Cyber vigilance through recognizing the domino effect
By Anamika Sahu | IMAWS | Mar 21, 2022 | Features
With more malware gaining a foothold into networks via fake certificates, early detection rests on strong IAM and IOC monitoring.
Read MoreWhat your industry doesn’t know can hurt you most
If you think cybercriminals are going after Asia Pacific’s financial services and government sectors rather than your industry, think again!
Read MoreTHE “Silent Night” malware Zloader/Zbot
By Malwarebytes & HYAS | May 22, 2020 | Malware & Ransomware, Whitepapers
Malwarebytes and HYAS have teamed up to jointly produce a paper which features the discovery of a new but elusive malware. Coined “Silent Night”, the malware has been discovered to...
Read MoreHow businesses can protect against COVID-19 cyberthreats
By Victor Ng | May 8, 2020 | Features, Newsletter, Tips
The rapid shift to remote working, leading to security measures and education having to play catch-up, has opened a broad attack surface for...
Read MoreRise in ransomware featuring ‘double extortion’ tactic
By CybersecAsia editors | Apr 23, 2020 | News, Newsletter
No one saw it coming, but cybercrooks are starting to publish sensitive data to taunt victim organizations to pay up. Cybersecurity researchers have...
Read More2020 Vulnerability & Threat Trends Report
By Skybox Security | Apr 21, 2020 | Sponsored, Whitepapers
The number of new vulnerabilities reported every year can be overwhelming, and your defense strategy can benefit from the perspective of trends shaping the vulnerability and threat landscape.
Read MoreBuy a COVID-19 vaccine now! Or do you smell a rat?
By L L Seow | Apr 15, 2020 | News, Newsletter
A comprehensive report on COVID-19’s threat impact shows the extent of cybercriminal attempts to hookwink vulnerable users. Between January and...
Read MoreIphone users must be wary of fleeceware on App Store
By CybersecAsia editors | Apr 13, 2020 | News, Newsletter
Though technically not malware, they scam unsuspecting users through hidden costs and exorbitant recurring subscription rates. Apple device users...
Read MorePandemic-related cybercrime up 667%: study
By CybersecAsia editors | Apr 1, 2020 | News, Newsletter
From petty product scams to phishing emails and malware to credential theft, cybercrooks are leaving no opportunity unturned. Attackers are taking...
Read MoreCan we ever trust Google Play Store anymore?
By CybersecAsia editors | Mar 31, 2020 | News, Newsletter
A total of 56 Tekya-infected apps were downloaded a million times by users who trust in the software innovation giant. New auto-clicker malware...
Read MoreCriminals hack Tupperware website with credit card skimmer
By CybersecAsia editors | Mar 27, 2020 | News, Newsletter
Steganographic techniques were used to create a fake payment form to steal data before handing control back to the real payment form! On March 20, a...
Read MoreA life of cybercrime: an inside story
By CybersecAsia editors | Mar 19, 2020 | Features
Over the past few months, Check Point’s researchers have painstakingly uncovered the identity of a prolific cybercriminal known as ‘Dton’. Here’s...
Read MoreHow SMEs can quickly and cost-effectively deploy defenses against cyberthreats
To survive and thrive in the digital economy, SMEs need comprehensive cybersecurity that is fast to deploy and easy to manage. More businesses in...
Read MoreMalicious email spam targets Italy outbreak fears with virulent trickbot
By CybersecAsia editors | Mar 12, 2020 | Newsletter, Tips
A document supposedly containing COVID-19 tips was weaponized with macros and a JavaScript dropper to tax careless people. In the last week,...
Read MoreKnow your cryptocurrency hacks before it’s too late
By CybersecAsia editors | Mar 12, 2020 | Features, Newsletter
Cryptocurrencies can be stolen without any hope of tracing or recovering the funds. Here is a rundown of how cybercriminals operate. In recent...
Read MoreGlobal non-malware cyberattacks exceeded malware-based threats last year: report
By CybersecAsia editors | Mar 5, 2020 | News, Newsletter
North Korean, China-linked state actors reported to focus on espionage and cryptocurrency interests in Big Game Hunting. During 2019, financially...
Read MoreDevSecOps: What enterprises may be missing out
By Victor Ng | Mar 2, 2020 | Features, Newsletter, Opinions
Do you know what you’re missing out on without DevSecOps? And if you’ve already embarked on it, you need to know what you may have overlooked… What...
Read MoreAPT cybercrooks are watching SE Asia
By CybersecAsia editors | Feb 25, 2020 | News, Newsletter
More than seven geopolitically-motivated threat groups are on the prowl, and they take no prisoners in their increasingly aggressive agendas. Hungry...
Read MoreAnother retrospective of 2019’s threat landscape
By CybersecAsia editors | Feb 25, 2020 | News, Newsletter
If looking at the past helps prepare you for the present, here is another cybersecurity retrospective to boost your cyberpreparedness…...
Read More2019 threat landscape: We have good news and bad news
By CybersecAsia editors | Feb 18, 2020 | News, Newsletter
Global media dwell time was down, but number of active hacker groups was up. The tug of war rages on… As retrospective reports on 2019...
Read More
Voters-draw
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
BB HTC
News
Middle-sidebar-banner
Whitepapers
Conversational Microsoft 365 Data Backup
All you need to know about conversation Microsoft 365 data backup and recoveryDownload WhitepaperThe Global Enterprise Authentication Practices
Learn the global enterprise authentication practices in this Yubico survey research in partnership with Censuswide.Download WhitepaperModern Identity Security For Stronger Defense
All you need to know about the requirements, features, and benefits of achieving Modern Identity …Download WhitepaperSecure the Application Journey Towards Digital Acceleration
Learn how to apply consistent security policies and controls to secure digital transformation across clouds …Download Whitepaper
More News
Case Studies
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & Access Management
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & …Read moreGrace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead more