harbor unmanageable risks and accountabilities.
Read MoreGaps in vulnerability database, CAPEC and KEVs raise Q1 ransomware concerns
By CybersecAsia editors | May 27, 2022 | Cyberthreat Landscape, News, Newsletter
One report notes a 7.5% increase in APT groups associated with ransomware, plus “cluttered threat intelligence” contributing to vulnerabilities.
Read MoreLatest INTERPOL international sting operation stops a “parallel pandemic”
By CybersecAsia editors | May 26, 2022 | News, Newsletter
An evasive cybercrime syndicate behind major phishing and BEC attacks—described as a US$2bn cyber pandemic—has been busted.
Read MoreConti ransomware attacks in Costa Rica and Peru drive national response
By CybersecAsia editors | May 23, 2022 | News, Newsletter
A US$10m bounty goes to informants that can provide actionable leads toward the arrest of the ransomware threat actors
Read MoreSix ‘Information Operations’ campaigns rage on in Ukraine-Russia-NATO cyber warfare
By CybersecAsia editors | May 23, 2022 | Cyberthreat Landscape, News, Newsletter
In an increasingly digitalized world, lions must concern themselves with the opinions of the sheeple.
Read MoreHow a compromised API in government can lead to data leaks
By CybersecAsia editors | May 20, 2022 | News, Newsletter
Although the Malaysian government agency involved refutes it, cybercriminals have repeatedly pointed to a specific API for their successful data heist.
Read MoreDoes formal measurement of security culture lead to improvements in cybersecurity?
By CybersecAsia editors | May 20, 2022 | News, Newsletter
One firm’s use of a measurement framework among its global corporate customers appears to have resulted in higher awareness and compliance,
Read MoreLaw enforcement actions, constant RaaS migrations: making ransomware groups harder to track
By CybersecAsia editors | May 19, 2022 | Cyberthreat Landscape, News, Newsletter
Threat actors are rebranding and regrouping faster to escape identification and forensic detection, one cyber threat report suggests.
Read MoreTransport industry a major cyber target: Indonesia acts to ramp up defenses
By CybersecAsia editors | May 17, 2022 | Case Study, News, Newsletter
The country’s largest taxi operator turns to AI-driven cybersecurity upgrades to protect its critical national infrastructure.
Read MoreFilling cyber skills gaps increasingly a board-level priority: survey
By CybersecAsia editors | May 12, 2022 | Cybersecurity Training & Certification, News, Newsletter
Responses from 1,223 decision makers in 29 countries showed two major trends involving a growing urgency in training and talent management.
Read MoreFour emerging threats need close monitoring in the global financial services industry
By CybersecAsia editors | May 11, 2022 | News, Newsletter
Financial market infrastructures are also intricately linked to the vulnerabilities identified in a white paper by a clearing/settlement services firm.
Read MoreStudy of exposed unsecured public-facing databases raises alarm bells
By CybersecAsia editors | May 10, 2022 | News, Newsletter
Some internet-facing databases could have been overlooked digital assets misconfigured to be unintentionally exposed to the open web: report
Read MoreRansomware collateral costs 7x more than ransoms paid: study
By CybersecAsia editors | May 9, 2022 | Malware & Ransomware, News, Newsletter
That does not mean corporations should just pay up rather than save on the costs of response, restoration and legal protection.
Read MorePhilippines payment platform hardens cloud application security infrastructure
By CybersecAsia editors | May 5, 2022 | Case Study, News, Newsletter
This includes rooting out vulnerabilities in container images and serverless functions, cloud misconfigurations, and hidden secrets and sensitive data.
Read MoreAre brand phishing tactics trending towards social/career-oriented networks?
By CybersecAsia editors | May 4, 2022 | News, Newsletter
Data from one cybersecurity firm’s customer base for Q1 may be signaling this trend.
Read MoreMoved to the Cloud and think your organization is secure? Watch your IAM configurations
By CybersecAsia editors | May 4, 2022 | Cyberthreat Landscape, News, Newsletter
Data from one cybersecurity firm’s ecosystem in Q1 has shown how complacence and indifference could put entire digitalized organizations at risk
Read MoreAudit review report highlights core challenges with managing open source risks
By CybersecAsia editors | Apr 29, 2022 | News, Newsletter
Hidden security and licensing threats lie in open source codebases, but organizations using them may not be applying sufficient due diligence.
Read MoreIndia trains government officials on cyber defense after spate of ICS attacks
By CybersecAsia editors | Apr 26, 2022 | News, Newsletter
More than 140 officials will be taught the concepts of intrusion detection techniques, pen testing, digital forensics and social media threats.
Read MoreCyberattacks against financial institutions: 2021 was a perfect storm
By CybersecAsia editors | Apr 25, 2022 | News, Newsletter
Instead of going after just money, cybercriminals in one survey were shown to also prize sensitive data for espionage, market manipulation.
Read MoreCybercriminals are turning to Kubernetes cloud native environments
By CybersecAsia editors | Apr 22, 2022 | Cyberthreat Landscape, News, Newsletter
One 2021 study suggests that cloud native environments are the second-most attractive targets after crypto, due to the broad attack surfaces.
Read More
Gamification listing
PARTICIPATE NOW |
|
sponsors-RCA

Whitepapers
2021 Human Factor Report
How ransomware, email threats, and other threat actors evolved and the latest techniques used in …Download Whitepaper2022 Global Report on Insider Threat Cost
Know the cost of credential theft to APAC organisationsDownload WhitepaperTips: Top 6 Recommendations to Improve User Productivity with More Secure Network Edges
Security experts’ top recommendations for improving user productivity and securing the edge in a WFA …Download WhitepaperAccidental Convergence: Ultimate Guide To Secured IT/OT Operations
Key things you need to know about IT/OT convergenceDownload Whitepaper
More News
Case Studies
Transport industry a major cyber target: Indonesia acts to ramp up defenses
The country’s largest taxi operator turns to AI-driven cybersecurity upgrades to protect its critical national …Read morePhilippines payment platform hardens cloud application security infrastructure
This includes rooting out vulnerabilities in container images and serverless functions, cloud misconfigurations, and hidden …Read moreIndonesian transport firm puts cybersecurity first as it pivots to digital
With multiple payment gateways, apps and APIs in use nationwide, the fast-growth business recognizes the …Read moreFortinet’s zero-trust security boosts innovation development of automotive manufacturing industry
How automotive manufacturers can leverage the zero-trust approach to secure operational technology.Read more