Every year, threat actors look for new ways to outwit victims and bypass defenses. As you might expect, different languages, cultures and levels of digital maturity mean some places are more vulnerable than others.
For our ninth annual State of the Phish report, we’ve put together in-depth regional summaries to...
India and Singapore made it easier and cheaper for their citizens to send and receive money through the integration of UPI and PayNow, but could this move lead to a rise in cross-border online payment scams? Reports of UPI-related fraud surged in India in 2022.
With the advent of ChatGPT, the topic of artificial intelligence is gathering momentum. The question on everyone's mind is, "How can the cybersecurity community leverage AI to predict and detect attacks?" Three experts discuss the various challenges and opportunities of AI.
Asia-Pacific healthcare sector organizations struggle with many of the same cybersecurity challenges as clinics in other parts of the world, including ransomware threats and denial-of-service attacks, says Errol Weiss, chief security officer of the Health Information Sharing and Analysis Center.
The complexities and lengthy processes involved in creating and deploying an artificial intelligence algorithm often act as roadblocks that keep cyber defenders from moving quickly against the attackers, says Dr. Jassim Haji, president of the International Group of Artificial Intelligence.
Banks must rethink their risk management approach in order to be more cyber resilient, says Simon Onyons, managing director, EMEA, cybersecurity with FTI Consulting. The Financial Service Authority in Indonesia recently issued new cybersecurity requirements for the banking industry in the country.
Microsoft blamed an internal network configuration change for outages that disrupted access to Microsoft 365 services, including Microsoft Teams and Outlook, for users around the world. The change has been rolled back and additional infrastructure added to speed restoration, it says.
How does a CISO map his goals to the security investments made by a company long before he came onboard? How can you balance the short-term and long-terms goals at a new organization? Aditya Vardhan, CISO of Jindal Power & Steel, shares his insights on ensuring a smooth transition.
Researchers have linked Chinese advanced persistent threat group Playful Taurus, also known as Vixen Panda and Nickel, to a series of attacks against Iranian organizations between July and December 2022. The group recently updated its toolkit to include a new variant of the Turian backdoor.
There are many questions about the security aspects of the Central Bank Digital Currency, or CBDC, and how it will be deployed. Dr. N. Rajendran, chief digital officer of the Multi Commodity Exchange of India, shares his views on the road ahead with CBDC.
Posing as leading banks, the North Korea-backed BlueNoroff group is evading Microsoft Windows' Mark of the Web security measure to help infect machines with malware. Hackers are refining their techniques for bypassing MOTW, which warns users when they try to open a file downloaded from the internet.
A North Korean state-sponsored APT group targeted nearly 900 foreign policy experts from South Korea to steal their personal data and carry out ransomware attacks. Targeted individuals mainly had backgrounds in diplomacy, defense and security and were working toward Korean unification.
In the next three years, CISOs face daunting challenges, including rapidly changing threat vectors, new APT attacks and the implementation of new defensive solutions, says Anuprita Daga, chief information security officer and chief data protection officer at Yes Bank.
What does the latest version of India's data protection bill mean for CISOs, and what impact does it have on security practitioners? Khushbu Jain, advocate, of the Supreme Court of India, shares some of the fine print in the draft legislation and discusses some changes that CISOs may need to make.
Software life cycle management has always been part of the development team, but organizations are now looking to extend the process beyond the development team to manage the entire supply chain, says Nahas Mohammed, regional sales director at GitHub India.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.