Fake CAPTCHA challenges are weaponizing trust to s...
By L L Seow | Mar 30, 2026
Misconfigured AI: Hype or real threat to APAC Infr...
By L L Seow | Mar 16, 2026
Claude Mythos wake-up call
By Jonathan Zanger, CTO, Check Point Software Technologies | Apr 7, 2026
Recently, we learned that Anthropic was developing Claude Capybara, also called Mythos, a powerful new AI model with substantially improved capabilities in vulnerability discovery, exploit development, and multi-step attack reasoning.
Read MoreFake CAPTCHA challenges are weaponizing trust to spread malware across platforms
By L L Seow | Mar 30, 2026
Attackers are using AI-enhanced social engineering to mimic verification checks and steal data on Windows, macOS, and Android systems: stay vigilant!
Read MoreShorter TLS certificate lifespans raise renewal challenges for stretched IT teams
By James Cook, Head of APAC, DigiCert | Mar 27, 2026
Phased reductions from 398 to 200 days now, then 47 days by 2029, boost security but increase outage risks.
Read MoreIs bot interference eroding customer experiences and trust levels? Take a PoW approach
By Tim Chang, Global Vice President and General Manager of Application Security, Thales | Mar 24, 2026
Bad bots are skewing analytics via AI mimicry and advanced human-like behavior, beating traditional defenses. A better approach is needed.
Read MoreMisconfigured AI: Hype or real threat to APAC Infrastructure?
By L L Seow | Mar 16, 2026
A press release sparks alarm: but cyber experts emphasize governance gaps, operational flaws over misconfiguration hype in regional grids and ports
Read MoreWhen AI adoption outpaces security, organizations struggle for collective safety
By Goh Eng Choon, President, Cyber, ST Engineering | Mar 12, 2026
Skyrocketing AI integration can expose serious gaps in data protection, operational resilience, and responsible use — requiring shared accountability and continuous oversight.
Read MoreHow escalating geopolitical tensions are expanding the cybersecurity frontline
By Ismael Valenzuela, VP, Threat Intelligence Research, Arctic Wolf | Mar 5, 2026
As geopolitical tensions rise and conflicts increasingly play out both on the ground and online, the line between national security and business risk is quickly fading.
Read MoreHow can APAC unlock AI potential without vulnerability to adoption pitfalls?
By Simon Green, President (Asia-Pacific and Japan), Palo Alto Networks | Mar 4, 2026
Generative AI adoption accelerates leaks/attacks and unpredictable risks and biases. This necessitates new thinking for resilient defenses beyond traditional cyber tools.
Read MoreIs your data-driven organization under-securing one piece of critical infrastructure?
By Liv Matan, Senior Research Engineer, Tenable | Feb 26, 2026
Hidden business intelligence systems create subtle leverage for adversaries through remote execution, data extraction, reconnaissance, and weak on‑premises lifecycle practices.
Read MoreWith AI powering seasonal e-shopping fraud and scams, what can CISOs do?
By L L Seow | Feb 13, 2026
As fraudsters and malicious groups target this year’s numerous upcoming e-commerce holidays, security leaders will need updated strategies to stay ahead
Read More
Voters-draw/RCA-Sponsors
CybersecAsia Voting Placement
Gamification listing or Participate Now
|
PARTICIPATE NOW |
|
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
Whitepapers

Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats
Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
2024 Insider Threat Report: Trends, Challenges, and Solutions
Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
AI-Powered Cyber Ops: Redefining Cloud Security for 2025
The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
Data Management in the Age of Cloud and AI
In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
Middle-sidebar-banner
Case Studies

Cyber protection for medical clinics in Singapore
As Singapore’s healthcare sector becomes increasingly digital and interconnected, clinics are facing heightened cyber risks, …Read more
India’s WazirX strengthens governance and digital asset security
Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
Bangladesh LGED modernizes communication while addressing data security concerns
To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
What AI worries keep members of the Association of Certified Fraud Examiners sleepless?
This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more
Bottom sidebar
Other News
Hong Kong Anti-graft Watchdog: Clean Governance and Ethical Business is Key to Hong Kong’s Sustainable Business Development
HONG KONG, April 9, 2026 …Read More »Goodix Launches the World’s First eSE Solution Designed for AI Agents
SHENZHEN, China, April 8, 2026 …Read More »LRQA Amplifies Industrial and Cyber Resilience in APAC at CS4CA Summit 2026
SINGAPORE, April 8, 2026 /PRNewswire/ …Read More »MegazoneCloud Achieves Profitability Turnaround with $1.16 Billion Revenue in 2025
Revenue grows 28% YoY… EBITDA …Read More »Taoping Expands Smart Elevator Services Business with New Orders Exceeding US$3 Million
TIANJIN, China, April 8, 2026 …Read More »