Recent breach exposes supply chain risks via OAuth and secrets misclassification
Attackers exploit third-party AI tool access, highlighting gaps in SaaS credential handling and developer environment protections.
Read More
Select Page
By CybersecAsia editors | Wednesday, April 29, 2026, 11:00 AM Asia/Singapore | Newsletter
Attackers exploit third-party AI tool access, highlighting gaps in SaaS credential handling and developer environment protections.
Read MoreBy Geoff Schomburgk, Regional Vice President (Asia Pacific and Japan), Yubico | Thursday, April 23, 2026, 4:01 PM Asia/Singapore | Newsletter, Opinions
As phishing becomes faster and more automated, defenders must consistently prevent attacks, while attackers only need a single success
Read MoreBy L L Seow | Wednesday, April 15, 2026, 3:41 PM Asia/Singapore | Newsletter, Tips
One sensor analysis identifies SME cyber failures as best practices with caveats, aligning to standards by prioritizing execution over tech hype
Read MoreBy CybersecAsia editors | Tuesday, April 14, 2026, 2:26 PM Asia/Singapore | News, Newsletter
Organizations and individual users are urged to patch the Zero Day flaws due to evidence of exploits running in the wild.
Read MoreBy CybersecAsia editors | Wednesday, April 1, 2026, 10:19 AM Asia/Singapore | News, Newsletter
Recent research suggests passwordless authentication linked to cloud synchronization and hybrid identity environments could expand attack surfaces across devices.
Read MoreBy CybersecAsia editors | Tuesday, March 31, 2026, 1:40 PM Asia/Singapore | News, Newsletter
One global cybersecurity firm’s user base showed malicious emails doubled after the US-Israel hostilities against Iran started on 28 February
Read MoreBy James Cook, Head of APAC, DigiCert | Friday, March 27, 2026, 4:49 PM Asia/Singapore | Newsletter, Tips
Phased reductions from 398 to 200 days now, then 47 days by 2029, boost security but increase outage risks.
Read MoreBy CybersecAsia editors | Wednesday, March 25, 2026, 9:59 AM Asia/Singapore | News, Newsletter
Is this a wake-up call around how dependence on a single endpoint platform can intensify the impact on critical commercial infrastructure?
Read MoreBy Tim Chang, Global Vice President and General Manager of Application Security, Thales | Tuesday, March 24, 2026, 12:07 PM Asia/Singapore | Newsletter, Tips
Bad bots are skewing analytics via AI mimicry and advanced human-like behavior, beating traditional defenses. A better approach is needed.
Read MoreBy CybersecAsia editors | Monday, March 23, 2026, 9:37 AM Asia/Singapore | Newsletter
zero-click attack, iOS exploit chain, iOS browser sandbox, iOS kernel-level privileges sensitive data, iOS zero click malware, iOS self-deleting threat actors, Apple watering-hole attacks, cryptocurrency wallets, iOS Lockdown Mode, CVE-2025-31277 CVE-2025-43529, Lookout Threat Labs
Read More|
PARTICIPATE NOW |
|
|



