<
>

CSA RMiT Event –Tenable and Trend Micro Tell us to Patch, Patch and Patch Again

CSA was pleased to host over 25 Malaysian Financial Services companies to discuss how to get compliant by October for Bank Negara’s Risk Management in IT framework. The event took place on 18th September at Aloft in KL...

CSA Event Supported by Tenable Demystifies RMiT for Malaysia’s FSI Companies

Here at Cybersecurity ASEAN (CSA), we try to do more than just deliver cybersecurity news on a daily basis. We believe our role is to help cybersecurity professionals understand the latest developments in their space. When it...

Malicious GIFs Exploit Whatsapp Vulnerability in Android

WhatsApp has a vulnerability that leverages malicious GIFS to compromise user chat sessions, files and messages. The security flaw, referred to as CVE-2019-11932, is a double-free bug that exists in WhatsApp for Android in all...

Shoulder Surfing, and Why Session Management is Important

Authored by: Morey J. Haber, CTO, CISO, BeyondTrust “Shoulder surfing” may be a near perfect personal attack vector. If you are not familiar with the concept, it is literally a threat actor looking over your...

Is your iPhone really safe?

On August 29th, Project Zero, Google’s Threat Analysis Group revealed that malicious websites had been covertly and successfully hacking iPhones for years. The report stated the hacked sites were being used in...

Twitter Hacks: How Secure is Social Media?

There’s no denying that social media plays a big role in our lives today. From Facebook to Instagram to Twitter, these social media apps have become a major role of influence in our daily lives. Social media applications...

What is The Cloud?

Author: Morey Haber, CTO and CISO at BeyondTrust   The cloud means so many different things to so many people. If you ask a grade school child “what is the cloud,” you may get a response about the water...

One Quarter of Social Media Accounts Created are Fake – And Here is What We Found on Linkedin

The recent Fraud and Abuse Report published by Arkose Labs a few days ago, gives insight to the number of fraudulent social media logins and new account creations that are being created en masse each day. It should be noted...

SMEs Can Have Access to Expert Cybersecurity Professionals Too

  Cyber security awareness is becoming a top priority for business globally. A large global company can withstand substantial losses from cyber attacks, for SMEs it can destroy your entire business. According to the Verizon...

How Would You Like Access to Cybersecurity Experts on Tap?

  The problem with Cybersecurity is that “you don’t know what you don’t know”. If you consider the number of cybersecurity accreditations and qualifications a highly rated Cybersecurity expert has...