Cybersecurity News in Asia
How AI is reshaping dating in Asia
By CybersecAsia editors | Feb 9, 2026
Emerging third-party cyber risks via agentic AI
By Victor Ng | Feb 3, 2026
Rethinking customer identity for financial cybersecurity
By Victor Ng | Jan 27, 2026
How AI is supercharging state-sponsored threat actors in Asi...
By Victor Ng | Jan 14, 2026
Leveraging digital twins to combat rising AI-powered threats
By Victor Ng | Jan 8, 2026
SECURITY NEWS
With AI powering seasonal e-shopping fraud and scams, what can CISOs do?
Feb 13, 2026
As fraudsters and malicious groups target this year’s numerous upcoming e-commerce holidays, security leaders will need updated strategies to stay ahead
-
Digital gold for predators on Valentine’s Day
Feb 13, 2026
-
-
EXPERT OPINIONS
Should we worry about AI agents taking over our world?
Feb 12, 2026
Does Moltbook offer a glimpse of our world heading toward a Terminator-movie Skynet-like self-aware, malevolent AI network that may trigger worldwide chaos or even nuclear war?
-
-
4 data management trends and predictions for 2026
Dec 22, 2025
-
TIPS
With AI powering seasonal e-shopping fraud and scams, what can CISOs do?
Feb 13, 2026
As fraudsters and malicious groups target this year’s numerous upcoming e-commerce holidays, security leaders will need updated strategies to stay ahead
-
Digital gold for predators on Valentine’s Day
Feb 13, 2026
-
-
















CLOUD SECURITY
HOSTWAY gains 73% operational efficiency for private cloud operations
Oct 2, 2025
With NetApp storage solutions, the Korean managed cloud service provider offers a lean, intelligent architecture, powered by automation and an Infrastructure-as-Code approach.
Are Your Business Secrets Really Secret and Secure?
Jan 21, 2025
“Bump in the night”: What’s next?
Sep 26, 2024
INFOGRAPHICS
Verizon 2025 Mobile Security Index Report Infographic
Phishing trends in Q3 2024 Infographic
Sumsub’s First Global Fraud Index Infographic
Verizon 2024 Mobile Security Index Infographic
Acronis Cyberthreats Report H1 2024 Infographic
Cyber Intelligence
LatestW3LL-oiled machine: report uncovers covert BEC phishing empire targeting Microsoft 365
By CybersecAsia editors and webmaster webmaster | Sep 7, 2023
A new threat report “W3LL DONE: HIDDEN PHISHING ECOSYSTEM DRIVING BEC ATTACKS” has detailed the operations of W3LL, a threat actor behind a phishing empire that has remained largely unknown until now.
-
-
-
Making cyber-resilience part of your organization’s balance sheet
By Victor Ng | Apr 26, 2022
Cyber Warfare
LatestIs the world ready to be united against intensifying 2025 cyber warfare?
By Nadir Izrael, CTO, Armis | Nov 19, 2024
From AI-emboldened organized cybercriminals to state-sponsored quantum threats, the cyber landscape could run out of control unless we act now
-
-
Ransomware still the #1 cyber threat: report
By CybersecAsia editors | Jan 30, 2023
-
MOST READ
WhatsApp group chat vulnerability hack thwarted
Researchers had discovered in August a group-chat flaw where a malicious message could crash WhatsApp group users’ devices. A...
Nine DevSecOps secret scanning tools to keep the bad guys at bay
With the secrets of over 2m corporations already leaked, it is time to mandate action to plug the preventable gaps
Voters-draw/RCA-Sponsors
CybersecAsia Voting Placement
Gamification listing or Participate Now
|
PARTICIPATE NOW |
|
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
Whitepapers

Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats
Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
2024 Insider Threat Report: Trends, Challenges, and Solutions
Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
AI-Powered Cyber Ops: Redefining Cloud Security for 2025
The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
Data Management in the Age of Cloud and AI
In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
Middle-sidebar-banner
Case Studies

India’s WazirX strengthens governance and digital asset security
Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
Bangladesh LGED modernizes communication while addressing data security concerns
To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
What AI worries keep members of the Association of Certified Fraud Examiners sleepless?
This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more
Meeting the business resilience challenges of digital transformation
Data proves to be key to driving secure and sustainable digital transformation in Southeast Asia.Read more
Bottom sidebar
Other News
Blackpanda Japan Announces Strategic Partnership with SoftBank to Strengthen Cyber Incident Response in Japan
SINGAPORE, Feb. 10, 2026 /PRNewswire/ …Read More »Cohesity Collaborates with Google Cloud to Deliver Secure Sandbox Capabilities and Comprehensive Threat Insights Designed to Eliminate Hidden Malware
Embedded Google Threat Intelligence capabilities, …Read More »Shield AI, Republic of Singapore Air Force, and Defence Science and Technology Agency Expand Partnership to Progressively Field Autonomy Capabilities
SINGAPORE, Feb. 5, 2026 /PRNewswire/ …Read More »ICAC Commissioner attends APEC anti-corruption meetings in Guangzhou to foster collaborations in the Asia Pacific region
HONG KONG, Feb. 4, 2026 …Read More »VIVOTEK Enhances VORTEX with Generative AI and Safety Detection
Expanding the cloud security ecosystem …Read More »