Cybersecurity News in Asia
Strengthening payment security against AI threats
By Victor Ng | Feb 5, 2025
Security, convenience and fraud management in digital paymen...
By Victor Ng | Jan 28, 2025
The changing roles – and tools – of CISOs
By Victor Ng | Jan 21, 2025
More cybersecurity predictions for 2025
By Victor Ng | Jan 14, 2025
SECURITY NEWS
How to rein-in AI agents with a privacy-centric data management approach
Feb 12, 2025
AI agents are agnostic about data privacy: the onus is on organizations to prioritize data sanitization to prevent agentic privacy crises
EXPERT OPINIONS
Securing AI-generated code: Lessons from Open Source’s early challenges
Jan 9, 2025
In drawing parallels in the two software development methods, this author offers tips on strengthening DevSecOps in the age of AI
-
-
No limit for number of blocked sites in Singapore
Nov 19, 2024
-
Ignoring deepfakes – a risky gamble for CXOs
Nov 12, 2024
TIPS
How to rein-in AI agents with a privacy-centric data management approach
Feb 12, 2025
AI agents are agnostic about data privacy: the onus is on organizations to prioritize data sanitization to prevent agentic privacy crises
-
-
-
8 tips for data and generative AI governance
Feb 5, 2025
















CLOUD SECURITY
Before we take the plunge into the AI-powered metaverse…
Nov 12, 2024
What do Asia Pacific organizations need to be aware of in a cloud-driven Web3 metaverse powered more and more by AI?
Are Your Business Secrets Really Secret and Secure?
Jan 21, 2025
“Bump in the night”: What’s next?
Sep 26, 2024
INFOGRAPHICS

Phishing trends in Q3 2024 Infographic

Sumsub’s First Global Fraud Index Infographic

Verizon 2024 Mobile Security Index Infographic

Acronis Cyberthreats Report H1 2024 Infographic


2024 Global Threat Report Infographic
Cyber Intelligence
LatestW3LL-oiled machine: report uncovers covert BEC phishing empire targeting Microsoft 365
By CybersecAsia editors and webmaster webmaster | Sep 7, 2023
A new threat report “W3LL DONE: HIDDEN PHISHING ECOSYSTEM DRIVING BEC ATTACKS” has detailed the operations of W3LL, a threat actor behind a phishing empire that has remained largely unknown until now.
-
-
-
Making cyber-resilience part of your organization’s balance sheet
By Victor Ng | Apr 26, 2022
Cyber Warfare
LatestIs the world ready to be united against intensifying 2025 cyber warfare?
By Nadir Izrael, CTO, Armis | Nov 19, 2024
From AI-emboldened organized cybercriminals to state-sponsored quantum threats, the cyber landscape could run out of control unless we act now
-
-
Ransomware still the #1 cyber threat: report
By CybersecAsia editors | Jan 30, 2023
-
MOST READ
WhatsApp group chat vulnerability hack thwarted
Researchers had discovered in August a group-chat flaw where a malicious message could crash WhatsApp group users’ devices. A...
Nine DevSecOps secret scanning tools to keep the bad guys at bay
With the secrets of over 2m corporations already leaked, it is time to mandate action to plug the preventable gaps
Voters-draw/RCA-Sponsors
CybersecAsia Voting Placement
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
Whitepapers
2024 Insider Threat Report: Trends, Challenges, and Solutions
Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download WhitepaperAI-Powered Cyber Ops: Redefining Cloud Security for 2025
The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download WhitepaperData Management in the Age of Cloud and AI
In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download WhitepaperMitigating Ransomware Risks with GRC Automation
In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper
Middle-sidebar-banner
Case Studies
Outgrowing limited perimeter-based security, DAIKYO ascends to zero trust holistic identity security
Besides gaining improved incidence response, the firm and its subsidiaries has reported increased productivity and …Read moreCASE STUDIES: Insider Threat Detection & Response
Insider threats are on the rise, with 60% of data breaches involving insiders. Explore how …Read moreData Management in the Age of Cloud and AI
In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Read moreUnlock Your Guide to Securing Business Critical Secrets
Is your organization effectively managing access to sensitive secrets like credentials, API keys, and certificates …Read more