Cybersecurity Malaysia Conference 2024

Cybersecurity Malaysia Conference (CyberSecMalaysia) is a premier event tailored for security professionals across various sectors in Malaysia. This conference serves as a pivotal platform for in-depth discussions, addressing challenges, and sharing the best practices in the rapidly evolving landscape of the security industry. The conference will feature sessions and presentations that delve into the latest […]

Cybersecurity Malaysia Conference 2024 Read More »

Threat Report, T3 2022

Welcome to the T3 2022 issue of the ESET Threat Report! In 2022, an unprovoked and unjustified attack on Ukraine shocked the world, bringing devastating effects on the country and its population. The war continues to impact everything from energy prices and inflation to cyberspace, which ESET researchers and analysts have monitored extensively throughout the

Threat Report, T3 2022 Read More »

The Near and Far Future of Ransomware Business Models

This research paper explores the position of ransomware in cybercrime and what would trigger changes in ransomware business models. Ransomware has evolved into a malware used to cause major problems for enterprises, governments, healthcare, and critical infrastructure, but other cybercriminal business models — ones that can generate significantly more illicit profit — raises an interesting

The Near and Far Future of Ransomware Business Models Read More »

Global Threat Report, Vol.1 2022

“The future of security is open. In a world of dynamic, fast-moving, and well-resourced threat actors, digital security’s best hope lies in bringing like-minded defenders together around platforms that are as open and inter-operable as possible.” – Nate Fick U.S. Ambassador at Large for Cyberspace & Digital Policy and Formerly Elastic Security General Manager and

Global Threat Report, Vol.1 2022 Read More »

Joint cybersecurity advisory

 2021 Top MalwareStrains This joint Cybersecurity Advisory (CSA) was coauthored by the Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC). This advisory provides details on the top malware strains observed in 2021. Malware, short for “malicious software,” can compromise a system by performing an unauthorized function or process. Malicious cyber

Joint cybersecurity advisory Read More »

2022 Social Engineering Report

Social engineering is the preeminent component of the overwhelming majority of cyberattacks today. Whether the goal of a threat actor is to directly perpetrate fraud, harvest credentials, or install malware, at some point a human being must be coerced into taking an action on the actors’ behalf. This fact is the basis for Proofpoint’s People-Centric

2022 Social Engineering Report Read More »