Cyber Resilience Survey

We live in an increasingly digital world where cyber threats are constantly evolving. Beyond just preventing attacks, the ability to quickly recover and maintain operations during and after a cyber incident—known as cyber resilience—is crucial for every organization. We invite you to participate in this brief survey to share your insights on how your organization approaches cyber resilience, the challenges you face, and the strategies you’re implementing to safeguard your digital future. Your valuable input will help us understand current trends and identify key areas for improvement across the industry.
Securing Malaysia’s Digital Future: Why Cyber Resilience Matters

As Malaysia advances its digital transformation, cyber threats pose growing risks to businesses, government institutions, and critical infrastructure. Cyber resilience—the ability to prepare for, respond to, and recover from cyber incidents—is essential for national security and economic stability. This blog explores Malaysia’s evolving threat landscape, the impact of cyber-attacks, and key steps to strengthen cybersecurity for a secure digital future.
Central Group’s Centara Luxury Hotel Chain Breached by Desorden

DESORDEN hacking group is claiming responsibility for the hack of Centara Hotels, a major hotel chain.
LockBit2.0, Beyond Privacy and Security

Lockbit2.0, beyond privacy and security This document describes the recent Cyber Attacks on Accenture that reportedly affected over 2,500 computers and leaked client information. LockBit threat actors posted the names of companies and their logos on their dark web site. They threatened to publish the data stolen during the Accenture ransomware attack. The threat actor […]
What is RansomExx?

RansomExx is notorious as one of the newest ransomware groups that continue to implement cyberattacks across the world. The RansomExx ransomware gang has been in operation since 2018 but came into prominence in 2020 after infecting a variety of high-profile organizations
Prometheus Ransomware Decryptor

How To Partially Recover Your Encrypted Files.
What is Lemon Duck Attack?

The objective of Lemon Duck is to steal credentials, remove security controls in an organization, spread through the organization via email and allow threat actor moves within the network without a trace.
What is Kaseya attack?

Kaseya VSA is a cloud-based MSP platform that allows providers to perform patch management and monitoring for the customers.
CVE-2021-1675 (CVE-2021-34527) PrintNightmare

This vulnerability is also known as PrintNightmare and the Print Spooler Bug. Microsoft also recently renamed this new vulnerability CVE-2021-34527. The original CVE-2021- 1675 was patched due to allowing an EoP hole; however, further issues were brought to light that CVE-2021- 1675 could also be used for RCE. This is the vulnerability to which we are referring.