Cybersecurity News in Asia
Navigating the evolving software supply chain landscape
By Victor Ng | Jul 8, 2025
Redefining the frontlines of digital defense
By Victor Ng | Jul 1, 2025
Addressing the challenges of fraud and compliance in the dig...
By Victor Ng | Jun 25, 2025
Solving data protection challenges in an era of cloud and AI
By Victor Ng | Jun 18, 2025
Will your organization’s defenses be breached due to your su...
By L L Seow | May 29, 2025
SECURITY NEWS
Sophisticated web skimming campaign exploits OpenCart sites with covert fake payment forms
Jul 18, 2025
Attackers are using advanced web skimming and script injection to phish sensitive financial information from online shoppers in East Asia
EXPERT OPINIONS
Open-source AI democratization: Can cyber defenses rise to the double-edged challenges?
Apr 16, 2025
When accessibility barriers fall, vulnerabilities emerge. Open-source AI models can be exploited by more people: a double-edged sword in the making
TIPS
How to detect and contain evasive lateral threats in hybrid cloud environments
Jul 17, 2025
Modern attackers bypass borders and spread silently. Strengthened internal observability helps leaders detect and contain them early. Find out how…
















CLOUD SECURITY
How will Gen AI introduce benefits and risks in cloud security in 2025?
Feb 17, 2025
One set of predictions by a market research and tech advisory firm has enumerated three potential benefits and two broad risks
Are Your Business Secrets Really Secret and Secure?
Jan 21, 2025
“Bump in the night”: What’s next?
Sep 26, 2024
INFOGRAPHICS
7 themes shaping security and identity in 2025
Mar 13, 2025
security and identity, 2025 State of Security and Identity Report, platformization, biometrics, AI, mobile credentials, unified security management,
-
Phishing trends in Q3 2024
Dec 11, 2024
Cyber Intelligence
LatestW3LL-oiled machine: report uncovers covert BEC phishing empire targeting Microsoft 365
By CybersecAsia editors and webmaster webmaster | Sep 7, 2023
A new threat report “W3LL DONE: HIDDEN PHISHING ECOSYSTEM DRIVING BEC ATTACKS” has detailed the operations of W3LL, a threat actor behind a phishing empire that has remained largely unknown until now.
-
-
-
Making cyber-resilience part of your organization’s balance sheet
By Victor Ng | Apr 26, 2022
Cyber Warfare
LatestIs the world ready to be united against intensifying 2025 cyber warfare?
By Nadir Izrael, CTO, Armis | Nov 19, 2024
From AI-emboldened organized cybercriminals to state-sponsored quantum threats, the cyber landscape could run out of control unless we act now
-
-
Ransomware still the #1 cyber threat: report
By CybersecAsia editors | Jan 30, 2023
-
MOST READ
WhatsApp group chat vulnerability hack thwarted
Researchers had discovered in August a group-chat flaw where a malicious message could crash WhatsApp group users’ devices. A...
Nine DevSecOps secret scanning tools to keep the bad guys at bay
With the secrets of over 2m corporations already leaked, it is time to mandate action to plug the preventable gaps
Join 60,000 Fellow IT & Business Professionals in APAC Region
Get the latest news, trends and expert opinions straight to your inbox, and craft an effective cybersecurity strategy.
Voters-draw/RCA-Sponsors
CybersecAsia Voting Placement
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
Whitepapers
2024 Insider Threat Report: Trends, Challenges, and Solutions
Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download WhitepaperAI-Powered Cyber Ops: Redefining Cloud Security for 2025
The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download WhitepaperData Management in the Age of Cloud and AI
In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download WhitepaperMitigating Ransomware Risks with GRC Automation
In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper
Middle-sidebar-banner
Case Studies
Thai government expands secure email management to close cybersecurity gaps
New measures address cybersecurity gaps in public sector communications, deploying advanced protections and operational support …Read moreHow Iress optimized global DevSecOps
Scaling compliance, security & efficiency – while seamlessly migrating to the cloud – with JFrog.Read moreSt Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network
With only a small IT team, the digital transformation has united operations across 30 locations, …Read moreAutomating border control and security with facial recognition technology
Indonesia Immigration & Seaport Authorities enhances security and speeds up border control queues at Batam …Read more