It is no secret that passwords are highly susceptible to phishing and brute force attacks. This led to the mass adoption of passkeys, a passwordless authentication method leveraging cryptographic key pairs that allows users to log in with biometrics or a hardware key. According to FIDO, over 15 billion accounts …
Read More »Malaysia Launches World’s First AI-powered Bank
Malaysia is boosting its digital transformation by launching its first fully AI-powered banking service. This initiative, which comes just before Merdeka, shows the country’s commitment to using advanced local technology to serve its citizens and enhance its global digital standing. YTL Group and SEA Ltd have launched Ryt Bank, the …
Read More »Why SIEM Rules Fail and How to Fix: Insights from 160M Attack Simulations
SIEM systems are essential for detecting suspicious activity in enterprise networks, enabling real-time responses to potential attacks. However, the Picus Blue Report 2025 indicates that organizations only detect 1 in 7 simulated attacks from over 160 million simulations, highlighting a serious gap in threat detection and response. Many organizations think …
Read More »Singapore Sets New Benchmarks for Sustainable Data Centres
Singapore has taken important steps towards sustainable growth in its digital economy by launching a new energy efficiency standard for data centers. The SS 715:2025 standard for Energy Efficiency of Data Centre IT Equipment helps operators, consultants, and users save energy and supports national sustainability goals. It advances the Green …
Read More »7 reasons the SOC is in crisis: 5 steps to fix it
I’ve been thinking a lot about SOC efficacy lately, and I’m going to take a position that might make some people uncomfortable. Despite organizations investing millions in security operations centres (SOC) and state-of-the-art detection technologies, we’re seeing breaches at unprecedented levels. Based on my observations across large enterprises in Australia, …
Read More »
Spotlight: Asia, Europe and USA
Crypto24 To Bypass EDR, Including Trend Micro’s Vision One platform
Researchers have identified a new Crypto24 ransomware campaign, which they describe as a “dangerous evolution” in cybersecurity threats. According to Trend Micro researchers, recent attacks by Crypto24 actors display a combination of advanced evasion techniques and custom tools that can disable EDR solutions — including Trend Micro’s own Vision One …
Read More »HexStrike AI Connects ChatGPT, Claude, Copilot with 150+ Security Tools
HexStrike AI, a new tool, aims to connect large language models (LLMs) with practical cybersecurity operations.The latest release, v6.0, provides AI agents like OpenAI’s GPT, Anthropic’s Claude, and GitHub’s Copilot with over 150 advanced security tools for independent penetration testing, vulnerability research, and bug bounty automation. This advanced framework serves …
Read More »UK telecom firm Colt suffers massive ransomware attack: data up for sale
UK telecoms company Colt suffered a cyberattack by the Warlock ransomware gang. The attack began on Tuesday, 12th August, around 11 am BST, initially reported as a technical issue. By Thursday, 14th August, Cold announced they were addressing a cyber incident affecting Colt Technology Services, including hosting, porting services, Colt …
Read More »Hackers To Attack Fortinet SSL VPN From 780 unique IPs
An unprecedented surge in brute-force attacks targeting Fortinet SSL VPN infrastructure, with over 780 unique IP addresses participating in coordinated assault campaigns. The August 3rd attack represents the highest single-day volume recorded on GreyNoise’s Fortinet SSL VPN Bruteforcer tag in recent months, raising concerns about potential zero-day vulnerabilities and sophisticated …
Read More »Biometric Clone: ₹5.58 crore loss, 251 accounts in 17 districts
A sophisticated cyber fraud has stolen over ₹5.58 crore from many bank accounts, highlighting serious concerns about digital payment security. This scam involved cloning biometric data and affected 251 accounts in 17 districts. Authorities are working hard to contain the situation and catch those responsible. The Modus Operandi: A Digital …
Read More »