Press Release
    January 28, 2025

    New Research from Abnormal Security Reveals a Surge in Email Attacks Across the APAC Region

    Abnormal Security, the leader in AI-native human behaviour security, today released new data that showcases…
    Press Release
    January 28, 2025

    Commvault Partners with CrowdStrike to Accelerate Threat Detection and Safe Recovery

    Commvault, a leading provider of cyber resilience and data protection solutions for the hybrid cloud,…
    Press Release
    January 28, 2025

    Fenix24 Acquires vArmour to Boost Cyber Resiliency and Network Insights

    Fenix24, an industry-leading cyber disaster recovery firm that is transforming the post-breach restoration process and…
    Press Release
    January 27, 2025

    ‘Tycoon 2FA’ Phishing-as-a-Service Evolves to Evade Security Tools, Barracuda Warns

    The widely used Tycoon 2FA Phishing-as-a-Service (PhaaS) has been updated with a range of tactics…
    Bylines
    January 27, 2025

    The Collision of AI and Cybersecurity: Building the Future of Digital Defense

    In today’s hyper-connected world, cybersecurity threats aren’t just evolving—they’re mutating at breakneck speed. As data…
    Press Release
    January 27, 2025

    MYEG Partners with MyDigital ID Solutions to Establish Malaysia’s Digital Identity Ecosystem

    Malaysia’s leading digital services company MY E.G. Services Berhad (“MYEG”) is proud to announce a strategic…
    Press Release
    January 27, 2025

    Thales: Data Privacy Day a Timely Reminder for Firms to Tighten Grip on Data and Strengthen Business Outcomes

    As Data Privacy Day (January 28) approaches, Thales is calling on businesses to take greater…
    Press Release
    January 27, 2025

    Keeper Security Insight Report: Navigating a Hybrid Authentication Landscape

    Keeper Security, the leading cybersecurity provider of zero-trust and zero-knowledge Privileged Access Management (PAM) software…
    Executive interviews
    January 24, 2025

    BlackBerry Experts Urge Cybersecurity as Top Priority Amid Malaysia’s ASEAN Chairmanship

    During the Asia International Security Summit & Expo (AISSE) Cybercrime Summit 2025, held on 21st…
    Press Release
    January 24, 2025

    Top Priorities for Cybersecurity Leaders in 2025: Info-Tech Research Group Publishes Annual Report

    Info-Tech-Research Group has highlighted in a new report that the continued escalation of sophistication and…
      January 23, 2025

      Cybercriminals Exploiting Microsoft Teams and Email Bombing in New Ransomware Tactics

      Cybercriminals are leveraging Microsoft Teams, email bombings, and remote access tools to orchestrate sophisticated ransomware campaigns, according to recent findings…
      January 20, 2025

      Cisco AI Defense: A Revolutionary Step or a Necessary Complexity in AI Security?

      On 16th January 2025, Cisco hosted a virtual roundtable to launch its highly-anticipated Cisco AI Defense, a platform aimed at…
      January 7, 2025

      Tech Tarik Think Tank Explores the Future of Digital Identities and Trust

      Technology is catapulting us into a future that is ever more connected, efficient and undeniably digital. And based on the…
      November 6, 2024

      Digital Vendetta: The Malicious Impact of Disgruntled Employees

      While businesses pour resources into defending against cyber attacks from the outside, an often-overlooked risk is a far more personal…
      October 10, 2024

      UNODC Report Reveals Criminal Gangs in Asia Getting Big Assist From AI, Crypto, and More

      Criminals, assemble! That appears to be happening in Asia right now, with organised crime syndicates consolidating their groups and expanding…
      October 2, 2024

      Quantum Threat to Cryptography: Experts Warn of an Extinction-Level Event in Digital Trust

      Quantum computing is hitting the headlines, and most of the time for good reasons. As tech players like Microsoft and…
      September 27, 2024

      Dell’s Triple Breach, a Critical Wake-Up Call for Cybersecurity

      Fool me once, shame on you; fool me twice, shame on me. Fool me thrice, shame on both of us.…
      September 18, 2024

      Goodbye, Passwords. Hello, Passkeys!!

      Earlier this year, Malaysia’s National Cyber Security Agency (NACSA) passed the Cyber Security Act 854, marking a key step in…

      Blogs

        Blogs
        November 18, 2024

        Generative AI & Quantum Risks: Are You Prepared for the Next Wave of Cybersecurity?

        The rise of generative AI is changing the industry and opening doors to creativity and innovation that seemed unattainable just…
        Blogs
        September 26, 2024

        When the Shield Gets Breached: How VPN Vulnerabilities Highlight the Need for Everywhere Security

        With the dust of the remote work revolution finally settling, it’s evident that many businesses have adopted a more hybrid…
        Blogs
        September 18, 2024

        Three Hidden Web Application Vulnerabilities You Need to Know About

        In today’s hyper-connected world, web applications are the backbone of many organisations, driving everything from customer engagement to backend operations.…
        Blogs
        September 5, 2024

        Disrupting the Disruptor: A Step-by-Step Strategy to Stonewall DDoS Attacks

        Service delays are bad for business. Service denial is even worse. Distributed Denial-of-Service (DDoS) attacks can do both, overwhelming a…
        Blogs
        August 27, 2024

        The Criticality of Security: How to Address the Modern Challenge of Securing APIs

        Application Programming Interfaces (API) are dominating the Internet, with successful API requests accounting for 57% of the Internet traffic (dynamic…
        Blogs
        August 13, 2024

        Could Instagram’s New “Feature” Make Stalking Easier?

        Instagram recently rolled out a new “Live Location” feature, which has sparked quite a few discussions, well, mostly concerns regarding…
        Blogs
        August 5, 2024

        The Critical Role of Converged Endpoint Management for Ensuring Enterprise Resilience

        Did you know there are more than 1.4 billion Windows devices currently in use by businesses worldwide? And this figure…
        Blogs
        July 26, 2024

        The Criticality of API Security: Guarding the Gateways of Digital Interactions

        The ability to innovate and utilise digital assets is a differentiator that sets leaders apart from laggards in this digital…