Southeast Asia reaffirms commitment to cooperation amidst increasing cybersecurity challenges in the age of artificial intelligence

Southeast Asian nations have established a physical ASEAN Regional CERT site in Singapore to enhance cybersecurity collaboration in the region. The site was launched during the 9th ASEAN Ministerial Conference on Cybersecurity, with the aim of boosting information sharing and addressing cyber threats. Singapore will host and fund the regional CERT for up to 10 … Read more

Iranian hackers serve as middlemen offering access to vital infrastructure systems for sale.

Iranian hackers are breaching critical infrastructure organizations to collect credentials and network data for cyberattacks. Government agencies in the U.S., Canada, and Australia believe they are acting as initial access brokers using brute-force techniques. They aim to gain persistent access and move laterally within networks, using methods like password spraying and MFA fatigue. The hackers … Read more

A critical vulnerability in Kubernetes image builder exposes nodes to the risk of root access.

A critical security flaw has been found in the Kubernetes Image Builder that could allow attackers to gain root access. The vulnerability has been fixed in version 0.1.38. Temporary mitigations include disabling the builder account and rebuilding affected images. Other critical vulnerabilities have also been disclosed, including in Microsoft Dataverse, Imagine Cup, and Power Platform, … Read more

The Insider Threat: How Employees Can Be a Company’s Greatest Cybersecurity Risk

In the age of digital technology, cybersecurity has become a top priority for businesses of all sizes. While companies invest heavily in firewalls, encryption, and other technical safeguards to protect their sensitive data, many overlook one of the biggest threats to their cybersecurity: their own employees. The Insider Threat, or the risk posed by employees … Read more

Cybersecurity in the Age of Remote Work: Best Practices for Securing Your Network

The shift towards remote work has accelerated in recent years, with the global pandemic being a major driver in this transition. While remote work offers many benefits such as increased flexibility and work-life balance, it also presents new challenges when it comes to cybersecurity. As employees access company networks from their homes or other remote … Read more

How to Create a Strong Cybersecurity Policy for Your Organization

In today’s digital age, cybersecurity is more important than ever. With the increasing number of cyber threats and attacks, organizations must prioritize creating a strong cybersecurity policy to protect their sensitive data and information. A cybersecurity policy is a set of guidelines and protocols that outline the steps your organization will take to prevent, detect, … Read more

The Cost of Ignoring Cybersecurity: Why Businesses Need to Invest in Protection

In today’s digital age, cybersecurity is more important than ever. With the rise of cyber attacks and data breaches, businesses can no longer afford to ignore the importance of protecting their sensitive information. The cost of ignoring cybersecurity can be catastrophic, leading to financial loss, reputational damage, and even legal consequences. One of the most … Read more

Five Common Cybersecurity Threats and How to Avoid Them

In today’s digital age, cybersecurity threats have become a common concern for individuals and businesses alike. With the increasing reliance on technology for everyday tasks, cybercriminals are constantly finding new ways to exploit vulnerabilities and steal personal information. It is important to be aware of the common cybersecurity threats and take steps to protect yourself … Read more