Experts respond to Spring4Shell vulnerability
By CybersecAsia editors | Apr 1, 2022 | News, Newsletter, Opinions | 0
What you need to know about the Okta breach by Lap...
By Victor Ng | Mar 24, 2022 | Malware & Ransomware, News, Newsletter | 0
Weed out hard-coded secrets before hackers violate your data!
By Ksenia Peguero, Senior Research Manager, Synopsys Software Integrity Group | Feb 6, 2023 | Newsletter, Tips
Inadvertently or otherwise, developers using hardcoded passwords or SSH keys for testing purposes could forget to remove them: invitation for trouble…
Read More6 questions businesses need to ask when tackling supply chain security
By CybersecAsia editors | Apr 7, 2022 | Newsletter, Software Development Lifecycle Security, Tips
Chances are your organization is using open source somewhere in your software development lifecycle, but is it secured?
Read MoreExperts respond to Spring4Shell vulnerability
By CybersecAsia editors | Apr 1, 2022 | News, Newsletter, Opinions
Will it be as severe as Log4Shell? Opinions differ, but here are some things we need to know about Spring4Shell.
Read MoreWhat you need to know about the Okta breach by Lapsus$
By Victor Ng | Mar 24, 2022 | Malware & Ransomware, News, Newsletter
While it’s a relief to know the impact is limited, organizations need to be aware of the potential threat of the Lapsus$ cyber gang.
Read More2022: Tackling new ‘normals’ with collaboration and supply chain recovery
By Carlo Cordova | Nov 5, 2021 | Features, Newsletter
The Asia Pacific region can weather new realities and norms well if some key drivers of change can be reined in.
Read MoreEmbedding security into every phase of the software development lifecycle
By Jonathan Knudsen, Senior Security Strategist, Synopsys Software Integrity Group | Jul 8, 2021 | Newsletter, Opinions, Software Development Lifecycle Security
Creating a secure software development lifecycle can lower risk, but security must be embedded into every step to ensure more secure applications.
Read MoreMobile Application Security report: Peril in a pandemic
By Synopsys | Apr 29, 2021 | Infographic, Newsletter
Are today’s mobile apps secure or do they offer opportunities for attackers?
Read MoreAttention Apple product users: your personal data is being airdropped to hackers!
By CybersecAsia editors | Apr 28, 2021 | News, Newsletter
Two years ago, a security flaw in the AirDrop feature was disclosed, but nothing has been done to address it.
Read MoreThe security dilemma of IoT devices and potential consequences
By Tim Mackey, Principal Security Strategist, Synopsys Cybersecurity Research Centre | Dec 23, 2020 | News, Newsletter
Manufacturers spend billions churning smart gadgets out, but will they invest as much in securing their in-built software? Not really…
Read More2020: a year of cyber-infamy
2021: a year to anticipate
By L L Seow | Dec 1, 2020 | Features, Newsletter
Here is a recap from seven experts, of the current year’s cybersecurity challenges and what we can look forward to next
Read MoreThe world’s most valuable company could have made customers the most vulnerable
By CybersecAsia editors | Oct 13, 2020 | Cyber Intelligence, Cyberthreat Landscape, Newsletter
Fortunately, the company responded quickly and positively to the vulnerability disclosures.
Read MoreTime pressure leading to vulnerable apps
By Victor Ng | Sep 30, 2020 | Features, Newsletter, Software Development Lifecycle Security
Time pressure opens several areas of vulnerabilities in organizations’ software development lifecycle security.
Read MoreMore than 50,000 driving license details leaked in Australia
By CybersecAsia editors | Sep 3, 2020 | News, Newsletter
Cheap-and-cheerful cloud storage solutions are abundant, but so are the cases of misconfigurations that can lead to hackings or data leaks. On 1 Sep 2020, more than 108,000 scanned images...
Read MoreThailand’s largest mobile network exposed 8 billion Internet records
By CybersecAsia editors | May 29, 2020 | Features, Newsletter
Why AIS’s cybersecurity measures need to be stepped up, and how. It was recently reported that Thailand’s largest cell network by subscriber...
Read More2020 open source security and risk analysis
By Synopsys | May 26, 2020 | Infographic, Synopsys
Key findings and open source trends from the Synopsys Open Source Security and Risk Analysis (OSSRA) 2020 report. Do you know what’s in your code?...
Read MoreIt’s past time to put passwords out of our misery
By Taylor Armerding, Software Security Expert, Synopsys Integrity Group | May 20, 2020 | Newsletter, Opinions
If anything has come out of the many debates around World Password Day, it’s that no password is secure. By now, the litany of exhortations...
Read MoreData breach in Marriott International hotel chain: Preventable!
By CybersecAsia editors | Apr 2, 2020 | Features, News, Newsletter
By all accounts, the breach was preventable using available best practices, as was an earlier spectacular hack in 2018. The personal data of up to...
Read MoreRepaving the rocky road to better IoT security starts here
By Taylor Armerding, Software Security Expert, Synopsys Integrity Group | Mar 6, 2020 | Features, IoT Security, Newsletter, Opinions
Before a global IoT disaster strikes, we need to review consumer culture, government regulation, habits and manufacturer mindsets urgently....
Read MoreMGM hotel guest data leaked on a hacking forum
By CybersecAsia editors | Feb 24, 2020 | News, Newsletter
Could this latest debacle of 10.6m lost personal records have been proactively avoided and better mitigated? Yes, say three experts. It was recently...
Read MoreBeware of the dark side of smart lighting
By CybersecAsia editors | Feb 11, 2020 | News
Business and home networks can be hacked via smart lightbulbs. Imagine how the use of smart lighting hubs such as Philips Hue or ZigBee could lead...
Read More
Voters-draw
Gamification listing
PARTICIPATE NOW |
|
Vote Now -Placment
BB HTC
Top-Sidebar-banner
Whitepapers
eBook: Ransomware Deception Use Cases
Learn how Metallic ® ThreatWiseTM , from Commvault, can provide proactive and advanced data protectionDownload WhitepaperPost-Pandemic APAC Digital Transformation and OT Cyber Security
All you need to know about digital transformation and OT cybersecurity in Asia in the …Download WhitepaperFour Things to Consider to Successfully and Securely Run Critical Applications in the Cloud
Use this checklist to securely and successfully run critical applications in the cloud and maximize …Download WhitepaperCriteria Guide When Choosing An Endpoint Detection and Response (EDR) Solution
Use this checklist to make a more informed decision when choosing an endpoint detection and …Download Whitepaper
Middle-sidebar-banner
Case Studies
Grace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead moreCase Study: Metallic ® ThreatWiseTM Data Protection Use Cases
How Metallic ThreatWise helped customers across industriesRead more