Battling Social Engineering Tactics in Malaysia
In an increasingly interconnected world, the risks we face have gone beyond traditional forms of combat. Social engineering is one such hazard lurking in the shadows of our digital age. This article serves as an important reminder to recognise the sneaky nature of...
The Need for Threat Intelligence
Introduction Threat intelligence is described at its core as the art and science of understanding, analyzing, and countering potential and present cyber threats. It entails the proactive collection and analysis of data and information pertaining to dangerous digital...
Tackling Cybersecurity in the New Hybrid Office
The traditional workplace environment has experienced major alteration in recent years, giving rise to what is now known as the "Hybrid Office Model." This creative approach to work marks a major shift in how organizations establish their operations and suit their...
2,700 individuals rescued: Tricked by Cybercrime syndicates in the Philippines.
The Philippine police were supported by commandos when they did a raid on Tuesday, rescuing 2,700 workers from the Philippines, Vietnam, China, Indonesia, and over a dozen other countries who were swindled into working for fraudsters using online gaming sites and...
The Rise of Social Engineering Attacks: How to Recognize and Defend Against Them.
Social engineering attacks have become increasingly prevalent in recent years, posing significant risks to individuals, businesses, and organisations. These types of attacks exploit human psychology and manipulate individuals into revealing sensitive information,...
Top 10 Creative Scams That Will Trick You
Internet users surely do offer some kind of personal information whenever they create an account on the Internet (NortonOnline, 2022). Furthermore, information like date of birth, social security number, or security questions are things that the user has shared online...