Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Experts urge action on May 2025 Patch Tuesday zero-days, highlight leg...
Haute couture, faible sécurité: luxury retailer’s data leak leaves cus...
Admitad Launches OEM Advertising Division to Drive Mobile Growth throu...
Navigating blockchain adoption amid rising security challenges
Scattered Spider: still spinning phishing webs on corporate land?
LOGIN REGISTER
CybersecAsia
  • Conference 2025
  • Features
    • Featured

      Navigating blockchain adoption amid rising security challenges

      Navigating blockchain adoption amid rising security challenges

      Wednesday, May 14, 2025, 12:32 PM Asia/Singapore | Features
    • Featured

      Backups are not enough for cyber resilience

      Backups are not enough for cyber resilience

      Monday, May 5, 2025, 4:49 PM Asia/Singapore | Features
    • Featured

      MSPs the first line of defense for APAC SMEs

      MSPs the first line of defense for APAC SMEs

      Tuesday, April 15, 2025, 1:30 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2024
  • Directory
  • E-Learning

Select Page

LOGIN REGISTER
  • Conference 2025
  • Features
    • Featured

      Navigating blockchain adoption amid rising security challenges

      Navigating blockchain adoption amid rising security challenges

      Wednesday, May 14, 2025, 12:32 PM Asia/Singapore | Features
    • Featured

      Backups are not enough for cyber resilience

      Backups are not enough for cyber resilience

      Monday, May 5, 2025, 4:49 PM Asia/Singapore | Features
    • Featured

      MSPs the first line of defense for APAC SMEs

      MSPs the first line of defense for APAC SMEs

      Tuesday, April 15, 2025, 1:30 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2024
  • Directory
  • E-Learning
Tips

Cyber threats are getting more coordinated, are your defenses equally holistic?

By CybersecAsia editors | Monday, April 7, 2025, 2:17 PM Asia/Singapore

Cyber threats are getting more coordinated, are your defenses equally holistic?

Emerging evidence is suggesting that cybersecurity infrastructure complexity, blind spots and lack of observability have been favoring AI-empowered threat actors

Based on an analysis of 500+ major incident response cases in its user base across 38 countries in Oct­–Dec 2024, a cybersecurity firm has reported what it views as evolving trends in cyber threat strategies.

At the heart of their data analysis is the premise that attackers are succeeding not just because of new tactics, but because they exploit complexity, blind spots, and misplaced trust in traditional defenses.

Cybercriminals and state-sponsored syndicates have been finding it easier to breach systems and move fast because organizations are struggling to secure sprawling attack surfaces.

Cyber trends to watch for

According to the experts at Palo Alto Networks, keeping an eye out for the evolving trends below can guide cybersecurity staff in their threat intelligence and preemptive defenses:

  • Operational disruption as a primary goal: Attackers in the major incidents had been prioritizing sabotage over data theft, aiming to cripple businesses and maximize extortion.
  • Surges in insider threats linked to North Korea: Cases had tripled in 2024, with operatives targeting contract-based technical roles at major tech firms, financial services, media, and government defense contractors. Advanced techniques, including hardware-based KVM-over-IP devices and Visual Studio Code tunneling, have made detection more challenging.
  • Accelerated data exfiltration: Attackers in the major incidents analyzed have been exfiltrating data three times faster than in 2021 incidents analyzed, with 25% of cases seeing data stolen within five hours, and nearly 20% occurring in under an hour.
    • Expanded attack surfaces: 70% of the major incidents in the analysis involved three or more attack vectors, underscoring the need for comprehensive security across endpoints, networks, cloud environments, and human vulnerabilities. Web browsers remained a weak link, facilitating 44% of attacks via phishing, malicious redirects, and malware downloads.
  • Resurgence of phishing as a top entry point: 23% of the major attacks had begun with phishing, overtaking vulnerabilities as the leading attack vector. GenAI has made phishing campaigns more scalable, sophisticated, and difficult to detect.

Tips for cyber defense teams

  • Complexity in cybersecurity kills effective SecOps and incident response: Today’s IT and security environments often resemble a patchwork of legacy applications, bolt-on infrastructure, and incomplete transformation initiatives. This leads many organizations to rely on 50 or more disparate security tools. Acquired piecemeal to address individual threats, these tools typically lack integration, creating data silos and preventing teams from maintaining a unified view of their environments. Even when critical evidence of intrusion is present in the logs, defenders may not be alerted in time due to complex, disjointed systems that make vital intrusion alerts not readily accessible or effectively operationalized, allowing attackers to exploit the gaps undetected. At the same time, multiple data sources are essential to detect and respond effectively. When these systems don’t communicate — or the telemetry is incomplete — essential clues remain buried until it’s too late. 
  • You cannot secure what you do not know about: Enterprise-wide visibility is the backbone of effective security operations, yet gaps remain common. Cloud services, in particular, present a significant challenge. Some organizations spin up an average of 300 new cloud services each  month. Without proper runtime visibility, SecOps teams are unaware of both exposures and attack. Unmanaged and unmonitored assets provide attackers with easy entry points into an organization’s environment. In fact, issues with security tools and management were a contributing factor in nearly 40% of cases. These gaps had allowed attackers to establish a foothold, move laterally and escalate privileges without being detected.
  • Too much trust expands the cyber threat impact: Overly permissive access is a dangerous liability. Attackers consistently exploit overly permissive accounts and inadequate access controls to escalate their attacks. At least one contributing factor in major cyber incidents is usually related to issues with identity and access management, including overly permissioned accounts and roles. This leads to lateral movement, access to sensitive information and applications, and ultimately enables attackers to succeed. Cloud environments are especially vulnerable. In many cases, attackers had gained far more access than should have been granted to the types of roles compromised. Once initial access is gained — through phishing, credential theft or exploiting vulnerabilities — this excessive trust allows attackers to rapidly escalate privileges, exfiltrate data and disrupt operations.
  • Empower your security ops with comprehensive visibility across the enterprise, and the technology to identify the signal in the noise: Use AI and ML to sift through vast datasets, identifying hidden threats and anomalous behaviors. AI-assisted behavioral analytics help predict attacks before they fully materialize. Measure MTTD to gauge improvements. Regular threat hunting and correlation of signals from multiple sources tackle the “needle in a haystack” problem. Automating incident response workflows is critical for containing threats at machine speed, before an attacker can escalate privileges or exfiltrate sensitive data. Also, track MTTR to drive continuous improvement. Seamless integration between SOC platforms, IT systems and business applications also removes manual bottlenecks that delay remediation.
  • Transition from reactive to proactive security: Combine red team exercises, incident simulation, and continuous security assessments to refine detection logic and response playbooks. This consistent feedback loop ensures the security teams to adapt as new threats emerge. Elevating SOC skills through advanced training closes knowledge gaps and ensures that your organization is prepared for the next wave of attacks. Establish lifelines with battle-proven incident response consultants to have access to proactive services such as threat hunting, tabletop exercises and purple team assessments, fortifying SecOps readiness and sharpening defenses before attackers strike.
  • Accelerate the journey to end-to-end Zero Trust architecture: Evenverified entities should then be monitored continuously, minimizing unauthorized access.  Enforce strict least privilege access: Grant roles only the access they need, guided by context-aware rules that factor-in identity, device posture and data sensitivity. This neutralizes the “excessive trust” issue by limiting the range of damage if an account is compromised. Network segmentation further isolates critical assets and prevents attackers from moving laterally. Apply holistic security inspection: Analyze network traffic — including encrypted streams — to prevent and detect active threats without degrading performance. Tailor controls for distinct environments (e.g.,  cloud, IoT) to reduce operational complexity and avoid gaps in visibility. Control data access and movement: safeguard sensitive information by classifying data and enforcing robust handling policies. Have strong data loss prevention technologies in place to stop unauthorized transfers that could result in intellectual property theft, compliance violations and financial repercussions.
  • Secure apps and cloud from development to runtime: Prevent security issues from reaching production: Integrate security early in the development lifecycle. Harden development and DevOps tools, govern third-party and open-source components, and run continuous scans during the CI/CD process. This shift-left approach uncovers vulnerabilities before they reach production. Remediate newly discovered security weaknesses: Continuously monitor cloud infrastructure for misconfigurations, vulnerabilities and excessive permissions. Automated scanning and risk-based remediation ensure that once issues emerge, they are swiftly identified and contained. This is critical for stopping attackers before they gain a foothold. Identify and block runtime attacks: protect applications, APIs and workloads with real-time threat detection and preventive controls. Ongoing monitoring helps neutralize malicious activity in progress, minimizing operational disruption and cutting off attackers before threats escalate. Automate cloud detection and response: Leverage native cloud services and third-party security tools to orchestrate automated incident response. By removing manual bottlenecks, you reduce the time attackers have to pivot, exfiltrate data or escalate privileges.

Share:

PreviousAkamai Supports Devsisters in Strengthening Its Global Game Services Infrastructure
NextIn a perimeter-less world, identity is the foundation of security

Related Posts

How law enforcement agencies are transforming the handling of digital evidence

How law enforcement agencies are transforming the handling of digital evidence

Wednesday, October 4, 2023

Tips for tightening fraud management in the e-commerce boom

Tightening fraud management in the e-commerce boom

Tuesday, July 20, 2021

Remember Y2K? Brace yourselves for Y2Q!

Remember Y2K? Brace yourselves for Y2Q!

Tuesday, November 22, 2022

Here are updated safety tips for a better online shopping experience

Here are updated safety tips for a better online shopping experience

Monday, November 11, 2024

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    With only a small IT team, the digital transformation has united operations across 30 locations, …Read more
  • Automating border control and security with facial recognition technology

    Automating border control and security with facial recognition technology

    Indonesia Immigration & Seaport Authorities enhances security and speeds up border control queues at Batam …Read more
  • Securing wealth advisory services without unnecessary friction: Endowus

    Securing wealth advisory services without unnecessary friction: Endowus

    The wealth advisory platform demonstrates its non-negotiable commitment to a robust security posture through partnering …Read more
  • LifeTech group sets up next-gen security operations center in Malaysia

    LifeTech group sets up next-gen security operations center in Malaysia

    By partnering with a unified cybersecurity platform, the firm will be offering cost-effective advanced SOC …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.