search

LEMON BLOG

The Rising Threat of Technology-Driven Corruption

The misuse of technology, including cyber threats and digital fraud, has the potential to create an entirely new form of corruption, warned Malaysian Anti-Corruption Commission (MACC) chief commissioner Tan Sri Azam Baki

Continue reading
3241 Hits
0 Comments

Hackers Can Now Bypass Two-Factor Authentication – Here’s How

Cybercriminals have found a new way to break through two-factor authentication (2FA), a security feature once thought to be one of the most effective defenses against unauthorized access. Using a sophisticated phishing kit called Astaroth, hackers can now intercept login credentials and authentication codes in real time, putting accounts at serious risk.

Continue reading
3267 Hits
0 Comments

Digital Ministry to Launch High-Tech System to Combat Personal Data Breaches—Because Your Data Deserves Better Protection Than Your WiFi Password

In an effort to clamp down on personal data leaks, Malaysia's Digital Ministry is rolling out its first-ever intelligence system to track and monitor the online sale of personal data. Dubbed the "Threat Intelligence Capacity Support Automation for Personal Data Breach Case Management Project", the initiative—led by the Personal Data Protection (PDP) Commissioner—is set to launch in Q2 this year. (Yes, the name is a mouthful, but at least it sounds impressive enough to scare off data thieves.)

Continue reading
3328 Hits
0 Comments

Meet SOHAI: The WhatsApp Bot That Wastes Scammers' Time Infinitely

Because if scammers love wasting people's time, why not return the favor?

In a world where scammers lurk behind every random WhatsApp message claiming you've won a mysterious lottery or inherited money from a long-lost prince, one Singaporean genius, Dylan Tan, decided enough was enough. Instead of just blocking and reporting these scammers, he built an AI to waste their time. Meet SOHAI: Scammers On Hold AI.

And yes, we know what SOHAI sounds like in Singlish. That's the point.

Continue reading
3637 Hits
0 Comments

2025 Report on SaaS Backup and Recovery Trends

The modern workplace has experienced a profound shift in recent years, with hybrid work becoming standard practice and businesses rapidly embracing cloud-based Software-as-a-Service (SaaS) applications to support this new paradigm. Applications like Microsoft 365 and Google Workspace now serve as the cornerstone of business operations, driving seamless collaboration and productivity. However, this growing reliance on SaaS solutions has also attracted an increase in cyberthreats, putting critical business data at risk from attacks like ransomware and phishing.

Continue reading
3763 Hits
0 Comments
Subscribe to our Blog
Get notified when there's new article
Subscribe