Based on a November 2024 survey of 400 IT security decision makers* by a cybersecurity firm on the topic of AI in cybersecurity (particular generative AI), some findings have been published. First, 65 ...
Crypto’s rise in sanctioned nations grows, but last Friday’s US$1.6bn heist reveals serious regulatory, state-sponsored and cyber vigilance gaps: upcoming report Cryptocurrency is carving out a ...
In a fast-evolving threat and technology landscape, cybersecurity together with digital transformation has become a top-of-mind issue at the Board and C-suite levels for organizations across all ...
Cybercriminals leave no potential victim behind — not even India’s micro-, small- and medium-sized enterprises (MSMEs). In an era where digital transformation is imperative for businesses of all sizes ...
In one of the largest thefts in digital asset history, hackers had on 22 Feb 2025 gained access to an offline Ethereum wallet and stolen US$1.5bn worth of digital assets, primarily consisting of ...
A never-before-seen attack using vSphere installation bundles (VIBs) across 10 machines could be the start of a VMpandemic Just as we experienced a ‘novel’ type of coronavirus in 2020, a novel malware ...
In a rapidly digitalizing payments landscape in Asia Pacific, balancing convenience and security has become essential. Is tokenization or passkeys or biometrics the answer? The Asia Pacific region ...
With AI, especially generative AI – the latest being China-developed DeepSeek – hogging the headlines in tech news across the region, what does that spell the cyberthreat landscape in Southeast Asia?
Insider threats are on the rise, with 60% of data breaches involving insiders. Since insiders already have access to critical data, their actions can pose significant risks if left unchecked.
Chances are your organization is using open source somewhere in your software development lifecycle, but is it secured? You could probably name at least one major supply-chain attack in the news by ...
On 26 September 2024, the Wall Street Journal reported that cyber espionage activities, allegedly backed by Beijing, had infiltrated several US internet service providers (ISPs). The primary objective ...
Know the various ways cybercriminals evade detection by using only a network’s own sanctioned tools for the attack. The best way to test if a door is locked is to try to open it. Similarly, one of the ...