Tackling digital fraud, dampened customer trust: a...
By CybersecAsia editors | Nov 25, 2024
Skyrocketing identity theft and deepfake abuse: a ...
By CybersecAsia editors | Nov 22, 2024
Banking professionals least likely to use generati...
By CybersecAsia editors | Nov 18, 2024
Enduring APT group in the Middle East deemed linke...
By CybersecAsia editors | Nov 18, 2024
Sextortion phishing may have been getting more personal lately
By CybersecAsia editors | Nov 26, 2024
According to one cybersecurity firm’s protection ecosystem data, attackers have been adding personally identifiable information to their approach emails
Read MoreTackling digital fraud, dampened customer trust: are humans the weakest link?
By CybersecAsia editors | Nov 25, 2024
According to one global risk consultancy, an analysis of proprietary and other transactional data has led to several findings for 2023/2024
Read MoreSkyrocketing identity theft and deepfake abuse: a sign of more to come?
By CybersecAsia editors | Nov 22, 2024
As AI, cloud technology and geopolitical disharmony compel more organized cybercriminal activities, one data analysis shows where some 2023/2024 hotspots were
Read MoreNo limit for number of blocked sites in Singapore
By Abhishek Kumar Singh, Head of Security Engineering, Singapore, Check Point Software Technologies | Nov 19, 2024
In a recent parliamentary session, Singapore's Ministry of Home Affairs (MHA) shared that it will not set a threshold for the number of websites blocked. This is after the country...
Read MoreBanking professionals least likely to use generative AI at work: analysis
By CybersecAsia editors | Nov 18, 2024
*with prior authorization, the period starting 1 May, 2023 through 30 April, 2024. The statistics are declared to be a reflection of attacker tactics, user behavior, and organizational policy
Read MoreEnduring APT group in the Middle East deemed linked to Hamas
By CybersecAsia editors | Nov 18, 2024
While many Hamas-associated cyber activities have been halted amid the ongoing war, one advanced persistent threat group is gaining notoriety
Read MoreHow did application security levels fare across 19 industry sectors?
By CybersecAsia editors | Nov 15, 2024
According to one year-long DAST analysis, software misconfigurations and exposed unpatched vulnerabilities were rife — creating opportunities for cyber exploitation and incidents
Read MoreCybercriminals resort to nesting multiple ZIP files to evade email scanners
By CybersecAsia editors | Nov 14, 2024
Unsolicited emails containing attachments in ZIP format are already a headache to handle: now attackers are using a more advanced technique
Read MoreSumsub’s First Global Fraud Index
By CybersecAsia editors | Nov 12, 2024
To assist regulatory bodies, governments and businesses in understanding and preventing digital fraud, Sumsub recently shared an interactive world map consisting 103 countries’ susceptibility to Digital Fraud.
Read MoreFive years of research on China-linked APTs yield worthwhile results
By CybersecAsia editors | Nov 8, 2024
Focusing on end-of-life and unpatched IoT edge devices, several state-sponsored threat groups linked to China have been identified and profiled
Read More- 1
- ...
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- ...
- 129
Voters-draw/RCA-Sponsors
CybersecAsia Voting Placement
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
Whitepapers
Data Management in the Age of Cloud and AI
In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download WhitepaperMitigating Ransomware Risks with GRC Automation
In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper2024 Gartner® Magic Quadrant™ for SD-WAN
Gartner® has positioned Fortinet highest for Ability to Execute for the fourth year in a …Download Whitepaper5 Cybersecurity Dashboards for CISOs
Are you ready to transform your cybersecurity approach? With Commugen's 5 Cybersecurity Dashboards for CIOs, …Download Whitepaper
Middle-sidebar-banner
Case Studies
Data Management in the Age of Cloud and AI
In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Read moreUnlock Your Guide to Securing Business Critical Secrets
Is your organization effectively managing access to sensitive secrets like credentials, API keys, and certificates …Read moreRBL Finserve boosts control of growing number of identities in its multi-cloud environment
By adopting a third-party identity security platform, the Indian financial institution expects to leverage zero …Read moreMAX Solutions safeguards data for digital transformation with Veeam
One of the largest employment providers in Australia needed to protect data while reducing complexity …Read more