Getting to know the Russia-based Conti threat grou...
By CybersecAsia editors | Mar 16, 2022 | News, Newsletter | 0
Ukraine-Russia cyber war: this week’s casualty da...
By CybersecAsia editors | Mar 7, 2022 | News, Newsletter | 0
Still think official app stores are safe? Read thi...
By CybersecAsia editors | Feb 28, 2022 | News, Newsletter | 0
New vishing techniques surfacing in South Korea
By CybersecAsia editors | Mar 17, 2023 | News, Newsletter
When a financial services app you are using causes an unexpected incoming call announcing irresistible offers, it is probably a scam
Read MoreGetting to know the Russia-based Conti threat group
By CybersecAsia editors | Mar 16, 2022 | News, Newsletter
In Feb 2022, leaked chat logs of the threat group’s members showed how professionally organized and managed these hackers are.
Read MoreUkraine-Russia cyber war: this week’s casualty dashboard
By CybersecAsia editors | Mar 7, 2022 | News, Newsletter
Some quick cyber war statistics from one cybersecurity ecosystem, at a glance.
Read MoreStill think official app stores are safe? Read this!
By CybersecAsia editors | Feb 28, 2022 | News, Newsletter
The following disclosure is yet another testament to the fact that apps downloaded from official software repositories are not always safe.
Read MoreLogistics giant was the most impersonated brand used in Q4 2021 phishing campaigns
By CybersecAsia editors | Feb 4, 2022 | News, Newsletter
Logistics giant was the most impersonated brand used in Q4 2021 phishing campaigns
Read MoreBeware: DeFi and crypto scammers are out to get you
By CybersecAsia editors | Jan 28, 2022 | News, Newsletter
From ‘rug pulling’ to fake crypto marketplaces to unregulated crypto trading—the lure of crypto riches is fraught with cyber traps.
Read MoreNew botnet variant steals US$500k worth of cryptocurrency
By CybersecAsia editors | Dec 20, 2021 | News, Newsletter
Using a technique called crypto clipping, the Phorpiex variant substitutes wallet addresses during a transaction.
Read More2021 cyber incident roundup: lessons for a more secure new year
By Gary Gardiner, Head, Security Engineering, APJ, Check Point Software Technologies | Dec 14, 2021 | Newsletter, Tips
A recap of this year’s major cyberattacks should jolt organizations out of cyber complacence and into a proactive defense stance.
Read MoreOctober 2021’s Most Wanted Malware: Trickbot again
By CybersecAsia editors | Nov 16, 2021 | News, Newsletter
Even vulnerability fixes can be vulnerable, as CVE-2021-41773 has shown!
Read MoreAPAC is a cyberattack magnet: STOP SHARING your life details on social media!
By Carlo Cordova | Nov 10, 2021 | Newsletter, Tips
Alongside a coronavirus pandemic is a pandemic of obsessive social media habits that people need inoculation against.
Read MorePortrait of a versatile security assessment tool turned rogue
By Lotem Finkelsteen, Head, Threat Intelligence, Check Point Research (CPR) | Nov 9, 2021 | Newsletter, Tips
It is powerful, easily modifiable for malicious use, and its wide adoption gives cyberdefenders a hard time identifying the group involved.
Read MoreScammers phish US$500k worth of cryptocurrency with SEO
By CybersecAsia editors | Nov 8, 2021 | News, Newsletter
Some crypto investors have been tricked into clicking on fake ads that made it to the top of crypto-investment search results.
Read MoreMalicious airdropped NFTs lead to theft of hundreds of thousands of dollars
By CybersecAsia editors | Oct 22, 2021 | News, Newsletter
A stern warning to users of the largest marketplace for non-fungible tokens: system vulnerabilities in this technology may still be lurking.
Read MoreTrickbot back in place: September’s most wanted malware
By CybersecAsia editors | Oct 12, 2021 | News, Newsletter
With the takedown of Emotet, this revitalized malware is now a staple player in the monthly list of vicious cyber threats.
Read MoreIndonesia was SEA’s most wanted target by cyber attackers: report
By CybersecAsia editors | Oct 11, 2021 | News, Newsletter
Thailand and Vietnam were also standouts in a global report of cyberattack trends in a cybersecurity firm’s user base.
Read MoreDeluge of fake vaccine certificates now on sale in chat groups
By CybersecAsia editors | Sep 17, 2021 | News, Newsletter
Fraudsters and forgers have expanded beyond the Dark Net to ply their illegal documents all over the world.
Read MoreAugust 2021’s most wanted malware: Formbook infostealer
By CybersecAsia editors | Sep 14, 2021 | News, Newsletter
Banking trojan Qbot ousted after a long stay on the rankings, while remote access trojan Remcos enters in sixth place.
Read MoreAn Amazon device that kindles the flames of cybercriminals
By CybersecAsia editors | Aug 16, 2021 | News, Newsletter
It was only a matter of time before any smart connected device with a huge user base would harbor vulnerabilities.
Read MoreTrickbot steals the limelight as Most Wanted Malware for June 2021
By CybersecAsia editors | Jul 16, 2021 | News, Newsletter
Often used in the initial stages of ransomware attacks, this nasty trojan is the most prevalent malware for the second month running.
Read MoreKaseya Independence Day ransomware attack – biggest breach so far
Cybersecurity experts weigh in on the timing, method, and payload of what may be the biggest ransomware and supply chain attack to date.
Read More
Voters-draw
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
BB HTC
News
Middle-sidebar-banner
Whitepapers
Conversational Microsoft 365 Data Backup
All you need to know about conversation Microsoft 365 data backup and recoveryDownload WhitepaperThe Global Enterprise Authentication Practices
Learn the global enterprise authentication practices in this Yubico survey research in partnership with Censuswide.Download WhitepaperModern Identity Security For Stronger Defense
All you need to know about the requirements, features, and benefits of achieving Modern Identity …Download WhitepaperSecure the Application Journey Towards Digital Acceleration
Learn how to apply consistent security policies and controls to secure digital transformation across clouds …Download Whitepaper
More News
Case Studies
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & Access Management
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & …Read moreGrace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead more