How a ransomware tried to execute a US$15m attack in three different ways
A post-mortem report shows how the versatility and persistence of cybercriminals effectively increases attack surfaces for exploitation.
Read MoreSelect Page
By CybersecAsia editors and webmaster webmaster | Monday, September 21, 2020, 12:14 PM Asia/Singapore | News, Newsletter
A post-mortem report shows how the versatility and persistence of cybercriminals effectively increases attack surfaces for exploitation.
Read MoreBy CybersecAsia editors and webmaster webmaster | Thursday, September 17, 2020, 3:08 PM Asia/Singapore | News, Newsletter
Another exciting month of malware and vulnerability limelight shifts for your undivided reference…
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, August 11, 2020, 9:58 AM Asia/Singapore | News, Newsletter
A nasty group that has hit even a US nuclear missile contractor has just disrupted the global...
Read MoreBy Samantha Madrid, VP, Security Business & Strategy, Juniper Networks and webmaster webmaster | Tuesday, August 4, 2020, 5:22 PM Asia/Singapore | Newsletter, Opinions
If healthcare networks are threat aware, administrators will not need to think about securing all...
Read MoreBy LogRhythm and webmaster webmaster | Wednesday, July 22, 2020, 12:00 AM Asia/Singapore | Case Study, Sponsored
Full visibility and intelligent detection eliminate cybersecurity blind spots and reduce response time for UDA.
As a company that is responsible for many governmental, commercial, and residential property development projects throughout Malaysia, it is imperative for the Urban Development Authority (UDA) to ensure that their data, clients’ information, and assets are well protected.
Read MoreBy Victor Ng | Thursday, July 16, 2020, 4:15 PM Asia/Singapore | Cloud Security, Data Protection, Features, Newsletter
As data proliferates in the cloud and on-premise, data breaches and regulatory compliance are...
Read MoreBy webmaster webmaster | Tuesday, June 2, 2020, 7:18 PM Asia/Singapore | News, Newsletter
Cryptocurrency miners operate according to the same business model as ransomware programs, and a...
Read MoreBy Green Radar and webmaster webmaster | Tuesday, May 19, 2020, 4:17 PM Asia/Singapore | Case Study
Case Study: Hong Kong firm VXRL reduces phishing threats with Green Radar The cybersecurity...
Read MoreBy webmaster webmaster | Friday, May 15, 2020, 8:58 AM Asia/Singapore | Features, Newsletter
Or rather, pay your hapless law firm the ransom! Yours truly – REvil The website of New York...
Read MoreBy Dylan Castagne, Managing Director, Retarus Asia and webmaster webmaster | Thursday, May 14, 2020, 10:20 AM Asia/Singapore | Newsletter, Opinions
The sudden and unprecedented migration to remote-working has made email scams the most lucrative...
Read More
PARTICIPATE NOW |
|