Blogs
Cryptocurrency Investment Scam: Victims Lost Millions

Cryptocurrency Investment Scam: Victims Lost Millions

On 5th February 2024, The Star reported a company director lost RM11 million in a cryptocurrency scam. Meanwhile, on 27th January 2024, Free Malaysia Today (FMT) reported a victim of a cryptocurrency scam who lost more than RM10 million.However, this is not the only...

Scammer exploiting Michelle Yeoh’s identity

Scammer exploiting Michelle Yeoh’s identity

On 17th January 2024, The Star reported fake Michelle Yeoh news on a scam site impersonating The Star brand identity. What happens? Scammers are using 'click-bait' techniques that use Malaysian Oscar-winning actress Michelle Yeoh's identity. There are multiple scam...

Identity Threat Protection

Identity Threat Protection

Identity threats grow larger than ever before in today's hyper-connected digital landscape, creating a huge issue for individuals and organizations alike. These threats come in a variety of devious forms, each with potentially disastrous repercussions. Identity theft,...

The Rise of Cybercrime in Malaysia: What you Need to Avoid

The Rise of Cybercrime in Malaysia: What you Need to Avoid

The emergence of cybercrime has become an alarming reality in an age where our lives are more connected with the digital sphere. Malaysia, a country characterized by rapid technology growth and internet connectedness, is not immune to this worldwide disease. As our...

Battling Social Engineering Tactics in Malaysia

Battling Social Engineering Tactics in Malaysia

In an increasingly interconnected world, the risks we face have gone beyond traditional forms of combat. Social engineering is one such hazard lurking in the shadows of our digital age. This article serves as an important reminder to recognise the sneaky nature of...

The Need for Threat Intelligence

The Need for Threat Intelligence

Introduction Threat intelligence is described at its core as the art and science of understanding, analyzing, and countering potential and present cyber threats. It entails the proactive collection and analysis of data and information pertaining to dangerous digital...