News

There are a total of 24 unique award categories for established cybersecurity vendors in APAC. Additionally, we are introducing 1-3 rising stars awards to recognize upcoming cybersecurity vendors who ...
Weak, short, or predictable passwords are easily cracked; use strong, unique combinations and enable advanced authentication for better protection. One of the biggest drivers of data breaches so far ...
A new cybercrime campaign uses advanced phishing, obfuscated scripts, and malicious smart contracts to steal millions from unsuspecting cryptocurrency wallet holders. According to the latest threat ...
A mother’s lawsuit over her son’s alleged chatbot-induced suicide will soon set legal precedents in AI creators’ rights and IP boundaries. A mother in Florida has filed a wrongful-death lawsuit ...
Using fake ads, counterfeit websites, and malicious remote-access tool executables disguised as AI-generated output, cybercriminals waste no time exploiting popular platforms. A major cyberattack ...
Learn how Rich Communication Services may help counter phishing and scams, while remaining mindful of its evolving risks and limitations. As perpetrators of phishing tactics become increasingly adept ...
Despite raised awareness of post-pandemic remote-working cyber risks, one cybersecurity firm’s South-east Asian user base was still highly vulnerable last year. Data from a cybersecurity firm’s client ...
Cybercriminals are adapting new technologies and social engineering tactics to target backup data. Here are tips for addressing such evolving vectors. With digitalization shifting the need for printed ...
The UAE’s national cybersecurity strategy aims to secure the country’s digital future, positioning it as a safe and innovative hub for businesses and residents. At GITEX Asia held in Singapore in ...
Citing legacy system risks and prioritization needs, cybersecurity firms are stressing urgent patching for five of 71 exploited Microsoft vulnerabilities. The latest Patch Tuesday fixes have drawn ...
What are the key risks facing businesses adopting blockchain technology and smart contracts, and how should we proactively secure our businesses against emerging blockchain-related threats? A PwC ...
Despite law enforcement crackdowns, questions remain about the group’s resurgence, evolving phishing tactics, and ongoing risks to organizations. Remember the saga involving the threat group Scattered ...