Cyber Security Public-Private Partnerships Are Taking Off in APAC

Cyber Security Public-Private Partnerships Are Taking Off in APAC

APAC governments are partnering more closely with private-sector organisations and cyber security tech providers as part of public-private partnership style arrangements. These collaborations can include threat intelligence sharing, cyber capacity building, research and joint investigations. As the cyber threat continues to grow in APAC, including from ransomware attackers and nation-state actors, the hope is that integrated collaboration between governments and businesses will lead to a more cohesive response. What is a cyber security public-private partnership?…

Read More

BlastRADIUS Vulnerability Discovered in RADIUS Protocol

BlastRADIUS Vulnerability Discovered in RADIUS Protocol

Cyber security researchers have exposed a vulnerability in the RADIUS protocol, dubbed BlastRADIUS. While there is no evidence that threat actors are actively exploiting it, the team is calling for every RADIUS server to be upgraded. What is the RADIUS protocol? RADIUS, or Remote Authentication Dial-In User Service, is a networking protocol that provides centralised authentication, authorisation and accounting for users connecting to a network service. It is widely used by internet service providers and…

Read More

Nearly 10 Billion Passwords Leaked in Biggest Compilation of All Time

Nearly 10 Billion Passwords Leaked in Biggest Compilation of All Time

The world’s largest compilation of passwords to be leaked online has been discovered by a research team at Cybernews, containing 9,948,575,739 unique plaintext entries. The credentials were discovered in a file named “rockyou2024.txt” that was posted on a popular hacking forum on July 4, 2024. Many of the so-called RockYou2024 passwords have already been leaked in previous data breaches. This is not the first RockYou data dump either, as the name has been associated with…

Read More

Dragos: Industrial Cyber Security Basics Can Help Protect APAC OT Operators

Dragos: Industrial Cyber Security Basics Can Help Protect APAC OT Operators

Industrial cyber security in APAC is still lagging behind enterprises, but having some basic hygiene and a plan in place is “light years” better than nothing, according to director of incident response at operational technology cyber security firm Dragos Lesley Carhart. Carhart recommends industrial technology operators large or small in APAC realise they could all be targets, including from state actors looking to steal information or position themselves for a future geopolitical event, and to…

Read More

10 Security Tips for Business Travellers This Summer

10 Security Tips for Business Travellers This Summer

Now the weather is hotting up, many workers may be considering spending some time away from their desk. You may be more inclined to head to that conference in Barcelona or take a trip with the family but keep the company phone on you. Whether you’re hopping on a plane or enjoying a staycation closer to home, taking your business away from your regular workplace brings about a new bevy of security risks. These include…

Read More

Cyber Insurance Premiums Are Declining, Howden Insurance Brokers Report Finds

Cyber Insurance Premiums Are Declining, Howden Insurance Brokers Report Finds

Improved cyber hygiene among businesses has led to a reduction in cyber insurance premiums by 15% worldwide over the last two years, a new report from Howden Insurance Brokers has found. This is despite the fact that cyberthreats, particularly ransomware attacks, are becoming more prevalent. Awareness of cyber hygiene practices, like multifactor authentication, EDR and cloud backups, has grown significantly since 2022. Ransomware attacks have increased by 18% this year, according to Howden and NCC…

Read More

CISA Report Finds Most Open-Source Projects Contain Memory-Unsafe Code

CISA Report Finds Most Open-Source Projects Contain Memory-Unsafe Code

More than half of open-source projects contain code written in a memory-unsafe language, a report from the U.S.’s Cybersecurity and Infrastructure Security Agency has found. Memory-unsafe means the code allows for operations that can corrupt memory, leading to vulnerabilities like buffer overflows, use-after-free and memory leaks. The report’s results, published jointly with the FBI, Australian Signals Directorate’s Australian Cyber Security Centre, and Canadian Cyber Security Center, are based on analysis of 172 critical projects defined…

Read More

What Security Means to Families | McAfee Blog

What Security Means to Families | McAfee Blog

What is our real job as parents? Is it to ensure our kids get good grades? – Maybe. Or is it ensuring we can give them the latest and greatest clothing and devices? Mmmm, not really. When all is said and done, I believe our real job is to keep our kids safe, teach them to be independent, and set them up for success – both online and offline. As first-generation digital parents, many of…

Read More

Olympics 2024: Cyber Attackers are Targeting Companies Associated With Paris Games

Olympics 2024: Cyber Attackers are Targeting Companies Associated With Paris Games

Organisations linked to the Paris Olympics 2024 have an increased risk of cyber attacks, including ransomware, credential leaks and phishing campaigns, a study has found. Insikt Group, the threat research division of security firm Recorded Future, has already observed posts advertising access to Games-related organisations in France and compromised credentials using “paris2024[dot]org” domains on the Dark Web. These findings were published in a new report highlighting high-priority threats to the Games, based on an assessment…

Read More

How Can Businesses Defend Themselves Against Cyberthreats?

How Can Businesses Defend Themselves Against Cyberthreats?

Today, all businesses are at risk of cyberattack, and that risk is constantly growing. Digital transformations are resulting in more sensitive and valuable data being moved onto online systems capable of exploitation, thus increasing the profitability of a successful breach. Furthermore, launching a cyberattack is becoming more accessible. Exploit kits and malware-as-a-service offerings are getting cheaper, while open-source AI tools are making masquerading as a trusted executive and exploiting vulnerabilities easier. TechRepublic consolidated expert advice…

Read More
1 3 4 5 6 7 130