Ransomware attacks are declining across many sectors - but not in healthcare, where an ongoing surge is reaching a four-year high in incidents, according to new research from security firm Sophos, which surveyed 5,000 IT leaders across 15 sectors and 14 countries between January and February.
A North Korean cyberespionage group is posing as job recruiters and targeting aerospace and energy sector employees with lucrative job offers, according to Mandiant. The hackers use email and WhatsApp messages to lure victims into clicking a link that deploys backdoor malware onto their devices.
Countries throughout APAC are rapidly expanding digital payment ecosystems and embracing digital change for greater convenience and financial inclusion. But the region has become a hotbed for fraudsters who are exploiting these same technologies. SIM swap fraud and QR code scams are up 15%.
By 2027, cybercrime is expected to cost the world a staggering $23.8 trillion per year. With so much money to be made, it’s no surprise that the creativity behind today’s cyber-attacks is seemingly endless.
We’ve collected some of the most insidious email attacks out there right now. What’s alarming is that...
This State of Phish Report gives in-depth regional summaries to explore how local nuances affect user behaviour when it comes to cybersecurity awareness and the importance of phishing protection.
A few APJ highlights in this Report are:
Only 28% of users in South Korea consider security to be their responsibility,...
In the digital era, Microsoft 365 is an essential tool for getting work done. Unfortunately, its popularity has made it a prime target for cyber criminals. Every year, people-centric Microsoft 365 attacks cost organisations millions of dollars and cause frustration for security teams and users alike. This e-book...
Cybercriminals are exploiting emergency data requests to obtain sensitive personal information from service providers and social media companies, says Jacob Larsen, team lead of security testing and assurance at CyberCX. This flaw in verification protocols puts user privacy at risk.
Microsoft's Sherrod DeGrippo delves into the rise of SIM swapping, the role of social engineering in cyberattacks, and the emerging use of AI by threat actors. She emphasizes the need for real multifactor authentication and advanced strategies to counter these evolving threats.
Social engineering attacks pose a severe threat to healthcare call centers, as recent breaches demonstrate. Sumant Mauskar, senior vice president of sales and global partnerships at Pindrop, discusses how voice biometrics and deepfake detection can protect sensitive information.
Your secret weapon to combat cyber threats might be just under your nose! Cybercriminals continue to exploit vulnerabilities while upping their game with new and more sinister attack methods. The human firewall is your cybersecurity ace in the hole.
But how resilient are your users when it comes to fending off...
Giving customers more flexibility in instant payment systems could give users more control over their transactions and help fight scammers. An option to delay payments could introduce the needed friction to stop fraudulent payments, said fraud experts Eva Velasquez and Ken Palla.
Cybercriminals are exploiting the chaos created by the CrowdStrike outage by launching fake websites and phishing campaigns to trick victims into downloading malware or divulging sensitive information, according to the U.S. Cybersecurity and Infrastructure Security Agency and others experts.
This week, North Korean hackers targeted macOS users, Bassett Furniture suffered a ransomware attack, Interpol arrested 300 and seized $3 million, new details emerged about Designed Receivable Solutions, Repligen reported a cyber incident, and MarineMax reported a data breach.
This week, WazirX, LI.FI, Dough Finance and CoinStats were breached; Satoshi Nakamoto impersonator's was charged; FTX and CFTC reached a settlement; a man was convicted of fraud; new details emerged in the Tornado Cash and SEC cases; and Taiwan set new AML rules.
A public-private effort with the codename Operation Spincaster is using intelligence related to 7,000 compromised cryptocurrency wallets and $162 million in losses to warn victims, recover funds and disrupt groups involved in crypto-powered approval phishing or pig-butchering scams.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.