Press Release
    June 30, 2025

    ESET Threat Report: ClickFix Fake Error Surges, Spreads Ransomware, Other Malware

    ESET has released its latest Threat Report, which summarises threat landscape trends seen in ESET…
    Press Release
    June 30, 2025

    KnowBe4, Microsoft Strengthen Email Security Through Strategic Integration

    KnowBe4, a world-renowned cybersecurity platform that comprehensively addresses human risk management, has announced a strategic…
    Press Release
    June 30, 2025

    Trend Micro Launches Scam Radar: Industry-First Personalised Early Scam Warning Feature for Consumers

    Trend Micro Incorporated, a global leader in cybersecurity, recently announced the launch of Scam Radar,…
    Press Release
    June 30, 2025

    Kaspersky: ChatGPT-Mimicking Cyberthreats Surge 115% in Early 2025, SMBs Increasingly Targeted

    In 2025, nearly 8,500 users from small and medium-sized businesses (SMBs) faced cyberattacks where malicious…
    Bylines
    June 27, 2025

    9 Reasons APAC Businesses Should Prioritise Privileged Access Management

    In cybersecurity, credentials function like keys to a building—anyone holding them has access. That is…
    Press Release
    June 27, 2025

    Sophos’ State of Ransomware Report Finds Nearly Half of Companies Opt to Pay Ransom

    Sophos, a global leader of innovative security solutions for defeating cyberattacks, today released its sixth…
    Press Release
    June 27, 2025

    Keeper Security Achieves SOC 3 Compliance, Furthering Commitment to Transparency, Excellence

    Keeper Security, the leading cybersecurity provider of zero-trust and zero-knowledge Privileged Access Management (PAM) software protecting…
    Press Release
    June 26, 2025

    Panasonic Information Systems Secures Access to Thousands of Servers with CyberArk

    CyberArk, the global leader in identity security,  has announced that Panasonic Information Systems Co. Ltd. has…
    Press Release
    June 25, 2025

    Imperva Application Security Integrates API Detection and Response, Setting New Standard in API Security

    Thales has announced new detection and response capabilities in the Imperva Application Security platform to protect against business…
    Press Release
    June 25, 2025

    Tenable Uncovers ‘GerriScary’ Supply Chain Compromise Vulnerability in Popular Google Open Source Projects

    Tenable, the exposure management company, has identified a vulnerability in Google’s open-source code review system,…
      June 10, 2025

      Verizon Business Releases Findings from 18th Data Breach Investigations Report

      Verizon Business has released the results of its annual Data Breach Investigations Report, which is now on its 18th year.…
      June 10, 2025

      ZeroBounce Reveals Four Tactics Phishing Syndicates Use Today

      Phishing is a massive problem in today’s worsening cybersecurity landscape. In fact, the latest FBI Internet Crime Report reveals that…
      June 9, 2025

      Sakura RAT: Cybercriminals Sabotaged by Their Own Malware Campaign, Sophos Finds

      Ever heard of the “Sakura RAT”? Well, you will now. Cybercriminals have been lacing their own malware and gaming cheats…
      June 6, 2025

      Google Warns That Hackers Abuse Modified Salesforce App to Steal Data

      (Reuters) – Google has warned Salesforce users that hackers are tricking employees at companies in Europe and the Americas into…
      May 30, 2025

      CyberSec Malaysia 2025: CyberSecurity Malaysia’s Keynote Reveals the Country Is Not Up to Speed on Cyber Resilience

      This year, CyberSecAsia made its way through Malaysia once again. Some frequent sponsors made a repeat appearance from last year.…
      May 15, 2025

      Japan Seeks to Enhance Cybersecurity by Doubling Industry Professionals by 2030

        The Japanese government is taking cybersecurity very seriously. In fact, it is looking to double the number of qualified…
      May 15, 2025

      Security Analysts Say Ransomware Group Lockbit Might Have Been Hacked

        Lockbit might have gotten a dose of its own medicine, at least according to cybersecurity analysts. According to Reuters,…
      May 9, 2025

      GMA Network Confirms Recent Hack But Dismisses Its Impact

        GMA Network all but confirmed that it got hacked recently with a statement touting a thorough investigation and a…

      Blogs

        Blogs
        May 26, 2025

        Exploiting the AI Boom: Check Point Breaks Down How Threat Actors Are Targeting Trust in Generative Platforms

        As generative AI (Artificial Intelligence) continues to capture global attention, threat actors are quick to exploit AI’s capabilities and popularity. From deepfake…
        Blogs
        April 22, 2025

        Is AI the Scammer’s New Best Friend?

        AI is empowering the masses and levelling the playing field, but not always for the better. While carrying out sophisticated…
        Blogs
        April 18, 2025

        How Deepfake Scammers Almost Pulled Off a Half-Million Dollar Heist

        They say if it looks like a duck, swims like a duck, and quacks like a duck, then it probably…
        Blogs
        February 26, 2025

        Breaking the Cycle: Preventing Re-Victimisation in Cyber Extortion Attacks

        Cyber extortion has evolved into multi-layered threats that go beyond locking systems and demanding ransom, combining data encryption with tactics…
        Blogs
        February 25, 2025

        Are You Overlooking Your Digital Blind Spots? How EASM Can Protect What You Can’t See

        What does the future of enterprise technology look like? According to a survey by IoT Analytics, it will be shaped…
        Blogs
        February 4, 2025

        Threat Detection Alone Won’t Cut It: Is Your Organisation Truly Cyber Resilient?

        The idea that cyber threats are evolving isn’t new, but the pace and complexity of threats facing today’s organisations definitely…
        Blogs
        November 18, 2024

        Generative AI & Quantum Risks: Are You Prepared for the Next Wave of Cybersecurity?

        The rise of generative AI is changing the industry and opening doors to creativity and innovation that seemed unattainable just…
        Blogs
        September 26, 2024

        When the Shield Gets Breached: How VPN Vulnerabilities Highlight the Need for Everywhere Security

        With the dust of the remote work revolution finally settling, it’s evident that many businesses have adopted a more hybrid…