Sophos Extends Adaptive Cybersecurity Ecosystem with Zero Trust Network Access
Jan27

Sophos Extends Adaptive Cybersecurity Ecosystem with Zero Trust Network Access

Sophos, a global leader in next-generation cybersecurity, today unveiled Sophos ZTNA, the only zero trust network access (ZTNA) offering that fully integrates with an industry-leading, next-generation endpoint solution – Sophos Intercept X – providing advanced endpoint protection and zero trust network access with a single agent. Sophos ZTNA introduces a transparent and scalable security model for connecting users and devices to...

Read More
More Elusive And More Persistent: The Third Known Firmware Bootkit Shows Major Advancement
Jan27

More Elusive And More Persistent: The Third Known Firmware Bootkit Shows Major Advancement

Kaspersky’s researchers have uncovered the third case of a firmware bootkit in the wild. Dubbed MoonBounce, this malicious implant is hidden within a computer’s Unified Extensible Firmware Interface (UEFI) firmware, an essential part of computers, in the SPI flash, a storage component external to the hard drive. Such implants are notoriously difficult to remove and are of limited visibility to security products. Having first appeared...

Read More
Kaspersky, Policy Experts Discuss Improving ICT Supply Chain Resilience In APAC
Jan21

Kaspersky, Policy Experts Discuss Improving ICT Supply Chain Resilience In APAC

For the past two years, the Asia-Pacific (APAC) region, like the rest of the world, has seen a huge digitalization leap as a result of the pandemic. Given the haste and urgency, cybersecurity measures have taken a back seat, resulting to some high profile ICT supply chain attacks last year. The world has seen some high profile incidents where cyber criminals took advantage of the weaknesses of ICT vendors, and used them as attack...

Read More
Advanced Scams, Data Breaches, Crypto and NFT Attacks to Shape SEA Cyberthreat Landscape in 2022
Jan12

Advanced Scams, Data Breaches, Crypto and NFT Attacks to Shape SEA Cyberthreat Landscape in 2022

Two years into the pandemic, Southeast Asia (SEA), as the rest of the world, is gearing up for a year of recovery in 2022. Companies and individuals of all ages are ready to revert back to regain the sense of normalcy, with back-to-office, back-to-school, and back-to-travel policies currently being put in place. But as witnessed this year, cybercriminals can target a variety of industries, from airlines, hospitals, government...

Read More
Kaspersky APAC Retains Top Spot In Canalys Channel Satisfaction Matrix For Second Year Running
Jan07

Kaspersky APAC Retains Top Spot In Canalys Channel Satisfaction Matrix For Second Year Running

Kaspersky has once again been recognized as a Champion in the Canalys APAC Channel Leadership Matrix, receiving a 96.1% satisfaction rating. This saw it rank highest among all cybersecurity vendors included in the matrix and secure the number one position for the second year in a row. Canalys is a globally renowned analyst firm, whose benchmark reports provide independent, third-party insights for the channel, giving them the...

Read More

AvosLocker Ransomware Uses AnyDesk in Safe Mode to Launch Attacks, Sophos Reports

Sophos, a global leader in next-generation cybersecurity, today released new research about AvosLocker ransomware in the article,“AvosLocker Remotely Accesses Boxes, Even Running in Safe Mode.” Sophos’ research explains how attackers attempt to bypass security controls by using a combination of Windows Safe Mode and the AnyDesk remote administration tool. Windows Safe Mode is an IT support method for resolving IT issues that disables...

Read More
Kaspersky Endpoint Detection and Response Wins Highest Grade in SE Labs Test
Dec31

Kaspersky Endpoint Detection and Response Wins Highest Grade in SE Labs Test

With cyberattacks becoming more sophisticated and endpoints still the main target for cybercriminals, the importance of reliable endpoint protection cannot be overestimated. However, judging the effectiveness of these solutions is not an easy task, and many factors, such as the ability to detect, relevancy, and accuracy are at play when assessing how well the product will help during a real attack. To evaluate Kaspersky EDR...

Read More
Malaysia’s MH4/2 From Utem Tops The World In Kaspersky Academy KIPS Students Championship
Dec24

Malaysia’s MH4/2 From Utem Tops The World In Kaspersky Academy KIPS Students Championship

Kaspersky Interactive Protection Simulation (KIPS) is a highly engaging training designed to boost the cybersecurity awareness through game-based learning environment. This dynamic program helps to engage community in understanding of cyberattacks and how to manage them efficiently and mitigate cyber risks. To increase awareness about the latest online threats among the youths, the global cybersecurity company organized international...

Read More
Lifting The Lid On The Details Of The New Apache Log4j Critical Vulnerability
Dec21

Lifting The Lid On The Details Of The New Apache Log4j Critical Vulnerability

Last week a new, particularly dangerous critical vulnerability was discovered in the Apache Log4j library. CVE-2021-44228 or Log4Shell or LogJam, is what’s known as a Remote Code Execution (RCE) class vulnerability, meaning if exploited on a vulnerable server, attackers gain the ability to execute arbitrary code and potentially take full control over a system. The CVE has been ranked a 10 out of 10 in terms of severity. The Apache...

Read More
A Glimpse into the Future: Trend Micro’s Project 2030
Dec15

A Glimpse into the Future: Trend Micro’s Project 2030

Trend Micro Incorporated, a global cybersecurity leader, today released a visionary new report and video dramatization articulating how the world might look at the start of the next decade — and how the security sector might respond to evolving cybercrime innovation. By 2030, connectivity will impact every aspect of daily life, on both the physical and psychological levels. Malicious threat actors will evolve to use and abuse...

Read More
Trend Micro Prediction Report Forecasts Cyber Fightback in 2022
Dec11

Trend Micro Prediction Report Forecasts Cyber Fightback in 2022

Trend Micro Incorporated, a global cybersecurity leader, has  predicted global organizations will emerge more alert and better prepared in 2022 thanks to a comprehensive, proactive, cloud-first approach to mitigating cyber risk. Research, foresight, and automation are critical for organizations to manage risk and secure their workforce. Trend Micro blocked 40.9 billion email threats, malicious files, and malicious URLs for customers...

Read More
Kaspersky Recognized As A 2021 Gartner Peer Insights Customers’ Choice For Endpoint Protection Platforms
Dec10

Kaspersky Recognized As A 2021 Gartner Peer Insights Customers’ Choice For Endpoint Protection Platforms

Kaspersky, an industry leader in endpoint protection, has been recognized as a 2021 Customers’ Choice for Endpoint Protection Platforms by Gartner following a customer rating of 4.7 out of 5. 96% of customers also said they were willing to recommend the Kaspersky Endpoint Security for Business product. Kaspersky is one of only 3 vendors named a Gartner Peer Insights Customers’ Choice in the latest round of recognition for both the EPP...

Read More
Financial Systems Jeopardized, Infostealers On The Rise And More Cryptocurrency Attacks: A Look At Financial Threats In 2022
Dec06

Financial Systems Jeopardized, Infostealers On The Rise And More Cryptocurrency Attacks: A Look At Financial Threats In 2022

In 2022, we will observe state-sponsored groups targeting the cryptocurrency industry, while cybercriminals will take advantage of investors by fabricating rogue wallet with backdoors included. On top of that, we are likely to witness the growth of attacks against payment systems and more advanced mobile threats. These are the key predictions from Kaspersky’s ‘Cyberthreats to Financial Organizations in 2022’ report. 2021 was a year of...

Read More
H1 2021: Double-Digit Increase In Brute Force Attacks In Malaysia
Dec06

H1 2021: Double-Digit Increase In Brute Force Attacks In Malaysia

A report published last August shown that 69% of Malaysia workforces have indicated their preference to continue working from home, highest in the region, ahead of Singapore, China and Hong Kong. Having more employees working from home opened up new vulnerabilities that cybercriminals were quick to target. The volume of corporate traffic grew as well as more users moved to using third party services to exchange data and work through...

Read More
Sophos Discovers New Memento Ransomware
Nov24

Sophos Discovers New Memento Ransomware

Sophos, a global leader in next-generation cybersecurity, has released details of a new Python ransomware called Memento. The research, “New Ransomware Actor Uses Password Protected Archives to Bypass Encryption Protection,” describes the attack, which locks files in a password-protected archive if the Memento ransomware can’t encrypt the targeted data. “Human-led ransomware attacks in the real world are rarely clear cut and linear,”...

Read More
90% of IT Decision Makers Believe Organizations Compromise on Cybersecurity in Favor of Other Goals
Nov19

90% of IT Decision Makers Believe Organizations Compromise on Cybersecurity in Favor of Other Goals

Trend Micro Incorporated has announced new research revealing that 90% of IT decision makers claim their business would be willing to compromise on cybersecurity in favor of digital transformation, productivity, or other goals. Additionally, 82% have felt pressured to downplay the severity of cyber risks to their board. “IT leaders are self-censoring in front of their boards for fear of appearing repetitive or too negative, with...

Read More
Kaspersky VPN Secure Connection Reveals Transparency And Supports New Connected Devices And Locations
Nov19

Kaspersky VPN Secure Connection Reveals Transparency And Supports New Connected Devices And Locations

In 2021, the trend for remote or hybrid work continues around the world, with many employees choosing to work partly from home. At the same time, users now pay more attention to what is happening to their data online, and seek to protect it. All this has led to the growing popularity of VPN services which are now used for protection of sensitive work data and ensuring personal privacy online. New location-cities and expanding the list...

Read More
Sophos Rapid Response Details Top 10 Ways Ransomware Attackers Ramp up Pressure to Pay
Nov15

Sophos Rapid Response Details Top 10 Ways Ransomware Attackers Ramp up Pressure to Pay

Sophos, a global leader in next-generation cybersecurity, has published an article, “The Top 10 Ways Ransomware Operators Ramp Up the Pressure to Pay,” detailing how ransomware attackers are implementing a wide range of ruthless pressure tactics to persuade victims to pay the ransom. The article is based on evidence and insight from Sophos’ Rapid Response team of 24/7 incident responders who help organizations under active...

Read More

Sophos 2022 Threat Report: Gravitational Force of Ransomware Black Hole Pulls in Other Cyberthreats to Create One Massive, Interconnected Ransomware Delivery System

Sophos, a global leader in next-generation cybersecurity, today published the Sophos 2022 Threat Report, which shows how the gravitational force of ransomware’s black hole is pulling in other cyberthreats to form one massive, interconnected ransomware delivery system – with significant implications for IT security. The report, written by SophosLabs security researchers, Sophos Managed Threat Response threat hunters and rapid...

Read More
Kaspersky Launches Centralized Threat Intelligence Platform For TI Management
Nov12

Kaspersky Launches Centralized Threat Intelligence Platform For TI Management

Multiple threat intelligence sources constantly process vast amounts of information and generate millions of alerts. This level of fragmented and multi-format data makes effective alert prioritization, triage, and validation incredibly difficult. That is why the ability to identify real threats remains one of the top challenges for IT security teams. To help corporate security and incident response teams facilitate threat detection,...

Read More