Early Warning Alert: ASUS Router Critical Vulnerabilities
ASUS has published updated firmware with cumulative security updates that address vulnerabilities in several router models, advising customers to update their devices immediately or restrict WAN access until they are secure. According to the organisation, the newly released firmware fixes nine security flaws, including a high and critical one.
Cyber Threat Alert: MOVEit Transfer Vulnerability Exploited (CVE- 2023-34362)
MOVEit, a well-known secure file transfer program, is at the center of a high-profile breach known as "Zero-Day MOVEit Transfer Vulnerability" that was recently revealed. This possible flaw might result in elevated privileges and unauthorided access to the environments. The attacking approach is a SQL Injection onto unpatched MOVEit servers, which allows the threat actor to gain access and remotely execute arbitrary code. As a result, it is critical to patch the flaw with the most recent security patches released by Progress Software in order to prevent exploitation efforts.
The Challenges for Managed Security Service Providers (MSSP) in Malaysia
Malaysia is a rapidly growing economy with a high rate of technology adoption. As more businesses digitize their operations, cybersecurity risks have also increased tremendously. Managed cybersecurity service providers (MSSPs) have emerged as a solution for businesses that lack the expertise or resources to manage their own cybersecurity. However, MSSPs in Malaysia face several challenges and shortcomings that can impact their ability to provide effective cybersecurity services to their clients.
Planning Your XDR Journey
Extended Detection and Response (XDR) is the latest buzzword in the cybersecurity industry. The idea behind XDR is to provide organizations with a comprehensive view of their security landscape, by integrating data from multiple sources, and delivering faster and more accurate threat detection and response. XDR is a powerful technology that can significantly improve an organization's security posture, but it requires careful planning and execution.
Supply Chains: The New Frontier for Cyber Attacks and How to Protect Your Business
The growing threat of cyber-attacks has made businesses of all sizes vulnerable in today's digital landscape. However, supply chains have emerged as a new frontier for cyber criminals. By taking proactive steps to protect businesses and their customers, organizations can better safeguard their supply chains and mitigate the impact of cyber-attacks.
Sales Ethics in Cybersecurity: Trust and Integrity as the Guiding Principles in What We Do
With the importance and size of the cybersecurity industry growing every day, it is a race for companies to grab market shares in order to achieve revenue goal as well as reaching the ever-glorious “market leader” status, more so in an event of a potential economic slowdown to secure the opportunities available.Unfortunately, some companies have taken advantage of this situation by using deceptive sales tactics. While these tactics may be effective in the short-term, they are not ethical and can lead to reputational damage.