Credential Stuffing Explained

Credential stuffing is a cyber attack technique whereby an attacker uses compromised credentials or login information on different services in order to gain unauthorized access into a user’s...

Crypto Dusting Attack Explained

Crypto Dusting Attack Explained A dusting attack is a situation where trace amounts of a cryptocurrency are sent to many thousands of crypto wallets.  The amounts are intentionally tiny...

Cryptojacking Explained

With the dawn of cryptocurrency, a new form of hijacking has emerged. A way to steal power and resources from a computer to be used for bitcoin mining. Cryptojacking, can be done on any device that...

Cyber Resilience Explained

Cyber resilience goes beyond the ability of a single computing system to bounce back from threats. In a business context, it signifies an organisation's comprehensive strategy to prevent,...

Cyber Safety Explained

Cyber Safety refers to the safe and responsible use of ICT.   Cyber Safety is not just about keeping systems and data safe, but its about using IT systems responsibly and treating...

Cyber Threat Actors Explained

In today's digital world, the threat of cyber attacks is ever-present, and it is essential to understand the concept of threat actors to safeguard against such attacks. Threat actors are...

DAO Explained

Decentralised Autonomous Organisations, or DAOs, are a type of organisation that operates without the use of conventional managerial hierarchies and instead relies on computer code. This indicates...

Dark Data Explained

Dark data is the term referring to all the assets and data an organisation has collected and stored but fails to use for business purposes. Unlike the dark web, there is nothing illegal or...

DarkSide Ransomware Explained

What Is DarkSide Ransomware? Initially traced back to a Russian speaking cybercriminal, DarkSide was announced as a Ransomeware-as-a-Service. “Affiliates” are recruited to launch...

Data Deduplication Explained

Data Deduplication is the process of removing duplicates or excessive copies of data to decrease the storage requirement and increase the efficiency of data processing. In this approach, the...

© Asia Online Publishing Group Sdn Bhd 2022
Powered by