Uncategorized
    August 21, 2025

    Sensedia and Incore Partner to Accelerate API Adoption in Malaysia

    Sensedia, a global leader specialising in APIs and integration solutions, and Incore, a leading provider…
    Threat Detection & Defense
    August 21, 2025

    MoneyMe Selects SEON to Strengthen Fraud Prevention and Credit Decisioning

    SEON, the command centre for fraud prevention and compliance, has announced that MoneyMe, one of…
    Uncategorized
    August 21, 2025

    Acronis Cyberthreats Report Finds AI-Powered Phishing, Social Engineering Fuelling Surge in Ransomware

    Acronis, a global leader in cybersecurity and data protection, has released the findings of the Acronis Cyberthreats…
    Press Release
    August 21, 2025

    Fortinet Enhances FortiRecon to Align with Continuous Threat Exposure Management (CTEM) Framework to Help Organisations Stay Ahead of Threats

    Fortinet®, the global cybersecurity leader driving the convergence of networking and security, recently announced significant enhancements…
    Uncategorized
    August 20, 2025

    Keeper CEO: Workday Breach Highlights Need to Extend Cyber Defence to Third-Pary Ecosystems

    Social engineering. That’s how hackers breached Workday’s defences early this August, pilfering away personal information…
    Bylines
    August 20, 2025

    Confronting Threat of Deepfakes in Financial Services

    Three in four Singaporeans cannot identify deepfakes. This shocking statistic from a survey by the Cyber…
    Press Release
    August 20, 2025

    CyberArk Achieves Cloud Service Provider Security Standard Certification from Dubai Electronic Security Centre

    CyberArk, the global leader in identity security, recently announced that it has received Cloud Service Provider (CSP) certification…
    Press Release
    August 19, 2025

    Phishing Evolves with AI, Stealth: Kaspersky Highlights Biometric, Signature Risks

    Kaspersky has announced it has detected and blocked over 142 million phishing link clicks in Q2 2025,…
    Press Release
    August 19, 2025

    CrowdStrike Unveils Falcon Next-Gen Identity Security

    CrowdStrike has announced CrowdStrike Falcon Next-Gen Identity Security, the first unified solution to protect every…
    Governance & Compliance
    August 19, 2025

    HID Acquires Intelligent Observation to Strengthen Its Healthcare RTLS Portfolio

    HID, a worldwide leader in trusted identity solutions, has announced it has acquired Intelligent Observation,…
      August 14, 2025

      Okta’s ‘AI at Work 2025’: Data Privacy, Cybersecurity Top of Mind Concerns in Business Use of AI

      Okta has the revealed findings from ”AI at Work 2025,” a new global survey of executives from companies of all sizes on their sentiments,…
      August 14, 2025

      NEC Corporation Provides Malaysia’s Cybersecurity Reality Check: Culture vs. Resilience

      In an age where digital transformation fuels business growth, a silent threat is undermining progress from within: a weak IT…
      August 12, 2025

      Chinese State Media: NVIDIA H20 Chips Not Safe for China

      (Reuters) – NVIDIA’s H20 chips pose security concerns for China, a social media account affiliated with China’s state media said on Sunday,…
      August 8, 2025

      Open Banking Is Coming to KL and Malaysian Banks Can’t Afford to Miss It

      The world of finance is changing fast. Open banking is at the heart of this transformation—allowing customers to share their…
      August 6, 2025

      Proofpoint Unmasks Microsoft OAuth Impersonation, Uncovers MFA Illusion

      For all of today’s technologies, many cyberattacks still depend on deception and subterfuge. Unfortunately, the ways cyber criminals are deceiving people and…
      July 28, 2025

      Cybersecurity Experts Give Penang’s Manufacturers Hard Truths and Awakenings

      Cybersecurity Asia (CSA) and the Federation of Malaysian Manufacturers (FMM) successfully held their second “Cybersecurity in Manufacturing: Making Things Secure”…
      June 10, 2025

      Verizon Business Releases Findings from 18th Data Breach Investigations Report

      Verizon Business has released the results of its annual Data Breach Investigations Report, which is now on its 18th year.…
      June 10, 2025

      ZeroBounce Reveals Four Tactics Phishing Syndicates Use Today

      Phishing is a massive problem in today’s worsening cybersecurity landscape. In fact, the latest FBI Internet Crime Report reveals that…

      Blogs

        Blogs
        May 26, 2025

        Exploiting the AI Boom: Check Point Breaks Down How Threat Actors Are Targeting Trust in Generative Platforms

        As generative AI (Artificial Intelligence) continues to capture global attention, threat actors are quick to exploit AI’s capabilities and popularity. From deepfake…
        Blogs
        April 22, 2025

        Is AI the Scammer’s New Best Friend?

        AI is empowering the masses and levelling the playing field, but not always for the better. While carrying out sophisticated…
        Blogs
        April 18, 2025

        How Deepfake Scammers Almost Pulled Off a Half-Million Dollar Heist

        They say if it looks like a duck, swims like a duck, and quacks like a duck, then it probably…
        Blogs
        February 26, 2025

        Breaking the Cycle: Preventing Re-Victimisation in Cyber Extortion Attacks

        Cyber extortion has evolved into multi-layered threats that go beyond locking systems and demanding ransom, combining data encryption with tactics…
        Blogs
        February 25, 2025

        Are You Overlooking Your Digital Blind Spots? How EASM Can Protect What You Can’t See

        What does the future of enterprise technology look like? According to a survey by IoT Analytics, it will be shaped…
        Blogs
        February 4, 2025

        Threat Detection Alone Won’t Cut It: Is Your Organisation Truly Cyber Resilient?

        The idea that cyber threats are evolving isn’t new, but the pace and complexity of threats facing today’s organisations definitely…
        Blogs
        November 18, 2024

        Generative AI & Quantum Risks: Are You Prepared for the Next Wave of Cybersecurity?

        The rise of generative AI is changing the industry and opening doors to creativity and innovation that seemed unattainable just…
        Blogs
        September 26, 2024

        When the Shield Gets Breached: How VPN Vulnerabilities Highlight the Need for Everywhere Security

        With the dust of the remote work revolution finally settling, it’s evident that many businesses have adopted a more hybrid…