News

Can the island-state serve as a global benchmark for election security as it gears up for national elections this year? AI has supercharged the internet and social media. As much as new information ...
Whether it’s phishing, ransomware or insider threats, it usually starts with a compromise in an organization’s identity management system… In a world of hybrid cloud and hybrid work, managing the ...
Emerging evidence is suggesting that cybersecurity infrastructure complexity, blind spots and lack of observability have been favoring AI-empowered threat actors Based on an analysis of 500+ major ...
Open source generative AI tools, when not managed well, amplify security risks through shadow IT, putting sensitive data and systems at risk Across the Asia-Pacific region, organizations are grappling ...
A recently-fixed privilege-escalation flaw has exposed critical risks in cloud service interdependencies and automatic service agents that could cause cascading vulnerabilities As cloud environments ...
ChatGPT’s latest image generator has captured the interest of multiple users worldwide with its ability to generate personal photos into Studio Ghibli-style images. However, users may overlook its ...
Latest findings from the Google Threat Intelligence Group (GTIG) on North Korea remote workers find operations shifting sights from the US to Europe and APAC. You must already have heard or read about ...
Based on a commissioned survey of 14,009 general respondents on their sentiments about trusting digital services in 2024, a multinational corporation with interests in the defence, aerospace, ...
Research surveys the prolific use of mobile malware in cross-platform surveillance and espionage campaigns by APT groups operating in the interest of China, Iran, North Korea and Vietnam. Mobile ...
In one cybersecurity firm’s Jan/Feb 2025 incidence metrics, attacks originating from Phishing-as-a-Service threat groups had surged in its global user base In the first few months of 2025, a ...
Analysis of 2024 and 2023 customer incident data shows a surge in mobile and crypto-related threats in its protection ecosystem Based on an analysis of anonymized data on malicious activities detected ...