Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Phishing and mobile scams surge in the Philippines: cyber report
Building trust in the age of AI
Chinese-language criminal networks laundered $16.1bn illicit crypto in...
X-PHY Inc Appoints RoBridgeAI as Official Channel Partner for India
AI disinformation campaigns surge in US/Israel-Iran war
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Beyond firewalls – addressing cybersecurity blind spots

      Beyond firewalls – addressing cybersecurity blind spots

      Monday, March 2, 2026, 10:24 AM Asia/Singapore | Features
    • Featured

      Where are financial fraud and AML regulations heading in S E Asia?

      Where are financial fraud and AML regulations heading in S E Asia?

      Tuesday, February 10, 2026, 2:44 PM Asia/Singapore | Features
    • Featured

      How AI is reshaping dating in Asia

      How AI is reshaping dating in Asia

      Monday, February 9, 2026, 5:33 AM Asia/Singapore | Features, Newsletter
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

Features

Navigating blockchain adoption amid rising security challenges

By Victor Ng | Wednesday, May 14, 2025, 12:32 PM Asia/Singapore

Navigating blockchain adoption amid rising security challenges

What are the key risks facing businesses adopting blockchain technology and smart contracts, and how should we proactively secure our businesses against emerging blockchain-related threats?

A PwC survey indicated that 84% of businesses are in the process of integrating blockchain into their technology stack, reflecting its growing mainstream appeal.

However, alongside this growth, the Chainalysis 2025 Crypto Crime Report reveals that US$2.2 billion was stolen from crypto platforms in 2024, with North Korean hackers responsible for $1.34 billion, accounting for 61% of the total amount stolen.

Although ransomware payments fell by 35%, following increased law enforcement actions, the total impact was US$813.55 million in 2024.

These figures underscore the pressing need for comprehensive security strategies as businesses venture into the blockchain space. Understanding the security landscape is essential for ensuring blockchain’s long-term viability amid evolving regulations and sophisticated cyberthreats.

For insights into the key risks facing businesses adopting blockchain technology, the importance of due diligence in smart contracts, and how proactive security measures can safeguard against emerging threats, we looked to Dr Tielei Wang, Chief Security Scientist, CertiK.

What are the biggest opportunities for businesses adopting blockchain today?

Dr Tielei Wang: Blockchain offers businesses unprecedented opportunities to enhance transparency, security, and efficiency across industries. In supply chain management, blockchain provides immutable, real-time tracking of goods and services, reducing fraud and inefficiencies while ensuring regulatory compliance. Financial institutions benefit from blockchain’s ability to enable instant, cross-border transactions without intermediaries, lowering costs and improving accessibility.

Additionally, decentralized identity solutions enhance security in user authentication, reducing reliance on vulnerable password-based systems. The tokenization of real-world assets, from real estate to intellectual property, also unlocks new business models by making traditionally illiquid assets more accessible and tradable.

With US$2.2 billion stolen from crypto platforms in 2024, what are the most pressing security concerns?

Dr Wang: These losses underscore systemic vulnerabilities in blockchain security, particularly in smart contract exploits, bridge attacks, and private key compromises. Cross-chain bridges remain a prime target, as hackers exploit their weak points to siphon funds across networks. Smart contract vulnerabilities, often due to rushed deployments and inadequate auditing, expose platforms to reentrancy attacks and logic flaws.

It is also notable that phishing and social engineering attacks have increased recently, compromising users’ private keys and wallets. The rapid evolution of threats highlights the need for businesses to adopt rigorous security measures, including real-time threat monitoring, multi-layer authentication, and routine audits of smart contracts and protocols.

Why is security expertise essential for companies entering the blockchain space?

Dr Wang: Unlike traditional IT systems, blockchain operates in a decentralized, trustless environment where security flaws can lead to irreversible financial losses. Businesses entering this space must recognize that blockchain security extends beyond standard cybersecurity measures; it requires specialized knowledge in cryptography, consensus mechanisms, and secure smart contract deployment.

Without experienced security professionals, companies risk launching vulnerable products that attackers can exploit, leading to severe financial and reputational damage. Engaging blockchain security experts for code audits, penetration testing, and continuous monitoring is crucial to building trust and resilience in this space.

How can businesses balance innovation with robust security measures?

Dr Wang: Pushing the boundaries of blockchain innovation should not come at the cost of security. Businesses can strike this balance by implementing security-first development practices, such as conducting rigorous code audits before deployment, utilizing formal verification for smart contracts, and integrating multi-factor authentication and encryption in user interactions.

Adopting a zero-trust security model can also ensure that access controls and verification mechanisms are in place at every level. Regular bug bounty programs incentivize ethical hackers to identify vulnerabilities before malicious actors can exploit them.

Ultimately, embedding security into the innovation process from the outset—rather than treating it as an afterthought—ensures that new blockchain solutions remain cutting-edge.

Share:

PreviousScattered Spider: still spinning phishing webs on corporate land?
NextAdmitad Launches OEM Advertising Division to Drive Mobile Growth through Device Manufacturer Partnerships

Related Posts

Why logistics and supply chain cybersecurity needs to align with digitalization rates

Why logistics and supply chain cybersecurity needs to align with digitalization rates

Wednesday, May 29, 2024

Grabbing hackers to poke holes in their cybersecurity in 2015 has paid off

Grabbing hackers to poke holes in their cybersecurity in 2015 has paid off

Wednesday, December 23, 2020

Human error is the top cybersecurity risk, and how to mitigate it

Human error is the top cybersecurity risk, and how to mitigate it

Friday, January 17, 2020

“Your bank account has been frozen. Click to verify your identity”: SCAM!

“Your bank account has been frozen. Click to verify your identity”: SCAM!

Thursday, May 19, 2022

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • Cyber protection for medical clinics in Singapore

    Cyber protection for medical clinics in Singapore

    As Singapore’s healthcare sector becomes increasingly digital and interconnected, clinics are facing heightened cyber risks, …Read more
  • India’s WazirX strengthens governance and digital asset security

    India’s WazirX strengthens governance and digital asset security

    Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
  • What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more

Bottom sidebar

Other News

  • X-PHY Inc Appoints RoBridgeAI as Official Channel Partner for India

    Tuesday, March 10, 2026
    SINGAPORE, March 9, 2026 /PRNewswire/ …Read More »
  • DESILO and FHE Inventor Craig Gentry Introduce 5th-Generation “GL” FHE Scheme for Private AI

    Monday, March 9, 2026
    Debuting at the FHE.org 2026 …Read More »
  • DoveRunner Expands Presence in Southeast Asia with New Office in Jakarta

    Thursday, February 26, 2026
    JAKARTA, Indonesia, Feb. 25, 2026 …Read More »
  • Proofpoint partners with Concentrix to strengthen human- and agent-centric cybersecurity across Asia Pacific

    Tuesday, February 24, 2026
    Partnership integrates Proofpoint’s collaboration and …Read More »
  • Indonesia’s MDI Ventures Doubles Down on Execution and Trust to Unlock Regional Portfolio Value

    Friday, February 20, 2026
    The Telkom-backed VC reinforces cross-sector …Read More »
  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 CybersecAsia All Rights Reserved.