October 2021’s Most Wanted Malware: Trickbot again...
By CybersecAsia editors | Nov 16, 2021 | News, Newsletter | 0
Goodbye Emotet? International agencies have shut t...
By CybersecAsia editors | Feb 2, 2021 | News, Newsletter | 0
Ryuk ransomware attacks in US hospitals
By CybersecAsia editors | Nov 3, 2020 | News, Newsletter | 0
January 2022’s most wanted malware
By CybersecAsia editors | Feb 18, 2022 | News, Newsletter
The Apache Log4j was the number-one most-exploited vulnerability in this cybersecurity ecosystem’s global rankings.
Read MoreOctober 2021’s Most Wanted Malware: Trickbot again
By CybersecAsia editors | Nov 16, 2021 | News, Newsletter
Even vulnerability fixes can be vulnerable, as CVE-2021-41773 has shown!
Read MoreGoodbye Emotet? International agencies have shut them down
By CybersecAsia editors | Feb 2, 2021 | News, Newsletter
The joint effort is an encouraging step in the right direction, but new malware families are likely to take its place.
Read MoreRyuk ransomware attacks in US hospitals
By CybersecAsia editors | Nov 3, 2020 | News, Newsletter
The Asia Pacific and EMEA regions are no less vulnerable, and are a reflection of current medical, socio-political and financial trends.
Read MoreQbot trojan as August 2020’s most popular malware
By CybersecAsia editors | Sep 17, 2020 | News, Newsletter
Another exciting month of malware and vulnerability limelight shifts for your undivided reference…
Read MorePandemic-related cybercrime up 667%: study
By CybersecAsia editors | Apr 1, 2020 | News, Newsletter
From petty product scams to phishing emails and malware to credential theft, cybercrooks are leaving no opportunity unturned. Attackers are taking...
Read MoreAs retailers shut their doors, hackers ply their dark trade
By CybersecAsia editors | Mar 31, 2020 | News, Newsletter
Coronavirus-related domains are 50% more likely to be malicious than other domains registered in the same time period. Since the beginning of...
Read More‘Lure and decoy’ cyber-threats exploit COVID-19
By CybersecAsia editors | Mar 9, 2020 | Cyber Intelligence, News, Newsletter, Tips
Cyber lure is a key social engineering tactic employed by state-sponsored and financially motivated cybercriminals. CrowdStrike Intelligence has...
Read MoreThis year’s global attack surface is huge, say researchers
By CybersecAsia editors | Feb 21, 2020 | Cyberthreat Landscape, Newsletter
Threat actors are weaponizing hyper-connectivity with new adversarial strategies and tactics, and their digital transformation is as awesome as...
Read MoreCheck out December 2019’s malware chart toppers
By CybersecAsia editors | Jan 17, 2020 | News
Christmas-themed and Greta Thunberg-linked spam were used to spread Emotet. The latest Global Threat Index for December 2019 by Check Point Research...
Read MoreAndroid users: Watch out for the xHelper mobile trojan
By CybersecAsia editors | Dec 18, 2019 | Cyberthreat Landscape, News
Researchers report that the trojan is spreading so fast, it has become #8 of the biggest threats impacting mobiles. The latest Global Threat Index for November 2019 from Check Point Research has reported that, for the first time...
Read MoreCompromised APAC WordPress domains are fueling Emotet malware: Report
By CybersecAsia editors | Dec 6, 2019 | News
Poor cyber-hygiene among SMEs are the predominant cause of the malspam onslaught. This week, Unit 42, the threat intelligence...
Read MoreHealthcare endpoint threat detections jump 60%: Report
By CybersecAsia editors | Nov 15, 2019 | News
Emotet and TrickBot dominate healthcare attacks, according to the latest Cybercrime Tactics and Techniques Report. A 60% increase in threat...
Read MoreSeptember 2019’s most wanted malware
By CybersecAsia editors | Oct 11, 2019 | Cyber Intelligence, Features, News
Check Point’s researchers reported that the notorious Emotet botnet has been reactivated and is spreading active campaigns again after a...
Read More
Voters-draw
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
BB HTC
News
Middle-sidebar-banner
Whitepapers
Conversational Microsoft 365 Data Backup
All you need to know about conversation Microsoft 365 data backup and recoveryDownload WhitepaperThe Global Enterprise Authentication Practices
Learn the global enterprise authentication practices in this Yubico survey research in partnership with Censuswide.Download WhitepaperModern Identity Security For Stronger Defense
All you need to know about the requirements, features, and benefits of achieving Modern Identity …Download WhitepaperSecure the Application Journey Towards Digital Acceleration
Learn how to apply consistent security policies and controls to secure digital transformation across clouds …Download Whitepaper
More News
Case Studies
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & Access Management
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & …Read moreGrace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead more