Cloud Security
    June 19, 2025

    Cloudflare Log Explorer Equips Businesses with Native Security Forensics for Faster Insights with Fewer Tools

    Cloudflare, Inc., the leading connectivity cloud company, has announced the general availability of Cloudflare Log…
    Press Release
    June 19, 2025

    NTT DATA Research Reveals C-Suite Misalignment Over GenAI Adoption

    NTT DATA, a global leader in digital business and technology services, has launched its new…
    Cyber Crime & Forensic
    June 18, 2025

    Taiwan Cyber Unit: Country Unfazed by China Bounty Offer

    (Reuters) – Taiwan’s cyber forces will not be intimidated by China’s threats of a bounty…
    Press Release
    June 18, 2025

    Salesforce State of IT Report: APAC Security Leaders Optimistic About Agentic AI to Tackle Security Concerns, but Concerns Remain

    As Artificial Intelligence (AI) adoption accelerates and cyber threats increase, nearly 8 in 10 IT…
    Press Release
    June 17, 2025

    CrowdStrike Falcon for AWS Security Incident Response Strengthens Cyber Resilience for AWS Customers

    CrowdStrike has unveiled Falcon for AWS Security Incident Response at AWS re:Inforce 2025, a new program that provides AWS…
    Press Release
    June 17, 2025

    SentinelOne Accelerates Secure Cloud Migrations for AWS Customers

    SentinelOne®, a global leader in Artificial Intelligence (AI)-powered security, has announced it has joined the…
    Bylines
    June 17, 2025

    From Human to Machine: Why a New Identity Security Playbook Is Needed in the Age of AI

    Identity security is becoming more and more crucial—and that’s putting it lightly. As Artificial Intelligence…
    Press Release
    June 16, 2025

    Azul Introduces 100–1000x More Accurate In-Production Java Vulnerability Detection

    Azul, the only company 100% focused on Java, has announced an enhancement to Azul Intelligence Cloud,…
    Press Release
    June 16, 2025

    Commvault Unveils New Post-Quantum Cryptography Capabilities to Help Customers Protect Data from a New Generation of Security Threats

    At a time when quantum computing is rapidly emerging as an entirely new security challenge…
    Bylines
    June 16, 2025

    Zero Trust in a Constantly Evolving Threat Landscape: Why Password Security is Critical for APAC Enterprises

    Zero trust is fast becoming nonnegotiable in cybersecurity. Cybersecurity is no longer a concern reserved…
      June 10, 2025

      Verizon Business Releases Findings from 18th Data Breach Investigations Report

      Verizon Business has released the results of its annual Data Breach Investigations Report, which is now on its 18th year.…
      June 10, 2025

      ZeroBounce Reveals Four Tactics Phishing Syndicates Use Today

      Phishing is a massive problem in today’s worsening cybersecurity landscape. In fact, the latest FBI Internet Crime Report reveals that…
      June 9, 2025

      Sakura RAT: Cybercriminals Sabotaged by Their Own Malware Campaign, Sophos Finds

      Ever heard of the “Sakura RAT”? Well, you will now. Cybercriminals have been lacing their own malware and gaming cheats…
      June 6, 2025

      Google Warns That Hackers Abuse Modified Salesforce App to Steal Data

      (Reuters) – Google has warned Salesforce users that hackers are tricking employees at companies in Europe and the Americas into…
      May 30, 2025

      CyberSec Malaysia 2025: CyberSecurity Malaysia’s Keynote Reveals the Country Is Not Up to Speed on Cyber Resilience

      This year, CyberSecAsia made its way through Malaysia once again. Some frequent sponsors made a repeat appearance from last year.…
      May 15, 2025

      Japan Seeks to Enhance Cybersecurity by Doubling Industry Professionals by 2030

        The Japanese government is taking cybersecurity very seriously. In fact, it is looking to double the number of qualified…
      May 15, 2025

      Security Analysts Say Ransomware Group Lockbit Might Have Been Hacked

        Lockbit might have gotten a dose of its own medicine, at least according to cybersecurity analysts. According to Reuters,…
      May 9, 2025

      GMA Network Confirms Recent Hack But Dismisses Its Impact

        GMA Network all but confirmed that it got hacked recently with a statement touting a thorough investigation and a…

      Blogs

        Blogs
        May 26, 2025

        Exploiting the AI Boom: Check Point Breaks Down How Threat Actors Are Targeting Trust in Generative Platforms

        As generative AI (Artificial Intelligence) continues to capture global attention, threat actors are quick to exploit AI’s capabilities and popularity. From deepfake…
        Blogs
        April 22, 2025

        Is AI the Scammer’s New Best Friend?

        AI is empowering the masses and levelling the playing field, but not always for the better. While carrying out sophisticated…
        Blogs
        April 18, 2025

        How Deepfake Scammers Almost Pulled Off a Half-Million Dollar Heist

        They say if it looks like a duck, swims like a duck, and quacks like a duck, then it probably…
        Blogs
        February 26, 2025

        Breaking the Cycle: Preventing Re-Victimisation in Cyber Extortion Attacks

        Cyber extortion has evolved into multi-layered threats that go beyond locking systems and demanding ransom, combining data encryption with tactics…
        Blogs
        February 25, 2025

        Are You Overlooking Your Digital Blind Spots? How EASM Can Protect What You Can’t See

        What does the future of enterprise technology look like? According to a survey by IoT Analytics, it will be shaped…
        Blogs
        February 4, 2025

        Threat Detection Alone Won’t Cut It: Is Your Organisation Truly Cyber Resilient?

        The idea that cyber threats are evolving isn’t new, but the pace and complexity of threats facing today’s organisations definitely…
        Blogs
        November 18, 2024

        Generative AI & Quantum Risks: Are You Prepared for the Next Wave of Cybersecurity?

        The rise of generative AI is changing the industry and opening doors to creativity and innovation that seemed unattainable just…
        Blogs
        September 26, 2024

        When the Shield Gets Breached: How VPN Vulnerabilities Highlight the Need for Everywhere Security

        With the dust of the remote work revolution finally settling, it’s evident that many businesses have adopted a more hybrid…