Big game hunting, ransomware dominate cybercrime e...
By CrowdStrike | Feb 25, 2021 | Infographic, Newsletter | 0
Disrupting Trickbot – tracking the takedown
By Victor Ng | Dec 10, 2020 | Features, Newsletter | 0
Cyber safety in the new normal
By Victor Ng | Nov 5, 2020 | Features, Newsletter | 0
Cyber vigilance through recognizing the domino effect
By Anamika Sahu | IMAWS | Mar 21, 2022 | Features
With more malware gaining a foothold into networks via fake certificates, early detection rests on strong IAM and IOC monitoring.
Read MoreBig game hunting, ransomware dominate cybercrime ecosystem
By CrowdStrike | Feb 25, 2021 | Infographic, Newsletter
If 2020 statistics are an indication, 2021 is set to see a proliferation of BGH, ransomware and supply chain espionage.
Read MoreDisrupting Trickbot – tracking the takedown
By Victor Ng | Dec 10, 2020 | Features, Newsletter
How Microsoft’s Digital Crime Unit and global partners tackled the botnet infamous for distributing ransomware leveraging the COVID-19 pandemic.
Read MoreCyber safety in the new normal
By Victor Ng | Nov 5, 2020 | Features, Newsletter
Why corporate data compliance can make or break an enterprise; cyber safety and hygiene must improve in the new normal.
Read MoreChoosing the right path in your data management journey
By Victor Ng | Jul 16, 2020 | Cloud Security, Data Protection, Features, Newsletter
As data proliferates in the cloud and on-premise, data breaches and regulatory compliance are proving to be burdensome – financially or otherwise....
Read MoreAre we helping cybercriminals to exploit the pandemic?
By L L Seow | Apr 16, 2020 | Features, Newsletter
Carelessly forwarding Whatsapp “pandemic information”, leaking embargoed government press releases—are well-intentioned people inadvertently helping...
Read MoreProtect yourselves from other malicious agents in your COVID-19 shopping spree
By Avesta Hojjati, R&D Head, DigiCert | Apr 7, 2020 | Newsletter, Tips
Imagine the irony of escaping from a coronavirus pandemic but getting scathed by digital viruses or other malicious e-commerce vulnerabilities … As...
Read MoreCybercrooks love AI too! Supercharged AI cyberattacks inevitable: research
By CybersecAsia editors | Apr 3, 2020 | News, Newsletter
While AI adoption chugs along in industries and government, cybercriminals have already weaponized it in preparation for massive global campaigns. A...
Read MorePandemic-related cybercrime up 667%: study
By CybersecAsia editors | Apr 1, 2020 | News, Newsletter
From petty product scams to phishing emails and malware to credential theft, cybercrooks are leaving no opportunity unturned. Attackers are taking...
Read MoreAs retailers shut their doors, hackers ply their dark trade
By CybersecAsia editors | Mar 31, 2020 | News, Newsletter
Coronavirus-related domains are 50% more likely to be malicious than other domains registered in the same time period. Since the beginning of...
Read MoreUnprecedented: Attacks on mobile apps surpassed desktop apps: study
By CybersecAsia editors | Mar 20, 2020 | News, Newsletter
Mobile browsers fraud threats did not rise much in the last half of 2019, but mobile apps attacks rose by 171%. Fraud has increasingly become...
Read MoreA life of cybercrime: an inside story
By CybersecAsia editors | Mar 19, 2020 | Features
Over the past few months, Check Point’s researchers have painstakingly uncovered the identity of a prolific cybercriminal known as ‘Dton’. Here’s...
Read MoreMalicious email spam targets Italy outbreak fears with virulent trickbot
By CybersecAsia editors | Mar 12, 2020 | Newsletter, Tips
A document supposedly containing COVID-19 tips was weaponized with macros and a JavaScript dropper to tax careless people. In the last week,...
Read MoreGlobal non-malware cyberattacks exceeded malware-based threats last year: report
By CybersecAsia editors | Mar 5, 2020 | News, Newsletter
North Korean, China-linked state actors reported to focus on espionage and cryptocurrency interests in Big Game Hunting. During 2019, financially...
Read MoreAPT cybercrooks are watching SE Asia
By CybersecAsia editors | Feb 25, 2020 | News, Newsletter
More than seven geopolitically-motivated threat groups are on the prowl, and they take no prisoners in their increasingly aggressive agendas. Hungry...
Read MoreChinese cybercriminals: a growing dark force to reckon with
By Carlo Cordova | Feb 24, 2020 | Features, Newsletter
With China, even cybercrime syndicates are larger than life due to the huge population, says a McAfee researcher. China’s cybercrime enterprise is...
Read MoreCybercrooks helping to do Covid-19 contact tracing?
By Matthew Bennett, Vice President, APJ, VMware Carbon Black | Feb 13, 2020 | Opinions
No, it is an opportunistic scam, and everyone has to present a united front to such animalistic immorality. The biggest crooks to emerge from the...
Read MoreCan ethical hacking improve your security posture?
By Myles Hosford, Head of Security Architecture, ASEAN, Amazon Web Services | Feb 5, 2020 | Opinions, White, Black & Grey Hat Hackers
Understand what makes hackers tick – then you can decide on the best approach. Cybersecurity professionals see some threat actors or...
Read MoreThe year of spectacular data leaks: 2019 in retrospect
By CybersecAsia editors | Jan 21, 2020 | News
If you need a detailed overview of the tumultuous past year of cyberincidents, check this ‘annual report’ out. During 2019, threat actors...
Read MoreInterpol reduced cryptojacking in SE Asia by 78%: Learning points?
By CybersecAsia editors | Jan 13, 2020 | News
Unpatched router vulnerabilities were ripe for cryptojacking, but quick concerted collaboration saved the year. Interpol, the international criminal...
Read More
Gamification listing
PARTICIPATE NOW |
|
sponsors-RCA

Whitepapers
Tips: Top 6 Recommendations to Improve User Productivity with More Secure Network Edges
Security experts’ top recommendations for improving user productivity and securing the edge in a WFA …Download WhitepaperAccidental Convergence: Ultimate Guide To Secured IT/OT Operations
Key things you need to know about IT/OT convergenceDownload Whitepaper2022 Top Strategic Security Trends by Gartner: CSMA
All you need to know about Cybersecurity Mesh to attain a more defensive security postureDownload Whitepaper5 Keys to a Secure Work-From-Anywhere Solution
Here are 5 essential keys to securing work-from-anywhere for APAC organizationsDownload Whitepaper
More News
Case Studies
Transport industry a major cyber target: Indonesia acts to ramp up defenses
The country’s largest taxi operator turns to AI-driven cybersecurity upgrades to protect its critical national …Read morePhilippines payment platform hardens cloud application security infrastructure
This includes rooting out vulnerabilities in container images and serverless functions, cloud misconfigurations, and hidden …Read moreIndonesian transport firm puts cybersecurity first as it pivots to digital
With multiple payment gateways, apps and APIs in use nationwide, the fast-growth business recognizes the …Read moreFortinet’s zero-trust security boosts innovation development of automotive manufacturing industry
How automotive manufacturers can leverage the zero-trust approach to secure operational technology.Read more