Cyber vigilance through recognizing the domino effect
By Anamika Sahu | IMAWS | Mar 21, 2022 | Features
With more malware gaining a foothold into networks via fake certificates, early detection rests on strong IAM and IOC monitoring.
Read MoreWhat your industry doesn’t know can hurt you most
If you think cybercriminals are going after Asia Pacific’s financial services and government sectors rather than your industry, think again!
Read MoreTHE “Silent Night” malware Zloader/Zbot
By Malwarebytes & HYAS | May 22, 2020 | Malware & Ransomware, Whitepapers
Malwarebytes and HYAS have teamed up to jointly produce a paper which features the discovery of a new but elusive malware. Coined “Silent Night”, the malware has been discovered to...
Read MoreHow businesses can protect against COVID-19 cyberthreats
By Victor Ng | May 8, 2020 | Features, Newsletter, Tips
The rapid shift to remote working, leading to security measures and education having to play catch-up, has opened a broad attack surface for...
Read MoreRise in ransomware featuring ‘double extortion’ tactic
By CybersecAsia editors | Apr 23, 2020 | News, Newsletter
No one saw it coming, but cybercrooks are starting to publish sensitive data to taunt victim organizations to pay up. Cybersecurity researchers have...
Read More2020 Vulnerability & Threat Trends Report
By Skybox Security | Apr 21, 2020 | Sponsored, Whitepapers
The number of new vulnerabilities reported every year can be overwhelming, and your defense strategy can benefit from the perspective of trends shaping the vulnerability and threat landscape.
Read MoreBuy a COVID-19 vaccine now! Or do you smell a rat?
By L L Seow | Apr 15, 2020 | News, Newsletter
A comprehensive report on COVID-19’s threat impact shows the extent of cybercriminal attempts to hookwink vulnerable users. Between January and...
Read MoreIphone users must be wary of fleeceware on App Store
By CybersecAsia editors | Apr 13, 2020 | News, Newsletter
Though technically not malware, they scam unsuspecting users through hidden costs and exorbitant recurring subscription rates. Apple device users...
Read MorePandemic-related cybercrime up 667%: study
By CybersecAsia editors | Apr 1, 2020 | News, Newsletter
From petty product scams to phishing emails and malware to credential theft, cybercrooks are leaving no opportunity unturned. Attackers are taking...
Read MoreCan we ever trust Google Play Store anymore?
By CybersecAsia editors | Mar 31, 2020 | News, Newsletter
A total of 56 Tekya-infected apps were downloaded a million times by users who trust in the software innovation giant. New auto-clicker malware...
Read MoreCriminals hack Tupperware website with credit card skimmer
By CybersecAsia editors | Mar 27, 2020 | News, Newsletter
Steganographic techniques were used to create a fake payment form to steal data before handing control back to the real payment form! On March 20, a...
Read MoreA life of cybercrime: an inside story
By CybersecAsia editors | Mar 19, 2020 | Features
Over the past few months, Check Point’s researchers have painstakingly uncovered the identity of a prolific cybercriminal known as ‘Dton’. Here’s...
Read MoreHow SMEs can quickly and cost-effectively deploy defenses against cyberthreats
To survive and thrive in the digital economy, SMEs need comprehensive cybersecurity that is fast to deploy and easy to manage. More businesses in...
Read MoreMalicious email spam targets Italy outbreak fears with virulent trickbot
By CybersecAsia editors | Mar 12, 2020 | Newsletter, Tips
A document supposedly containing COVID-19 tips was weaponized with macros and a JavaScript dropper to tax careless people. In the last week,...
Read MoreKnow your cryptocurrency hacks before it’s too late
By CybersecAsia editors | Mar 12, 2020 | Features, Newsletter
Cryptocurrencies can be stolen without any hope of tracing or recovering the funds. Here is a rundown of how cybercriminals operate. In recent...
Read MoreGlobal non-malware cyberattacks exceeded malware-based threats last year: report
By CybersecAsia editors | Mar 5, 2020 | News, Newsletter
North Korean, China-linked state actors reported to focus on espionage and cryptocurrency interests in Big Game Hunting. During 2019, financially...
Read MoreDevSecOps: What enterprises may be missing out
By Victor Ng | Mar 2, 2020 | Features, Newsletter, Opinions
Do you know what you’re missing out on without DevSecOps? And if you’ve already embarked on it, you need to know what you may have overlooked… What...
Read MoreAPT cybercrooks are watching SE Asia
By CybersecAsia editors | Feb 25, 2020 | News, Newsletter
More than seven geopolitically-motivated threat groups are on the prowl, and they take no prisoners in their increasingly aggressive agendas. Hungry...
Read MoreAnother retrospective of 2019’s threat landscape
By CybersecAsia editors | Feb 25, 2020 | News, Newsletter
If looking at the past helps prepare you for the present, here is another cybersecurity retrospective to boost your cyberpreparedness…...
Read More2019 threat landscape: We have good news and bad news
By CybersecAsia editors | Feb 18, 2020 | News, Newsletter
Global media dwell time was down, but number of active hacker groups was up. The tug of war rages on… As retrospective reports on 2019...
Read More
Gamification listing
PARTICIPATE NOW |
|
sponsors-RCA

Whitepapers
Whitepaper: IT and OT Infrastructure Cybersecurity Threats
Industrial cybersecurity threats that can bring down critical infrastructuresDownload WhitepaperSecurity Challenges of Work-From-Anywhere
Work-from-anywhere enterprise security challenges and solutionsDownload WhitepaperStruggling to Securely Keep Up with Digital Acceleration
Digital acceleration is posing security challenges and solutions for enterprisesDownload Whitepaper2021 Human Factor Report
How ransomware, email threats, and other threat actors evolved and the latest techniques used in …Download Whitepaper
Case Studies
Retail wealth management firm taps API technology for secure personalized outreach
A wealthtech firm managed to handle the deluge of panic enquiries at the beginning of …Read moreStock exchange reaches for the Cloud to meet compliance, agility targets
Improving data management automation, data-driven services and regulatory compliance levels sets the pace for India’s …Read moreTransport industry a major cyber target: Indonesia acts to ramp up defenses
The country’s largest taxi operator turns to AI-driven cybersecurity upgrades to protect its critical national …Read morePhilippines payment platform hardens cloud application security infrastructure
This includes rooting out vulnerabilities in container images and serverless functions, cloud misconfigurations, and hidden …Read more