Scammer exploiting Michelle Yeoh’s identity
On 17th January 2024, The Star reported fake Michelle Yeoh news on a scam site impersonating The Star brand identity. What happens? Scammers are using 'click-bait' techniques that use Malaysian Oscar-winning actress Michelle Yeoh's identity. There are multiple scam...
Identity Threat Protection
Identity threats grow larger than ever before in today's hyper-connected digital landscape, creating a huge issue for individuals and organizations alike. These threats come in a variety of devious forms, each with potentially disastrous repercussions. Identity theft,...
The Rise of Cybercrime in Malaysia: What you Need to Avoid
The emergence of cybercrime has become an alarming reality in an age where our lives are more connected with the digital sphere. Malaysia, a country characterized by rapid technology growth and internet connectedness, is not immune to this worldwide disease. As our...
Battling Social Engineering Tactics in Malaysia
In an increasingly interconnected world, the risks we face have gone beyond traditional forms of combat. Social engineering is one such hazard lurking in the shadows of our digital age. This article serves as an important reminder to recognise the sneaky nature of...
The Need for Threat Intelligence
Introduction Threat intelligence is described at its core as the art and science of understanding, analyzing, and countering potential and present cyber threats. It entails the proactive collection and analysis of data and information pertaining to dangerous digital...
Tackling Cybersecurity in the New Hybrid Office
The traditional workplace environment has experienced major alteration in recent years, giving rise to what is now known as the "Hybrid Office Model." This creative approach to work marks a major shift in how organizations establish their operations and suit their...