Quantcast
Channel: CybersecAsia
Browsing latest articles
Browse All 79 View Live

What do trends in one Q1 2024 cyber landscape report translate to?

Now that we are in Q2, Q1 threat reports will point to what individual and state-sponsored threat actors have been perpetrating In its analysis of Q1 2024 cyber incidents in its user ecosystem, a...

View Article



Image may be NSFW.
Clik here to view.

What businesses need to know about SEO poisoning

The urgency for enhanced measures and awareness of SEO poisoning cannot be overstated, as we navigate through turbulent waters in the digital domain. One trend that is vividly captured in...

View Article

Sparrow Co., Ltd. to Showcase the Latest Supply Chain Security Solutions at...

SINGAPORE, April 16, 2024 /PRNewswire/ — Sparrow Co., Ltd., a leading provider of application security services, will be showcasing its latest application security solutions at Black Hat Asia 2024,...

View Article

Dahua Technology Releases 2023 ESG Report

HANGZHOU, China, April 17, 2024 /PRNewswire/ — Dahua Technology, a world-leading video-centric AIoT solution and service provider, has unveiled its 2023 Environmental, Social and Governance Report,...

View Article

VIVOTEK Launches Successful Make Tomorrow Easier, Today! Vision During ISC...

TAIPEI, April 19, 2024 /PRNewswire/ — VIVOTEK (3454-TW), the global leading IP security solution provider, announces that last week’s 2024 ISC West trade show in Las Vegas was a tremendous success as...

View Article


Group-IB takes part in a global operation to cripple Canadian...

SINGAPORE, April 18, 2024 /PRNewswire/ — Group-IB, a leading cybersecurity company aimed at investigating, preventing, and fight digital crime announced today that it participated in a coordinated...

View Article

DataTracks Celebrates Completion of 19 Years

SINGAPORE, April 18, 2024 /PRNewswire/ — DataTracks, a provider of cloud-based software to automate/generate compliance reports for filing with financial/security regulators to more than 28,000...

View Article

Security risks from IT/OT convergence threaten North Asia’s Industry 4.0...

2024 will see 50 per cent of Operational Technology (OT) systems connected to corporate IT systems in North Asia, up from 38 per cent in 2023. Only 13 per cent surveyed are at an advanced level of...

View Article


Real estate logistics provider GLP steps up to zero trust architecture

With its physical and digital footprint growing, the global firm’s outdated legacy security stack has been replaced with AI-based cloud-centric platforms When a global real estate logistics provider...

View Article


When GenAI chatbots start pretending to be stupid to gain human trust…

This may be a signal that the limited human intellect, in trying to play God, may be underestimating Pandora’s box In a recent peer-reviewed PLOS ONE research paper on large language models (LLMs) for...

View Article

More RATs discovered in official Android app store

Cybercriminals have been modifying open source remote access trojans (RATs) for embedding into seemingly legitimate apps to infiltrate “trusted” app stores Do not take for granted that apps from...

View Article

DEEPX Expands First-Generation AI Chips into Intelligent Security and Video...

Award-winning on-device AI chipmaker will pursue key industry partnerships to bolster this expansion; following a strong showing at ISC West, it will continue this momentum at Secutech Taipei, Embedded...

View Article

Intelligent Living Application Group Inc. Granted Extension to Meet Nasdaq...

HONG KONG, April 20, 2024 /PRNewswire/ — Intelligent Living Application Group Inc. (NASDAQ: ILAG) (“Intelligent Living” or the “Company”), a premium lockset manufacturer in Hong Kong, announced today...

View Article


Image may be NSFW.
Clik here to view.

Large language models have their strengths and weaknesses: analysis

In a balanced testing process, one widespread LLM has been evaluated for vulnerabilities and strengths, to demonstrate no room for complacency In an extension evaluation process of Meta’s LlamaV2 7B...

View Article

How much of automated internet traffic contains malicious activity?

One cybersecurity firm’s 20234 global bot activity data can shed some light on this area of growing concern In analyzing data on automated bot traffic from its customer protection ecosystem, one...

View Article


AI vulnerability testing: Knowing the In’s and Out’s of proper red teaming

To test the safety/security of a generative AI feature, what unchartered bugs and human testing parameters are we dealing with? In the world of AI testing, “red teaming” for safety issues focuses on...

View Article

Does using the fear factor encourage people to be more cyber vigilant?

Is it better to use inclusiveness and positive reinforcement when educating the young about the need to be cyber vigilant? What motivational drivers influence individuals’ attitudes towards certain...

View Article


AEWIN Presents Performant Hardware Solution with the Best TCO for AI-Powered...

TAIPEI, April 22, 2024 /PRNewswire/ — AEWIN Technologies Co., Ltd (doing business as AEWIN) will present performant hardware solution with the best TCO for AI-powered cybersecurity at RSA Conference...

View Article

How medical devices manufacturer Tuttnauer protects patient and personal-data...

In running a cloud-based portal to link its smart medical equipment, the firm has also implemented third-party end-to-end cybersecurity vigilance The advent of smart and connected medical devices has...

View Article

Veritas Strengthens Cyber Resilience with New AI-Powered Solutions

Launches industry’s first self-defending data protection solution Announces new AI-powered copilot Expands Veritas 360 Defense with new security partners SINGAPORE, April 24, 2024 /PRNewswire/ —...

View Article
Browsing latest articles
Browse All 79 View Live




Latest Images