Blogs
    April 18, 2025

    How Deepfake Scammers Almost Pulled Off a Half-Million Dollar Heist

    They say if it looks like a duck, swims like a duck, and quacks like…
    Press Release
    April 18, 2025

    Broadcom Introduces Industry’s First Incident Prediction Capability to Stop Living-Off-The-Land Attacks

    Broadcom Inc. announced Incident Prediction, an industry-first security capability that extends Adaptive Protection, a unique feature…
    Press Release
    April 18, 2025

    Wireless Logic Releases Industry Blueprint for Building Cyber-Resilient IoT Network

    Wireless Logic has published a new white paper titled ‘Maximising Uptime for IoT’, providing a detailed…
    Bylines
    April 17, 2025

    The Dark Market Parallel: A Rising Threat to Consumers and Businesses

    By Bogdan Botezatu, Director of Threat Research and Reporting at Bitdefender The sophistication of dark…
    Press Release
    April 17, 2025

    Identity Theft, Document Forgeries Among Top Fraud Threats in APAC; Global Average Loss from Fraud Reaches $7M Annually: Study

    Docusign, the intelligent agreement management company, together with leading global provider of identity-centric security solutions,…
    Press Release
    April 17, 2025

    SEA Businesses Face 400 Ransomware Attacks Daily, Kaspersky

    Organisations in Southeast Asia (SEA) continue to face an alarming surge in ransomware attacks in…
    Press Release
    April 17, 2025

    2025 Unit 42 Global Incident Response Report Reveals Nearly 44% of Security Incidents Involved a Web Browser

    Palo Alto Networks, the global cybersecurity leader, released the 2025 Unit 42 Global Incident Response…
    Bylines
    April 15, 2025

    A Self-Sustaining Cycle of Cyber Threats

    Attributed to Dmitry Volkov, Chief Executive Officer, Group-IB Cybersecurity in the Asia-Pacific (APAC) region is…
    Press Release
    April 15, 2025

    AI-driven Attacks to Become Faster, More Sophisticated, and Harder to Detect by 2026, New Delinea Report Shows

    Delinea released its inaugural Cybersecurity and the AI Threat Landscape report. The report, based on exclusive…
    Press Release
    April 15, 2025

    Tenable Warns that Open-Source AI Tools Widen Cybersecurity Gaps as Adoption Outpaces Cloud Security Readiness

    As businesses rush to harness artificial intelligence (AI) for competitive advantage, Tenable®, the exposure management…
      April 2, 2025

      Remote Ransomware Attacks Surge 50% as Threat Actors Exploit Shared Drives

      A sharp increase in remote ransomware attacks is raising alarm across the cybersecurity landscape, as attackers move away from traditional…
      February 12, 2025

      Bitdefender Reports UAC-0063 Cyber-Espionage Campaign Is Expanding Beyond Central Asia

      A recent report from cybersecurity firm Bitdefender reveals that UAC-0063, a cyber-espionage group previously active in Central Asia, has expanded…
      January 23, 2025

      Cybercriminals Exploiting Microsoft Teams and Email Bombing in New Ransomware Tactics

      Cybercriminals are leveraging Microsoft Teams, email bombings, and remote access tools to orchestrate sophisticated ransomware campaigns, according to recent findings…
      January 20, 2025

      Cisco AI Defense: A Revolutionary Step or a Necessary Complexity in AI Security?

      On 16th January 2025, Cisco hosted a virtual roundtable to launch its highly-anticipated Cisco AI Defense, a platform aimed at…
      January 7, 2025

      Tech Tarik Think Tank Explores the Future of Digital Identities and Trust

      Technology is catapulting us into a future that is ever more connected, efficient and undeniably digital. And based on the…
      November 6, 2024

      Digital Vendetta: The Malicious Impact of Disgruntled Employees

      While businesses pour resources into defending against cyber attacks from the outside, an often-overlooked risk is a far more personal…
      October 10, 2024

      UNODC Report Reveals Criminal Gangs in Asia Getting Big Assist From AI, Crypto, and More

      Criminals, assemble! That appears to be happening in Asia right now, with organised crime syndicates consolidating their groups and expanding…

      Blogs

        Blogs
        February 26, 2025

        Breaking the Cycle: Preventing Re-Victimisation in Cyber Extortion Attacks

        Cyber extortion has evolved into multi-layered threats that go beyond locking systems and demanding ransom, combining data encryption with tactics…
        Blogs
        February 25, 2025

        Are You Overlooking Your Digital Blind Spots? How EASM Can Protect What You Can’t See

        What does the future of enterprise technology look like? According to a survey by IoT Analytics, it will be shaped…
        Blogs
        February 4, 2025

        Threat Detection Alone Won’t Cut It: Is Your Organisation Truly Cyber Resilient?

        The idea that cyber threats are evolving isn’t new, but the pace and complexity of threats facing today’s organisations definitely…
        Blogs
        November 18, 2024

        Generative AI & Quantum Risks: Are You Prepared for the Next Wave of Cybersecurity?

        The rise of generative AI is changing the industry and opening doors to creativity and innovation that seemed unattainable just…
        Blogs
        September 26, 2024

        When the Shield Gets Breached: How VPN Vulnerabilities Highlight the Need for Everywhere Security

        With the dust of the remote work revolution finally settling, it’s evident that many businesses have adopted a more hybrid…
        Blogs
        September 18, 2024

        Three Hidden Web Application Vulnerabilities You Need to Know About

        In today’s hyper-connected world, web applications are the backbone of many organisations, driving everything from customer engagement to backend operations.…
        Blogs
        September 5, 2024

        Disrupting the Disruptor: A Step-by-Step Strategy to Stonewall DDoS Attacks

        Service delays are bad for business. Service denial is even worse. Distributed Denial-of-Service (DDoS) attacks can do both, overwhelming a…
        Blogs
        August 27, 2024

        The Criticality of Security: How to Address the Modern Challenge of Securing APIs

        Application Programming Interfaces (API) are dominating the Internet, with successful API requests accounting for 57% of the Internet traffic (dynamic…