A Chinese nation-state group is hacking foreign affairs ministries and embassies across Europe, employing a sophisticated HTML-smuggling technique to deliver the insidious PlugX remote access Trojan to compromised systems. The technique raises concern about the security of diplomatic institutions.
The Indian government on Friday issued a long list of mandatory cybersecurity guidelines applicable to all government ministries, departments and associated organizations, plus a checklist that applies to all government employees and contractors.
Lt. Gen. M.U. Nair has been appointed the new national cyber security coordinator. He succeeds retired Lt. Gen. Dr. Rajesh Pant. The selection of Nair, who previously served as signal officer in chief at the Indian Army's headquarters, signifies renewed focus on national cyber defense capabilities.
The world's top chip manufacturer has dismissed the LockBit 3.0 ransomware gang's hack claim and $70 million ransom. TSMC said the data leak took place at a third-party supplier and contains only certain initial configuration files. It said customer information and operations were not affected.
Suspected Chinese threat actors are using fake web advertisements for popular instant messaging applications Kik and Viber to install mobile banking malware onto devices of Asian users. Researchers at cybersecurity firm Cyberint said adversaries are distributing the malware on third-party APK sites.
Japan's $1 trillion manufacturing industry is a prime target for ransomware and state-sponsored threats. Over the past year, nearly one-third of all ransomware victims have come from the automotive and general manufacturing sectors, according to threat intelligence company Rapid7.
Steve Kerrison, a senior lecturer in cybersecurity at Singapore's James Cook University, recently shared how universities in the Asia-Pacific region are meeting the rising demand for cybersecurity professionals. Meeting the demand starts with understanding the needs of the job market.
Researchers at AhnLab Security Emergency Response Center observed APT37 target South Korean individuals with spear-phishing emails to inject wiretapping malware. The state-backed cybercrime group primarily employs spear-phishing to compromise the devices of victims.
Suspected Chinese APT groups exploited a 17-year-old Microsoft Office vulnerability in May to launch malware attacks against foreign government officials who attended a G7 summit in Hiroshima, Japan. Threat actors targeted officials from France, the United Kingdom, India, Singapore and Australia.
Ukrainian cyber police have disrupted a fake investment scam that involved stealing cryptocurrency from the online wallets of several victims in Canada. The scammers operated out of two call centers in the Khmelnytskyi region of Ukraine, mainly targeting Ukrainian citizens living in Canada.
India's national cybersecurity coordinator said the government will soon roll out a cybersecurity reference framework to help organizations operating in critical infrastructure sectors shore up their defenses. The framework joins data protection and security strategy as a top government priority.
Enterprise cybersecurity is no longer just about a siloed team of professionals securing the firm's systems and servers. Security has evolved into a key business consideration with people at its core, according to Suraj Jayaraman, Microsoft's director of cloud security architecture.
Financial institutions must leverage artificial intelligence and other new-age authentication tools to establish a robust KYC process in the era of remote account opening, said Vishal Kapoor, head of group finance audit and risk audit and executive director at DBS Bank.
Developing a cyber resilience playbook is a continuous process that demands constant enhancement, rather than a one-time input. By beginning with targeted action items and progressively expanding upon them, organizations can make every conceivable recovery scenario more manageable.
Gaurav Gupta from MeiTY, India, recommends that CIOs and CISOs should initiate their digital forensics readiness journey in advance by training first responder employees to prevent any evidence contamination. Gupta emphasized that data created will always remain.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.