How to turn the tide against the tsunami of cyber-threats
It seems cybercriminals have gained the upper hand. With a shortage of skilled cyber-defenders, how do we turn the tide?
Read MoreSelect Page
By Victor Ng | Friday, October 23, 2020, 1:46 PM Asia/Singapore | Cyberthreat Landscape, Features, Newsletter
It seems cybercriminals have gained the upper hand. With a shortage of skilled cyber-defenders, how do we turn the tide?
Read MoreBy Eddie Stefanescu, General Manager - Asia Pacific & Japan, Claroty | Friday, October 16, 2020, 12:17 PM Asia/Singapore | Newsletter, Opinions
Securing Operational Technology requires a different approach from IT security, and cybercriminals are just waiting to pounce on the unwary.
Read MoreBy Victor Ng | Friday, October 16, 2020, 11:51 AM Asia/Singapore | Cyberthreat Landscape, Features, Newsletter
After 9.9. and 10.10, businesses and shoppers are gearing up for 11.11, Black Friday, Cyber Monday and 12.12. And so are cybercriminals…
Read MoreBy L L Seow | Monday, October 12, 2020, 11:06 AM Asia/Singapore | Features, Newsletter
Which threats and actors should South-east Asian and Japanese businesses watch for in the remaining part of 2020 and beyond?
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, October 6, 2020, 2:34 PM Asia/Singapore | News, Newsletter
Cybercriminals are enjoying their own game: preying on gamers and exploiting any lax security by gaming platforms.
Read MoreBy CybersecAsia editors and webmaster webmaster | Friday, September 25, 2020, 11:37 AM Asia/Singapore | News, Newsletter
To safeguard client data against increasingly-sophisticated cybercriminals, their technology manager turned to AI-enhanced EDR solutions .
Read MoreBy Brad Gray, Senior Vice President (APAC), Exclusive Networks | Friday, September 25, 2020, 11:24 AM Asia/Singapore | Newsletter, Opinions
AI-powered cyberattacks, crypto cloud mining and manipulated data are just some of the methods that cybercriminals will use against us .
Read MoreBy CybersecAsia editors and webmaster webmaster | Monday, September 21, 2020, 12:14 PM Asia/Singapore | News, Newsletter
A post-mortem report shows how the versatility and persistence of cybercriminals effectively increases attack surfaces for exploitation.
Read MoreBy CybersecAsia editors and webmaster webmaster | Friday, September 18, 2020, 12:15 PM Asia/Singapore | News, Newsletter
Dubbed a ‘double dragon’ group due to its dual objectives, APT41 is history, at least until more state-sponsored groups replace them!
Read MoreBy CybersecAsia editors and webmaster webmaster | Wednesday, September 16, 2020, 2:05 PM Asia/Singapore | News, Newsletter
How much will victims lose if cybercriminals found and used the lost data? We are referring to Singapore’s ride-hailing data-breach!
Read MoreBy webmaster webmaster | Monday, September 7, 2020, 12:00 AM Asia/Singapore | Barracuda Articles, Sponsored, Whitepapers
Latest insights into cybercriminal activity in compromised email accounts.
A specialized economy is emerging around email account takeover as cybercriminals find new ways to attack and exploit email accounts.
Read MoreBy CybersecAsia editors and webmaster webmaster | Friday, September 4, 2020, 11:34 AM Asia/Singapore | News, Newsletter
Distract victims by leading them through multiple platforms until they lose caution and become trusting enough to supply login credentials!
With a revolution in remote working, collaborative tools such as SharePoint and OneNote are now more useful than ever. However, this has also presented more opportunities for cybercriminals to target remote workers.
Read MoreBy CybersecAsia editors and webmaster webmaster | Friday, September 4, 2020, 11:21 AM Asia/Singapore | News, Newsletter
Few studies have been conducted into how cybercriminals quickly clean stolen funds without attracting attention: this report is long overdue.
Take a look inside the complex web of money mules, front companies and cryptocurrencies that criminals use to siphon funds from the financial system after a cyber-attack. That is what a new report by secure financial messaging service SWIFT and cybersecurity consultancy BAE Systems Applied Intelligence.
Read MoreBy Tad Heppner, Threat Researcher, SophosLabs and webmaster webmaster | Wednesday, September 2, 2020, 9:50 AM Asia/Singapore | Newsletter, Opinions
Know the various ways cybercriminals evade detection by using only a network’s own sanctioned tools for the attack.
The best way to test if a door is locked is to try to open it. Similarly, one of the best ways to test your computer security is to try to breach its defenses using known tools. These are referred to as ‘grey hat’ tools and they are used legitimately by penetration testers and red teams to launch attacks with benign payloads on computers and networks.
Read MoreBy CybersecAsia editors and webmaster webmaster | Friday, August 28, 2020, 11:54 AM Asia/Singapore | News, Newsletter
The infamous Lazarus Group has again been linked to financially-motivated cyberthreats around the world, because sanctions make NKorea more desperate.
An attack against an organization working in the cryptocurrency vertical has been linked to the notorious Lazarus Group (APT38)—a highly-skilled, financially-motivated threat actor whose interests reportedly align with the Democratic People’s Republic of Korea (DPRK).
Read More
PARTICIPATE NOW |
|