Press Release
    June 23, 2025

    Trend Micro Set to Deliver Secure Infrastructure at Scale

    Trend Micro Incorporated, a global cybersecurity leader, has announced it will deliver a suite of…
    Press Release
    June 23, 2025

    Kaspersky Study: 7% of Industrial Organisations Tackle Vulnerabilities Only When Necessary

    The study “Securing OT with Purpose-Built Solutions” conducted by Kaspersky in collaboration with VDC Research,…
    Press Release
    June 20, 2025

    Jumio Launches Premium Liveness Detection Solution vs. Deepfakes, Injection Attacks

    Jumio, the leader in Artificial Intelligence (AI)-powered identity intelligence anchored in biometric authentication, automation and…
    Press Release
    June 20, 2025

    Tenable’s 2025 Cloud Security Risk Report: Cloud Security Gaps Threaten SEA Businesses

    Businesses in Singapore and across Southeast Asia are facing a silent crisis of cloud vulnerabilities,…
    Cloud Security
    June 19, 2025

    Cloudflare Log Explorer Equips Businesses with Native Security Forensics for Faster Insights with Fewer Tools

    Cloudflare, Inc., the leading connectivity cloud company, has announced the general availability of Cloudflare Log…
    Press Release
    June 19, 2025

    NTT DATA Research Reveals C-Suite Misalignment Over GenAI Adoption

    NTT DATA, a global leader in digital business and technology services, has launched its new…
    Cyber Crime & Forensic
    June 18, 2025

    Taiwan Cyber Unit: Country Unfazed by China Bounty Offer

    (Reuters) – Taiwan’s cyber forces will not be intimidated by China’s threats of a bounty…
    Press Release
    June 18, 2025

    Salesforce State of IT Report: APAC Security Leaders Optimistic About Agentic AI to Tackle Security Concerns, but Concerns Remain

    As Artificial Intelligence (AI) adoption accelerates and cyber threats increase, nearly 8 in 10 IT…
    Press Release
    June 17, 2025

    CrowdStrike Falcon for AWS Security Incident Response Strengthens Cyber Resilience for AWS Customers

    CrowdStrike has unveiled Falcon for AWS Security Incident Response at AWS re:Inforce 2025, a new program that provides AWS…
    Press Release
    June 17, 2025

    SentinelOne Accelerates Secure Cloud Migrations for AWS Customers

    SentinelOne®, a global leader in Artificial Intelligence (AI)-powered security, has announced it has joined the…
      June 10, 2025

      Verizon Business Releases Findings from 18th Data Breach Investigations Report

      Verizon Business has released the results of its annual Data Breach Investigations Report, which is now on its 18th year.…
      June 10, 2025

      ZeroBounce Reveals Four Tactics Phishing Syndicates Use Today

      Phishing is a massive problem in today’s worsening cybersecurity landscape. In fact, the latest FBI Internet Crime Report reveals that…
      June 9, 2025

      Sakura RAT: Cybercriminals Sabotaged by Their Own Malware Campaign, Sophos Finds

      Ever heard of the “Sakura RAT”? Well, you will now. Cybercriminals have been lacing their own malware and gaming cheats…
      June 6, 2025

      Google Warns That Hackers Abuse Modified Salesforce App to Steal Data

      (Reuters) – Google has warned Salesforce users that hackers are tricking employees at companies in Europe and the Americas into…
      May 30, 2025

      CyberSec Malaysia 2025: CyberSecurity Malaysia’s Keynote Reveals the Country Is Not Up to Speed on Cyber Resilience

      This year, CyberSecAsia made its way through Malaysia once again. Some frequent sponsors made a repeat appearance from last year.…
      May 15, 2025

      Japan Seeks to Enhance Cybersecurity by Doubling Industry Professionals by 2030

        The Japanese government is taking cybersecurity very seriously. In fact, it is looking to double the number of qualified…
      May 15, 2025

      Security Analysts Say Ransomware Group Lockbit Might Have Been Hacked

        Lockbit might have gotten a dose of its own medicine, at least according to cybersecurity analysts. According to Reuters,…
      May 9, 2025

      GMA Network Confirms Recent Hack But Dismisses Its Impact

        GMA Network all but confirmed that it got hacked recently with a statement touting a thorough investigation and a…

      Blogs

        Blogs
        May 26, 2025

        Exploiting the AI Boom: Check Point Breaks Down How Threat Actors Are Targeting Trust in Generative Platforms

        As generative AI (Artificial Intelligence) continues to capture global attention, threat actors are quick to exploit AI’s capabilities and popularity. From deepfake…
        Blogs
        April 22, 2025

        Is AI the Scammer’s New Best Friend?

        AI is empowering the masses and levelling the playing field, but not always for the better. While carrying out sophisticated…
        Blogs
        April 18, 2025

        How Deepfake Scammers Almost Pulled Off a Half-Million Dollar Heist

        They say if it looks like a duck, swims like a duck, and quacks like a duck, then it probably…
        Blogs
        February 26, 2025

        Breaking the Cycle: Preventing Re-Victimisation in Cyber Extortion Attacks

        Cyber extortion has evolved into multi-layered threats that go beyond locking systems and demanding ransom, combining data encryption with tactics…
        Blogs
        February 25, 2025

        Are You Overlooking Your Digital Blind Spots? How EASM Can Protect What You Can’t See

        What does the future of enterprise technology look like? According to a survey by IoT Analytics, it will be shaped…
        Blogs
        February 4, 2025

        Threat Detection Alone Won’t Cut It: Is Your Organisation Truly Cyber Resilient?

        The idea that cyber threats are evolving isn’t new, but the pace and complexity of threats facing today’s organisations definitely…
        Blogs
        November 18, 2024

        Generative AI & Quantum Risks: Are You Prepared for the Next Wave of Cybersecurity?

        The rise of generative AI is changing the industry and opening doors to creativity and innovation that seemed unattainable just…
        Blogs
        September 26, 2024

        When the Shield Gets Breached: How VPN Vulnerabilities Highlight the Need for Everywhere Security

        With the dust of the remote work revolution finally settling, it’s evident that many businesses have adopted a more hybrid…