Information Security Media Group this week wrapped up its Cybersecurity Summit: Mumbai, which united digital experts, thought leaders and security leaders from both the public and private sector on hot topics such as digital resilience, security, growth and business transformation.
A modern board of directors has no option but to immerse itself in today's cybersecurity and threat landscapes to spearhead enterprise-wide cyber defense and mitigation strategies, said Bhimaraya Metri, director at the Nagpur-based Indian Institute of Management.
Apple on Tuesday warned several sitting members of Parliament and journalists in India that state-sponsored attackers had tried to remotely compromise iPhones associated with their Apple IDs. The Indian government quickly rejected allegations from critics that it was deploying commercial spyware.
North Korean hackers are spreading malware through known vulnerabilities in legitimate software. In a new campaign spotted by Kaspersky researchers, the Lazarus group is targeting a version of an unnamed software product for which vulnerabilities have been reported and patches are available.
Iranian state-backed persistent threat group TA456, which PwC tracks as Yellow Liderc, used a combination of malicious Javascript, phishing emails and .NET malware called IMAPLoader to conduct espionage attacks on maritime, shipping and logistics companies in the Mediterranean region.
It has been over a year since Indonesia enacted its first personal data protection law, bringing its data privacy and security controls closer to standards set by Europe's GDPR. With less than a year to go, many businesses are still looking for clarity on many aspects of the regulations.
In the latest weekly update, ISMG editors discuss how cybersecurity businesses are building resilience during the Israel-Hamas war, the latest on the hacks of Cisco IOS XE devices, and recommendations for businesses in Indonesia looking to improve their cybersecurity practices.
A Kazakhstan-based cyberespionage group that has been stealing credentials and data from government agencies of the Commonwealth of Independent States countries is going great lengths to hide its identity. The group is using custom malware and evasion techniques to pose as Azerbaijani hackers.
The prospects of another cyber war are looming with the latest war between Israel and Hamas. Cyberwarfare is the new norm in conflicts because it offers new dimensions to kinetic fighting at much less risk, cost and effort, according to Antony KM, who works for a leading Australian bank.
India ranks among the bottom five on Harvard's Belfer Cyber Power Index 2022, while China, its primary adversary, is at a strong number two position. Lt. Gen. (Retd.) R S Panwar says a national cyber strategy with an offensive approach is imperative.
Filipino authorities are pushing for higher funding for the country's cybersecurity agency and other government agencies in the wake of recent cyberattacks that resulted in data breaches at multiple government agencies. Researchers say cybercriminals and nation-state actors are behind the attacks.
Security researchers attributed a wave of targeted cyberattacks against telecommunications companies and government ministries in several Asian countries to a Chinese advanced persistence threat group named ToddyCat. The group has been expanding its cyberespionage operations in Asia since late 2022.
The Digital Personal Data Protection Act in India has introduced many implementation challenges for security practitioners. Two experts - Shivangi Nadkarni, co-founder and CEO at Arrka Consulting, and Priya Muku Gora, GRC lead and DPO at Axtria - shared strategies for successful projects.
Cybersecurity firm Group-IB said threat actors are using an advanced banking Trojan, dubbed GoldDigger, to steal credentials from 51 Vietnamese financial apps, e-wallets and cryptocurrency applications. Researchers said it can potentially transfer funds from apps and avoid detection and analysis.
The first 100 days for a new CISO are filled with challenges and opportunities to make a strong footprint. You need to improve incrementally, introduce transformational change and gain visibility into all critical aspects of the organization, said Jacxine Fernandez of BIAL.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.