Countries throughout APAC are rapidly expanding digital payment ecosystems and embracing digital change for greater convenience and financial inclusion. But the region has become a hotbed for fraudsters who are exploiting these same technologies. SIM swap fraud and QR code scams are up 15%.
This State of Phish Report gives in-depth regional summaries to explore how local nuances affect user behaviour when it comes to cybersecurity awareness and the importance of phishing protection.
A few APJ highlights in this Report are:
Only 28% of users in South Korea consider security to be their responsibility,...
The demand for skilled cybersecurity professionals, coupled with the rise in remote work, has led to an increase in fraudulent job postings targeting tech-savvy individuals. Learn why this is so and how to protect yourself from deceptive schemes as you pursue a job in cybersecurity.
In an era where cyber threats evolve at an unprecedented pace, AI emerges as the ultimate cybersecurity “Swiss Army Knife.” With AI, your security operations become proactively fortified, turning defenses into an intelligent, adaptive, and resilient force against the next generation of cyber attacks.
By...
Social engineering attacks pose a severe threat to healthcare call centers, as recent breaches demonstrate. Sumant Mauskar, senior vice president of sales and global partnerships at Pindrop, discusses how voice biometrics and deepfake detection can protect sensitive information.
Your secret weapon to combat cyber threats might be just under your nose! Cybercriminals continue to exploit vulnerabilities while upping their game with new and more sinister attack methods. The human firewall is your cybersecurity ace in the hole.
But how resilient are your users when it comes to fending off...
Giving customers more flexibility in instant payment systems could give users more control over their transactions and help fight scammers. An option to delay payments could introduce the needed friction to stop fraudulent payments, said fraud experts Eva Velasquez and Ken Palla.
This week, ICANN warned of phishing, BreachForums data was leaked, police arrested alleged pro-Russian hackers, the U.K shut down a DDoS booter site, the EU gave Meta a deadline, Russia decried U.S. sanctions, Verizon settled on breaches, and Windows 10 security support will end in October 2025.
Phishing hackers have developed a new technique for smuggling malware past secure email gateway defenses, said researchers at Cofense who uncovered a recent info stealer campaign. "I honestly think that it was someone testing the water to see if it would work - and it did work," a researcher said.
Cybercriminals are exploiting the chaos created by the CrowdStrike outage by launching fake websites and phishing campaigns to trick victims into downloading malware or divulging sensitive information, according to the U.S. Cybersecurity and Infrastructure Security Agency and others experts.
As the investigation of the attempted assassination of former President Trump unfolds, authorities and cybersecurity experts advise individuals and organizations to beware of online threats in the forms of physical violence, nation-state disinformation and cybercrime campaigns.
Phishing remains a top cyber threat, and employee vigilance is crucial for safeguarding your organization in Asia. Download the report which provides valuable insights into employee susceptibility to phishing across various industries and company sizes.
Also, gain valuable data and insights to:
Identify areas for...
Phishing attacks are a major threat, accounting for 91% of cyberattacks and 2/3 of ransomware infections. As these attacks evolve, manual detection methods become increasingly ineffective.
Download this whitepaper and stop wasting time on manual workflows. Learn how PhishER Plus eliminates the challenges of...
Microsoft’s native and add-on email security capabilities help to protect against basic threats, but they aren’t enough to ensure full protection. Learn how a multi-layered human-centric security strategy can augment Microsoft 365 to defend against modern threats like business email compromise, advanced phishing,...
10 Essential Insights to Update Your Security Policies for Modern Threat and Data Protection
Modern threats and data protection require updated security policies. The pandemic accelerated SaaS and cloud adoption, putting more users and data beyond traditional perimeters. Here are ten essential insights for updating...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.