News

Stay connected! Stay connected! By checking this box, I agree that CybersecAsia can share my data with Utimaco so that Utimaco and its partners may contact me by email or phone to provide more ...
The operational technology (OT) landscape is rapidly evolving with the integration of emerging technologies such as AI, machine learning, and cloud computing, bringing enhanced efficiency, automation, ...
Learn how Rich Communication Services may help counter phishing and scams, while remaining mindful of its evolving risks and limitations. As perpetrators of phishing tactics become increasingly adept ...
Read about the cyber-insurance gap and the complexities and caveats of over-relying on this aspect of risk coverage to avoid due (cyber) diligence Stay connected! Stay connected! By checking this box, ...
Using fake ads, counterfeit websites, and malicious remote-access tool executables disguised as AI-generated output, cybercriminals waste no time exploiting popular platforms. A major cyberattack ...
Lost money in recent crypto breaches? Welcome to Web3: Where innovation meets billion-dollar heists, and more heading our way this year! In analyzing its Q1 2025 ecosystem data, a Web3 blockchain ...
Its 2022 user base data from five countries in the region shows a need for stronger oversight of AI ethics frameworks. According to a cybersecurity firm’s Cyber Threat Landscape report for 2022, ...
Securing privileged credentials through password vaulting and regular rotation prevents attackers from exploiting static or weak passwords to infiltrate backup environments. Continuous monitoring and ...
Despite raised awareness of post-pandemic remote-working cyber risks, one cybersecurity firm’s South-east Asian user base was still highly vulnerable last year. Data from a cybersecurity firm’s client ...
As experts extrapolate past data into predictions, remember: bold forecasts often sound certain, but hindsight proves which crystal balls were cloudy. Based on its access to the select opinions of ...
Open source generative AI tools, when not managed well, amplify security risks through shadow IT, putting sensitive data and systems at risk Across the Asia-Pacific region, organizations are grappling ...
Respondents of one survey in 2024 had indicated such concerns, unless their digital transformation maturity had imbibed low-friction identity verification processes. Based on a quantitative Nov–Dec ...