Cyber Security
📌 What Is It? A newly spotted family of Android malware is using artificial intelligence (AI) to perform click-fraud — i.e., automatically generating fake ad clicks to make money…
Microsoft has issued a warning to Windows 11 users regarding a user interface bug introduced by updates released since August 2025, which may cause the password sign-in option to…
📌 What DroidLock Is DroidLock is a newly identified type of Android malware that behaves like ransomware but is even more dangerous because it gives attackers near-total control over…
Critical Fortinet Vulnerabilities Actively Exploited CVE-2025-59718 & CVE-2025-59719 Executive Summary Threat actors are actively exploiting two critical-severity authentication bypass vulnerabilities affecting multiple Fortinet products. These flaws allow attackers to…
We use websites for everything. From checking our bank balance and paying bills to connecting with friends and reading the daily news, these digital platforms are woven into the…
This official publication in the Royal Thai Government Gazette presents the “Standards for Website Security Version 1.0,” issued by the National Cyber Security Agency (NCSA) pursuant to the Cybersecurity…
Google has released an emergency security update to fix a new zero-day vulnerability in its Chrome web browser, marking the sixth actively exploited flaw patched this year. The Vulnerability…
In a striking development that underscores the fragility of digital sovereignty, over 500 gigabytes of internal data from Geedge Networks—a key contractor behind China’s Great Firewall (GFW)—was recently leaked…
Introduction Apple’s ecosystem is well-known for its seamless user experience. One of the unsung heroes behind this smooth interaction with digital images is the ImageIO Framework. This framework provides…
Interested in PKF services?
Reach out to us to learn more about how the experts at PKF Thailand can help your business succeed.