Daily News
    January 23, 2025

    Cybercriminals Exploiting Microsoft Teams and Email Bombing in New Ransomware Tactics

    Cybercriminals are leveraging Microsoft Teams, email bombings, and remote access tools to orchestrate sophisticated ransomware…
    Press Release
    January 23, 2025

    Rocket Software Introduces Phishing-Resistant Solution for Secure Host Connectivity

    Rocket Software, a global technology leader in modernisation software, today announced the launch of Rocket® Secure…
    Press Release
    January 23, 2025

    Extended AI Capabilities and Resource Visualisation: New Features in Kaspersky SIEM

    To bolster the productivity and effectiveness of cybersecurity teams, Kaspersky has unveiled a significant update…
    Press Release
    January 23, 2025

    Entrust Helps Businesses Fight Fraud with New AI-powered Facial Biometric Authentication Capability

    Entrust, a global leader in trusted payments, identities, and data security, today introduced AI-powered identity…
    Bylines
    January 23, 2025

    Data Privacy Week 2025: Protecting Privileged Accounts in the Modern Digital Era

    By Darren Guccione, CEO and Co-Founder, Keeper Security  As Data Privacy Week approaches from 27…
    Press Release
    January 22, 2025

    Sophos Tips: Ensure a Scam-Free Celebration in the Year of the Snake!

    As the joyous celebrations of Chinese New Year approach, a dark cloud threatens to overshadow…
    Press Release
    January 21, 2025

    Group-IB Joins the Cybercrime Atlas Community at the World Economic Forum To Disrupt Global Cybercrime

    Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, announced…
    Press Release
    January 21, 2025

    DYXnet Hosts its First Cross-Region Simulated Attack and Defense Exercise to Strengthen Cybersecurity Capabilities

    As technology rapidly evolves, the number and complexity of cyberattacks have increased significantly. To enhance…
    Press Release
    January 21, 2025

    Singtel Partners DSTA and HTX To Enhance Defence and National Security

    Singtel today announced that it has partnered the Defence Science and Technology Agency (DSTA) and…
    Daily News
    January 20, 2025

    Cisco AI Defense: A Revolutionary Step or a Necessary Complexity in AI Security?

    On 16th January 2025, Cisco hosted a virtual roundtable to launch its highly-anticipated Cisco AI…
      January 7, 2025

      Tech Tarik Think Tank Explores the Future of Digital Identities and Trust

      Technology is catapulting us into a future that is ever more connected, efficient and undeniably digital. And based on the…
      November 6, 2024

      Digital Vendetta: The Malicious Impact of Disgruntled Employees

      While businesses pour resources into defending against cyber attacks from the outside, an often-overlooked risk is a far more personal…
      October 10, 2024

      UNODC Report Reveals Criminal Gangs in Asia Getting Big Assist From AI, Crypto, and More

      Criminals, assemble! That appears to be happening in Asia right now, with organised crime syndicates consolidating their groups and expanding…
      October 2, 2024

      Quantum Threat to Cryptography: Experts Warn of an Extinction-Level Event in Digital Trust

      Quantum computing is hitting the headlines, and most of the time for good reasons. As tech players like Microsoft and…
      September 27, 2024

      Dell’s Triple Breach, a Critical Wake-Up Call for Cybersecurity

      Fool me once, shame on you; fool me twice, shame on me. Fool me thrice, shame on both of us.…
      September 18, 2024

      Goodbye, Passwords. Hello, Passkeys!!

      Earlier this year, Malaysia’s National Cyber Security Agency (NACSA) passed the Cyber Security Act 854, marking a key step in…
      September 11, 2024

      Malaysia Backtracks and Scraps Flawed DNS Blockade

      The Malaysian government, through its communications regulator, the Malaysian Communications and Multimedia Commission (MCMC), has faced a storm of backlash…
      September 11, 2024

      Is My Phone Spying on Me? How Advertisers Are Using AI to Listen to Ambient Conversations for “Better Marketing Analysis”

      Have you ever had a conversation with a friend about a product, and then later, while browsing, an ad for…

      Blogs

        Blogs
        November 18, 2024

        Generative AI & Quantum Risks: Are You Prepared for the Next Wave of Cybersecurity?

        The rise of generative AI is changing the industry and opening doors to creativity and innovation that seemed unattainable just…
        Blogs
        September 26, 2024

        When the Shield Gets Breached: How VPN Vulnerabilities Highlight the Need for Everywhere Security

        With the dust of the remote work revolution finally settling, it’s evident that many businesses have adopted a more hybrid…
        Blogs
        September 18, 2024

        Three Hidden Web Application Vulnerabilities You Need to Know About

        In today’s hyper-connected world, web applications are the backbone of many organisations, driving everything from customer engagement to backend operations.…
        Blogs
        September 5, 2024

        Disrupting the Disruptor: A Step-by-Step Strategy to Stonewall DDoS Attacks

        Service delays are bad for business. Service denial is even worse. Distributed Denial-of-Service (DDoS) attacks can do both, overwhelming a…
        Blogs
        August 27, 2024

        The Criticality of Security: How to Address the Modern Challenge of Securing APIs

        Application Programming Interfaces (API) are dominating the Internet, with successful API requests accounting for 57% of the Internet traffic (dynamic…
        Blogs
        August 13, 2024

        Could Instagram’s New “Feature” Make Stalking Easier?

        Instagram recently rolled out a new “Live Location” feature, which has sparked quite a few discussions, well, mostly concerns regarding…
        Blogs
        August 5, 2024

        The Critical Role of Converged Endpoint Management for Ensuring Enterprise Resilience

        Did you know there are more than 1.4 billion Windows devices currently in use by businesses worldwide? And this figure…
        Blogs
        July 26, 2024

        The Criticality of API Security: Guarding the Gateways of Digital Interactions

        The ability to innovate and utilise digital assets is a differentiator that sets leaders apart from laggards in this digital…