• About
  • Subscribe
  • Contact
Tuesday, February 3, 2026
  • Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home CISO

Singapore sees 17% increase in cyber threats as global attacks soar

FutureCISO Editors by FutureCISO Editors
January 30, 2026
Tenable launches enclave security for highly secure environments

Photo by Tima Miroshnichenko: https://www.pexels.com/photo/two-people-using-computers-5380607/

Share on FacebookShare on Twitter

Check Point Software Technologies' Cyber Security Report 2026 reveals an alarming trends that indicate an unprecedented escalation in global cyber attacks. The report, which examines data from the previous year, shows an average of 1,968 cyber attacks occurring weekly worldwide—a staggering 70% increase since 2023.

More concerning for organisations in Asia, Singapore recorded an even higher frequency, with 2,272 weekly attacks, representing a 17% increase from 2024, particularly impacting sectors such as consumer goods and financial services.

The findings highlight a critical evolution in cyber threats, driven largely by advancements in automation and artificial intelligence (AI). Key to this transformation is how attackers are leveraging these technologies for rapid, large-scale operations across various channels.

Lotem Finkelstein

“AI is not just changing the volume of cyber attacks; it's altering their mechanics,” states Lotem Finkelstein, VP of Research at Check Point. The increased speed and sophistication of these attacks necessitate a reevaluation of existing security frameworks to adequately mitigate emerging risks.

Among the report’s notable insights, 89% of organisations encountered AI-generated prompts deemed risky, with approximately one in every 41 prompts classified as high risk. This dovetails with an alarming trend of AI-driven attacks becoming increasingly autonomous, with attackers now employing sophisticated automation techniques that integrate elements of social engineering, operational decision-making, and reconnaissance.

Ransomware remains a persistent threat, with operations fragmenting into smaller, specialised groups. The decentralisation of these groups has contributed to a 53% jump in extorted victims and a rise in the ransomware-as-a-service model. Meanwhile, social engineering tactics are evolving, expanding far beyond email to include coordinated attacks over web, phone, and collaboration platforms.

Related:  Navigating data privacy in the AI era

To combat these threats, it is recommended to deploy a series of proactive measures tailored to the evolving threat landscape:

  1. Revalidate Security Foundations for the AI Era: Security controls must be assessed and adapted to meet the speed and coordination of AI-driven attacks.
  2. Enable Secure AI Adoption: Visibility and governance should be applied to both sanctioned and unsanctioned AI usage to mitigate risks from data leakage and misuse.
  3. Protect the Digital Workspace: Security strategies must encompass all areas where human interaction and AI automation intersect, including collaboration tools and SaaS applications.
  4. Harden Edge and Infrastructure: Continuous inventory and security assessments of edge devices, VPNs, and IoT systems are crucial to reduce hidden vulnerabilities.
  5. Adopt a Prevention-First Approach: Shift to a prevention-led security model to counteract threats before lateral movement and data loss occur.

As organisations in Asia and beyond navigate increasingly complex cyber landscapes, adapting to these evolving threats will be essential for maintaining robust security postures.

Tags: AI-driven cyber attacksCheck Point Software Technologiesransomware trendssecurity posture insights
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • Singapore sees 17% increase in cyber threats as global attacks soar
  • Commvault unveils unified data vault for enhanced S3 Data Protection
  • AI activity surges 91%, exposing security gaps"
  • Digital identities at risk with legacy PKI
  • 75% of security incidents now identity-related

Categories

  • Artificial Intelligence
  • Blogs
  • CISO
  • CISO strategies
  • Cloud, Platforms and Ecosystems
  • Cloud, Virtualization, Operating Environments and Middleware
  • Compliance and Governance
  • Compliance and Governance
  • Compliance and Governance|People
  • Compliance and Governance|Technology
  • Computer, Storage, Networks, Connectivity
  • Culture and Behaviour
  • Culture and Behaviour|People
  • Cyber risk management
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity careers
  • Cybersecurity operations
  • Cybersecurity operations
  • Data Protection
  • Data Protection
  • Endpoint Security
  • FutureCISO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • Incident Response
  • Network Security
  • People
  • Process
  • Remote work
  • Resources
  • Risk Management
  • Risk Management
  • Security
  • Technology
  • Training and awarenes
  • Videos
  • Vulnerabilities and threats
  • Vulnerabilities and threats
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
  • Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl