Cybersecurity News in Asia

Select Page

Fewer SE Asia ransomware attacks, but more targeted APT attacks in H1

Two factors probably account for this trend, but we must not let our guard down for even a moment.

Ransomware attacks detected and blocked by cybersecurity provider Kaspersky on computers of small-to-medium sized enterprises (SMEs) in Southeast Asia have dwindled from 1.4M hits in H1 2019 to just half a million in H1 2020, based on their latest figures.

Read More

Report shows how cybercrooks cash out and launder stolen funds

Few studies have been conducted into how cybercriminals quickly clean stolen funds without attracting attention: this report is long overdue.

Take a look inside the complex web of money mules, front companies and cryptocurrencies that criminals use to siphon funds from the financial system after a cyber-attack. That is what a new report by secure financial messaging service SWIFT and cybersecurity consultancy BAE Systems Applied Intelligence.

Read More

More than 50,000 driving license details leaked in Australia

Cheap-and-cheerful cloud storage solutions are abundant, but so are the cases of misconfigurations that can lead to hackings or data leaks.

On 1 Sep 2020, more than 108,000 scanned images of over 54,000 Australian driving licenses were found to have been leaked online. The leak was discovered by a Ukrainian security consultant who stumbled upon the folder on an Amazon storage service, which also contained phone numbers, addresses and birth dates, all available for public view.

Read More

Uncovering the 50 shades of ‘grey hat’ threats

Know the various ways cybercriminals evade detection by using only a network’s own sanctioned tools for the attack.

The best way to test if a door is locked is to try to open it. Similarly, one of the best ways to test your computer security is to try to breach its defenses using known tools. These are referred to as ‘grey hat’ tools and they are used legitimately by penetration testers and red teams to launch attacks with benign payloads on computers and networks.

Read More

Digital workplace views and recommendations..

Actually, businesses can enjoy both high staff productivity and WFH security. Here are some tips to achieve this balance…

Remote-working had already been a rising trend in recent years, but no one could have predicted that an event like the COVID-19 pandemic would cause entire companies to move to the digital workplace overnight.

Read More

Stop reusing passwords and giving hackers your crown jewels!

Stolen credentials and the resultant credential stuffing are real and growing cyberthreats underlying a majority of vulnerabilities, says this expert.

While data breaches garner significant attention in the region, less has been said about how technology has evolved to thwart these attacks. Many security teams are unaware of tactics at their disposal to stop fraudsters in their tracks. 

Read More

DPRK-aligned threat actor targeting cryptocurrency vertical with global hacking campaign

The infamous Lazarus Group has again been linked to financially-motivated cyberthreats around the world, because sanctions make NKorea more desperate.

An attack against an organization working in the cryptocurrency vertical has been linked to the notorious Lazarus Group (APT38)—a highly-skilled, financially-motivated threat actor whose interests reportedly align with the Democratic People’s Republic of Korea (DPRK).

Read More

Voters-draw/RCA-Sponsors

previous arrow
next arrow
Slider

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

Middle-sidebar-banner

Case Studies

Bottom sidebar