• Support
  • (+84) 246.276.3566 | contact@eastgate-software.com
  • Request a Demo
  • Privacy Policy
English
English 日本語 Deutsch
Eastgate Software A Global Fortune 500 Company's Strategic Partner
  • Home
  • Company
  • Services
    • Business Process Optimization
    • Custom Software Development
    • Systems Integration
    • Technology Consulting
    • Cloud Services
    • Data Analytics
    • Cybersecurity
    • Automation & AI Solutions
  • Case Studies
  • Blog
  • Resources
    • Life
    • Ebook
    • Tech Enthusiast
  • Careers
CONTACT US
Eastgate Software
  • Home
  • Company
  • Services
    • Business Process Optimization
    • Custom Software Development
    • Systems Integration
    • Technology Consulting
    • Cloud Services
    • Data Analytics
    • Cybersecurity
    • Automation & AI Solutions
  • Case Studies
  • Blog
  • Resources
    • Life
    • Ebook
    • Tech Enthusiast
  • Careers
CONTACT US
Eastgate Software
Home Tech Enthusiast
December 10, 2025

APAC Cybersecurity Alert: Identity Attacks Surge

Cybersecurity

APAC Cybersecurity Alert: Identity Attacks Surge

 Identity has emerged as the primary cybersecurity battleground in the Asia-Pacific (APAC) region. As attackers shift away from system-centric exploits toward directly targeting people. According to new industry research, URL-based threats now occur four times as often as attachment-based attacks. Once an attacker compromises an identity, they can bypass controls, move laterally across networks, and monetize access quickly. 

Security analysts warn that threat actors are exploiting psychological triggers such as urgency, authority, and financial incentives to manipulate victims across email, SMS, and collaboration platforms. The expanding attack surface now includes not only usernames and passwords but also cloud tokens, API keys, OAuth credentials, certificates, and embedded secrets. A report from the Identity Defined Security Alliance found that 90% of organizations experienced an identity-related incident in the last year. 

Proofpoint’s State of the Phish 2025 further highlights the human factor, identifying credential phishing and business email compromise as dominant attack vectors. More than 10% of endpoints show exposed privileged passwords, making identity misuse one of the most common—and dangerous—risks. 

As organizations introduce AI agents into workflows, new vulnerabilities are emerging. AI assistants can be manipulated through prompt engineering or by poisoning their inputs. Once compromised, can execute harmful actions at machine speed. Security leaders now argue that identity protections must extend beyond humans to include the AI systems acting on their behalf. 

Experts emphasize that “human resilience” remains a decisive defensive layer, requiring stronger awareness training, phishing-resistant MFA, and rapid reporting mechanisms. A multi-layered strategy integrating identity controls, threat intelligence, secure device practices, and robust PII protection is necessary as attackers traverse multiple channels to abuse trust. 

The message for APAC organizations is clear. Identity is the new perimeter, and strengthening it is now central to security, compliance, and digital trust. 

 

Source: 

https://www.itnews.asia/news/identity-is-now-the-new-cybersecurity-battlefield-622384  

Tags: cybersecurity
Something went wrong. Please try again.
Thank you for subscribing! You'll start receiving Eastgate Software's weekly insights on AI and enterprise tech soon.
ShareTweet

Categories

  • AI (202)
  • Application Modernization (9)
  • Case study (34)
  • Cloud Migration (46)
  • Cybersecurity (29)
  • Digital Transformation (7)
  • DX (17)
  • Ebook (12)
  • ERP (39)
  • Fintech (27)
  • Fintech & Trading (1)
  • Intelligent Traffic System (1)
  • ITS (5)
  • Life (23)
  • Logistics (1)
  • Low-Code/No-Code (32)
  • Manufacturing Industry (1)
  • Microservice (17)
  • Product Development (36)
  • Tech Enthusiast (405)
  • Technology Consulting (68)
  • Uncategorized (2)

Tell us about your project idea!

Sign up for our weekly newsletter

Stay ahead with Eastgate Software, subscribe for the latest articles and strategies on AI and enterprise tech.

Something went wrong. Please try again.
Thank you for subscribing! You'll start receiving Eastgate Software's weekly insights on AI and enterprise tech soon.

Eastgate Software

We Drive Digital Transformation

Eastgate Software 

We Drive Digital Transformation.

  • Services
  • Company
  • Resources
  • Case Studies
  • Contact
Services

Case Studies

Company

Contact

Resources
  • Youtube
  • Facebook
  • Linkedin
  • Outlook
  • Twitter
DMCA.com Protection Status

Copyright © 2024.  All rights reserved.

  • Home
  • Company
  • Services
    • Business Process Optimization
    • Custom Software Development
    • Systems Integration
    • Technology Consulting
    • Cloud Services
    • Data Analytics
    • Cybersecurity
    • Automation & AI Solutions
  • Case Studies
  • Blog
  • Resources
    • Life
    • Ebook
    • Tech Enthusiast
  • Careers

Support
(+84) 246.276.35661 contact@eastgate-software.com

  • Request a Demo
  • Privacy Policy
Book a Free Consultation!