Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Rushing to adopt autonomous AI agents without tight vigilance is too r...
VIVOTEK Earned Level 2 in TWSE’s 11th Corporate Governance Evalu...
How vigilant are you to sneaky phishing tactics?
And all along we thought phone numbers linked to our online identity w...
Are support systems for victims of online harm sufficient and accessib...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Will your organization’s defenses be breached due to your suppliers’ weak cybersecurity?

      Will your organization’s defenses be breached due to your suppliers’ weak cybersecurity?

      Thursday, May 29, 2025, 5:04 PM Asia/Singapore | Features
    • Featured

      How the UAE proactively protects its digital economy

      How the UAE proactively protects its digital economy

      Monday, May 19, 2025, 2:16 PM Asia/Singapore | Features
    • Featured

      Navigating blockchain adoption amid rising security challenges

      Navigating blockchain adoption amid rising security challenges

      Wednesday, May 14, 2025, 12:32 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

LOGIN REGISTER
  • Features
    • Featured

      Will your organization’s defenses be breached due to your suppliers’ weak cybersecurity?

      Will your organization’s defenses be breached due to your suppliers’ weak cybersecurity?

      Thursday, May 29, 2025, 5:04 PM Asia/Singapore | Features
    • Featured

      How the UAE proactively protects its digital economy

      How the UAE proactively protects its digital economy

      Monday, May 19, 2025, 2:16 PM Asia/Singapore | Features
    • Featured

      Navigating blockchain adoption amid rising security challenges

      Navigating blockchain adoption amid rising security challenges

      Wednesday, May 14, 2025, 12:32 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning
News

What lessons do financial phishing trends in South-east Asia harbor?

By CybersecAsia editors | Monday, April 1, 2024, 5:33 PM Asia/Singapore

What lessons do financial phishing trends in South-east Asia harbor?

While phishing incidents were definitely increasing in 2023, one cybersecurity firm is suggesting that insufficiently-trained employees was one common denominator

In analyzing its protection ecosystem metrics for 2023, one cybersecurity agency has announced “financial-phishing” trends encountered among its customers in South-east Asia (SEA).

Financial-phishing refers to phishing incidents related to banking, payment systems and digital retail transactions where users of business devices are involved.

Those in the Philippines logged the highest number of financial phishing incidents at 163,279 attempts, followed by Malaysia with 124,105. Indonesia customers chalked up 97,465 incidents while those in Vietnam experienced 36,130 phishing attacks related to financial matters. Thailand and Singapore customers 25,227 and 9,502 financial-phishing attempts respectively.

In total, the metrics showed nearly 455,700 attempts (from Jan to Dec 2023) to follow a phishing link related to finance matters on business devices in South-east Asia (SEA) customers of various sizes.

The statistics from Kaspersky reflect user clicks on phishing links placed in various communication channels, including emails, fraudulent web sites, messengers, social media, etc. According to the firm’s general manager for SEA, Yeo Siang Tiong: “Phishing is a technique trusted by cybercriminals when it comes to infiltrating business networks. The rise of generative AI helps cybercriminals to make phishing messages or scam resources more convincing. As a result, it becomes challenging for people to distinguish between a scam and a legitimate communication.”

The firm has asserted that employee security violations in the region can be as damaging as external hacking incidents. Citing the “human factor” as part of the most common causes of “accidental” security violations and cyber incidents, the firm believes the current shortage/leanness of IT and cybersecurity staff numbers renders human-factor risks even more concerning.

Yeo said the human factor continues to play a role in making businesses vulnerable. Therefore, in addition to investing in anti-phishing software, endpoint detection and response and other best cybersecurity best practices, organizations need to continually educate employees on cyber awareness, upskill IT personnel to keep ahead of threats, and maintain continual vigilance.

Share:

PreviousInvesting in cyber training is not enough: mind the quality of courses
NextShadowy IT activities by remote workers can ruin cybersecurity

Related Posts

As the cyber threat landscape grows, defenders need to SOAR high

As the cyber threat landscape grows, defenders need to SOAR high

Friday, April 29, 2022

When CISOs and senior management are not aligned, try these techniques

When CISOs and senior management are not aligned, try these techniques

Friday, March 13, 2020

How businesses can protect against COVID-19 cyberthreats

How businesses can protect against COVID-19 cyberthreats

Friday, May 8, 2020

Singapore’s digital ‘watering-holes’ were a top threat in 2019

Singapore’s digital ‘watering-holes’ were a top threat in 2019

Tuesday, May 19, 2020

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    With only a small IT team, the digital transformation has united operations across 30 locations, …Read more
  • Automating border control and security with facial recognition technology

    Automating border control and security with facial recognition technology

    Indonesia Immigration & Seaport Authorities enhances security and speeds up border control queues at Batam …Read more
  • Securing wealth advisory services without unnecessary friction: Endowus

    Securing wealth advisory services without unnecessary friction: Endowus

    The wealth advisory platform demonstrates its non-negotiable commitment to a robust security posture through partnering …Read more
  • LifeTech group sets up next-gen security operations center in Malaysia

    LifeTech group sets up next-gen security operations center in Malaysia

    By partnering with a unified cybersecurity platform, the firm will be offering cost-effective advanced SOC …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.