Cybersecurity News in Asia
Blessing in disguise for data security in APAC
By Victor Ng | Dec 10, 2024
Deepfake technology and other innovations in cyberthreats
By Victor Ng | Dec 3, 2024
Combating deepfake fraud during elections
By Victor Ng | Nov 26, 2024
Will the billions lost in financial scams lead to better vig...
By L L Seow | Nov 19, 2024
Impact of downtime and security workflows on cloud strategie...
By Victor Ng | Nov 19, 2024
SECURITY NEWS
Be on guard against fake software gifts during the year-end festive season
Dec 17, 2024
Scammers and cybercriminals are only too happy to send you hacked premium versions of software in order to steal account credentials
EXPERT OPINIONS
Is the world ready to be united against intensifying 2025 cyber warfare?
Nov 19, 2024
From AI-emboldened organized cybercriminals to state-sponsored quantum threats, the cyber landscape could run out of control unless we act now
-
No limit for number of blocked sites in Singapore
Nov 19, 2024
-
Ignoring deepfakes – a risky gamble for CXOs
Nov 12, 2024
-
TIPS
Three cyber threats in 2025 are predicted to share the same rubric: AI
Dec 20, 2024
Organizations that continue to be blinded by the hype, and do not obsess over responsible and secure AI, face imminent disaster
-
-
Five AI trends to watch in 2025
Dec 18, 2024
-
CLOUD SECURITY
Before we take the plunge into the AI-powered metaverse…
Nov 12, 2024
What do Asia Pacific organizations need to be aware of in a cloud-driven Web3 metaverse powered more and more by AI?
“Bump in the night”: What’s next?
Sep 26, 2024
Cybersecurity: looking back 2021, looking ahead 2022
Jan 20, 2022
INFOGRAPHICS
Sumsub’s First Global Fraud Index Infographic
Verizon 2024 Mobile Security Index Infographic
Acronis Cyberthreats Report H1 2024 Infographic
2024 Global Threat Report Infographic
Cyber Intelligence
LatestW3LL-oiled machine: report uncovers covert BEC phishing empire targeting Microsoft 365
By CybersecAsia editors and webmaster webmaster | Sep 7, 2023
A new threat report “W3LL DONE: HIDDEN PHISHING ECOSYSTEM DRIVING BEC ATTACKS” has detailed the operations of W3LL, a threat actor behind a phishing empire that has remained largely unknown until now.
-
-
-
Making cyber-resilience part of your organization’s balance sheet
By Victor Ng | Apr 26, 2022
Cyber Warfare
LatestIs the world ready to be united against intensifying 2025 cyber warfare?
By Nadir Izrael, CTO, Armis | Nov 19, 2024
From AI-emboldened organized cybercriminals to state-sponsored quantum threats, the cyber landscape could run out of control unless we act now
-
-
Ransomware still the #1 cyber threat: report
By CybersecAsia editors | Jan 30, 2023
-
MOST READ
WhatsApp group chat vulnerability hack thwarted
Researchers had discovered in August a group-chat flaw where a malicious message could crash WhatsApp group users’ devices. A...
Nine DevSecOps secret scanning tools to keep the bad guys at bay
With the secrets of over 2m corporations already leaked, it is time to mandate action to plug the preventable gaps
Voters-draw/RCA-Sponsors
CybersecAsia Voting Placement
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
Whitepapers
Data Management in the Age of Cloud and AI
In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download WhitepaperMitigating Ransomware Risks with GRC Automation
In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper2024 Gartner® Magic Quadrant™ for SD-WAN
Gartner® has positioned Fortinet highest for Ability to Execute for the fourth year in a …Download Whitepaper5 Cybersecurity Dashboards for CISOs
Are you ready to transform your cybersecurity approach? With Commugen's 5 Cybersecurity Dashboards for CIOs, …Download Whitepaper
Middle-sidebar-banner
Case Studies
Data Management in the Age of Cloud and AI
In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Read moreUnlock Your Guide to Securing Business Critical Secrets
Is your organization effectively managing access to sensitive secrets like credentials, API keys, and certificates …Read moreRBL Finserve boosts control of growing number of identities in its multi-cloud environment
By adopting a third-party identity security platform, the Indian financial institution expects to leverage zero …Read moreMAX Solutions safeguards data for digital transformation with Veeam
One of the largest employment providers in Australia needed to protect data while reducing complexity …Read more