Learning Resources
Beyond the Firewall: A Comprehensive Cybersecurity Guide for Malaysian Enterprises
Unlock the essentials of cybersecurity for Malaysian enterprises. Learn the path for businesses to strengthen their defenses and thrive in the global digital landscape.
Managed IT Services: Is It Right for Businesses in Malaysia?
Managed IT services refer to the practice of outsourcing various technology management responsibilities and functions to improve operations and cut expenses.
Phishing Attacks and How to Prevent Them
Phishing is a type of cyberattack where criminals try to steal your data by pretending to be a legitimate service or entity.
Malware Explained – From Basic Viruses to Advanced Threats
Malware is the short form of malicious software. Malware takes various forms but most often exists as simple computer code. This rudimentary existence makes it more capable of harming or exploiting any programmable device or network.
Cross-site Scripting – When Your App Become a Threat
A cross-site scripting, or XSS attack, is when cybercriminals inject malicious scripts into web pages. These scripts can do various things, like steal visitor data, run browser-based exploits, or even deface a website.
Zero-day Exploits – When Hackers Attack Unfixed Vulnerabilities
Zero-day exploits are attacks that occur on the same day a vulnerability is discovered. These attacks are done as swiftly as possible. Cybercriminals try to achieve as much damage as possible before software developers can release a patch.
DDoS attacks – When Traffic Kills Networks
A DDoS involves traffic overwhelming a targeted server, website, or network. When the target faces more traffic than it can cope with, it cannot operate as usual.