Cybersecurity Company Malaysia

Insights

Insights That Keep You Ahead of Cyber Threats

How do attackers really think? What does a new vulnerability actually mean for your business?

The AKATI Sekurity Insights Blog is where our experts answer the hard questions. We publish frontline analysis and forensic discoveries to give IT professionals and business leaders the practical, technical, and strategic knowledge they need to build a stronger defense.

Joanna Woon SC. Joanna Woon SC.

The 442% Surge: How AI Supercharged Vishing in 2025

Voice phishing (vishing) attacks have increased by 442% in 2025, driven by Generative AI tools that clone executive voices to bypass biometric verification. This article details how deepfakes are facilitating CFO fraud and credential harvesting, and outlines essential defenses including Out-of-Band (OOB) verification and "Safe Phrase" protocols for corporate leadership.

Read More
Joanna Woon SC. Joanna Woon SC.

The 51-Second Breakout: Why Speed is Now Your Biggest Enemy

Cybersecurity breakout times have collapsed to just 51 seconds, rendering human-speed incident response obsolete. With 79% of modern attacks now "malware-free" and utilizing "Living off the Land" (LotL) techniques to bypass traditional EDR, this guide outlines why identity has become the new perimeter. Learn how to combat speed with speed using Phishing-Resistant MFA (FIDO2), Identity Threat Detection & Response (ITDR), and Just-in-Time (JIT) access models.

Read More
Joanna Woon SC. Joanna Woon SC.

Your security is only as strong as your weakest vendor.

Your security is only as strong as your weakest vendor. With the rise of "Fourth-Party" risk and API-based attacks, traditional annual audits are no longer sufficient. This guide explains why the "SolarWinds" era has evolved into the "Snowflake" era of identity attacks and outlines a modern defense strategy using SBOMs (Software Bill of Materials) and continuous risk monitoring.

Read More
Joanna Woon SC. Joanna Woon SC.

Cloud Security Myths: The 2025 Reality Check

Is your data really safe in a Private VPC? Probably not. Discover why "Identity is the new Perimeter" and how to justify the budget for Cloud Security Posture Management (CSPM). We break down the real costs of cloud security vs. the $4.44M cost of a breach.

Read More
Joanna Woon SC. Joanna Woon SC.

Deepfake Fraud 2025: The Executive Defense Guide

Deepfake fraud involves more than just face-swapping; 2025 has seen a massive rise in camera injection attacks and real-time voice cloning targeting C-suite executives. With voice fraud attempts surging 1,300%, traditional KYC and firewalls are no longer sufficient. This guide outlines the four critical AI threat vectors facing Malaysian and ASEAN enterprises and provides a technical roadmap for defense—combining cryptographic content authentication, metadata analysis, and out-of-band verification protocols.

Read More