Cyber Security Tech News

Former GIC and Grab Executive Joins Horangi Cyber Security as Chairman to Harness AI in Cyber Security

Horangi Cyber Security announced today that Kevin Lee has joined the company as Executive Chairman. In his new role, Kevin will work on deepening Horangi’s cybersecurity capabilities by harnessing AI and machine learning to enhance the Horangi platform and build out a world-class executive team. He has been serving on the Horangi Board of Directors […]

Cyber Security

CYBER SECURITY | New malware can survive even on reinstalled OS, wiped-out HDD/SSD

Slovak based IT security company, ESET, has recently confirmed the existence of a dangerous malware, dubbed LoJax, that infects a targeted computer by re-writing the Unified Extensible Firmware Interface (UEFI) which is located in the motherboard’s flash memory, allowing it to survive even when you wipe/replace your hard disk and re-install your operating system. UEFI […]

Cyber Security Tech News

ManageEngine Strengthens Endpoint Security with the Launch of Browser Security Plus

Manila, Philippines — Sept. 19, 2018 — ManageEngine, the real-time IT management company, today announced its launch of Browser Security Plus, a browser management solution that helps organizations secure their corporate data in the cloud and protect their networks from web-based cyberattacks. Available immediately, Browser Security Plus provides organizations with a layer of management capabilities […]

Cyber Security

Cybersecurity in APAC: The art of simplicity and being on the right side of history

We all have “a-ha” moments when that lightbulb above our heads is just too bright to ignore. One came to me when I was in a previous IT operations role.  It happened on a day when I had two meetings: first with an endpoint agent team and another with a security operations team. The endpoint […]

Cyber Security

How can blockchain applications adapt and adopt software security best practices?

Though blockchain-native software is in its infancy, the technology races forward to meet more and more use cases. But the community doesn’t seem to have taken software security principles seriously, as we can see from the recent scan of Ethereum smart contracts that identified 34,200 vulnerable contracts (source: https://www.bleepingcomputer.com/news/cryptocurrency/researchers-find-34-200-vulnerable-ethereum-smart-contracts/). For added perspective, a smart contract […]

Cyber Security

Cyber-Security Firm Reveals Most Wanted Malware

SAN FRANCISCO, CALIFORNIA — Cryptomining malware that dominated the top 10 most wanted malware in May has dug into nearly 40 percent of organizations globally, an increase of nearly 50 percent, a California-based cyber-security firm said Thursday. In its latest Global Threat Index for May 2018, Check Point Software Technologies Ltd., a global leading cyber-security […]

Cyber Security

Intel Processors now utilizing iGPU for Malware Scanning. Securing down to the hardware level

Last week during the RSA Conference 2018, Intel announced two new technologies—Threat Detection Technology (TDT) and Security Essentials. These are hardware-based built-in security features across Intel processors for threat detection without compromising system performance. Intel’s Threat Detection Technology (TDT) offers hardware-level telemetry helping security products detect new classes of threats and exploits. It’s two main […]

Cyber Security

Windows 7 PCs more vulnerable due to Microsoft’s own patch for Meltdown

If you haven’t heard of the Meltdown and Spectre vulnerabilities, these are security flaws discovered by researchers earlier this year found in computer processors from all manufacturers: Intel, ARM, and AMD, which means all current and previous generations of PCs, servers, and mobile phones are vulnerable to data theft. It became even worse on the […]