SecurityBrief Asia logo
Asia's leading source of cybersecurity and cyber-attack news

Hackers stories

Story image
Ransomware
Zero-day attacks climb as hackers get more sophisticated
July 2022
Hackers are moving fast to exploit security vulnerabilities. There was a surge in widespread zero-day attacks last year, with the average time to exploitation down from 42 days in 2020 to just 12 days in 2021. 
Story image
Cybersecurity
Companies rushing to secure print infrastructure
May 2022
As the pandemic prioritised communication channels and the shift to remote work, IT departments fell behind in updating the security of print and IT infrastructure.
Story image
Cyber warfare
Native technologies used in Russia-Ukraine cyber attacks
March 2022
The conflict between Russia and Ukraine is raging not only in the physical realm, but also on the cyber front.
Story image
Phishing
Cyberattacks on governments beyond Ukraine surge by 21% - Check Point
March 2022
Check Point Research provides updates on cyberattack trends observed during the Russia-Ukraine conflict. 
Story image
Axonius
How incident responders fight infotech fires
February 2022
When systems fail, or hackers strike, incident responders represent an organisation’s first line of defence.
Story image
Cybersecurity
How to make a business ‘invisible’ to hackers
February 2022
Critical to every organisation is how to stop a cyber-security breach AND the damage it causes and do so within available budgets.
Story image
Cybercrime
Why cyber crime will continue to flourish in 2022
January 2022
Cybercrime flourished in 2021, and there are no signs that it will slow down in 2022. There are several factors behind this high-confidence prediction.
Story image
Malware
Forcepoint reveals the top 5 cybersecurity trends to watch out for in 2022
December 2021
From prevention to jacking, we look at the top enterprise cyber secuerity trends to investigate.
Story image
Cybersecurity
Webinar: Sophos explains how to break a hacker's heart and ruin their day
September 2021
Hackers' actions can bring down businesses, infrastructure, and even entire countries. But what if they could no longer do any of these things?
Story image
Cloud Security
HP finds remote work is creating a growing cybersecurity risk
May 2021
HP has released a security report finding remote work is creating a growing cybersecurity risk.
Story image
Cybersecurity
The business case for an in-house ethical hacker
October 2020
Ethical hackers, also known as penetration testers or white-hat hackers, mimic the techniques used by malicious hackers to try and break into computer systems and discover vulnerabilities before the bad guys can exploit them.
Story image
Distributed Denial of Service
Revealed: Imperva publishes research on decade old botnet, responsible for millions of attacks
October 2020
Imperva Research Labs has revealed findings of a six-month intensive investigation into a botnet that has been exploiting CMS vulnerabilities.
Story image
Cybersecurity
HackerOne hits $100M milestone with bug bounties
May 2020
“We have arrived at the point in history where you are ignorant and negligent if you do not have a way to receive useful input from ethical hackers."
Story image
Cybersecurity
PUBG Mobile cracks down on dirty cheaters
March 2020
Players will be able to use the Death Replay to see how they were killed from their opponent’s perspective.
Story image
Hackers
Australian women-focusd hackathon #SheHacks expands across Victoria
February 2020
"We want to make Australia the best place in the world for women to build and scale a startup. #SheHacks is the perfect starting point for any woman wanting to create something great."
Story image
Cybersecurity
Want $10,000? Unisys tempts hackers at San Francisco event
February 2020
Participants will try to compromise a target system protected by Stealth, Unisys’ encrypted, identity-based microsegmentation solution.
Story image
Malware
Huge growth in malware connected to popular musicians - Kaspersky
January 2020
Cybercriminals are actively abusing the names of artists and songs nominated for a Grammy 2020 award, in order to spread malware.
Story image
Film
Get ready to take the red pill: The Matrix is coming back
August 2019
“As you can see, we've had our eye on you for some time now, Mr. Anderson..."
Story image
Gaming
Cyber criminals targeting the gaming industry at an alarming rate
June 2019
New research from Akamai shows the gaming community is quickly becoming one of the most highly targeted industries for cyber attacks, with hackers largely driven by gaining consumer credentials.
Story image
Cybercrime
Hackers increasingly ‘island hopping’ – so what does it mean?
May 2019
Carbon Black's Rick McElroy discusses this new trend and what it means for the new age of cybercrime.
Story image
Cybersecurity
Use a password manager? New study reveals it may be worse than useless
February 2019
The study finds using a number of the top password managers is no better than putting your passwords in a text file and saving it to your desktop.
Story image
Application Security
When hackers get the munchies, they just steal McDonalds
February 2019
What happens when hackers get the munchies? Apparently in Canada, they decide to put their ‘hamburglar’ gloves on and go after unwitting people who happen to use the McDonalds app.
Story image
Cybersecurity
WatchGuard’s eight (terrifying) 2019 security predictions
November 2018
The next evolution of ransomware, escalating nation-state attacks, biometric hacking, Wi-Fi protocol security, and Die Hard fiction becomes reality.
Story image
Hackers
Exclusive: Venafi talks weaponisation of machine identities
August 2018
As companies integrate more digital tools into their business, many of them remain unaware of the risk code-signing certificates are exposing them to.