How a ransomware tried to execute a US$15m attack in three different ways
A post-mortem report shows how the versatility and persistence of cybercriminals effectively increases attack surfaces for exploitation.
Read MoreSelect Page
By CybersecAsia editors and webmaster webmaster | Monday, September 21, 2020, 12:14 PM Asia/Singapore | News, Newsletter
A post-mortem report shows how the versatility and persistence of cybercriminals effectively increases attack surfaces for exploitation.
Read MoreBy CybersecAsia editors and webmaster webmaster | Friday, September 18, 2020, 12:15 PM Asia/Singapore | News, Newsletter
Dubbed a ‘double dragon’ group due to its dual objectives, APT41 is history, at least until more state-sponsored groups replace them!
Read MoreBy CybersecAsia editors and webmaster webmaster | Wednesday, September 16, 2020, 2:05 PM Asia/Singapore | News, Newsletter
How much will victims lose if cybercriminals found and used the lost data? We are referring to Singapore’s ride-hailing data-breach!
Read MoreBy webmaster webmaster | Monday, September 7, 2020, 12:00 AM Asia/Singapore | Barracuda Articles, Sponsored, Whitepapers
Latest insights into cybercriminal activity in compromised email accounts.
A specialized economy is emerging around email account takeover as cybercriminals find new ways to attack and exploit email accounts.
Read MoreBy CybersecAsia editors and webmaster webmaster | Friday, September 4, 2020, 11:34 AM Asia/Singapore | News, Newsletter
Distract victims by leading them through multiple platforms until they lose caution and become trusting enough to supply login credentials!
With a revolution in remote working, collaborative tools such as SharePoint and OneNote are now more useful than ever. However, this has also presented more opportunities for cybercriminals to target remote workers.
Read MoreBy CybersecAsia editors and webmaster webmaster | Friday, September 4, 2020, 11:21 AM Asia/Singapore | News, Newsletter
Few studies have been conducted into how cybercriminals quickly clean stolen funds without attracting attention: this report is long overdue.
Take a look inside the complex web of money mules, front companies and cryptocurrencies that criminals use to siphon funds from the financial system after a cyber-attack. That is what a new report by secure financial messaging service SWIFT and cybersecurity consultancy BAE Systems Applied Intelligence.
Read MoreBy Tad Heppner, Threat Researcher, SophosLabs and webmaster webmaster | Wednesday, September 2, 2020, 9:50 AM Asia/Singapore | Newsletter, Opinions
Know the various ways cybercriminals evade detection by using only a network’s own sanctioned tools for the attack.
The best way to test if a door is locked is to try to open it. Similarly, one of the best ways to test your computer security is to try to breach its defenses using known tools. These are referred to as ‘grey hat’ tools and they are used legitimately by penetration testers and red teams to launch attacks with benign payloads on computers and networks.
Read MoreBy CybersecAsia editors and webmaster webmaster | Friday, August 28, 2020, 11:54 AM Asia/Singapore | News, Newsletter
The infamous Lazarus Group has again been linked to financially-motivated cyberthreats around the world, because sanctions make NKorea more desperate.
An attack against an organization working in the cryptocurrency vertical has been linked to the notorious Lazarus Group (APT38)—a highly-skilled, financially-motivated threat actor whose interests reportedly align with the Democratic People’s Republic of Korea (DPRK).
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, August 11, 2020, 10:20 AM Asia/Singapore | News, Newsletter
Even more dire consequences could surface if password reuse habits by compromised users are exploited by hackers.
A list containing plaintext usernames and passwords, along with IP addresses for over 900 VPN servers belonging to Pulse Secure VPN, has been published online as well as shared on a hacker forum used by cybercriminals.
Read MoreBy webmaster webmaster | Tuesday, June 2, 2020, 5:48 PM Asia/Singapore | News, Newsletter
Social media clues left by the most wanted digital vandal-cum-cybercriminal in three countries...
Read MoreBy Singtel and webmaster webmaster | Friday, March 13, 2020, 12:00 AM Asia/Singapore | Features, Sponsored
To survive and thrive in the digital economy, SMEs need comprehensive cybersecurity that is fast...
Read MoreBy webmaster webmaster | Monday, March 9, 2020, 9:42 AM Asia/Singapore | Cyber Intelligence, News, Newsletter, Tips
Cyber lure is a key social engineering tactic employed by state-sponsored and financially...
Read MoreBy Laura Kornelija Inamedinova, CCO, CyberNews and webmaster webmaster | Tuesday, January 28, 2020, 3:28 PM Asia/Singapore | Features
How to stop trying to foil hackers and prepare to lose your job (or maybe...
Read MoreBy webmaster webmaster | Friday, July 12, 2019, 10:37 AM Asia/Singapore | Features, Tips
When it comes to cybersecurity, SMEs may often be the weakest link in the supply chain that...
Read More
PARTICIPATE NOW |
|