
Data Breach – When Traditional Layers Of Cybersecurity Fail
Posted by Sebastian Toh, 26-11-2020Data Breach – When Traditional Layers Of Cybersecurity Fail “How Prepared Are You?” What happens when your traditional layers of cybersecurity fail? How can you stay ahead of the g...

CyberArk Launches AI-Powered Service to Remove Excessive Cloud Permissions
Posted by admin, 12-11-2020CyberArk the global leader in privileged access management, today announced CyberArk Cloud Entitlements Manager, the industry’s first privilege-based, artificial intelligence...

Majority of Microsoft 365 Admins Don’t Enable MFA
Posted by , 28-10-2020Beyond admins, researchers say that 97 percent of all total Microsoft 365 users do not use multi-factor authentication. Up to 78 percent of Microsoft 365 administrators do not have multi-factor...

New cyber security label for smart home devices launched; plans to have standards adopted overseas
Posted by , 09-10-2020SINGAPORE - A new labelling scheme to indicate the cyber security levels of home appliances has been launched in Singapore, with plans to have the standards adopted at an international level. The Cyb...

Black Hat 2020: Using Botnets to Manipulate Energy Markets for Big Profits
Posted by AngelaWong, 16-08-2020Black Hat 2020 session discusses how high-wattage connected devices like dishwashers and heating systems can be recruited into botnets and used to manipulate energy markets. Researchers are war...

NSA, FBI Warn of Linux Malware Used in Espionage Attacks
Posted by AngelaWong, 16-08-2020A never before seen malware has been used for espionage purposes via Linux systems, warn the NSA and FBI in a joint advisory. UPDATE The U.S. government is warning of new malware, dubbed Drovo...