China hasn't ordered any restrictions on the use of Apple iPhones by government agencies, according to a Chinese government spokesperson, but the official cited recent security flaws in the iPhone and warned that foreign mobile device manufacturers must abide by domestic information security laws.
Google released a fix on Monday for a Chrome zero-day that allows an attacker to remotely target a vulnerable version of the browser. The bug is tracked as a heap buffer overflow in the WebP image format, which is specifically designed to optimize web images.
Penetration testing is a cornerstone of cybersecurity, essential for evaluating your defenses against potential threats. But how should you approach it? The answer lies in tailoring your strategy to your unique needs.
Download the guide written by Fortra and discover the perfect balance between in-house expertise and...
The message is crystal clear: Cybersecurity threats are soaring. Cybercriminals are multiplying, and their audacity knows no bounds. Did you know that a ransomware attack strikes every 11 seconds, with a record payout of $50 million in 2021? It's a stark reality, but should we simply accept this as the new...
Multiple nation-state hacking groups have been exploiting known flaws in Zoho ManageEngine software and Fortinet firewalls to steal data, cybersecurity officials warn. A new alert details exploits of each vulnerability by separate groups that targeted the same aeronautical firm.
Tenable will purchase a cloud security startup founded by the longtime leader of Secdo to help security teams make efficient and accurate remediation decisions. The proposed buy of Ermetic will make it easier for security professionals of all cloud expertise levels to spot and quickly address risks.
The number of connected devices used in healthcare is growing as manufacturers constantly introduce new types of IoT equipment. The ever-evolving threat landscape is making it harder for many entities, particularly outpatient care providers, to keep up, said Justin Foster, CTO of Forescout.
A startup founded by the longtime leader of Secdo and backed by the likes of Qumra Capital and Accel could soon be acquired by Tenable. The company is in advanced negotiations to purchase cloud infrastructure security startup Ermetic in a deal valued at between $300 million and $350 million.
Amid the rapid evolution of cyber threats, staying informed about the latest trends is paramount to protecting your digital assets. Join cybersecurity experts from Coalfire and NowSecure as they delve into the dynamic realm of digital security. Drawing on insights from the recently unveiled 5th annual Coalfire and...
Third-party targeting by attackers has intensified due to the interconnectedness of the business world, enabling adversaries to exploit intermediaries for access. With the surge in cloud adoption, visibility in the cloud is paramount, advised Levi Gundert, chief security officer at Recorded Future.
While a significant number of attacks are not yet AI-driven, there's a noticeable shift in the creation of generative malware and lures for business email compromise, warned Ashan Willy, CEO at Proofpoint. LLMs are being used to create enticing lures in foreign languages to target broader audiences.
Recently acquired RiskLens edged out startup Axio and incumbent ThreatConnect for the top spot in Forrester's first-ever cyber risk quantification rankings. Cyber risk quantification focused on theoretical methodology for about 10 years but shifted to practical applications over the past five years.
A growing number of Asia-Pacific countries are greenlighting digital-only banks to meet customer needs for access to fast, mobile-friendly services, but persistent cybersecurity threats and hackers’ growing capabilities could hurt the success of this emerging market segment.
Protect AI bought one of the world's largest certified naming authorities to create a bug bounty platform focused exclusively on AI and ML open-source software. The acquisition will allow customers to discover exploits in the AI or ML supply chain weeks before they're publicly revealed.
India's defense ministry will replace the Microsoft Windows operating system with a locally built operating system to enhance cybersecurity in the face of persistent cyberattacks. India is also pursuing a set of laws to create the necessary legal space to secure critical infrastructure.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.