Ransomware never dies, it rises from the ashes deadlier than ever
With strong vigilance, protection, cyber-training and supply-chain security audits, ICS should be ready and waiting for ANY malware or ransomware resurgence.
Read MoreSelect Page
By Chris Grove, Product Director, Nozomi Networks and webmaster webmaster | Wednesday, February 16, 2022, 10:04 AM Asia/Singapore | Opinions
With strong vigilance, protection, cyber-training and supply-chain security audits, ICS should be ready and waiting for ANY malware or ransomware resurgence.
Read MoreBy CybersecAsia editors and webmaster webmaster | Wednesday, February 9, 2022, 10:11 AM Asia/Singapore | News, Newsletter
Attacking the Active Directory and human-operated, the double-extortion ransomware group has already been spotted in the Philippines.
Read MoreBy Cybereason and webmaster webmaster | Friday, November 19, 2021, 4:52 PM Asia/Singapore | Infographic, Malware & Ransomware, Newsletter
With the holiday season coming up, the emerging pattern of cyber-attacks occurring over the weekends or holidays is concerning for businesses.
Read MoreBy CybersecAsia editors and webmaster webmaster | Friday, November 12, 2021, 11:39 AM Asia/Singapore | News, Newsletter
Its powerful gravitational field sucks in all cyber threats to form one interconnected ransomware delivery system: ramifications will hit critical mass.
Read MoreBy Mark Goudie, APJ Services Director, CrowdStrike and webmaster webmaster | Thursday, November 11, 2021, 10:00 AM Asia/Singapore | Newsletter, Tips
In addition to knowing never to pay cyber ransoms, here are nine other points to evaluate your organization’s preparedness against attacks.
Read MoreBy Victor Ng | Monday, November 8, 2021, 9:17 AM Asia/Singapore | Data Protection, Features, Malware & Ransomware
Cybercriminals are targeting your data for ransom, but true data immutability and visibility can be your best defense.
Read MoreBy CybersecAsia editors and webmaster webmaster | Wednesday, October 13, 2021, 5:24 PM Asia/Singapore | News, Newsletter
The threat researchers who investigated the attack said it was the fastest ever systematic targeted attack.
Read MoreBy CybersecAsia editors and webmaster webmaster | Monday, August 23, 2021, 10:50 AM Asia/Singapore | News, Newsletter
Organizations in the USA took 44% of the hits, four times more the next region in the list, according to data.
Read MoreBy CybersecAsia editors and webmaster webmaster | Thursday, August 19, 2021, 10:26 AM Asia/Singapore | News, Newsletter
When the risks of internet exposure and connectivity affect industrial control systems, entire cities and even nations can be disrupted.
Read MoreBy Andy Ng, Vice President and Managing Director, Asia South and Pacific Region, Veritas Technologies and webmaster webmaster | Friday, July 23, 2021, 9:44 PM Asia/Singapore | Newsletter, Opinions
Threat groups have profited handsomely from recent high-profile US supply chain ransomware attacks: everyone brace for more attacks to come!
Read MoreBy CybersecAsia editors and webmaster webmaster | Friday, July 16, 2021, 3:42 PM Asia/Singapore | News, Newsletter
In terms of number of attacks and amount of damage incurred, IT teams in educational institutions had their hands tied.
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, July 13, 2021, 2:30 PM Asia/Singapore | Features, Newsletter
Recent high-profile data breaches and ransomware attacks demonstrate the inevitability of cyber-attacks. If prevention is not possible, what is?
Read MoreCybersecurity experts weigh in on the timing, method, and payload of what may be the biggest ransomware and supply chain attack to date.
Read MoreBy CybersecAsia editors and webmaster webmaster | Wednesday, June 30, 2021, 9:37 AM Asia/Singapore | Cyberthreat Landscape, News, Newsletter
Also, CoinMiner malware increased 117% in one cybersecurity firm’s telemetry, but declined by 13% in North America: study
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, June 8, 2021, 11:52 AM Asia/Singapore | News, Newsletter
Why stop at ransoming a main victim and stealing sensitive data when you can also extort the victim’s entire supply chain?
Read More
PARTICIPATE NOW |
|