SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

Threat detection stories - Page 2

Prasad

Why the next endpoint and SASE disruption will not come from a security vendor

Last week
#
firewalls
#
digital transformation
#
network security
AI-native agents could quietly upend endpoint and SASE, eroding incumbents' telemetry moats as control shifts to the AI interaction layer.
Global upg. phase 2 partner blog header 3 1200x500px

Upgrade advantage: More value, less effort for partners, MSPs & MSSPs

Last week
#
firewalls
#
network infrastructure
#
endpoint protection
SonicWall's latest firewalls promise MSPs and MSSPs unified management, AI-driven insights and richer margins with less manual effort.
Massive cloud shield over office and datacenter network security

Cato unveils Dynamic Prevention engine for SASE security

This month
#
firewalls
#
digital transformation
#
hyperscale
Cato launches Dynamic Prevention, a SASE-native engine that auto-detects multi-stage attacks by correlating months of security telemetry.
Japan soc night cyber analysts monitoring abstract threat visuals

Blackwired & NTT Japan launch ThirdWatch in market

This month
#
iot security
#
advanced persistent threat protection
#
soc
Blackwired teams with NTT Japan to launch AI-driven ThirdWatch threat intelligence platform for pre-emptive cyber defence in Japan.
Tokyo cybersecurity towers sharing threat intel global network

Blackwired, NTT Security Japan partner on cyber intel

This month
#
ransomware
#
digital transformation
#
advanced persistent threat protection
Blackwired teams with NTT Security Japan to embed its ThirdWatch intel platform in managed services, boosting pre-emptive cyber defence.
Worried office worker old phone shadow hacker corporate network

Coruna exploit kit exposes risks for outdated iOS users

This month
#
endpoint protection
#
pam
#
mfa
New Coruna exploit kit shows outdated iOS devices face automated, scalable attacks that can turn compromised phones into corporate gateways.
Moody engineer cicd pipelines morphing into shadowy hands vaults

JFrog flags 13 critical CI/CD flaws in GitHub workflows

This month
#
siem
#
fintech
#
application security
JFrog warns 13 GitHub CI/CD workflow flaws, mostly critical, could let attackers hijack pipelines and steal secrets at scale.
Ai cyberattack singapore asia pacific glowing red network map

AI-driven cyberattacks surge in Asia-Pacific, IBM warns

This month
#
saas
#
malware
#
ransomware
AI-driven cyberattacks are surging across Asia-Pacific, with IBM warning basic security gaps now let attackers move from scan to impact faster.
Chaitra malladad  workflo solutions

Bridging the gap: Cybersecurity breakthroughs and imbalances

This month
#
data protection
#
endpoint protection
#
mfa
Cybersecurity evolves to AI‑driven defences, but gender imbalances persist, pushing women to fight harder for visibility and leadership.
Ai security lock glass office data breach neural network night

AI adoption drives security spend but breaches persist

This month
#
data protection
#
hybrid cloud
#
digital transformation
Rising AI adoption is driving higher security spend, yet most enterprises still suffer repeated breaches as risk outpaces new defences.
Email attachment20260303 3215460 o59u0

Indosat opens Jakarta cyber hub to counter AI threats

This month
#
siem
#
digital transformation
#
hyperscale
Indosat opens Jakarta Security Command Centre with Cisco and Splunk, offering 24/7 managed cyber defence as AI-driven threats surge.
Secure server room ai agents access rings locked and revoked scene

SentinelOne unveils identity tools for human & AI use

This month
#
data protection
#
pam
#
cloud security
SentinelOne launches identity tools to monitor and revoke access for human users and fast-moving AI agents beyond initial authentication.
Zero trust enterprise network all devices segmented connections

Netskope, Forescout expand zero trust to all devices

This month
#
firewalls
#
hyperscale
#
network security
Netskope and Forescout link tools to push zero trust across managed and unmanaged devices, curbing lateral movement on local networks.
Email attachment20260228 3629482 3nkjrg

Indonesia launches SHECURE Digital to protect women online

This month
#
data protection
#
surveillance
#
phishing
Indonesia has launched SHECURE Digital, a national programme to shield women and girls from online abuse, extortion and data exploitation.
Moody globe of network cables with hidden red cyber threat nodes

Phishing gangs weaponise .arpa DNS to evade defences

Last month
#
firewalls
#
network infrastructure
#
network security
Phishing gangs abuse .arpa DNS and IPv6 tunnels to hide brand-impersonation scams in core internet plumbing that most defences ignore.
Uk security operations center night monitors shield backup alert

N-able adds real-time alerts to protect backup policies

Last month
#
firewalls
#
data protection
#
dr
N-able adds real-time anomaly alerts to Cove Data Protection, flagging risky backup policy changes linked to identity-driven attacks.
Corporate it security control room cloud ai governance scene

Island adds browser AI controls to AWS Security Hub

Last month
#
firewalls
#
data protection
#
digital transformation
Island brings browser-based security and AI governance tools to AWS Security Hub Extended, offering unified buying, billing and support.
Email attachment20260227 2568527 6qbah6

Saviynt adds Amazon Q AI tools to boost identity risk

Last month
#
hybrid cloud
#
digital transformation
#
hyperscale
Saviynt taps Amazon Q to add conversational AI and deeper cross-app risk context, helping identity teams automate investigations and fixes.
Dr. ren%c3%a9e burton infoblox 1

Phishing campaigns exploit .arpa DNS to evade filters

Last month
#
firewalls
#
network security
#
phishing
Phishing gangs exploit obscure .arpa DNS space and IPv6 tunnels to sneak past reputation-based web filters and lure users to fake sites.
Ai cyber attack hourglass binary lock cloud night office scene

AI-fuelled cyber attacks now steal data in 72 minutes

Last month
#
firewalls
#
pam
#
cloud security
AI-driven hackers can now steal data in just 72 minutes, as faster, multi-surface attacks overwhelm complex, over-trusting enterprises.