Is the manufacturing and production industry the w...
By CybersecAsia editors | Nov 2, 2022 | News, Newsletter | 0
General increase in ransomware attacks against sta...
By CybersecAsia editors | Oct 5, 2022 | Cyberthreat Landscape, News, Newsletter | 0
Cybersecurity budgets in APJ rising since 2019, bu...
By CybersecAsia editors | Sep 22, 2022 | News, Newsletter | 0
Adversaries are getting way smarter than official app stores
By CybersecAsia editors | Feb 3, 2023 | News, Newsletter
The CryptoRom scam ring has broken through the app stores’ security review processes, and more bypasses can be expected in future
Read MoreIs the manufacturing and production industry the weakest link?
By CybersecAsia editors | Nov 2, 2022 | News, Newsletter
One survey highlights the industry’s high level of IT/OT convergence but low level of matching cyber defense urgency
Read MoreGeneral increase in ransomware attacks against state and local government sectors
By CybersecAsia editors | Oct 5, 2022 | Cyberthreat Landscape, News, Newsletter
This was one observation in a focused survey on such sectors across 31 countries.
Read MoreCybersecurity budgets in APJ rising since 2019, but look what happened
By CybersecAsia editors | Sep 22, 2022 | News, Newsletter
A small comparative survey of the region’s track record in averting (or suffering) cyberattacks despite increased spending harbors important learning points
Read MoreRansomware asking rates increased by 53% in 2021: global survey
By CybersecAsia editors | Sep 16, 2022 | Malware & Ransomware, News, Newsletter
The more visible and sophisticated attackers were demanding US$1m or more, while returning less data than in previous years
Read MoreNext deadly ransomware tactic imminent: simultaneous or multiple consecutive attacks!
By CybersecAsia editors | Sep 1, 2022 | News, Newsletter
Just one unpatched vulnerability can soon attack three or more ransomware groups to infiltrate a network in swoop in
Read MoreRaaS group adds pentesting tool to their arsenal
By CybersecAsia editors | Jul 19, 2022 | News, Newsletter
The pentesting tool has remote access features similar to that of Cobalt Strike
Read MoreAre we equipped to stay ahead of ransomware?
By Victor Ng | Jun 27, 2022 | Features, Malware & Ransomware
Success in stopping ransomware still seems out of our reach. Can AI and automation, a ‘zero trust’ approach, or a hybrid SOC help us deal more effectively with this fast-growing...
Read MoreInitial Access Brokers went for broke in 2021: report
By CybersecAsia editors | Jun 21, 2022 | Cyberthreat Landscape, News, Newsletter
Last year, a rapid cybersecurity response team noticed increased specialization, collaboration and use of ‘as-a-service’ turnkey malware solutions among cybercriminal groups.
Read MoreThe age-old Ponzi scheme finally goes digital to ensnare crypto investors
By CybersecAsia editors | Jun 7, 2022 | News, Newsletter
Crypto scammers are starting to use fake apps and malicious smart contracts to lure ‘liquidity mining’ investors to their doom.
Read MoreStudy shows healthcare sector more inclined to pay ransoms in 2021
By CybersecAsia editors | Jun 3, 2022 | News, Newsletter
The ransoms were lower than the global average, and 99% of respondents had received some of the encrypted data released
Read MoreHackers breach US government server; lurk for months before ransomware attack
By CybersecAsia editors | Apr 19, 2022 | News, Newsletter
Attackers of varying levels of skill were involved at different times, yet numerous indicators of compromise had been ignored.
Read MoreWhat 900 APJ respondents thought of their large organizations’ cybersecurity posture
By CybersecAsia editors | Apr 6, 2022 | News, Newsletter
Their sentiments pointed to complacency and lack of awareness, especially at the Board level.
Read MoreStill a lack of boardroom awareness of cybersecurity in Asia Pacific
By CybersecAsia editors | Apr 6, 2022 | Features, News, Newsletter, Tips
Board level executives assume they’ll never be attacked, despite rising ransomware incidents, according to new Sophos survey.
Read MoreHow to lose up to US$625,000 in crypto romance scams
By CybersecAsia editors | Mar 22, 2022 | News, Newsletter
Just be romantically gullible and susceptible to online dating friends.
Read MoreA tale of two simultaneous ransomware attacks
By CybersecAsia editors | Mar 2, 2022 | News, Newsletter
A healthcare vendor with unpatched Exchange servers and under-protected systems scored a first in the world of cyber incidents.
Read MoreCybercriminals collaborate to throw investigators off the scent trail
By CybersecAsia editors | Feb 25, 2022 | News, Newsletter
Investigations of two recent incidents have thrown up new clues alluding to intensified cybercriminal cooperation and obfuscation techniques.
Read MoreLog4Shell: no mass abuse yet. What happened?
By CybersecAsia editors | Feb 15, 2022 | News, Newsletter
Does this mean everyone can sit back and relax? Not a chance, according to one cybersecurity researcher citing telemetric scenarios.
Read MoreDo not lose sight of quaint malware delivery methods, warns threat researcher
By CybersecAsia editors | Feb 7, 2022 | Newsletter
Search engine poisoning and stealthy persistence mechanisms can rear their ugly heads this year if defenders get complacent.
Read MoreBreaking: major vulnerability is “setting the internet on fire”
By CybersecAsia editors | Dec 14, 2021 | News, Newsletter
IT defenders are advised to take immediate action as the next few days could see a massive upsurge of exploits.
Read More
Voters-draw
Gamification listing
PARTICIPATE NOW |
|
Vote Now -Placment
BB HTC
Top-Sidebar-banner
Whitepapers
eBook: Ransomware Deception Use Cases
Learn how Metallic ® ThreatWiseTM , from Commvault, can provide proactive and advanced data protectionDownload WhitepaperPost-Pandemic APAC Digital Transformation and OT Cyber Security
All you need to know about digital transformation and OT cybersecurity in Asia in the …Download WhitepaperFour Things to Consider to Successfully and Securely Run Critical Applications in the Cloud
Use this checklist to securely and successfully run critical applications in the cloud and maximize …Download WhitepaperCriteria Guide When Choosing An Endpoint Detection and Response (EDR) Solution
Use this checklist to make a more informed decision when choosing an endpoint detection and …Download Whitepaper
Middle-sidebar-banner
Case Studies
Grace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead moreCase Study: Metallic ® ThreatWiseTM Data Protection Use Cases
How Metallic ThreatWise helped customers across industriesRead more