Wednesday , January 22 2025
Malasia flag

New survey by IDC
Malaysia face doubling of ransomware incidents in 2023

In Malaysia, the cybersecurity situation is changing as organizations deal with an increase in cyber threats. A recent survey by IDC shows that phishing is the main concern, with 54% of organizations ranking it as the biggest threat. The top five risks in Malaysia are ransomware, unpatched vulnerabilities, identity theft, and attacks on the Internet of Things (IoT).

ALSO READ:

Delay patching leaves about 50,000 Fortinet firewalls to zero-day attack

Fortinet customers must apply the latest updates, as almost 50,000 management interfaces remain vulnerable to the latest zero-day exploit. The...
Read More
Delay patching leaves about 50,000 Fortinet firewalls to zero-day attack

Daily Security Update Dated: 21.01.2025

Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
Daily Security Update Dated: 21.01.2025

126 Linux kernel Vulns Allow Attackers Exploit 78 Linux Sub-Systems

Ubuntu 22.04 LTS users are advised to update their systems right away due to a crucial security patch from Canonical...
Read More
126 Linux kernel Vulns Allow Attackers Exploit 78 Linux Sub-Systems

CERT-UA alerts about “security audit” requests through AnyDesk

Attackers are pretending to be Ukraine's Computer Emergency Response Team (CERT-UA) using AnyDesk to access target computers. “Unidentified individuals are...
Read More
CERT-UA alerts about “security audit” requests through AnyDesk

Oracle Critical Pre-Release update addressed 320 flaw

Oracle Critical Patch Update Pre-Release Announcement shares details about the upcoming update scheduled for January 21, 2025. Note that this...
Read More
Oracle Critical Pre-Release update addressed 320 flaw

OWASP Reveils Top 10 Smart Contract Vulnerabilities for 2025

OWASP has released its updated list of the top 10 vulnerabilities in smart contracts for 2025. This guide highlights the...
Read More
OWASP Reveils Top 10 Smart Contract Vulnerabilities for 2025

Multiple Azure DevOps Vulns Allow To Inject CRLF Queries & Rebind DNS

Security researchers have found several vulnerabilities in Azure DevOps that could enable attackers to inject CRLF queries and carry out...
Read More
Multiple Azure DevOps Vulns Allow To Inject CRLF Queries & Rebind DNS

Intel holds 22 employees from one Bangladeshi University

Intel Corporation is a leading semiconductor chip manufacturer, employing at least 22 graduates from the Department of Applied Chemistry and...
Read More
Intel holds 22 employees from one Bangladeshi University

VPN Surge 1500% in USA after TikTok Shut Down

vpnMentor’s Research Team is monitoring the potential TikTok ban in the U.S., driven by national security and data privacy issues....
Read More
VPN Surge 1500% in USA after TikTok Shut Down

MITRE Launches D3FEND 1.0; The Milestone for Cybersecurity Ontology

MITRE launched D3FENDTM 1.0, a cybersecurity framework that provides a vocabulary and understanding of the cyber domain. D3FEND 1.0, funded...
Read More
MITRE Launches D3FEND 1.0; The Milestone for Cybersecurity Ontology

China to enforce 10 min response time for data breaches

Ransomware incidents in the country have doubled, with over 50% of organizations experiencing a two-fold increase in 2023 compared to the previous year. Fortinet, who commissioned the report, discussed the data from the SecOps report. They highlighted key findings and shed light on the escalating challenges faced by Malaysian organizations in cybersecurity.

The survey highlights the importance of AI and automation in SecOps. According to the report, phishing, malware, SQL injection, insider threats, and IoT vulnerabilities are the main attack vectors.

The survey shows important information about cybersecurity, highlighting how remote work has led to more insider threats. For example, 88% of respondents link the increase in insider threat incidents to remote work, citing reasons such as lack of training, employee negligence, and poor communication.

Only 38% of businesses have dedicated IT resources for security teams, making it harder to strengthen security measures. The impact of emerging technologies like hybrid work, AI, and IT/OT system convergence presents significant challenges. Cloud technology adoption is a major obstacle that increases organizational vulnerability to cyber threats.

During a briefing in Kuala Lumpur on November 13, 2023, Rashish Pandey, Fortinet’s vice president of marketing & communications for Asia and ANZ, stated that as cyberthreats continue to evolve, many organizations are facing diverse cyber threats. He suggested using Fortinet’s security operations solutions with advanced AI to automate incident detection and response.

Pandey promised that they could detect and contain threats in an average time of one hour, investigate and fix issues in an average of 11 minutes, achieve a 597% return on investment, double team productivity, and reduce expected breach costs by US$1.39 million.

48% of organizations in Malaysia feel unprepared for threats and want better cybersecurity. 75% don’t do regular risk assessments, making it hard to detect threats. More than 50% of companies deal with alert fatigue and have about 221 incidents every day.

“Two out of five enterprises grapple with over 500 incidents daily, leading to alert fatigue. The top two alerts faced are suspicious emails (phishing) and malware or virus detections, highlighting the imperative for targeted training on phishing awareness. Additionally, suspicious user behavior, account lockouts, and multiple failed login attempts contribute to alert fatigue,” the report reads.

False positives are a big problem. 62% of alerts are false positives. This shows that there is a need for automation. It is difficult for 98% of respondents to develop the skills needed to handle cyberthreats. This emphasizes the need for improving skills, especially in automation, multi-tasking, and critical thinking.

Check Also

CISA

CISA Adds Second BeyondTrust Flaw to KEV On Active Attacks

U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a second security flaw affecting BeyondTrust’s Privileged …

Leave a Reply

Your email address will not be published. Required fields are marked *