search

LEMON BLOG

Don’t Panic: Your Data Is Protected, Says Digital Ministry

Cybersecurity | 11 June 2025
With rising concerns about data breaches and digital privacy, it's no surprise that Malaysians are growing more cautious about how their personal information is being handled. But according to the Deputy Minister of Digital, Datuk Wilson Ugak Kumbong, there's no need to worry — your data is in safe hands.

Are Telcos Being Asked to Hand Over Your Call and Location Data? What We Know So Far

Cybersecurity | 06 June 2025
A recent report has raised serious questions about how much of our personal phone data may be heading straight into the hands of authorities. According to the South China Morning Post (SCMP), Malaysia's telecom companies have allegedly been asked by the Malaysian Communications and Multimedia Commission (MCMC) to hand over highly detailed user data – including call records, internet activity, and even GPS coordinates – as part of a government project.

Microsoft Security Updates Coming June 10, 2025: What You Need to Know

Cybersecurity | 05 June 2025
As part of its regular Patch Tuesday cycle, Microsoft has given a heads-up to its Unified and Premier Support customers about the upcoming wave of security updates scheduled for release on June 10, 2025 (Pacific Time). This early notice is meant to help IT teams and system administrators plan ahead and ensure smooth patch deployment across environments.

SonicWall SMA100 Appliances Under Active Attack: What You Need to Know

Cybersecurity | 10 May 2025
If your organization uses SonicWall's Secure Mobile Access (SMA100) appliances, it's time to take action. SonicWall has confirmed that cyber attackers are actively exploiting two serious vulnerabilities in these devices, prompting warnings from both the company and the U.S. Cybersecurity and Infrastructure Security Agency (CISA). Here's what's happening and what you need to do.

Zero-Day Windows Shortcut Exploit Used by State-Backed Hackers Since 2017

Cybersecurity | 02 April 2025
A newly disclosed zero-day vulnerability in Windows shortcut files (.lnk) has been exploited in-the-wild for several years by state-sponsored hacking groups. Identified as ZDI-CAN-25373, the flaw allows attackers to silently execute malicious commands using shortcut files—making it difficult to detect through traditional security tools.Security researchers revealed that this vulnerability has been abused since at least 2017 by advanced persistent threat (APT) groups linked to 11 different countries. 

Microsoft’s New AI Agents Are Built to Boost Cybersecurity Teams

Cybersecurity | 28 March 2025
Cybersecurity teams today face an overwhelming task: sifting through endless alerts, potential phishing emails, and threats to sensitive data. For many, the daily grind involves evaluating mountains of suspicious messages or tracing the source of a data breach. Microsoft thinks it can help—and it's putting AI agents to work to do just that.  

MAHB Cyberattack: Hackers Demand US$10 Million, Malaysia Refuses to Pay

Cybersecurity | 26 March 2025
Malaysia's cybersecurity defenses were put to the test recently when hackers launched a serious cyberattack on Malaysia Airports Holdings Berhad (MAHB), demanding a staggering US$10 million ransom. Prime Minister Datuk Seri Anwar Ibrahim revealed the incident during his keynote speech at the 218th Police Day celebration.

What is a Brute-Force Attack and How to Stop It

Cybersecurity | 25 March 2025
Let's say you forget the password to your old email account, and you sit there trying every combination you can think of—birthdays, pet names, your go-to "123456". That, in a nutshell, is how a brute-force attack works… just on a much, much bigger scale. 

LEMON VIDEO CHANNELS

Step into a world where web design & development, gaming & retro gaming, and guitar covers & shredding collide! Whether you're looking for expert web development insights, nostalgic arcade action, or electrifying guitar solos, this is the place for you. Now also featuring content on TikTok, we’re bringing creativity, music, and tech straight to your screen. Subscribe and join the ride—because the future is bold, fun, and full of possibilities!

My TikTok Video Collection
Subscribe to our Blog
Get notified when there's new article
Subscribe