Press Release
    February 7, 2025

    Kaspersky Discovers New Crypto-Stealing Trojan in AppStore and Google Play

    Kaspersky Threat Research expertise center has discovered a new data-stealing Trojan, SparkCat, active in AppStore…
    Press Release
    February 7, 2025

    Okta Announces Multi-Year Partnership with the McLaren Racing Formula 1 Team

    Okta, Inc., the leading independent Identity partner, today announced a multi-year partnership with the McLaren…
    Press Release
    February 7, 2025

    Check Point Announces New AI-Powered Innovations to Bolster Unified Security Management for the Infinity Platform

    Check Point Software Technologies Ltd., a pioneer and global leader of cyber security solutions, today…
    Press Release
    February 6, 2025

    Qualys Introduces Managed Risk Operation Center (mROC) Partner Alliance to Scale Cyber Risk Services

    Qualys, Inc., a leading provider of disruptive cloud-based IT, security and compliance solutions, today announced…
    Press Release
    February 6, 2025

    The Institute of Internal Auditors (IIA) Releases the Cybersecurity Topical Requirement

    The Institute of Internal Auditors (The IIA) today released the Cybersecurity Topical Requirement, the first of…
    Press Release
    February 6, 2025

    18,000+ Devices Compromised: CloudSEK Disrupts Trojanised XWorm RAT Builder

    Think there’s honor among thieves? Think again. CloudSEK researchers have just exposed a trojanized version…
    Press Release
    February 5, 2025

    FS-ISAC Releases Timely Data Governance and Generative AI Guidance

    To help financial firms understand and mitigate the risks posed by implementing Generative Artificial Intelligence…
    Press Release
    February 5, 2025

    CyberArk Helps Modernise Identity and Access Management for Linux Machines With New Identity Bridge Capability

    CyberArk, the global leader in identity security, today announced Identity Bridge, an endpoint identity security…
    Press Release
    February 5, 2025

    Forescout Announces 2024 Threat Roundup Report

    Forescout Technologies, Inc., a global cybersecurity leader, announced key findings from its “2024 Threat Roundup”…
    Press Release
    February 4, 2025

    Sophos Completes Secureworks Acquisition

    Sophos and Secureworks®, two global cybersecurity pioneers that have innovated and redefined services and technology…
      January 23, 2025

      Cybercriminals Exploiting Microsoft Teams and Email Bombing in New Ransomware Tactics

      Cybercriminals are leveraging Microsoft Teams, email bombings, and remote access tools to orchestrate sophisticated ransomware campaigns, according to recent findings…
      January 20, 2025

      Cisco AI Defense: A Revolutionary Step or a Necessary Complexity in AI Security?

      On 16th January 2025, Cisco hosted a virtual roundtable to launch its highly-anticipated Cisco AI Defense, a platform aimed at…
      January 7, 2025

      Tech Tarik Think Tank Explores the Future of Digital Identities and Trust

      Technology is catapulting us into a future that is ever more connected, efficient and undeniably digital. And based on the…
      November 6, 2024

      Digital Vendetta: The Malicious Impact of Disgruntled Employees

      While businesses pour resources into defending against cyber attacks from the outside, an often-overlooked risk is a far more personal…
      October 10, 2024

      UNODC Report Reveals Criminal Gangs in Asia Getting Big Assist From AI, Crypto, and More

      Criminals, assemble! That appears to be happening in Asia right now, with organised crime syndicates consolidating their groups and expanding…
      October 2, 2024

      Quantum Threat to Cryptography: Experts Warn of an Extinction-Level Event in Digital Trust

      Quantum computing is hitting the headlines, and most of the time for good reasons. As tech players like Microsoft and…
      September 27, 2024

      Dell’s Triple Breach, a Critical Wake-Up Call for Cybersecurity

      Fool me once, shame on you; fool me twice, shame on me. Fool me thrice, shame on both of us.…
      September 18, 2024

      Goodbye, Passwords. Hello, Passkeys!!

      Earlier this year, Malaysia’s National Cyber Security Agency (NACSA) passed the Cyber Security Act 854, marking a key step in…

      Blogs

        Blogs
        February 4, 2025

        Threat Detection Alone Won’t Cut It: Is Your Organisation Truly Cyber Resilient?

        The idea that cyber threats are evolving isn’t new, but the pace and complexity of threats facing today’s organisations definitely…
        Blogs
        November 18, 2024

        Generative AI & Quantum Risks: Are You Prepared for the Next Wave of Cybersecurity?

        The rise of generative AI is changing the industry and opening doors to creativity and innovation that seemed unattainable just…
        Blogs
        September 26, 2024

        When the Shield Gets Breached: How VPN Vulnerabilities Highlight the Need for Everywhere Security

        With the dust of the remote work revolution finally settling, it’s evident that many businesses have adopted a more hybrid…
        Blogs
        September 18, 2024

        Three Hidden Web Application Vulnerabilities You Need to Know About

        In today’s hyper-connected world, web applications are the backbone of many organisations, driving everything from customer engagement to backend operations.…
        Blogs
        September 5, 2024

        Disrupting the Disruptor: A Step-by-Step Strategy to Stonewall DDoS Attacks

        Service delays are bad for business. Service denial is even worse. Distributed Denial-of-Service (DDoS) attacks can do both, overwhelming a…
        Blogs
        August 27, 2024

        The Criticality of Security: How to Address the Modern Challenge of Securing APIs

        Application Programming Interfaces (API) are dominating the Internet, with successful API requests accounting for 57% of the Internet traffic (dynamic…
        Blogs
        August 13, 2024

        Could Instagram’s New “Feature” Make Stalking Easier?

        Instagram recently rolled out a new “Live Location” feature, which has sparked quite a few discussions, well, mostly concerns regarding…
        Blogs
        August 5, 2024

        The Critical Role of Converged Endpoint Management for Ensuring Enterprise Resilience

        Did you know there are more than 1.4 billion Windows devices currently in use by businesses worldwide? And this figure…