October 2021’s Most Wanted Malware: Trickbot again...
By CybersecAsia editors | Nov 16, 2021 | News, Newsletter | 0
Goodbye Emotet? International agencies have shut t...
By CybersecAsia editors | Feb 2, 2021 | News, Newsletter | 0
Ryuk ransomware attacks in US hospitals
By CybersecAsia editors | Nov 3, 2020 | News, Newsletter | 0
January 2022’s most wanted malware
By CybersecAsia editors | Feb 18, 2022 | News, Newsletter
The Apache Log4j was the number-one most-exploited vulnerability in this cybersecurity ecosystem’s global rankings.
Read MoreOctober 2021’s Most Wanted Malware: Trickbot again
By CybersecAsia editors | Nov 16, 2021 | News, Newsletter
Even vulnerability fixes can be vulnerable, as CVE-2021-41773 has shown!
Read MoreGoodbye Emotet? International agencies have shut them down
By CybersecAsia editors | Feb 2, 2021 | News, Newsletter
The joint effort is an encouraging step in the right direction, but new malware families are likely to take its place.
Read MoreRyuk ransomware attacks in US hospitals
By CybersecAsia editors | Nov 3, 2020 | News, Newsletter
The Asia Pacific and EMEA regions are no less vulnerable, and are a reflection of current medical, socio-political and financial trends.
Read MoreQbot trojan as August 2020’s most popular malware
By CybersecAsia editors | Sep 17, 2020 | News, Newsletter
Another exciting month of malware and vulnerability limelight shifts for your undivided reference…
Read MorePandemic-related cybercrime up 667%: study
By CybersecAsia editors | Apr 1, 2020 | News, Newsletter
From petty product scams to phishing emails and malware to credential theft, cybercrooks are leaving no opportunity unturned. Attackers are taking...
Read MoreAs retailers shut their doors, hackers ply their dark trade
By CybersecAsia editors | Mar 31, 2020 | News, Newsletter
Coronavirus-related domains are 50% more likely to be malicious than other domains registered in the same time period. Since the beginning of...
Read More‘Lure and decoy’ cyber-threats exploit COVID-19
By CybersecAsia editors | Mar 9, 2020 | Cyber Intelligence, News, Newsletter, Tips
Cyber lure is a key social engineering tactic employed by state-sponsored and financially motivated cybercriminals. CrowdStrike Intelligence has...
Read MoreThis year’s global attack surface is huge, say researchers
By CybersecAsia editors | Feb 21, 2020 | Cyberthreat Landscape, Newsletter
Threat actors are weaponizing hyper-connectivity with new adversarial strategies and tactics, and their digital transformation is as awesome as...
Read MoreCheck out December 2019’s malware chart toppers
By CybersecAsia editors | Jan 17, 2020 | News
Christmas-themed and Greta Thunberg-linked spam were used to spread Emotet. The latest Global Threat Index for December 2019 by Check Point Research...
Read MoreAndroid users: Watch out for the xHelper mobile trojan
By CybersecAsia editors | Dec 18, 2019 | Cyberthreat Landscape, News
Researchers report that the trojan is spreading so fast, it has become #8 of the biggest threats impacting mobiles. The latest Global Threat Index...
Read MoreCompromised APAC WordPress domains are fueling Emotet malware: Report
By CybersecAsia editors | Dec 6, 2019 | News
Poor cyber-hygiene among SMEs are the predominant cause of the malspam onslaught. This week, Unit 42, the threat intelligence...
Read MoreHealthcare endpoint threat detections jump 60%: Report
By CybersecAsia editors | Nov 15, 2019 | News
Emotet and TrickBot dominate healthcare attacks, according to the latest Cybercrime Tactics and Techniques Report. A 60% increase in threat...
Read MoreSeptember 2019’s most wanted malware
By CybersecAsia editors | Oct 11, 2019 | Cyber Intelligence, Features, News
Check Point’s researchers reported that the notorious Emotet botnet has been reactivated and is spreading active campaigns again after a...
Read More
Gamification listing
PARTICIPATE NOW |
|
sponsors-RCA

Whitepapers
Tips: Top 6 Recommendations to Improve User Productivity with More Secure Network Edges
Security experts’ top recommendations for improving user productivity and securing the edge in a WFA …Download WhitepaperAccidental Convergence: Ultimate Guide To Secured IT/OT Operations
Key things you need to know about IT/OT convergenceDownload Whitepaper2022 Top Strategic Security Trends by Gartner: CSMA
All you need to know about Cybersecurity Mesh to attain a more defensive security postureDownload Whitepaper5 Keys to a Secure Work-From-Anywhere Solution
Here are 5 essential keys to securing work-from-anywhere for APAC organizationsDownload Whitepaper
More News
Case Studies
Transport industry a major cyber target: Indonesia acts to ramp up defenses
The country’s largest taxi operator turns to AI-driven cybersecurity upgrades to protect its critical national …Read morePhilippines payment platform hardens cloud application security infrastructure
This includes rooting out vulnerabilities in container images and serverless functions, cloud misconfigurations, and hidden …Read moreIndonesian transport firm puts cybersecurity first as it pivots to digital
With multiple payment gateways, apps and APIs in use nationwide, the fast-growth business recognizes the …Read moreFortinet’s zero-trust security boosts innovation development of automotive manufacturing industry
How automotive manufacturers can leverage the zero-trust approach to secure operational technology.Read more