Nine DevSecOps secret scanning tools to keep the bad guys at bay
With the secrets of over 2m corporations already leaked, it is time to mandate action to plug the preventable gaps
Read MoreSelect Page
By Clement Lee, Security Architect, APAC, Check Point Software Technologies and webmaster webmaster | Tuesday, April 26, 2022, 11:38 AM Asia/Singapore | Most Read2, Newsletter, Tips
With the secrets of over 2m corporations already leaked, it is time to mandate action to plug the preventable gaps
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, April 19, 2022, 3:09 PM Asia/Singapore | Newsletter, Tips
That is why organizations need to beef up basic mobile device management with real-time threat intelligence and frictionless all-round user protection.
Read MoreBy CybersecAsia editors and webmaster webmaster | Wednesday, April 6, 2022, 2:39 PM Asia/Singapore | News, Newsletter
Maybe when a celebrity takes a hit, his millions of fans will start spreading word of the volatility of crypto assets…
Read MoreBy CybersecAsia editors and webmaster webmaster | Monday, April 4, 2022, 12:28 PM Asia/Singapore | News, Newsletter
Within a short two-year period, billions have already been stolen from just a handful of platforms. Casual crypto punters, beware!
Read MoreBy Victor Ng | Thursday, March 24, 2022, 8:45 AM Asia/Singapore | Malware & Ransomware, News, Newsletter
While it’s a relief to know the impact is limited, organizations need to be aware of the potential threat of the Lapsus$ cyber gang.
Read MoreBy CybersecAsia editors and webmaster webmaster | Wednesday, March 16, 2022, 1:00 AM Asia/Singapore | News, Newsletter
In Feb 2022, leaked chat logs of the threat group’s members showed how professionally organized and managed these hackers are.
Read MoreBy CybersecAsia editors and webmaster webmaster | Thursday, March 10, 2022, 11:28 AM Asia/Singapore | Cyber Intelligence, News, Newsletter
The ran$omware gang u$ed $tolen $ource code to disgui$e malware files as tru$tworthy to the operating system of targeted systems.
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, March 8, 2022, 9:58 AM Asia/Singapore | News, Newsletter
Old video clips and tweaked old news are being used to mislead the public over non-existent successful cyberattacks.
Read MoreBy CybersecAsia editors and webmaster webmaster | Monday, March 7, 2022, 8:54 AM Asia/Singapore | News, Newsletter
Some quick cyber war statistics from one cybersecurity ecosystem, at a glance.
Read MoreBy CybersecAsia editors and webmaster webmaster | Thursday, March 3, 2022, 8:56 AM Asia/Singapore | News, Newsletter
War is a bonanza of money making opportunities, and cyber warfare is no different: let the polarization begin …
Read MoreBy CybersecAsia editors and webmaster webmaster | Monday, February 28, 2022, 9:25 AM Asia/Singapore | News, Newsletter
The following disclosure is yet another testament to the fact that apps downloaded from official software repositories are not always safe.
Read MoreBy Gary Gardiner, Head, Security Engineering, APJ, Check Point Software Technologies and webmaster webmaster | Wednesday, February 23, 2022, 1:39 PM Asia/Singapore | Newsletter, Tips
Given the past two years of cyberattack surges, organizations need to rethink holistic, perimiterless protection and intelligence to stay on guard.
Read MoreBy CybersecAsia editors and webmaster webmaster | Friday, February 18, 2022, 9:46 AM Asia/Singapore | News, Newsletter
The Apache Log4j was the number-one most-exploited vulnerability in this cybersecurity ecosystem’s global rankings.
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, February 15, 2022, 9:32 AM Asia/Singapore | News, Newsletter
With inflation at a high this Valentine’s Day, clicking on an ad for 80% off roses and chocolates sure sounds phishy!
Read MoreBy CybersecAsia editors and webmaster webmaster | Monday, February 14, 2022, 12:00 PM Asia/Singapore | News, Newsletter
The hazardous, under-regulated world of crypto and NFT token trading promises crypto criminals years or even decades of blockchained untraceability.
Read More
PARTICIPATE NOW |
|