Press Release
    July 15, 2025

    Indosat, Mastercard, Kemkomdigi Launch New Cyber Security Training Program in Indonesia 

    Indosat Ooredoo Hutchison (Indosat or IOH) and Mastercard continue their strategic collaboration with the Human Resource Development Agency for…
    Cyber Safety
    July 15, 2025

    ABI Research: Industrial Environments Are 10–15 Years Behind in Cybersecurity Despite Regulatory Push for Secure Hardware

    Integrating security into industrial control systems (ICS) is a crucial next step in creating next-generation…
    Bylines
    July 15, 2025

    The Role of Higher Education in Building a Cyber-Resilient Workforce

    In today’s hyper-connected global economy, cybersecurity is a strategic risk at the highest levels of…
    Uncategorized
    July 14, 2025

    InboxArmy Outlines Survival Plan After 16B Password Dump

    InboxArmy has taken notice of the recent massive password dump, and now it wants everyone…
    Press Release
    July 14, 2025

    JFrog Security Research Team Discovers Critical Remote Code Execution Vulnerability Hijacking mcp-Remote Clients

    The JFrog Security Research team has announced its discovery of a critical vulnerability in an mcp-remote server capable of…
    Bylines
    July 14, 2025

    The Time Is Now to Secure Telecommunications in Asia Pacific 

    When it comes to telecommunications, the Asia Pacific has some of the most advanced technological…
    Press Release
    July 14, 2025

    Kaspersky Partners with SIS International Limited to Expand Distribution in Hong Kong

    Global cybersecurity and digital privacy company Kaspersky has announced it is expanding its distribution network…
    Press Release
    July 11, 2025

    Fortinet Report: OT Cybersecurity Risk Elevates within Executive Leadership Ranks

    Fortinet® the global cybersecurity leader driving the convergence of networking and security, today announced the…
    Press Release
    July 11, 2025

    BG100 Speedgate by HID, ASSA ABLOY Recognised with Renowned Red Dot Award for Innovative Biometric eGate Design

    HID, a worldwide leader in trusted identity and biometric solutions; and ASSA ABLOY, a global…
    Press Release
    July 11, 2025

    NDR Leader ExtraHop® Expands Global Footprint in Singapore

    ExtraHop®, a leader in modern network detection and response (NDR), has announced it is expanding…
      June 10, 2025

      Verizon Business Releases Findings from 18th Data Breach Investigations Report

      Verizon Business has released the results of its annual Data Breach Investigations Report, which is now on its 18th year.…
      June 10, 2025

      ZeroBounce Reveals Four Tactics Phishing Syndicates Use Today

      Phishing is a massive problem in today’s worsening cybersecurity landscape. In fact, the latest FBI Internet Crime Report reveals that…
      June 9, 2025

      Sakura RAT: Cybercriminals Sabotaged by Their Own Malware Campaign, Sophos Finds

      Ever heard of the “Sakura RAT”? Well, you will now. Cybercriminals have been lacing their own malware and gaming cheats…
      June 6, 2025

      Google Warns That Hackers Abuse Modified Salesforce App to Steal Data

      (Reuters) – Google has warned Salesforce users that hackers are tricking employees at companies in Europe and the Americas into…
      May 30, 2025

      CyberSec Malaysia 2025: CyberSecurity Malaysia’s Keynote Reveals the Country Is Not Up to Speed on Cyber Resilience

      This year, CyberSecAsia made its way through Malaysia once again. Some frequent sponsors made a repeat appearance from last year.…
      May 15, 2025

      Japan Seeks to Enhance Cybersecurity by Doubling Industry Professionals by 2030

        The Japanese government is taking cybersecurity very seriously. In fact, it is looking to double the number of qualified…
      May 15, 2025

      Security Analysts Say Ransomware Group Lockbit Might Have Been Hacked

        Lockbit might have gotten a dose of its own medicine, at least according to cybersecurity analysts. According to Reuters,…
      May 9, 2025

      GMA Network Confirms Recent Hack But Dismisses Its Impact

        GMA Network all but confirmed that it got hacked recently with a statement touting a thorough investigation and a…

      Blogs

        Blogs
        May 26, 2025

        Exploiting the AI Boom: Check Point Breaks Down How Threat Actors Are Targeting Trust in Generative Platforms

        As generative AI (Artificial Intelligence) continues to capture global attention, threat actors are quick to exploit AI’s capabilities and popularity. From deepfake…
        Blogs
        April 22, 2025

        Is AI the Scammer’s New Best Friend?

        AI is empowering the masses and levelling the playing field, but not always for the better. While carrying out sophisticated…
        Blogs
        April 18, 2025

        How Deepfake Scammers Almost Pulled Off a Half-Million Dollar Heist

        They say if it looks like a duck, swims like a duck, and quacks like a duck, then it probably…
        Blogs
        February 26, 2025

        Breaking the Cycle: Preventing Re-Victimisation in Cyber Extortion Attacks

        Cyber extortion has evolved into multi-layered threats that go beyond locking systems and demanding ransom, combining data encryption with tactics…
        Blogs
        February 25, 2025

        Are You Overlooking Your Digital Blind Spots? How EASM Can Protect What You Can’t See

        What does the future of enterprise technology look like? According to a survey by IoT Analytics, it will be shaped…
        Blogs
        February 4, 2025

        Threat Detection Alone Won’t Cut It: Is Your Organisation Truly Cyber Resilient?

        The idea that cyber threats are evolving isn’t new, but the pace and complexity of threats facing today’s organisations definitely…
        Blogs
        November 18, 2024

        Generative AI & Quantum Risks: Are You Prepared for the Next Wave of Cybersecurity?

        The rise of generative AI is changing the industry and opening doors to creativity and innovation that seemed unattainable just…
        Blogs
        September 26, 2024

        When the Shield Gets Breached: How VPN Vulnerabilities Highlight the Need for Everywhere Security

        With the dust of the remote work revolution finally settling, it’s evident that many businesses have adopted a more hybrid…