Browser VPN extension intercepts AI chats from mil...
By CybersecAsia editors | Dec 18, 2025
AI chats can spread malware via sponsored search t...
By CybersecAsia editors | Dec 17, 2025
Urgent patches for multiple critical vulnerabiliti...
By CybersecAsia editors | Dec 16, 2025
Using AI coding tools may incur hidden technical debt: research
By CybersecAsia editors | Jan 8, 2026
The time needed to review and quality-check AI coding output could exceed initial time savings, potentially creating subsequent rework burdens
Read MoreAgentic AI emerge as enterprise insider threats predicted in 2026
By CybersecAsia editors | Jan 7, 2026
Several industry observers warn enterprises of compromised autonomous agents in the year ahead
Read MoreGenAI chatbot generates sexualized images of minors on command, then admits wrongdoing
By CybersecAsia editors | Jan 7, 2026
This marks the second problematic output since July 2025. However, the chatbot’s creator has been defensive than the actual AI…
Read MoreBrowser VPN extension intercepts AI chats from millions of unwary users
By CybersecAsia editors | Dec 18, 2025
Malicious updates covertly override network APIs to capture sensitive data from AI chats across 10 platforms
Read MoreAI chats can spread malware via sponsored search traps
By CybersecAsia editors | Dec 17, 2025
Threat actors can deploy a platform-specific credential-stealing infostealer through deceptive Terminal instructions in shared AI chatbot conversations
Read MoreUrgent patches for multiple critical vulnerabilities in iOS/iPadOS released
By CybersecAsia editors | Dec 16, 2025
Updates tackle more than 30 risks across components such as the kernel, App Store, and apps such as Messages and Photos.
Read MoreAI video tool fuels disinformation surge
By CybersecAsia editors | Dec 15, 2025
Despite recent safeguards against AI video tool abuse, users have succeeded in generating realistic fake footage flooding every social media space
Read MoreNo-code agentic AI can be used for financial fraud and workflow hijacking
By CybersecAsia editors | Dec 15, 2025
New findings from Tenable Research demonstrate how democratized AI tools like Microsoft Copilot Studio can inadvertently leak sensitive data and execute unauthorized financial actions.
Read MoreJust when we thought AI-powered IDEs were invaluable…
By CybersecAsia editors | Dec 12, 2025
Researchers have just found more than 30 vulnerabilities in integrated development tools powered by AI.
Read MoreSouth Korean firm’s November massive data breach hits a legal ramification
By CybersecAsia editors | Dec 8, 2025
Last week, the nation’s President ordered swift action to penalize those responsible for the largest-ever data breach recorded to date
Read More
- 1
- ...
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- ...
- 153
Voters-draw/RCA-Sponsors
CybersecAsia Voting Placement
Gamification listing or Participate Now
|
PARTICIPATE NOW |
|
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
Whitepapers

Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats
Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
2024 Insider Threat Report: Trends, Challenges, and Solutions
Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
AI-Powered Cyber Ops: Redefining Cloud Security for 2025
The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
Data Management in the Age of Cloud and AI
In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
Middle-sidebar-banner
Case Studies

Bangladesh LGED modernizes communication while addressing data security concerns
To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
What AI worries keeps members of the Association of Certified Fraud Examiners sleepless?
This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more
Meeting the business resilience challenges of digital transformation
Data proves to be key to driving secure and sustainable digital transformation in Southeast Asia.Read more
Upgrading biometric authentication system protects customers in the Philippines: UnionDigital Bank
An improved dual-liveness biometric framework can counter more deepfake threats, ensure compliance, and protect underbanked …Read more
Bottom sidebar
Other News
CYFIRMA’s 2025 Impact Recap Showcases DeCYFIR, Preemptive External Threat Landscape Management Platform, Delivering Measurable Global Defense Against Emerging Threats
SINGAPORE and TOKYO, Dec. 29, …Read More »Taoping Announces Transformational Growth Milestones: New Corporate Headquarters and US$2 Million Smart Infrastructure Contracts
TIANJIN, China, Dec. 29, 2025 …Read More »SAESOL Tech to Unveil Next-Generation V2X Security Technology Protecting Vulnerable Road Users at CES 2026
First public showcase of “S2X …Read More »Fescaro makes strong Kosdaq debut, eyes global auto cybersecurity
SUWON, South Korea, Dec. 19, …Read More »CYFIRMA Announces DeCYFIR 4.0: Industry-Leading AI Platform Engineered for Preemptive Protection Against Future Threats
Revolutionary 9 Pillar AI Architecture …Read More »