IT Brief Asia - Technology news for CIOs & IT decision-makers

Social Engineering stories

Untitled design   2026 03 10t221350.377

Kernel in the crosshairs: The BlackSanta threat campaign targeting recruitment workflows

Today
#
endpoint protection
#
phishing
#
edr
A stealthy BlackSanta malware campaign is hijacking CVs and HR hiring flows to kill EDR tools at kernel level and exfiltrate data.
Aditya

Kernel in the crosshairs: The BlackSanta threat campaign targeting recruitment workflows

Today
#
storage
#
phishing
#
hcm
A stealthy BlackSanta malware spree is hijacking HR recruitment workflows, killing endpoint defence tools and exfiltrating sensitive data.
Remote worker london facial recognition shield against deepfakes

iProov unveils biometric suite to combat deepfake fraud

Yesterday
#
pam
#
mfa
#
iam
iProov launches a biometric Workforce Solution Suite to verify real human presence and shield employers from deepfake-driven identity fraud.
Online fraud suspicious investment ads phone laptop warning icons

Bitdefender unmasks global Meta investment scam ads

Yesterday
#
phishing
#
email security
#
cybersecurity
Bitdefender exposes 26,000 Meta ads in 25 countries pushing fake investment schemes, impersonating banks, media and public figures.
Meta smart glasses reflecting surveillance grid data leak risk

Sama credential leaks raise fears over Meta glasses data

Last week
#
wearables
#
data protection
#
surveillance
Leaked Sama staff logins tied to stealer malware spark fresh alarm over security of Meta Ray-Ban smart glasses video review pipeline.
Corporate worker inbox overwhelmed by similar suspicious emails

Dell email mixes payment-style header with promos

Last week
#
malware
#
network infrastructure
#
cx
Dell draws scrutiny after a promo email mimics a payment remittance notice, blurring lines between marketing, transactions and phishing risks.
Andy fielder cto at metacompliance

A resilient security culture is built in the flow of work, not the classroom

Last week
#
data protection
#
digital transformation
#
phishing
Rising UK cyber attacks show training alone is failing; firms must embed behavioural security cues into daily work to cut human risk.
Worried office worker old phone shadow hacker corporate network

Coruna exploit kit exposes risks for outdated iOS users

Last week
#
endpoint protection
#
pam
#
mfa
New Coruna exploit kit shows outdated iOS devices face automated, scalable attacks that can turn compromised phones into corporate gateways.
Japan factory night ransomware attack shadow figure network

Ransomware attacks surge 50% as industrial firms hit hardest

Last week
#
malware
#
data protection
#
ransomware
Global ransomware attacks jump 50% to 7,874 in 2025, with industrial firms bearing the brunt as criminal groups reshuffle their tactics.
Moody laptop dark desk phishing inbox shadowy hand global cyber threats

Israel-Iran conflict exploited in fresh email scam wave

Last week
#
phishing
#
physical security
#
email security
Scammers hijack Israel-Iran war headlines for classic advance-fee email cons, security researchers warn, urging users not to respond.
Smartphone biometric scan deepfake distortion bank gov bg

iProov handles 1m daily checks as deepfake fraud soars

Last week
#
data protection
#
surveillance
#
mfa
iProov passes one million daily biometric checks as deepfake-driven fraud soars, forcing banks and governments to harden identity defences.
Digital shield protecting crypto coins blocking online scams

Bybit says 2025 security drive saved USD $300m from scams

Last week
#
crypto
#
fintech
#
phishing
Bybit says its 2025 Dynamic Risk-Based Protection System stopped scams from draining over USD $300m in suspicious crypto withdrawals.
Nighttime cybersecurity ops center email alerts ai shield scene

IRONSCALES adds AI agents to counter next‑gen phishing

Last week
#
uc
#
data protection
#
cloud security
IRONSCALES' Winter 2026 Release debuts three AI agents, outbound encryption and Teams deepfake defences to counter next‑gen phishing.
It service desk agent biometric facial scan secure auth workflow

1Kosmos adds identity checks to ServiceNow AI workflows

Last week
#
uc
#
surveillance
#
biometrics
1Kosmos adds embedded identity checks to ServiceNow AI workflows to curb social engineering in high-risk service desk interactions.
Msp office night glowing server chains masked hackers apac eu

MSPs warned as cyber criminals weaponise trusted access

Last week
#
firewalls
#
dr
#
ransomware
Cyber criminals are hijacking MSP trust relationships, abusing valid credentials and VPNs as AI turbocharges phishing and ransomware.
Overwhelmed security analyst shadowy cyber threats night office

AI cyber threats outpace staff readiness, report warns

Last week
#
firewalls
#
data protection
#
digital transformation
Attackers' AI use is surging faster than staff skills, Fortinet warns, leaving firms exposed despite rising security awareness spending.
Hooded cyber figure identity attack breached accounts blue tones

Identity attacks dominate Expel's 2026 threat report

Last week
#
malware
#
endpoint protection
#
mfa
Identity-based attacks drove nearly 70% of incidents in Expel's 2026 threat report, exposing gaps between basic controls and real-world defence.
Cybersecurity ops room female leader collaborative team risk mgmt

Women call for visibility & voice in cybersecurity

Last week
#
risk & compliance
#
cybersecurity
#
recruitment
Women in cybersecurity demand real visibility and inclusion, warning that lack of female voices skews risk, products and leadership decisions.
Bd jade brown

Why cybersecurity needs women from non-tech careers

Last week
#
ransomware
#
devops
#
advanced persistent threat protection
Cybersecurity is missing vital human insight; drawing in women and non‑STEM talent could close both the threat and perspective gaps.
Office worker ai cyberattack popups warning icons shadowy web

HP warns of AI-fuelled 'flat-pack' cyberattacks surge

Last week
#
malware
#
uc
#
phishing
HP reports a surge in AI-powered “flat-pack” cyberattacks as criminals trade sophistication for speed, low cost and mass customisation.