Cybersecurity News in Asia
Bridging the data science talent gap for national cyber defe...
By L L Seow | Apr 29, 2024
AI vulnerability testing: Knowing the In’s and Out’s of prop...
By L L Seow | Apr 22, 2024
What businesses need to know about SEO poisoning
By Victor Ng | Apr 16, 2024
SECURITY NEWS
Fears of increased identity fraud due to AI need addressing: survey
May 8, 2024
Some 200 respondents large Australia/Singapore firms indicated a gap between their concerns and the countermeasures they were implementing urgently
EXPERT OPINIONS
With great payment-methods growth come greater security liabilities
May 7, 2024
The double-edged swords of AI and groundbreaking GPU power need to be kept under the protective sheath of heightened cybersecurity vigilance
-
Why World Password Day is redundant now
May 3, 2024
-
2024 cybersecurity trends
Feb 15, 2024
-
2024 cybersecurity predictions from Akamai leaders
Dec 13, 2023
TIPS
Know and understand steganography: the risk of loading rigged images
May 9, 2024
With browsers granted so much autonomy in automatically playing embedded videos, GIFs and other images upon loading webpages, cyber-vigilance is necessary
-
-
Six benefits of cloud-centric secrets management
May 6, 2024
-
CLOUD SECURITY
Are cloud giants holding the world’s data captive?
Oct 2, 2023
One small commissioned global survey has noted that respondents who felt trapped, need to be liberated from perceived cloud-vendor lock-in.
INFOGRAPHICS
2024 Global Threat Report Infographic
APJ 2023 Direction of Technology Report Infographic
Cyber Intelligence
LatestW3LL-oiled machine: report uncovers covert BEC phishing empire targeting Microsoft 365
By CybersecAsia editors and webmaster webmaster | Sep 7, 2023
A new threat report “W3LL DONE: HIDDEN PHISHING ECOSYSTEM DRIVING BEC ATTACKS” has detailed the operations of W3LL, a threat actor behind a phishing empire that has remained largely unknown until now.
-
-
-
Making cyber-resilience part of your organization’s balance sheet
By Victor Ng | Apr 26, 2022
Cyber Warfare
LatestRansomware still the #1 cyber threat: report
By CybersecAsia editors | Jan 30, 2023
With stolen credentials and Ransomware-as-a-Service kits being sold cheaper than ever on the Dark Web, expect more cybercrime this year!
-
-
Ukraine-Russia conflict: war also occurs in cyberspace
By CybersecAsia editors and webmaster webmaster | Feb 28, 2022
-
MOST READ
WhatsApp group chat vulnerability hack thwarted
Researchers had discovered in August a group-chat flaw where a malicious message could crash WhatsApp group users’ devices. A...
Nine DevSecOps secret scanning tools to keep the bad guys at bay
With the secrets of over 2m corporations already leaked, it is time to mandate action to plug the preventable gaps
Voters-draw/RCA-Sponsors
CybersecAsia Voting Placement
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
Whitepapers
Securing Industry 4.0
The world is advancing to Industry 4.0 in full swing, and this is a key …Download WhitepaperSecure Access Service Edge (SASE) Solutions for Today’s Work-From-Anywhere (WFA) Environment
Organizations are turning to Secure Access Service Edge (SASE) solutions for securing remote work environments, …Download WhitepaperIdentity Has Breached the Ecosystem
This whitepaper explores the dual nature of identity in cybersecurity, emphasizing its role in both …Download WhitepaperFortanix Buyers Guide for Modern Key Management and Data Security
This document underscores the pressing challenges in key management and data securityDownload Whitepaper
Middle-sidebar-banner
Case Studies
How medical devices manufacturer Tuttnauer protects patient and personal-data safety
In running a cloud-based portal to link its smart medical equipment, the firm has also …Read moreAI vulnerability testing: Knowing the In’s and Out’s of proper red teaming
To test the safety/security of a generative AI feature, what unchartered bugs and human testing …Read moreReal estate logistics provider GLP steps up to zero trust architecture
With its physical and digital footprint growing, the global firm’s outdated legacy security stack has …Read moreIdentity security woes now a thing of the past for Heng Leong Hang
The retail chain was grappling with numerous cyber risks in its IT infrastructure until it …Read more