Cybersecurity Company Malaysia

Insights

Insights That Keep You Ahead of Cyber Threats

How do attackers really think? What does a new vulnerability actually mean for your business?

The AKATI Sekurity Insights Blog is where our experts answer the hard questions. We publish frontline analysis and forensic discoveries to give IT professionals and business leaders the practical, technical, and strategic knowledge they need to build a stronger defense.

Joanna Woon SC. Joanna Woon SC.

The 2026 CISO Checklist: Your Roadmap to Resilience

2026 CISO Action Plan

This strategic checklist prioritizes the critical security controls for 2026. Immediate actions include implementing Phishing-Resistant MFA (FIDO2) and Continuous Patching to counter rapid attacks. Strategic initiatives include deploying Immutable Backups to defeat ransomware and mandating SBOMs for supply chain visibility.

Read More
Joanna Woon SC. Joanna Woon SC.

The Invisible Threat: When AI Starts Lying to You

"Model Poisoning" is like rewriting a student's textbook before a test. The AI learns wrong information on purpose. * The Goal: Attackers change specific outcomes—like ensuring a specific loan is approved or denied—without breaking the whole system.

Read More
Joanna Woon SC. Joanna Woon SC.

The Browser is the New Operating System (and the New Target)

2026 Browser Security Report

Generative AI traffic has spiked 890%, transforming the web browser into the primary attack surface for modern enterprises. Because traditional firewalls cannot inspect encrypted AI traffic, organizations must implement Browser-Native Zero Trust controls. This includes Dynamic Prompt Masking to redact sensitive data in real-time and strict Session Isolation to separate corporate workflows from personal browsing.

Read More
Joanna Woon SC. Joanna Woon SC.

Legal Alert: The Rise of "Death by AI" Liability

2026 Legal Threat Report: Death by AI Claims

Legal claims involving AI safety failures are predicted to exceed 2,000 by 2026. The legal standard is shifting from "software glitches" to "gross negligence," holding executives personally liable for product defects. To mitigate this, organizations must implement Human-in-the-Loop protocols and maintain Model Explainability logs to prove reasonable care in court.

Read More
Joanna Woon SC. Joanna Woon SC.

Agentic AI: The New Battlefield for the SOC

2026 Strategic Forecast: Agentic AI

The cybersecurity landscape has shifted from "Copilots" to "Agentic AI," where autonomous systems execute tasks without human oversight. This creates risks of "Shadow Agents" and machine-speed attacks that traditional SOCs cannot handle. To defend against this, organizations must implement an Agentic SOC model, utilizing Runtime AI Firewalls and Identity Binding to govern non-human identities.

Read More
Joanna Woon SC. Joanna Woon SC.

"Seeing is No Longer Believing": The Identity Crisis of 2026

2026 Identity Security Report: The Shift to Continuous Authentication

By 2026, real-time deepfakes will render standard video verification obsolete, with human detection rates falling to 24.5%. To combat this, organizations are adopting Continuous Authentication, which uses behavioral biometrics (keystroke dynamics, mouse movements) to verify identity throughout a session rather than just at login. This shift addresses the "Identity Crisis" where traditional "snapshot" verification fails against AI-generated impostors.

Read More
Joanna Woon SC. Joanna Woon SC.

The $5 Billion Budget Line: Preparing for AI Governance Publishing

2026 AI Governance Report: The $5 Billion Gap

Fragmented global regulations (EU AI Act, US State Laws) are projected to drive $5 billion in compliance spending by 2027. This guide explains why organizations must shift from "Responsible AI" to "Defensible AI"—a legal posture requiring immutable audit trails. It outlines practical steps to uncover "Shadow AI" using existing CASB and Microsoft Purview tools and establishes frameworks for an AI Bill of Materials (AIBOM).

Read More
Joanna Woon SC. Joanna Woon SC.

IoT & OT: The Attack Surface You Can't See

2025 IoT & OT Threat Report

The convergence of IT and OT via 5G and Edge computing has exposed legacy industrial systems to the internet, eliminating the "Air Gap". Attackers now exploit flat networks to pivot from compromised IoT devices to critical control systems. Defense requires adopting the Purdue Model for micro-segmentation and deploying specialized OT protocol monitoring.

Read More
Joanna Woon SC. Joanna Woon SC.

The Enemy Within: When AI Agents Go Rogue

2025 Insider Threat Report: AI Agents

The definition of "Insider Threat" has expanded to include Autonomous AI Agents, contributing to 40% of all threat operations in 2025. Attackers utilize Prompt Injection to hijack trusted agents for data exfiltration and privilege escalation. Defense strategies must now include Just-Enough Access (JEA) and Unified Behavioral Analytics (UEBA) for non-human identities.

Read More
Joanna Woon SC. Joanna Woon SC.

Cloud at Risk: Zero-Days in the Hypervisor Publishing

2025 Cloud Security Threat Report Cloud and virtualization attacks have escalated, with over 30,000 vulnerabilities disclosed year-over-year. Attackers are leveraging AI to discover Zero-Day exploits in hypervisors, allowing them to pivot from edge services to core databases in minutes. Defense requires Cyber Asset Attack Surface Management (CAASM) and rapid hot-patching protocols.

Read More
Joanna Woon SC. Joanna Woon SC.

The Single Point of Failure: Why Your Vendor is Your Vulnerability

2025 Supply Chain Threat Report Attackers have shifted to a "1:Many" attack model by compromising the "connective tissue" of the IT ecosystem, such as Managed Service Providers (MSPs) and CI/CD pipelines. This cascade effect allows a single vendor breach to infect thousands of downstream customers. Defense strategies now require the implementation of Software Bill of Materials (SBOMs) and continuous vendor risk tiering.

Read More
Joanna Woon SC. Joanna Woon SC.

Ransomware 2.0: The Rise of the "Corporate" Cybercriminal

Ransomware 2.0: The RaaS Threat Report Ransomware has industrialized into a "corporate" model known as Ransomware-as-a-Service (RaaS), contributing to 59% of organizations being hit last year. Attackers now utilize "Double Extortion"—encrypting systems and stealing data—to force payments even when backups exist. This article analyzes the RaaS business structure and outlines critical defenses, including immutable backups and rapid patching for known vulnerabilities.

Read More
Joanna Woon SC. Joanna Woon SC.

The 442% Surge: How AI Supercharged Vishing in 2025

Voice phishing (vishing) attacks have increased by 442% in 2025, driven by Generative AI tools that clone executive voices to bypass biometric verification. This article details how deepfakes are facilitating CFO fraud and credential harvesting, and outlines essential defenses including Out-of-Band (OOB) verification and "Safe Phrase" protocols for corporate leadership.

Read More
Joanna Woon SC. Joanna Woon SC.

The 51-Second Breakout: Why Speed is Now Your Biggest Enemy

Cybersecurity breakout times have collapsed to just 51 seconds, rendering human-speed incident response obsolete. With 79% of modern attacks now "malware-free" and utilizing "Living off the Land" (LotL) techniques to bypass traditional EDR, this guide outlines why identity has become the new perimeter. Learn how to combat speed with speed using Phishing-Resistant MFA (FIDO2), Identity Threat Detection & Response (ITDR), and Just-in-Time (JIT) access models.

Read More
Joanna Woon SC. Joanna Woon SC.

Your security is only as strong as your weakest vendor.

Your security is only as strong as your weakest vendor. With the rise of "Fourth-Party" risk and API-based attacks, traditional annual audits are no longer sufficient. This guide explains why the "SolarWinds" era has evolved into the "Snowflake" era of identity attacks and outlines a modern defense strategy using SBOMs (Software Bill of Materials) and continuous risk monitoring.

Read More
Joanna Woon SC. Joanna Woon SC.

Cloud Security Myths: The 2025 Reality Check

Is your data really safe in a Private VPC? Probably not. Discover why "Identity is the new Perimeter" and how to justify the budget for Cloud Security Posture Management (CSPM). We break down the real costs of cloud security vs. the $4.44M cost of a breach.

Read More
Joanna Woon SC. Joanna Woon SC.

Deepfake Fraud 2025: The Executive Defense Guide

Deepfake fraud involves more than just face-swapping; 2025 has seen a massive rise in camera injection attacks and real-time voice cloning targeting C-suite executives. With voice fraud attempts surging 1,300%, traditional KYC and firewalls are no longer sufficient. This guide outlines the four critical AI threat vectors facing Malaysian and ASEAN enterprises and provides a technical roadmap for defense—combining cryptographic content authentication, metadata analysis, and out-of-band verification protocols.

Read More