Big game hunting, ransomware dominate cybercrime e...
By CrowdStrike | Feb 25, 2021 | Infographic, Newsletter | 0
Disrupting Trickbot – tracking the takedown
By Victor Ng | Dec 10, 2020 | Features, Newsletter | 0
Cyber safety in the new normal
By Victor Ng | Nov 5, 2020 | Features, Newsletter | 0
Cyber vigilance through recognizing the domino effect
By Anamika Sahu | IMAWS | Mar 21, 2022 | Features
With more malware gaining a foothold into networks via fake certificates, early detection rests on strong IAM and IOC monitoring.
Read MoreBig game hunting, ransomware dominate cybercrime ecosystem
By CrowdStrike | Feb 25, 2021 | Infographic, Newsletter
If 2020 statistics are an indication, 2021 is set to see a proliferation of BGH, ransomware and supply chain espionage.
Read MoreDisrupting Trickbot – tracking the takedown
By Victor Ng | Dec 10, 2020 | Features, Newsletter
How Microsoft’s Digital Crime Unit and global partners tackled the botnet infamous for distributing ransomware leveraging the COVID-19 pandemic.
Read MoreCyber safety in the new normal
By Victor Ng | Nov 5, 2020 | Features, Newsletter
Why corporate data compliance can make or break an enterprise; cyber safety and hygiene must improve in the new normal.
Read MoreChoosing the right path in your data management journey
By Victor Ng | Jul 16, 2020 | Cloud Security, Data Protection, Features, Newsletter
As data proliferates in the cloud and on-premise, data breaches and regulatory compliance are proving to be burdensome – financially or otherwise....
Read MoreAre we helping cybercriminals to exploit the pandemic?
By L L Seow | Apr 16, 2020 | Features, Newsletter
Carelessly forwarding Whatsapp “pandemic information”, leaking embargoed government press releases—are well-intentioned people inadvertently helping...
Read MoreProtect yourselves from other malicious agents in your COVID-19 shopping spree
By Avesta Hojjati, R&D Head, DigiCert | Apr 7, 2020 | Newsletter, Tips
Imagine the irony of escaping from a coronavirus pandemic but getting scathed by digital viruses or other malicious e-commerce vulnerabilities … As...
Read MoreCybercrooks love AI too! Supercharged AI cyberattacks inevitable: research
By CybersecAsia editors | Apr 3, 2020 | News, Newsletter
While AI adoption chugs along in industries and government, cybercriminals have already weaponized it in preparation for massive global campaigns. A...
Read MorePandemic-related cybercrime up 667%: study
By CybersecAsia editors | Apr 1, 2020 | News, Newsletter
From petty product scams to phishing emails and malware to credential theft, cybercrooks are leaving no opportunity unturned. Attackers are taking...
Read MoreAs retailers shut their doors, hackers ply their dark trade
By CybersecAsia editors | Mar 31, 2020 | News, Newsletter
Coronavirus-related domains are 50% more likely to be malicious than other domains registered in the same time period. Since the beginning of...
Read MoreUnprecedented: Attacks on mobile apps surpassed desktop apps: study
By CybersecAsia editors | Mar 20, 2020 | News, Newsletter
Mobile browsers fraud threats did not rise much in the last half of 2019, but mobile apps attacks rose by 171%. Fraud has increasingly become...
Read MoreA life of cybercrime: an inside story
By CybersecAsia editors | Mar 19, 2020 | Features
Over the past few months, Check Point’s researchers have painstakingly uncovered the identity of a prolific cybercriminal known as ‘Dton’. Here’s...
Read MoreMalicious email spam targets Italy outbreak fears with virulent trickbot
By CybersecAsia editors | Mar 12, 2020 | Newsletter, Tips
A document supposedly containing COVID-19 tips was weaponized with macros and a JavaScript dropper to tax careless people. In the last week,...
Read MoreGlobal non-malware cyberattacks exceeded malware-based threats last year: report
By CybersecAsia editors | Mar 5, 2020 | News, Newsletter
North Korean, China-linked state actors reported to focus on espionage and cryptocurrency interests in Big Game Hunting. During 2019, financially...
Read MoreAPT cybercrooks are watching SE Asia
By CybersecAsia editors | Feb 25, 2020 | News, Newsletter
More than seven geopolitically-motivated threat groups are on the prowl, and they take no prisoners in their increasingly aggressive agendas. Hungry...
Read MoreChinese cybercriminals: a growing dark force to reckon with
By Carlo Cordova | Feb 24, 2020 | Features, Newsletter
With China, even cybercrime syndicates are larger than life due to the huge population, says a McAfee researcher. China’s cybercrime enterprise is...
Read MoreCybercrooks helping to do Covid-19 contact tracing?
By Matthew Bennett, Vice President, APJ, VMware Carbon Black | Feb 13, 2020 | Opinions
No, it is an opportunistic scam, and everyone has to present a united front to such animalistic immorality. The biggest crooks to emerge from the...
Read MoreCan ethical hacking improve your security posture?
By Myles Hosford, Head of Security Architecture, ASEAN, Amazon Web Services | Feb 5, 2020 | Opinions, White, Black & Grey Hat Hackers
Understand what makes hackers tick – then you can decide on the best approach. Cybersecurity professionals see some threat actors or...
Read MoreThe year of spectacular data leaks: 2019 in retrospect
By CybersecAsia editors | Jan 21, 2020 | News
If you need a detailed overview of the tumultuous past year of cyberincidents, check this ‘annual report’ out. During 2019, threat actors...
Read MoreInterpol reduced cryptojacking in SE Asia by 78%: Learning points?
By CybersecAsia editors | Jan 13, 2020 | News
Unpatched router vulnerabilities were ripe for cryptojacking, but quick concerted collaboration saved the year. Interpol, the international criminal...
Read More
Voters-draw
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
BB HTC
News
Middle-sidebar-banner
Whitepapers
Conversational Microsoft 365 Data Backup
All you need to know about conversation Microsoft 365 data backup and recoveryDownload WhitepaperThe Global Enterprise Authentication Practices
Learn the global enterprise authentication practices in this Yubico survey research in partnership with Censuswide.Download WhitepaperModern Identity Security For Stronger Defense
All you need to know about the requirements, features, and benefits of achieving Modern Identity …Download WhitepaperSecure the Application Journey Towards Digital Acceleration
Learn how to apply consistent security policies and controls to secure digital transformation across clouds …Download Whitepaper
More News
Case Studies
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & Access Management
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & …Read moreGrace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead more