Home
Tips Sharing
For Bloggers
For Businesses
For Cybersecurity
For Designers
For E-Commerce
For Enterprise
For New Retail
For WordPress
By Product
Alibaba.com
Bulk SMS Marketing
Digital Export
Digital Marketing
Domain
E-Commerce
Email
Freshworks Helpdesk
Google Workspace
Hosting
Live Chat
Local Business Listing
Marketing Tools
Microsoft 365
New Retail
Sales CRM
Search Engine Optimisation
Security & Backup
Solutions
SSL Certificate
VPS & Server
News Article
Client Success Stories
Search
Exabytes Blog
News
Events
WIN A TESLA
Back to Exabytes.my
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Home
Tips Sharing
All
For Bloggers
For Businesses
For Cybersecurity
For Designers
For E-Commerce
For Enterprise
For New Retail
For WordPress
Celebrate the Holiday Season with BuyDirect’s 2025 Exclusive Year-End Deals!
AI-powered phishing in MalaysiaSurges in 2025: How Malaysian Businesses Are Being…
How to Choose a Website Builder in Malaysia: Features, Cost &…
How AI Website Builders Help Malaysian SMEs Go Digital Faster (2026…
By Product
All
Alibaba.com
Bulk SMS Marketing
Digital Export
Digital Marketing
Domain
E-Commerce
Email
Freshworks Helpdesk
Google Workspace
Hosting
Live Chat
Local Business Listing
Marketing Tools
Microsoft 365
New Retail
Sales CRM
Search Engine Optimisation
Security & Backup
Solutions
SSL Certificate
VPS & Server
Celebrate the Holiday Season with BuyDirect’s 2025 Exclusive Year-End Deals!
AI in Google Workspace: How Gemini Helps Your Team Work Smarter
Teamwork Made Simple: How SMEs in Malaysia Stay Organised with Google…
How to Look More Professional with Google Workspace Email
News Article
Client Success Stories
For Cybersecurity
For Bloggers
For Businesses
For Designers
Home
Tips Sharing
For Cybersecurity
For Cybersecurity
AI-powered phishing in MalaysiaSurges in 2025: How Malaysian Businesses Are Being Targeted
Edwin Alexander
-
December 17, 2025
Introduction In 2025, Malaysia is experiencing a sharp rise in AI-powered phishing attacks. Cybercriminals are leveraging generative AI, deepfake voice technology, and automated social engineering...
Tips Sharing
Ethical AI in SOC Environments: Governance and Accountability
Edwin Alexander
-
November 26, 2025
For Cybersecurity
API Security Threats in 2025: The Next Attack Frontier
Edwin Alexander
-
November 26, 2025
For Cybersecurity
Cyber Risk Quantification (CRQ): Turning Threats into Business Metrics
Edwin Alexander
-
November 26, 2025
Tips Sharing
AI-Augmented Blue Teams: Balancing Automation with Analyst Judgment
Edwin Alexander
-
November 19, 2025
For Cybersecurity
The Rise of Shadow SaaS: Detecting Unapproved Cloud Applications
Edwin Alexander
-
November 19, 2025
Tips Sharing
Leveraging Threat Intelligence for GRC Decision Making
Edwin Alexander
-
October 30, 2025
Popular Article
Rising Threats, Smarter Defenses: Cybersecurity Priorities for 2025
January 13, 2025
AI-Powered Cybersecurity: The Future of Threat Detection
May 21, 2025
Growing Threat of Amazon S3 Ransomware Attacks
April 23, 2025
Generative AI in Cybersecurity: The Arms Race of the Digital Age
May 5, 2025