A secure convergence of IT and OT requires an industrial layer to bridge these systems. This layer ensures safe operations by segmenting networks and isolating legacy OT systems, preventing exposure to attacks, said Baidyanath Kumar, CISO and DPO at JK Lakshmi Cement.
China's cyberespionage campaigns, viewed as an extension of the communist regime's wider geopolitical moves, rely on civilian hackers from domestic security firms for much of their success. Researchers say these groups face off in intense rivalries for lucrative government contracts.
The Australian government has proposed new regulations to place mandatory guardrails on the use of AI in high-risk settings, but private sector industry groups fear that too many laws and regulations around AI could deter businesses from investing in or deploying the AI technology.
Singapore police arrested five Chinese nationals and seized cryptocurrency assets. It said the group led an international crime organization that used hacking tools and credentials for internet servers to carry out cyberattacks. A Singapore national faces charges related to helping the group.
Security researchers say China-based cyberespionage group Mustang Panda is stepping up attacks on government agencies in Asia, using new malware tools to breach networks and a reverse shell feature in Visual Studio Code software to gain a persistent foothold in networks.
Countries throughout APAC are rapidly expanding digital payment ecosystems and embracing digital change for greater convenience and financial inclusion. But the region has become a hotbed for fraudsters who are exploiting these same technologies. SIM swap fraud and QR code scams are up 15%.
IT concentration risk could pose major problems for financial institutions that rely heavily on one vendor for critical services. United Overseas Bank's Gaurav Gupta recommends CIOs hold vendors accountable for resilience and look for ways to diversify to ensure business continuity.
Malicious actors have been using an open-source, data-stealing remote access Trojan called Babylon to spy on and steal data from three Malaysian government entities since July 2023, according to security firm Cyble in a report Wednesday. Cyble could not link the attackers to any state or group.
In this episode of "APAC Insights," Sujit Christy, president of ISACA's Colombo chapter, discusses the growing need for organizations to focus on cyber supply chain security, including third-party and fourth-party suppliers, which can create significant vulnerabilities.
Telegram deleted 25 videos the South Korean Communications Standards Commission said depicted sex crimes, and regulators reported that site administrators pledged a "relationship of trust." The agency said it intends to establish a hotline to ensure urgent action on deepfakes.
The Australian Prudential Regulation Authority listed seven priority areas in its new corporate plan released Wednesday, including a plan to raise industry standards on cyber risk management and increase minimum standards for operational resilience for banks and insurers.
The Cyber Security Agency of Singapore released an updated operational technology cybersecurity master plan to boost the OT cybersecurity workforce and enable critical infrastructure and other operators to prepare for emerging cybersecurity risks and build effective response plans.
South Korea has begun its annual military and cyberwarfare exercise with the United States called Ulchi Freedom Shield amid growing North Korean attacks on defense agencies and recent espionage incidents that compromised highly sensitive military technologies.
Cloud security strategies often suffer from several fundamental flaws as many cloud providers still maintain outdated cybersecurity practices that increase business risk, said Angel Redoble, chairman and founding president of the Philippine Institute of Cyber Security Professionals.
A U.S. company has asked its software vendor to indemnify it to the tune of $12 million to cover costs associated with settling a data breach-related class action lawsuit. The indemnity demand comes amid a rise in class action lawsuits driving soaring litigation costs for enterprises.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.