Disruptive.Asia
  • Home
  • News
  • Views
  • Features
  • Off the Wire
  • Videos
  • Authors
  • About Us
    • About Us
    • Marketing Services

attacks

network attacks Singapore
Features

Singapore companies struggle to repel network attacks

September 21, 2021 News Centre 0

Singapore companies are struggling to repel network attacks, falling victim to dangerous ransomware assaults with deadly consequences. Read more…

infrastructure attacks ICS
Features

Coping with ‘leak and shame’ attacks against critical national infrastructure

September 9, 2021 Avanti Kumar 0

Recent high-profile attacks on industrial control systems (ICS) expose vulnerabilities within critical infrastructure leading to disruptions. Read more…

targets ransomware
Features

Businesses are premium ransomware targets as attacks spike in last year

August 25, 2021 News Centre 0

The frequency of ransomware attacks has increased dramatically over the past year, with most of these costly attacks targeting businesses. Read more…

attacks ransom
Features

Know your enemy: Protecting against the next wave of ransomware attacks

August 10, 2021 Guest Writer 0

The evolving nature of ransomware continues to prove that no industry, organisation or person is immune to these kinds of attacks. Read more…

News

Research shows DNS amplification attacks grew nearly 4,800%

January 7, 2020 News Centre 0

DNS amplification attacks continue to increase in number, growing 4,788% over Q3 2018, according to Nexusguard’s Q3 2019 Threat Report. Read more…

Off the Wire

FBI shutdown of “DDoS for hire vendors” reduces attacks

April 8, 2019 News Centre 0

FBI shutdown of the 15 largest DDoS for hire vendors (“booters”) reduced the overall number of attacks worldwide by nearly 11% compared to last year. Read more…

Languages

Features

  • Cybercriminals introduce new phishing tactics to net victims
    March 24, 2023 0
  • AIOps automation application security
    AIOps and automation are crucial to good app security
    March 22, 2023 0
  • IT infrastructure
    Future-oriented IT infrastructure for sustainable success
    March 17, 2023 0
  • cybersecurity talent shortage
    Changing conversations on the cybersecurity talent shortage
    March 13, 2023 0

Off the Wire

  • ZTE sees increases in operating revenue and profit in 2022
    March 10, 2023 0
  • ZTE ranks No. 1 for both PON CPE and DSL CPE shipments
    March 10, 2023 0
  • ZTE unveils more efficient, eco-friendly products at MWC
    February 27, 2023 0
  • ZTE brings brilliant new products and solutions to MWC 2023
    February 25, 2023 0

Videos

  • Huawei revenue sanctions
    Huawei revenue holding up despite US sanctions
    December 31, 2022 0
  • Meta metaverse
    Meta accused of trying to buy dominance of the metaverse
    December 11, 2022 0
  • crypto world cup
    Crypto fan tokens are a hot item at this year’s World Cup
    November 30, 2022 0
  • blockfi bankruptcy
    BlockFi files for bankruptcy as the latest FTX casualty
    November 29, 2022 0

Popular Posts

  • Cybercriminals introduce new phishing tactics to net victims
    Cybercriminals introduce new phishing tactics to net victims

Recent Comments

  • Andrew Doyle on Generative AI is a bubble – we know what happens next
  • Elizabeth Johnson on If PayPal and Facebook allow fraud to occur are they party to that fraud?
  • Trevor Penniall on External risk evaluation needs better tools and transparency
  • JW on NOW Telecom and USTDA move forward on Philippines 5G plan

Archives

Popular Posts
  • Cybercriminals introduce new phishing tactics to net victims
    Cybercriminals introduce new phishing tactics to net victims
Recent Comments
  • Andrew Doyle on Generative AI is a bubble – we know what happens next
  • Elizabeth Johnson on If PayPal and Facebook allow fraud to occur are they party to that fraud?
Important pages
  • About Us
  • Marketing Services
  • Newsletters
  • Privacy Policy
  • Terms and Conditions of Service

© Disruptive.Asia 2023

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}