Cybersecurity News in Asia
The tough conversations about cybersecurity
By Victor Ng | Oct 2, 2024
Know the two buzzwords making waves in next-generation cyber...
By L L Seow | Sep 30, 2024
Creating phishing-resistant users to eliminate cyber risks
By Victor Ng | Sep 24, 2024
Security in AI, AI in security
By Victor Ng | Sep 24, 2024
SECURITY NEWS
Crypto drainer malware lurked on official Android software marketplace for five months
Oct 1, 2024
Being the first malware targeting crypto users on the Android platform, the malicious app also evaded security checks for months
EXPERT OPINIONS
Protecting enterprise data is no longer a business option
Oct 3, 2024
COVID-19 forever changed the digital landscape and its cybersecurity perimeters. However, some governments and businesses are lagging behind in data protection
-
“Bump in the night”: What’s next?
Sep 26, 2024
-
-
TIPS
Understanding perennial social media risks and remaining vigilant
Sep 26, 2024
Here are some updates on social media risks and trends, and how we can reduce exposure to social engineering campaigns
CLOUD SECURITY
MAX Solutions safeguards data for digital transformation with Veeam
Sep 11, 2024
One of the largest employment providers in Australia needed to protect data while reducing complexity when it decided to migrate from on-prem to multi-cloud.
“Bump in the night”: What’s next?
Sep 26, 2024
Cybersecurity: looking back 2021, looking ahead 2022
Jan 20, 2022
INFOGRAPHICS
Verizon 2024 Mobile Security Index Infographic
Acronis Cyberthreats Report H1 2024 Infographic
2024 Global Threat Report Infographic
Cyber Intelligence
LatestW3LL-oiled machine: report uncovers covert BEC phishing empire targeting Microsoft 365
By CybersecAsia editors and webmaster webmaster | Sep 7, 2023
A new threat report “W3LL DONE: HIDDEN PHISHING ECOSYSTEM DRIVING BEC ATTACKS” has detailed the operations of W3LL, a threat actor behind a phishing empire that has remained largely unknown until now.
-
-
-
Making cyber-resilience part of your organization’s balance sheet
By Victor Ng | Apr 26, 2022
Cyber Warfare
LatestRansomware still the #1 cyber threat: report
By CybersecAsia editors | Jan 30, 2023
With stolen credentials and Ransomware-as-a-Service kits being sold cheaper than ever on the Dark Web, expect more cybercrime this year!
-
-
Ukraine-Russia conflict: war also occurs in cyberspace
By CybersecAsia editors and webmaster webmaster | Feb 28, 2022
-
MOST READ
WhatsApp group chat vulnerability hack thwarted
Researchers had discovered in August a group-chat flaw where a malicious message could crash WhatsApp group users’ devices. A...
Nine DevSecOps secret scanning tools to keep the bad guys at bay
With the secrets of over 2m corporations already leaked, it is time to mandate action to plug the preventable gaps
Voters-draw/RCA-Sponsors
CybersecAsia Voting Placement
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
Whitepapers
Secure Your Cloud Apps & APIs: Access Industry’s Market Guide Now
This Gartner® Market Guide aids security and risk management leaders in analyzing the cloud WAAP …Download WhitepaperDiscover the Top Vendor in the SecureIQ CyberRisk Validation Report
F5 Distributed Cloud Web App and API Protection (WAAP) outperforms the competition in SecureIQ Lab's …Download Whitepaper2024 Voice of the CISO
The "2024 Voice of the CISO" report by Proofpoint offers insights from a survey of …Download WhitepaperSecuring Industry 4.0
The world is advancing to Industry 4.0 in full swing, and this is a key …Download Whitepaper
Middle-sidebar-banner
Case Studies
Unlock Your Guide to Securing Business Critical Secrets
Is your organization effectively managing access to sensitive secrets like credentials, API keys, and certificates …Read moreRBL Finserve boosts control of growing number of identities in its multi-cloud environment
By adopting a third-party identity security platform, the Indian financial institution expects to leverage zero …Read moreMAX Solutions safeguards data for digital transformation with Veeam
One of the largest employment providers in Australia needed to protect data while reducing complexity …Read moreAdding secure automatic multi-factor authentication boosts customer experience: Tiger Brokers
Can tightening identity security degrade customer experience? In this case study, an online trading platform …Read more