TLStorm: Three critical vulnerabilities discovered in APC Smart-UPS devices can allow attackers to remotely manipulate the power of millions of enterprise devices.

Dubbed TLStorm, in the widely used smart- UPS. Attackers could leverage the vulnerabilities to breach internal networks and deactivate Smart-UPS devices or manipulate the power flow to disrupt downstream devices or completely destroy the UPS. One critical vulnerabilities relates to the authenticity validation or firmware files used by UPS devices. Read more:

Ask4key celebrate 5 year partnership with Zscaler

We would like to take this opportunity to celebrate our 5 year partnership with Zscaler and special thanks to Scott Robertson to paramount Ask4key for tremendous success in 2021! See more detail in

Ask4key Malaysia and Ask4key Thailand welcome Smokescreen Technologies joining Zscaler Family

Ask4key Malaysia and Ask4key Thailand welcome Smokescreen Technologies joining Zscaler Family and Smokescreen is one of leader providing active defense and deception technology, its core technology enables organizations to launch deception campaigns using ready-made decoys, detect threat before attacker launched  planned cyber-attack and proactively guard against cyber threat. Zscaler will plan in near future to integrate […]

Zscaler: The Only Gartner Magic Quadrant Leader for Secure Web Gateways, 2020

I am truly humbled to share that Zscaler has been named the only leader in the 2020 Gartner Magic Quadrant for Secure Web Gateways, cementing 10 consecutive years of being recognized as a Leader. In addition to being this year’s only leader, Zscaler has been positioned the furthest overall in both “Ability to Execute” and […]

Cyber Threat Actor Share Global 50K List of IPs vulnerability VPNS

Kuala Lumpur, 25th Nov – Malaysia (552) and Thailand (992) corporate SSL VPN Gateway IPs are listed as part of the exposed VPN weakness. Although patches (for CVE-2018-13379 ) have been out for several months but it seems that corporations are taken it lightly on this vulnerability. Globally this exploits affected government agencies, big enterprises […]