Press Release
    April 29, 2025

    Veeam Report Finds Close to 70% of Organisations Still Under Cyber-Attack Despite Improved Defences

    Veeam® Software, the #1 global leader by market share in Data Resilience, announced the findings…
    Press Release
    April 29, 2025

    CyberArk Highlights Identity Security Struggles as AI Adoption Grows in Asia Pacific

    In its latest 2025 Identity Security Landscape global study, CyberArk revealed how organisations are inadvertently…
    Press Release
    April 29, 2025

    Bitdefender Announces Global Launch of GravityZone PHASR, Aims to Redefine Endpoint Security,

    Bitdefender, a global cybersecurity leader, has announced the worldwide availability of Bitdefender GravityZone Proactive Hardening…
    Press Release
    April 28, 2025

    Datadog’s State of DevSecOps 2025 Report Finds Only 18% of Critical Vulnerabilities Are Truly Worth Prioritising

    Datadog, Inc., the monitoring and security platform for cloud applications, has released its latest report,…
    Press Release
    April 28, 2025

    CrowdStrike Unveils Falcon Privileged Access

    CrowdStrike recently announced the general availability of Falcon® Privileged Access, a new module within Falcon®…
    Press Release
    April 28, 2025

    Verizon’s 2025 Data Breach Investigations Report: System Intrusions Behind 80% of APAC Breaches

    Verizon Business released its 2025 Data Breach Investigations Report (DBIR), sounding the alarm on a…
    Bylines
    April 28, 2025

    From Convenience to Compromise: Ending Insecure Password Sharing at Work

    By Darren Guccione, CEO and Co-founder, Keeper Security A Familiar Habit with Serious Implications Everything…
    Press Release
    April 25, 2025

    ‘Digital Detritus’ Leaving Businesses Vulnerable to Attacks on Network Edge Devices

    Sophos has released its Annual Threat Report 2025, which sheds light on the biggest security threats small and medium-sized…
    Press Release
    April 25, 2025

    Trend Micro Study Reveals Singaporeans’ Dangerous Misconceptions about Scams

    Singaporean consumers have a false sense of security around online scams, as revealed in a…
    Press Release
    April 25, 2025

    Proofpoint Unveils Industry’s First and Only Unified Solution to Reduce Costs and Cyber Risk Across the Expanding Workspace

    Proofpoint, Inc., a leading cybersecurity and compliance company, today announced the global availability of Proofpoint…
      April 2, 2025

      Remote Ransomware Attacks Surge 50% as Threat Actors Exploit Shared Drives

      A sharp increase in remote ransomware attacks is raising alarm across the cybersecurity landscape, as attackers move away from traditional…
      February 12, 2025

      Bitdefender Reports UAC-0063 Cyber-Espionage Campaign Is Expanding Beyond Central Asia

      A recent report from cybersecurity firm Bitdefender reveals that UAC-0063, a cyber-espionage group previously active in Central Asia, has expanded…
      January 23, 2025

      Cybercriminals Exploiting Microsoft Teams and Email Bombing in New Ransomware Tactics

      Cybercriminals are leveraging Microsoft Teams, email bombings, and remote access tools to orchestrate sophisticated ransomware campaigns, according to recent findings…
      January 20, 2025

      Cisco AI Defense: A Revolutionary Step or a Necessary Complexity in AI Security?

      On 16th January 2025, Cisco hosted a virtual roundtable to launch its highly-anticipated Cisco AI Defense, a platform aimed at…
      January 7, 2025

      Tech Tarik Think Tank Explores the Future of Digital Identities and Trust

      Technology is catapulting us into a future that is ever more connected, efficient and undeniably digital. And based on the…
      November 6, 2024

      Digital Vendetta: The Malicious Impact of Disgruntled Employees

      While businesses pour resources into defending against cyber attacks from the outside, an often-overlooked risk is a far more personal…
      October 10, 2024

      UNODC Report Reveals Criminal Gangs in Asia Getting Big Assist From AI, Crypto, and More

      Criminals, assemble! That appears to be happening in Asia right now, with organised crime syndicates consolidating their groups and expanding…

      Blogs

        Blogs
        April 22, 2025

        Is AI the Scammer’s New Best Friend?

        AI is empowering the masses and levelling the playing field, but not always for the better. While carrying out sophisticated…
        Blogs
        April 18, 2025

        How Deepfake Scammers Almost Pulled Off a Half-Million Dollar Heist

        They say if it looks like a duck, swims like a duck, and quacks like a duck, then it probably…
        Blogs
        February 26, 2025

        Breaking the Cycle: Preventing Re-Victimisation in Cyber Extortion Attacks

        Cyber extortion has evolved into multi-layered threats that go beyond locking systems and demanding ransom, combining data encryption with tactics…
        Blogs
        February 25, 2025

        Are You Overlooking Your Digital Blind Spots? How EASM Can Protect What You Can’t See

        What does the future of enterprise technology look like? According to a survey by IoT Analytics, it will be shaped…
        Blogs
        February 4, 2025

        Threat Detection Alone Won’t Cut It: Is Your Organisation Truly Cyber Resilient?

        The idea that cyber threats are evolving isn’t new, but the pace and complexity of threats facing today’s organisations definitely…
        Blogs
        November 18, 2024

        Generative AI & Quantum Risks: Are You Prepared for the Next Wave of Cybersecurity?

        The rise of generative AI is changing the industry and opening doors to creativity and innovation that seemed unattainable just…
        Blogs
        September 26, 2024

        When the Shield Gets Breached: How VPN Vulnerabilities Highlight the Need for Everywhere Security

        With the dust of the remote work revolution finally settling, it’s evident that many businesses have adopted a more hybrid…
        Blogs
        September 18, 2024

        Three Hidden Web Application Vulnerabilities You Need to Know About

        In today’s hyper-connected world, web applications are the backbone of many organisations, driving everything from customer engagement to backend operations.…