<
>

In the Era of Ransomware, Robust Data Management Is Key

Ransomware is the new data breach. Nowadays, cybercriminals are no longer content just exfiltrating data and either leaking it on the dark web or selling it to the highest bidder. Instead, they would rather hold that data...

A Human Only Framework is Not Enough to Combat Incoming Cyber Attacks

“Humans alone can’t protect a company,” states Stephen McNulty, President of Micro Focus APJ regarding the adoption of AI in cybersecurity. Micro Focus is a company that provides “mission-critical software...

Is Your Focus on Compliance Undermining Your Cybersecurity Strategy?

When it comes to cybersecurity, business leaders often make the mistake of defining their security policies based on regulatory requirements with the goal of preventing fines. This often results in them operating with a...

Kaseya and DeadRinger Attacks: A Reminder for Public and Private Sectors to Change the Way Cyber Conflict is Fought

Cybereason recently announced the discovery of several previously unknown cyber attack campaigns infiltrating major telecommunications providers across Southeast Asia – a long-running espionage campaign dubbed...

DDoS Attacks on the Rise: Don’t Turn a Blind Eye and Secure Your System Now

DDoS attacks have disrupted companies far and wide in recent times. Almost five million Remote Desktop Protocol (RDP) servers are exposed to the Internet – around two million more than before the pandemic. In an...

The Unheard Story of IIS Malware - The Malware That Gives Attackers Complete Control Over Compromised Servers

Have you ever heard of IIS malware? It’s not a common term that most people are familiar with, but it is not new. Cybercriminals have been exploiting the IIS web server software for Windows since 2013. Now, IIS backdoors...

From Partnership to Acquisition: How Ivanti Acquired RiskSense Amidst the “Cyber Pandemic”

Cybersecurity threats have been on the rise as the current global pandemic sinks its hooks into humanity. Since the arrival of Covid-19, the world has discovered flaws within its systems, and criminals have taken advantage of...

Horangi CEO Shares Future Plans for APAC in Addressing the Rising Demand for Cybersecurity

Southeast Asian cybersecurity company, Horangi recently announced that it is making its cybersecurity services available to the region’s organisations via Amazon Web Services (AWS) Marketplace, making it one of the first...

As Malaysia Gives Green Light to 5G, Is the Country Prepared for the Security Challenges?

AFP reported that the pandemic has created a “perfect storm for cyber attacks”, with millions of Malaysians working in unfamiliar, less secure environments and eager for information about the coronavirus and new...

Beware of Dangerous Permissions: Your Apps May Be Collecting More Data Than It Needs To

We download and install a lot of applications on our phones. While doing that, have we even taken a glimpse of the app permissions they are requesting? Most of us would probably say no just because we don’t have the time to...