In a recent escalation of customer cyber incidents involving “strange behavior” of an old (2010) version of Microsoft Word, a cybersecurity firm has sniffed out a new potentially persistent threat ...
AI and gaming-oriented phishing kits are making it easier for threat actors to victimize young gamers, according to one firm Between July 2023 and July 2024, a cybersecurity firm examined its ...
The North Korean threat group has been keeping up its job recruitment ploys, to steal developers’ corporate codebases and secrets When are state-sponsored cyber threat actors not satisfied with just ...
Cybercriminals are known to target large events that are of high media visibility around the world. For example, in the Euro 2024, some 15,000 credentials of customers of the Union of European ...
The world seems hell-bent on monetizing its own self-created AI hype, and threat actors are hell-bent on exploiting this The reported growing adoption of AI in data centers has driven the need for ...
While the lessons learned from the notorious cyber incident will not mitigate the massive damage inflicted worldwide, they bear repeating here In the wake of the CrowdStrike outage of July 2024, parts ...
Wait until tech-fashionistas and avid fans of wearables face a global coordinated attack never thought possible! With the worldwide rise of AI, concepts such as “techwear” and “smart fashion” combine ...
Study shows priority shifts in Asia’s digital native businesses — accelerating tech adoption demands new ways to manage rising complexity and security risks “Cutting-edge tech is at the core of DNA ...
One of the largest employment providers in Australia needed to protect data while reducing complexity when it decided to migrate from on-prem to multi-cloud. MAX Solutions (MAX) operates across ...
The 5th CybersecAsia Readers’ Choice Awards honors Asia Pacific’s leaders in cybersecurity for the critical roles played and the huge advances and innovations made over the last two years. SINGAPORE, ...
F5 Distributed Cloud Web App and API Protection (WAAP) outperforms the competition in SecureIQ Lab’s latest report. Tested alongside 12 leading enterprise-class WAAP solutions, F5 achieved exceptional ...
Organizations are increasingly effective at applying the “just enough” access piece using privileged access management (PAM) solutions, but they have largely neglected the time-limited part and ...