Asia's leading source of security and threat news
These search results are from across the Techday Network of sites
Cyber threat spotlight: Kiwis report more, lose less in Q2
CERT NZ’s April-June 2018 Quarterly Report suggests that cyber threats – and the amount of people who are reporting them – are once again on the rise, and fewer people are losing money.
2018 proves to be a mixed bag of severe cyber threats, report finds
There are more than 100,000 known vulnerabilities that are open to exploitation from attackers.
Quick thinking remedies vulnerability in Schneider Electric ICS controller
Radiflow discovered that a serious vulnerability in the devices put the safety and availability of ICS networks in jeopardy.
MikroTik routers in NZ may be at risk of cryptomining - Symantec
These routers are used by many organisations and businesses, including internet service providers.
Flaw discovered in Intel chips, allows attackers to steal cloud data
Foreshadow is the third major flaw found in Intel chips this year after Spectre and Meltdown.
Exclusive interview: Major MFA vulnerability discovered in Microsoft’s ADFS
This exploit gives an actor an incredible advantage to expand compromises significantly.
At-work collaboration apps most vulnerable to cyber attacks
According to a survey of 500 decision makers across several industries, 80% believe that cloud collaboration tools are vulnerable to cyber attacks.
Google Chrome launches new feature to block Spectre attacks
The next update to Google Chrome will bring new protections against web browser attacks such as Spectre.
GitHub rolls out security alerts feature for Python
“Over the coming weeks, we will be adding more historical Python vulnerabilities to our database. "
Use of banking trojans up 50%, cryptomining still dominant malware – report
Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
BMW awards Chinese security team's work in exposing connected vehicle vulnerabilities
When Chinese security researchers found vulnerabilities in BMW’s connected vehicles, BMW didn’t just fix the vulnerabilities, it awarded the team.
Singapore IMDA launches GoSecure cybersecurity programme for Singapore ICT firms
According to IMDA, the programme will benefit 200 Singapore-based ICT companies over the two-year period.
Report: Open source software plagued with vulnerabilities
78% of 1100 examined codebases contained at least one open source vulnerability, with an average of 64 vulnerabilities per codebase.
OWASP vulnerabilities plague mobile apps: Data leakage a major concern
Across two million applications analysed by Pradeo’s security engine, almost one third of applications contained an OWASP vulnerability.
Singapore organizations caught in 'patching paradox'
Singapore organizations say they don’t have the resources to keep up with the volume of patches required to remediate software flaws.
Electronic lock vulnerabilities can lead attackers directly to your hotel room
Next time you stay at a hotel as part of a business or personal trip, you may want to ask if the hotel’s locking systems are up-to-date.
CERT NZ issues security alert about Smart Install-enabled Cisco devices
CERT NZ has issued a bulletin about a cyber attack campaign that is targeting Cisco devices that have enabled Smart Install (SMI).
Illumio & Qualys combine forces to offer vulnerability threat mapping
Illumio and Qualys are joining forces to combine threat data and application dependency mapping to show potential cyber attack paths in real time.
CERT NZ issues MikroTik RouterOS vulnerability alert
MikroTik RouterOS devices are at risk of malware attacks that can spread to other devices, according to an alert published by CERT NZ last week.
GitHub boosts bug bounty program & payouts in 2017 with more to come this year
GitHub’s Security Bug Bounty program paid out more than US$166,000 in 2017 after a significant payout revamp that doubled amounts across the board.
Connected medical devices pose serious security risks for healthcare firms
Healthcare organisations around the world may be using medical devices that come with serious cybersecurity risks.
CERT Australia reveals this year's cybersecurity challenges
Criminals will exploit known vulnerabilities; social engineering will craft sophisticated networks; supply chain targeting will target third parties..
Singapore MINDEF's Bug Bounty Challenge nets 32 vulnerabilities in three weeks
The Singapore Ministry of Defence (MINDEF) handed out more than S$14,000 in bounties to 17 hackers as part of the Bug Bounty Challenge.
Intel amplifies Bug Bounty rewards to attract more security researchers
“We will continue to evolve the program as needed to make it as effective as possible and to help us fulfill our security-first pledge."
Whitepaper: How to explain why IT security needs more budget
Do you want to convince your higher-ups that IT and security need more budget?
Review: Cut through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
Identity governance: The all-in-one solution for GDPR compliance
The GDPR affects any company that deals with individuals living in the EU and has very specific requirements for the treatment of their personal
The crucial guide to deploying a SIEM solution successfully
SIEM solutions have far-reaching benefits, but Gartner says there are a lot of factors to consider to avoid disaster - here's the company's guide.