Press Release
    June 4, 2025

    Delinea Report Finds 69% of Organisations Breached by Ransomware in 2024

    Delinea, a pioneering provider of solutions for securing human and machine identities through centralised authorisation,…
    Press Release
    June 4, 2025

    Illumio Simplifies Zero Trust in Critical Infrastructure with NVIDIA Accelerated Computing

    Illumio Inc., the breach containment company, has announced a strategic integration with NVIDIA to help critical infrastructure…
    Press Release
    June 4, 2025

    CrowdStrike, Microsoft Collaborate to Harmonise Cyber Threat Attribution

    CrowdStrike and Microsoft have announced a collaboration to bring clarity and coordination to how cyber threat…
    Cyber Safety
    June 3, 2025

    KAST Chooses Okta’s Auth0 to Scale Secure Identity for Rapid User Acquisition

    KAST, a Hong Kong-based FinTech platform, has integrated Okta’s Auth0 platform to provide seamless and…
    Press Release
    June 3, 2025

    Tenable Announces Acquisition Plan of Apex Security for Expanded Exposure Management

    Tenable® Holdings, Inc., the exposure management company, has announced its intent to acquire Apex Security, Inc.,…
    Press Release
    June 3, 2025

    Keeper Security Introduces Bidirectional One-Time Sharing Feature to Its Password Manager Platform

    Keeper Security, the leading cybersecurity provider of zero-trust and zero-knowledge Privileged Access Management (PAM) software…
    Press Release
    May 30, 2025

    CDNetworks’ State of WAAP Report Reveals 887.4B Web App, API Attacks in 2024

    CDNetworks, the APAC-leading network to deliver edge as a service, has released its latest State…
    Press Release
    May 30, 2025

    SEON Accelerates APAC Growth Amidst Rising Demand for Unified Fraud, AML Solutions

    SEON, a global leader in digital fraud prevention and compliance, has announced rapid growth across…
    Daily News
    May 30, 2025

    CyberSec Malaysia 2025: CyberSecurity Malaysia’s Keynote Reveals the Country Is Not Up to Speed on Cyber Resilience

    This year, CyberSecAsia made its way through Malaysia once again. Some frequent sponsors made a…
    Press Release
    May 30, 2025

    Bitdefender Enhances Global Channel Program for Resellers, Managed Service Providers

    Bitdefender, a global cybersecurity leader, has announced major enhancements to its Partner Advantage Network—Reselling Channel…
      May 15, 2025

      Japan Seeks to Enhance Cybersecurity by Doubling Industry Professionals by 2030

        The Japanese government is taking cybersecurity very seriously. In fact, it is looking to double the number of qualified…
      May 15, 2025

      Security Analysts Say Ransomware Group Lockbit Might Have Been Hacked

        Lockbit might have gotten a dose of its own medicine, at least according to cybersecurity analysts. According to Reuters,…
      May 9, 2025

      GMA Network Confirms Recent Hack But Dismisses Its Impact

        GMA Network all but confirmed that it got hacked recently with a statement touting a thorough investigation and a…
      May 7, 2025

      Why It Is Time to Say Good-Bye to Passwords, According to Check Point

      Cybersecurity professionals have been urging the public to strengthen their password hygiene. But in 2025, this tradition may be past…
      April 2, 2025

      Remote Ransomware Attacks Surge 50% as Threat Actors Exploit Shared Drives

      A sharp increase in remote ransomware attacks is raising alarm across the cybersecurity landscape, as attackers move away from traditional…
      February 12, 2025

      Bitdefender Reports UAC-0063 Cyber-Espionage Campaign Is Expanding Beyond Central Asia

      A recent report from cybersecurity firm Bitdefender reveals that UAC-0063, a cyber-espionage group previously active in Central Asia, has expanded…
      January 23, 2025

      Cybercriminals Exploiting Microsoft Teams and Email Bombing in New Ransomware Tactics

      Cybercriminals are leveraging Microsoft Teams, email bombings, and remote access tools to orchestrate sophisticated ransomware campaigns, according to recent findings…

      Blogs

        Blogs
        May 26, 2025

        Exploiting the AI Boom: Check Point Breaks Down How Threat Actors Are Targeting Trust in Generative Platforms

        As generative AI (Artificial Intelligence) continues to capture global attention, threat actors are quick to exploit AI’s capabilities and popularity. From deepfake…
        Blogs
        April 22, 2025

        Is AI the Scammer’s New Best Friend?

        AI is empowering the masses and levelling the playing field, but not always for the better. While carrying out sophisticated…
        Blogs
        April 18, 2025

        How Deepfake Scammers Almost Pulled Off a Half-Million Dollar Heist

        They say if it looks like a duck, swims like a duck, and quacks like a duck, then it probably…
        Blogs
        February 26, 2025

        Breaking the Cycle: Preventing Re-Victimisation in Cyber Extortion Attacks

        Cyber extortion has evolved into multi-layered threats that go beyond locking systems and demanding ransom, combining data encryption with tactics…
        Blogs
        February 25, 2025

        Are You Overlooking Your Digital Blind Spots? How EASM Can Protect What You Can’t See

        What does the future of enterprise technology look like? According to a survey by IoT Analytics, it will be shaped…
        Blogs
        February 4, 2025

        Threat Detection Alone Won’t Cut It: Is Your Organisation Truly Cyber Resilient?

        The idea that cyber threats are evolving isn’t new, but the pace and complexity of threats facing today’s organisations definitely…
        Blogs
        November 18, 2024

        Generative AI & Quantum Risks: Are You Prepared for the Next Wave of Cybersecurity?

        The rise of generative AI is changing the industry and opening doors to creativity and innovation that seemed unattainable just…
        Blogs
        September 26, 2024

        When the Shield Gets Breached: How VPN Vulnerabilities Highlight the Need for Everywhere Security

        With the dust of the remote work revolution finally settling, it’s evident that many businesses have adopted a more hybrid…