Cybercriminals and state-sponsored threat actors also undergoing digitalization
In one study, cyber threat actors have fully exploited bot-based automation, cloud-enhanced speed and AI-driven tools to probe, prod and pilfer
Read MoreSelect Page
By CybersecAsia editors and webmaster webmaster | Tuesday, October 18, 2022, 10:28 AM Asia/Singapore | News, Newsletter
In one study, cyber threat actors have fully exploited bot-based automation, cloud-enhanced speed and AI-driven tools to probe, prod and pilfer
Read MoreBy Carlo Cordova | Wednesday, September 14, 2022, 10:30 AM Asia/Singapore | Features, Newsletter
Actually they love attacking every industry, but gamers and gaming platforms—especially those in Asia—are especially attractive prey
Read MoreBy CybersecAsia editors and webmaster webmaster | Thursday, August 18, 2022, 8:57 AM Asia/Singapore | News, Newsletter
Old vulnerabilities lay dormant and unpatched, leaving the gate wide open for attack, as Q2 telemetry from one cybersecurity firm shows
Read MoreBy Alvin Rodrigues, Field CSO, Asia Pacific, Infoblox | Monday, August 1, 2022, 10:32 AM Asia/Singapore | Newsletter, Tips
Know their tactics, follow the tips here, and do not let your generosity and sense of political righteousness run awry
Read MoreBy Samrita Baruah, IMAWS and webmaster webmaster | Friday, June 10, 2022, 2:02 PM Asia/Singapore | Features, Newsletter
Is it cheaper to pay ransoms and suffer reputational/legal losses, or to install accessible disaster recovery and data backup systems?
Read MoreBy CybersecAsia editors and webmaster webmaster | Friday, April 22, 2022, 2:06 PM Asia/Singapore | Cyberthreat Landscape, News, Newsletter
One 2021 study suggests that cloud native environments are the second-most attractive targets after crypto, due to the broad attack surfaces.
Read MoreBy Paul Prudhomme, Head, Threat Intelligence Advisory, IntSights, a Rapid7 company and webmaster webmaster | Thursday, March 3, 2022, 9:38 AM Asia/Singapore | Newsletter, Opinions, Tips
Other than for ransoming the monetizable sensitive data, cybercriminals are targeting the industry for vengeance, political agendas and other strategies.
Read MoreBy CybersecAsia editors and webmaster webmaster | Friday, February 25, 2022, 9:48 AM Asia/Singapore | News, Newsletter
Investigations of two recent incidents have thrown up new clues alluding to intensified cybercriminal cooperation and obfuscation techniques.
Read MoreBy Balasubramanian Swaminathan, IMAWS and webmaster webmaster | Friday, January 28, 2022, 5:01 PM Asia/Singapore | Features, Newsletter
CybersecAsia.net solicits the general opinions of one cybersecurity firm with eyes keenly affixed on realtors and building managements in the region.
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, September 21, 2021, 9:05 AM Asia/Singapore | News, Newsletter
Ironically, the malicious actors made use of popular cloud-based services to host travel-related malware and phishing websites.
Read MoreBy CybersecAsia editors and webmaster webmaster | Thursday, September 9, 2021, 12:31 PM Asia/Singapore | News, Newsletter
Data from a cybersecurity firm’s user base for 2021 points to cybercriminals’ increasing sophistication at penetration and evasion.
Read MoreBy CybersecAsia editors and webmaster webmaster | Monday, August 16, 2021, 10:19 AM Asia/Singapore | News, Newsletter
It was only a matter of time before any smart connected device with a huge user base would harbor vulnerabilities.
Read MoreBy CybersecAsia editors and webmaster webmaster | Thursday, July 29, 2021, 10:17 AM Asia/Singapore | News, Newsletter
Fraudsters and scammers have thought up new ways to cheat sports fans and Olympics supporters, according to cybersecurity researchers.
Read MoreBy CybersecAsia editors and webmaster webmaster | Wednesday, June 2, 2021, 12:09 PM Asia/Singapore | News, Newsletter
Some cyber-risks when being registered on various video game platforms while working from home.
Read MoreBy Victor Ng | Thursday, April 22, 2021, 10:56 AM Asia/Singapore | Features, Newsletter
Social engineering techniques go beyond email phishing to exploit the remote-working new normal.
Read More
PARTICIPATE NOW |
|