[ad_1]
For weeks now, unidentified threat actors have been leveraging a critical zero-day vulnerability in Palo Alto Networks’ PAN-OS software, running arbitrary code on vulnerable firewalls, with root privilege. Multiple security researchers have flagged the campaign, including Palo Alto Networks’ own Unit 42, noting a single threat actor group has been abusing a vulnerability…
[ad_1]
The cost of ditching Windows 10 at your business and upgrading to the latest software might end up being a rather expensive process, Microsoft has revealed. Microsoft is ending support for Windows 10 on October 14, 2025, with businesses then needing to pay out for its Extended Security Updates (ESU). The company has…
[ad_1]
The C-suite is more familiar with AI technologies than their IT and security staff, according to a report from the Cloud Security Alliance commissioned by Google Cloud. The report, published on April 3, addressed whether IT and security professionals fear AI will replace their…
[ad_1]
Staying up to date with the latest in cyber security has arguably never been more paramount than in 2024. Financial services provider Allianz named cyber attacks this year’s biggest risk for business in the U.K. and a top concern for businesses of all sizes…
[ad_1]
A new version of a known Android banking trojan is making rounds on the internet, stealing sensitive data, and possibly even money, from its victims. Cybersecurity researchers from NCC Group’s Fox-IT sounded the alarm of a new, upgraded version of the Vultur banking trojan, first spotted in early 2021 but having received a…
[ad_1]
Security researchers have found a relatively easy and cheap way to clone the keycards used on three million Saflok electronic RFID locks in 13,000 hotels and homes all over the world. The keycard and lock manufacturer, Dormakaba, has been notified, and it is currently working to replace the vulnerable hardware - but it’s…
[ad_1]
CISOs know best practice information security management comes down to people as much as technology. Without employees and a robust security culture on your side, tech deployment will not stop threat actors, who continue to find their way into organisations.
It appears Asia-Pacific employees…
[ad_1]
With generative AI transforming the way businesses around the world work, plan and evolve, the need to ensure the data such platforms use and generate is paramount. Although primarily still seen as a cloud and storage leader, Amazon Web Services is looking to play a key role in ensuring businesses of all sizes remain…
[ad_1]
The Federal Communications Commission (FCC) is investigating the potential risks posed by Russian and Chinese satellite systems that are used by some US mobile devices. There are concerns that some satellites operated by Russia and China could be siphoning Global Navigation Satellite System (GNSS) data. The FCC rules state that only approved satellite…
[ad_1]
Many cybersecurity professionals with burnout in APAC have suffered in silence for years. However, a growing body of regional research, including a recent report from cybersecurity firm Sophos, is bringing attention to the extent, causes and impacts of the problem.
The Sophos report, The…