TechDay Asia - Asia's technology news network
Asia

Search

Cybercrime stories

Any use of network connected electronic devices such as computers or smartphones for criminal activity is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as ‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers and other malware, the download and use of malware produced by others, social engineering tactics such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also occasionally seeking to disrupt, embarrass or shame their targets.
Cinematic laptop deepfake face binary code broken locks quantum ai

IBM warns AI & quantum threats will reshape cybercrime

Today
#
malware
#
data protection
#
ransomware
IBM warns shadow AI, deepfakes and quantum threats will reshape cyber risk by 2026, as autonomous agents speed breaches and ransomware.
Untitled design   2026 03 10t211837.920

Wireless CVEs surge, exposing hidden risks for AI centres

Today
#
uc
#
firewalls
#
surveillance
Wireless flaws have surged 230-fold since 2010, as Bastille warns AI data centres and critical infrastructure face escalating unseen risks.
Hooded hacker over asia pacific skyline ai ransomware cloud web

Ransomware surges across Asia-Pacific as AI fuels risk

Yesterday
#
data protection
#
ransomware
#
digital transformation
Ransomware attacks in Asia-Pacific surged 59% in 2025 as rapid digitalisation and AI adoption fuel faster, more targeted cyber extortion.
Global office night cyber attack hacker shadows cracked cloud

Cyber attacks stay near record high as GenAI risks grow

Yesterday
#
edutech
#
firewalls
#
data protection
Global cyber attacks hover near record highs as unchecked workplace GenAI use exposes sensitive data in one in 31 corporate prompts.
Online fraud suspicious investment ads phone laptop warning icons

Bitdefender unmasks global Meta investment scam ads

2 days ago
#
phishing
#
martech
#
physical security
Bitdefender exposes 26,000 Meta ads in 25 countries pushing fake investment schemes, impersonating banks, media and public figures.
Cambodia countryside ai rice fields drones to modern cityscape

Cambodia steps up AI push to narrow regional tech gap

3 days ago
#
uc
#
agricultural technology
#
data protection
Cambodia steps up its AI push under a draft strategy to drive growth and narrow regional digital gaps by 2030.
Nhs hospital ward clinicians badge login secure data access

Netskope & Imprivata link zero trust for clinicians

3 days ago
#
data protection
#
ransomware
#
cloud security
Netskope and Imprivata link zero trust policies to healthcare shared workstations, promising tighter PHI protection without slowing clinicians.
Dim corporate server room flashing red lights cracked shield vulnerability

Google warns of surge in enterprise zero-day attacks

Last week
#
virtualisation
#
firewalls
#
vpns
Google warns attackers are shifting from browsers to corporate systems, as tracked zero-day exploits climb and enterprise edge devices surge.
Moody server room supply chain breach glowing red lock icon

ShinyHunters claims Woflow breach in supply chain hack

Last week
#
data protection
#
ransomware
#
mfa
ShinyHunters claims it hacked merchant data firm Woflow, raising supply chain fears for major brands despite no confirmed breach yet.
Europe smartphone social feed blocking shady ads flat design

Meta removes nearly 6m scam ads after DSA reports

Last week
#
martech
#
facebook
#
instagram
Meta took down nearly 6m scam ads in 2025 after alerts from Lithuanian watchdog Debunk.org under the EU's Digital Services Act system.
Japan factory night ransomware attack shadow figure network

Ransomware attacks surge 50% as industrial firms hit hardest

Last week
#
malware
#
data protection
#
ransomware
Global ransomware attacks jump 50% to 7,874 in 2025, with industrial firms bearing the brunt as criminal groups reshuffle their tactics.
Heather mahalik  1

Why women can be leaders when it comes to AI

Last week
#
data protection
#
ransomware
#
digital transformation
Women in cybersecurity, long trained to question and validate, are uniquely placed to lead the era of risky, fast‑moving AI tools.
Moody laptop dark desk phishing inbox shadowy hand global cyber threats

Israel-Iran conflict exploited in fresh email scam wave

Last week
#
phishing
#
physical security
#
email security
Scammers hijack Israel-Iran war headlines for classic advance-fee email cons, security researchers warn, urging users not to respond.
Dark cyber fraud desk with shields and law enforcement servers

Microsoft & Europol disrupt global Tycoon 2FA scam

Last week
#
ransomware
#
mfa
#
crypto
Microsoft and Europol have seized over 300 domains to disrupt Tycoon 2FA, a vast phishing-for-hire service bypassing MFA worldwide.
Logos

Tycoon 2FA phishing service disrupted in EU crackdown

Last week
#
ransomware
#
manufacturing
#
mfa
European authorities and tech firms have disrupted Tycoon 2FA, a major phishing service used to bypass MFA and hijack cloud accounts.
Cinematic cloud server room ai identity theft masked attackers

Cloudflare flags AI-fuelled identity & SaaS attacks

Last week
#
saas
#
firewalls
#
ddos
Cloudflare warns AI-driven identity fraud and SaaS abuse are reshaping cybercrime, as global costs hit USD $10.5 trillion a year.
Megan squire

Stop framing deepfake harassment of women as a social problem - It's a cybersecurity problem

Last week
#
ransomware
#
genai
#
ai
Non-consensual deepfake abuse of women is not just online harassment but cybercrime, demanding full threat intelligence and security action.
Email attachment20260303 3215460 o59u0

Indosat opens Jakarta cyber hub to counter AI threats

Last week
#
siem
#
digital transformation
#
hyperscale
Indosat opens Jakarta Security Command Centre with Cisco and Splunk, offering 24/7 managed cyber defence as AI-driven threats surge.
Theodora

Generative AI fuels alarming surge in intimate image abuse

Last week
#
data protection
#
encryption
#
open source
Generative AI is fuelling a sharp rise in intimate image abuse, outpacing weak platform responses and patchy global legal protections.
Moody globe of network cables with hidden red cyber threat nodes

Phishing gangs weaponise .arpa DNS to evade defences

Last month
#
firewalls
#
network infrastructure
#
network security
Phishing gangs abuse .arpa DNS and IPv6 tunnels to hide brand-impersonation scams in core internet plumbing that most defences ignore.