GFG takes cloud attack surfaces seriously with exposure management platform
Entrusted with the personal data of 800m customers worldwide, the fashion group takes no chances when addressing resilience and cyber risks
Read MoreSelect Page
By CybersecAsia editors | Friday, August 23, 2024, 9:31 AM Asia/Singapore | Case Study, News, Newsletter
Entrusted with the personal data of 800m customers worldwide, the fashion group takes no chances when addressing resilience and cyber risks
Read MoreBy CybersecAsia editors | Thursday, August 22, 2024, 10:24 AM Asia/Singapore | News, Newsletter
The infostealer targets such a broad range of data that mac users can no longer be considered a minority target
Read MoreBy CybersecAsia editors | Wednesday, August 21, 2024, 4:19 PM Asia/Singapore | News, Newsletter
Is this the start of a new trend in cyber warfare where Zero Day hackers can cover their tracks perfectly?
Read MoreBy CybersecAsia editors | Wednesday, August 21, 2024, 4:15 PM Asia/Singapore | News, Newsletter
Although the approach remains the same, this new type of attack is more evasive, and exfiltrates more data
Read MoreBy CybersecAsia editors | Wednesday, August 21, 2024, 4:09 PM Asia/Singapore | News, Newsletter
With many organizations holding back on PQC groundwork, the release of the first PQC standards is the cue to get rolling
Read MoreBy Hitesh Sheth, CEO, Vectra AI | Monday, August 19, 2024, 5:20 PM Asia/Singapore | Newsletter, Tips
It may be the first comprehensive legislation over responsible AI development, but the unpredictability and diversity of this aspect raises questions…
Read MoreBy CybersecAsia editors | Monday, August 19, 2024, 4:53 PM Asia/Singapore | News, Newsletter
One firmware analysis of popular OT/IoT routers in parts of ASEAN suggests some trends in risk exposure levels embedded in firmware
Read MoreBy CybersecAsia editors | Monday, August 19, 2024, 4:39 PM Asia/Singapore | News, Newsletter
An alarming number of critical-severity vulnerabilities have been disclosed for August 2024, with few details of indicators of compromise
Read MoreBy CybersecAsia editors | Friday, August 16, 2024, 7:26 PM Asia/Singapore | News, Newsletter
A logical flaw in S3 bucket-naming conventions could have allowed hackers to lay booby traps for organizations creating new buckets
Read MoreBy CybersecAsia editors | Friday, August 16, 2024, 4:33 PM Asia/Singapore | Case Study, News, Newsletter
Integrating authentication across the group is helping to improve customer centricity while boosting scalability and security
Read More
PARTICIPATE NOW |
|