Ransom payments are typically tightly held secrets between cybercriminals and their victims, but the Australian government has introduced a cybersecurity bill in Parliament that would require larger businesses to report ransom payments to the government.
Cybercrime syndicates across Southeast Asia have teamed up with human traffickers, money launderers and cryptocurrency services to build an increasingly effective cybercrime ecosystem that can survive law enforcement crackdowns, according to a new United Nations report.
North Korean cyberespionage group APT37 used local language phishing emails to trick Internet users in Cambodia and neighboring countries into downloading malicious files to introduce a highly versatile PowerShell-based backdoor called VeilShell, according to cybersecurity firm Securonix.
Two airport contractors in India used multiple airline ticketing systems to fraudulently access the account details of about 800 Qantas airline customers to steal loyalty reward points. Qantas said it has put tighter controls on its frequent flyer program.
A cyberattack shut down government web portals, servers and a regional data center in the Indian state of Uttarakhand, forcing agencies to scramble to restore affected services. The attack disrupted work at all government locations and crippled services to citizens.
In the second episode of ISMG's "APAC Insights" series, Raina Verma, AML and forensics expert, and Rubaiyyaat Aakbar, head of IT and cybersecurity at an insure tech startup, discuss problem solving in security and dealing with the complexities of the many data localization laws in APAC.
India's leading private health insurer Star Health Insurance suffered a major data breach in August, but the company's prolonged silence over the incident exposes businesses' placing a priority on protecting their reputation over their customers' concerns for data security and privacy.
Southeast Asia is emerging as a major hub for data center growth, and the data center market is expected to reach $17.73 billion by 2029. But several nations' hawkish approach to data sovereignty is complicating cross-border data transfers and efforts to harmonize the region's digital policies.
In the rapidly changing cybersecurity field, continuous education and upskilling are crucial. Ram Kumar, cybersecurity leader at a global automotive company and a CyberEdBoard member, recommends continuous training and staying up to date on new technologies and regulations.
India has launched a dedicated cybersecurity incident response team for the critical energy sector. Officials said existing computer emergency response teams currently lack the resources and skilled professionals needed to defend against growing cyberattacks on power utilities and infrastructure.
China's Ministry of State Security has accused a Taiwanese government agency of waging cyberattacks on the mainland's digital assets across multiple organizations and running disinformation campaigns on social media to disrupt the political system and sow social discord.
Technology and security leaders convened at CIO.inc's Cloud and AI Innovation Summit to discuss cloud-driven innovation and AI adoption strategies. The event explored the advantages and risks of cloud and AI adoption and how organizations are using platforms to fuel growth.
A secure convergence of IT and OT requires an industrial layer to bridge these systems. This layer ensures safe operations by segmenting networks and isolating legacy OT systems, preventing exposure to attacks, said Baidyanath Kumar, CISO and DPO at JK Lakshmi Cement.
China's cyberespionage campaigns, viewed as an extension of the communist regime's wider geopolitical moves, rely on civilian hackers from domestic security firms for much of their success. Researchers say these groups face off in intense rivalries for lucrative government contracts.
The Australian government has proposed new regulations to place mandatory guardrails on the use of AI in high-risk settings, but private sector industry groups fear that too many laws and regulations around AI could deter businesses from investing in or deploying the AI technology.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.