Cybersecurity News in Asia
High stakes in the cybersecurity AI arms race
By Victor Ng | Nov 18, 2025
Staying resilient against the invisible onslaught of AI-powe...
By Victor Ng | Nov 11, 2025
Tackling the risks of AI innovations in the cloud
By Victor Ng | Nov 5, 2025
Weaponization of GenAI by adversaries
By Victor Ng | Nov 5, 2025
SECURITY NEWS
Major internet infrastructure outage disrupts access to numerous popular platforms
Nov 19, 2025
The failure cascaded through essential online services, serving as a reminder of the fragility of interconnected internet ecosystems and dependency risks
EXPERT OPINIONS
Unified Zero Trust is vital to plug IAM gaps and exploitable risks
Oct 14, 2025
Fragmented identity and access management tools and processes increase risk. Continuous, proof-driven security is the key to foiling attackers.
-
-
Google tightens Android sideloading
Sep 2, 2025
-
TIPS
Five strategies to address cybersecurity tool sprawl risks
Nov 13, 2025
Too many security tools create complexity and risk: CISOs should focus on risk-based selection, scope control, collaboration, and consolidation.
-
AI companies leaking sensitive information on GitHub
Nov 12, 2025
-
Data protection starts with visibility and control
Nov 11, 2025
-
















CLOUD SECURITY
HOSTWAY gains 73% operational efficiency for private cloud operations
Oct 2, 2025
With NetApp storage solutions, the Korean managed cloud service provider offers a lean, intelligent architecture, powered by automation and an Infrastructure-as-Code approach.
Are Your Business Secrets Really Secret and Secure?
Jan 21, 2025
“Bump in the night”: What’s next?
Sep 26, 2024
INFOGRAPHICS
Verizon 2025 Mobile Security Index Report Infographic
Phishing trends in Q3 2024 Infographic
Sumsub’s First Global Fraud Index Infographic
Verizon 2024 Mobile Security Index Infographic
Acronis Cyberthreats Report H1 2024 Infographic
Cyber Intelligence
LatestW3LL-oiled machine: report uncovers covert BEC phishing empire targeting Microsoft 365
By CybersecAsia editors and webmaster webmaster | Sep 7, 2023
A new threat report “W3LL DONE: HIDDEN PHISHING ECOSYSTEM DRIVING BEC ATTACKS” has detailed the operations of W3LL, a threat actor behind a phishing empire that has remained largely unknown until now.
-
-
-
Making cyber-resilience part of your organization’s balance sheet
By Victor Ng | Apr 26, 2022
Cyber Warfare
LatestIs the world ready to be united against intensifying 2025 cyber warfare?
By Nadir Izrael, CTO, Armis | Nov 19, 2024
From AI-emboldened organized cybercriminals to state-sponsored quantum threats, the cyber landscape could run out of control unless we act now
-
-
Ransomware still the #1 cyber threat: report
By CybersecAsia editors | Jan 30, 2023
-
MOST READ
WhatsApp group chat vulnerability hack thwarted
Researchers had discovered in August a group-chat flaw where a malicious message could crash WhatsApp group users’ devices. A...
Nine DevSecOps secret scanning tools to keep the bad guys at bay
With the secrets of over 2m corporations already leaked, it is time to mandate action to plug the preventable gaps
Voters-draw/RCA-Sponsors
CybersecAsia Voting Placement
Gamification listing or Participate Now
|
PARTICIPATE NOW |
|
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
Whitepapers

2024 Insider Threat Report: Trends, Challenges, and Solutions
Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
AI-Powered Cyber Ops: Redefining Cloud Security for 2025
The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
Data Management in the Age of Cloud and AI
In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
Mitigating Ransomware Risks with GRC Automation
In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper
Middle-sidebar-banner
Case Studies

Meeting the business resilience challenges of digital transformation
Data proves to be key to driving secure and sustainable digital transformation in Southeast Asia.Read more
Upgrading biometric authentication system protects customers in the Philippines: UnionDigital Bank
An improved dual-liveness biometric framework can counter more deepfake threats, ensure compliance, and protect underbanked …Read more
HOSTWAY gains 73% operational efficiency for private cloud operations
With NetApp storage solutions, the Korean managed cloud service provider offers a lean, intelligent architecture, …Read more
CISOs can navigate emerging risks from autonomous AI with a new security framework
See how security leaders can adopt layered strategies addressing intent, governance, and oversight to manage …Read more