Press Release
    August 29, 2025

    Keeper Security Launches KeeperAI to Deliver Real-Time Detection and Defence Against Cyber Threats

    As cyberattacks become quicker, more pervasive, and increasingly automated using Artificial Intelligence (AI), organisations are…
    Press Release
    August 29, 2025

    HID Unveils Next-Generation FIDO Hardware, Centralised Management at Scale

    HID, a global leader in trusted identity and access control solutions, has announced a new…
    Press Release
    August 29, 2025

    Netskope Threat Labs: Rate of Australian Workers Clicking on Phishing Links More Than Doubles in Nine Months

    Netskope Threat Labs, the threat research arm of security and networking company Netskope, has revealed…
    Press Release
    August 28, 2025

    New Sophos Report Finds AI Adoption, Increased Threat Activity Keeping Cybersecurity Burnout High in Malaysia in 2025

    Sophos, a global leader in advanced security solutions, has unveiled the fifth edition of its…
    Daily News
    August 28, 2025

    Inevitable? Proofpoint Gives Stern Warning About Phishing, Reveals Key Technique to Avoid It

    Cybersecurity isn’t just a software and infrastructure problem. It is as much a people problem…
    Uncategorized
    August 28, 2025

    Keeper Security: Why Cybersecurity Must Be the Foundation of the Semiconductor Industry

    The semiconductor industry is at the heart of some Asian states’ economic and technological future,…
    Press Release
    August 28, 2025

    Proofpoint’s 2025 ‘Voice of the CISO’ Report Reveals Heightened AI Risk, Alarming Surge in Data Loss Among Singapore Organisations

    Proofpoint, Inc., a leading cybersecurity and compliance company, has released its fifth annual Voice of the…
    Cyber Safety
    August 27, 2025

    Indosat, Cisco Launch New Security Operations Centre in Indonesia for AI-Powered Cybersecurity Threat Detection

    Indosat Ooredoo Hutchison (Indosat or IOH), in collaboration with Cisco, the worldwide leader in security…
    Device & IoT
    August 27, 2025

    Keysight Completes Industry-First PSA Certified Level 4 Evaluation for Silicon Labs’ SiXG301 SoC

    Keysight Technologies, Inc. has completed the industry’s first PSA Certified Level 4 security evaluation for…
    Bylines
    August 27, 2025

    Hack to Basics: Why Cyber Games Like ‘Capture the Flag’ Are Serious Business in Cybersecurity

    Cybersecurity has stepped out of the server room and into the boardroom. Once a quiet…
      August 25, 2025

      Microsoft Scales Back Chinese Access to Cyber Early Warning System

      (Reuters) – Microsoft recently announced that it has scaled back some Chinese companies’ access to its early warning system for…
      August 14, 2025

      Okta’s ‘AI at Work 2025’: Data Privacy, Cybersecurity Top of Mind Concerns in Business Use of AI

      Okta has the revealed findings from ”AI at Work 2025,” a new global survey of executives from companies of all sizes on their sentiments,…
      August 14, 2025

      NEC Corporation Provides Malaysia’s Cybersecurity Reality Check: Culture vs. Resilience

      In an age where digital transformation fuels business growth, a silent threat is undermining progress from within: a weak IT…
      August 12, 2025

      Chinese State Media: NVIDIA H20 Chips Not Safe for China

      (Reuters) – NVIDIA’s H20 chips pose security concerns for China, a social media account affiliated with China’s state media said on Sunday,…
      August 8, 2025

      Open Banking Is Coming to KL and Malaysian Banks Can’t Afford to Miss It

      The world of finance is changing fast. Open banking is at the heart of this transformation—allowing customers to share their…
      August 6, 2025

      Proofpoint Unmasks Microsoft OAuth Impersonation, Uncovers MFA Illusion

      For all of today’s technologies, many cyberattacks still depend on deception and subterfuge. Unfortunately, the ways cyber criminals are deceiving people and…
      July 28, 2025

      Cybersecurity Experts Give Penang’s Manufacturers Hard Truths and Awakenings

      Cybersecurity Asia (CSA) and the Federation of Malaysian Manufacturers (FMM) successfully held their second “Cybersecurity in Manufacturing: Making Things Secure”…
      June 10, 2025

      Verizon Business Releases Findings from 18th Data Breach Investigations Report

      Verizon Business has released the results of its annual Data Breach Investigations Report, which is now on its 18th year.…

      Blogs

        Blogs
        May 26, 2025

        Exploiting the AI Boom: Check Point Breaks Down How Threat Actors Are Targeting Trust in Generative Platforms

        As generative AI (Artificial Intelligence) continues to capture global attention, threat actors are quick to exploit AI’s capabilities and popularity. From deepfake…
        Blogs
        April 22, 2025

        Is AI the Scammer’s New Best Friend?

        AI is empowering the masses and levelling the playing field, but not always for the better. While carrying out sophisticated…
        Blogs
        April 18, 2025

        How Deepfake Scammers Almost Pulled Off a Half-Million Dollar Heist

        They say if it looks like a duck, swims like a duck, and quacks like a duck, then it probably…
        Blogs
        February 26, 2025

        Breaking the Cycle: Preventing Re-Victimisation in Cyber Extortion Attacks

        Cyber extortion has evolved into multi-layered threats that go beyond locking systems and demanding ransom, combining data encryption with tactics…
        Blogs
        February 25, 2025

        Are You Overlooking Your Digital Blind Spots? How EASM Can Protect What You Can’t See

        What does the future of enterprise technology look like? According to a survey by IoT Analytics, it will be shaped…
        Blogs
        February 4, 2025

        Threat Detection Alone Won’t Cut It: Is Your Organisation Truly Cyber Resilient?

        The idea that cyber threats are evolving isn’t new, but the pace and complexity of threats facing today’s organisations definitely…
        Blogs
        November 18, 2024

        Generative AI & Quantum Risks: Are You Prepared for the Next Wave of Cybersecurity?

        The rise of generative AI is changing the industry and opening doors to creativity and innovation that seemed unattainable just…
        Blogs
        September 26, 2024

        When the Shield Gets Breached: How VPN Vulnerabilities Highlight the Need for Everywhere Security

        With the dust of the remote work revolution finally settling, it’s evident that many businesses have adopted a more hybrid…