Skip to content
  • Case Studies
  • Cybersecurity Readiness Assessment
simply data logo
  • About
    • About Us
    • Innovation
      • SD Platform Overview
    • Certifications & Awards
  • Our Services
    • CyberSecurity Services
      • DFIR (Digital Forensics and Incident Response)
      • Compromise Assessment
      • Security Operations Center (SOC) Managed Service
        • SD-Cyber Deception
        • Threat Intelligence
        • Managed Detection and Response (MDR)
        • Cloud Security Posture Management (CSPM)
        • Web Defacement Monitoring
        • In-house Automation Script Development
        • Advanced Malware Analysis & Threat Intelligence
        • Office 365 Monitoring
        • SaaS Monitoring
      • Extended Threat Intelligence
        • Dark Web Monitoring
        • Attack Surface Management
        • Cyber Risk Management
      • Security Posture Assessment (SPA)
      • VAPT & Penetration Testing
      • Network & Security Configuration Audit & Hardening
      • Phishing Email Simulation
    • Managed Network & Security Services
    • Application Performance Monitoring (APM)
      • APM as a Service (APMaaS)
      • Cloud Monitoring
      • Database Performance Monitoring
      • Web Application Monitoring
      • Synthetic Testing Monitoring
      • Real User Monitoring (RUM)
      • Application Stress Test / Load Test Services
    • Consultancy Services
      • NCSB Risk Assessment
      • Security BluePrint™ Consultancy Services
    • Application Framework
      • Safety Net Core System Framework
    CyberSecurity Services
    • VAPT & Penetration Testing
    • Cyber - 911 - DFIR Services
    • Compromise Assessment
    • Security Operations Center (SOC)
    • Extended Threat Intelligence
    • Security Posture Assessment (SPA) Services
    • Network & Security Configuration Audit & Hardening
    • Phishing Email Simulation
    Managed Network & Security Services
    • Managed Network & Security Services
    Consultancy Services
    • NCSB Risk Assessment
    • Security BluePrint™ Consultancy Services
    Application Framework 
    • Safety Net Core System Framework
    Application Performance Monitoring
    • APM as a Service (APMaaS)
    • Cloud Monitoring
    • Database Performance Monitoring
    • Web Application Monitoring
    • Synthetic Testing Monitoring
    • Real User Monitoring (RUM)
    • Stress Test / Load Test – Performance Assessment

    Not Sure What Security Threats Your Organization is Facing?

    We can help. Contact us now for a free consultation and protect your business from potential risks.

    Contact Us
  • Technology Vendor Partners
  • Blog & News
  • Contact
    • Contact Us
    • Become a Simply Data Partner

Under Attack?

Submit your message through our contact form or call us at +603 5886 2714.

    Latest News

    Malaysia Cybersecurity Threat Report 2025: Key Findings & Strategic Insights

    February 27, 2026
    Malaysia Cybersecurity Threat Report 2025

    Home – Malaysia Cybersecurity Threat Report 2025: Key Findings & Strategic Insights

    The Malaysia cybersecurity threat report 2025 reveals a significant escalation in sophisticated cyberattacks targeting businesses across all sectors. From ransomware groups to state-sponsored APT activity, Malaysian organisations face an increasingly complex threat landscape.

    Table of Contents

    1. Report Overview
    2. Incident Landscape
    3. Incidents by Log Sources
    4. Top Targeted Industries
    5. MITRE ATT&CK Breakdown
    6. Threat Intelligence
    7. Top 3 Risks Identified
    8. Strategic Insights
    9. Reflecting on 2024 Predictions
    10. Starlight Intelligence Data
    11. Flawtrack Dark Web Data
    12. 2026 Predictions & Recommendations
    Report Overview

    Malaysia Cybersecurity Threat Report 2025: Scale of Malaysia’s Threat Landscape

    Each year, Simply Data’s award-winning Security Operations Centre (SOC), ISO/IEC 27001 certified, CREST accredited, and CSM Collaboration Partner recognised, processes billions of security events — forming the evidence base for the Malaysia cybersecurity threat report 2025 — on behalf of organisations across Malaysia, Indonesia, and Singapore. The Malaysia Threat Report 2025, covering the full calendar year from 1 January to 31 December 2025, represents the most comprehensive view yet of the threats targeting Malaysian organisations.

    The data in the Malaysia cybersecurity threat report 2025, drawn from a customer base spanning Finance & Insurance, Government Agencies, Education, Logistics, Large Conglomerates, Property Developers, Energy, Manufacturing, Datacentre Providers, and Media & Entertainment, paints an alarming but actionable picture: threat actors are becoming more systematic, more patient, and increasingly focused on identity-layer exploitation.

    120.6B Total Logs Collected
    12.4M SIEM Alerts Triggered
    3,945 Incidents Escalated
    428.7M Unique IOC Lookups
    33.2M Bad Reputation IOCs
    7.75% TI Match Rate

    What makes the Malaysia cybersecurity threat report 2025 distinctive is that it is built on real SOC telemetry, not surveys or estimates. Every number represents an actual log line, a real alert, a genuine attacker behaviour observed inside a Malaysian organisation’s environment.

    Incident Landscape

    Incidents Month by Month

    Of the 12,379,396 alerts triggered across all monitored SIEM environments, Simply Data’s analysts escalated 3,945 confirmed security incidents, roughly 329 per month, as documented in the Malaysia cybersecurity threat report 2025. However, the monthly distribution is far from uniform, and the trend line tells a critical story.

    Escalated Incidents: Monthly Breakdown (2025)
    JAN 2024
    326
    FEB 2024
    211
    MAR 2024
    211
    APR 2024
    235
    MAY 2024
    219
    JUN 2024
    187
    JUL 2024
    267
    AUG 2024
    323
    SEPT 2024
    602
    OCT 2024
    497
    NOV 2024
    458
    DEC 2024
    409

    The Malaysia cybersecurity threat report 2025’s most alarming data point is September 2025, which saw 602 escalated incidents, the highest single month across the entire year and more than three times the June low. The Q4 2025 period (September through December) accounted for a disproportionate share of all annual incidents, suggesting that threat actors are ramping up operations in the second half of the year, possibly aligned with major product and fiscal cycle milestones.

    September 2025 alone saw 602 escalated incidents, the highest monthly count of the year, signalling a sharp escalation in adversarial tempo heading into Q4.

    Incidents by Log Sources

    Where Are Attacks Originating?

    Understanding which log sources generate the most incidents is critical for SOC prioritisation. The Malaysia cybersecurity threat report 2025 reveals that Microsoft 365 (O365) is the dominant attack surface, generating nearly a third of all escalated incidents.

    32.16% O365 LOGS #1 Ranked 30.33% OS LOGS #2 Ranked 14.91% NETWORK LOGS #3 Ranked

    The Malaysia cybersecurity threat report 2025 confirms the dominance of O365 logs (32.16%), as the MITRE ATT&CK mappings also show: Microsoft 365 environments are the primary initial access battleground for Malaysian organisations. Operating System logs (30.33%) follow closely, indicating significant endpoint-level activity, while Network logs (14.91%) round out the top three.

    Top 10 Incidents by Name

    The most frequently observed incident types reveal a consistent pattern: attackers are leveraging credential-based techniques before attempting to escalate privileges or exfiltrate data:

    Incident Type% of Total
    Potential Password Spraying of Microsoft 365 User Accounts6.53%
    Microsoft 365 Portal Logins from Impossible Travel Locations6.20%
    Successful O365 Login from Blacklisted IP4.74%
    Sensitive Directory Service Object Changed2.78%
    SMB (Windows File Sharing) Activity to the Internet2.43%
    Account Configured with Never-Expiring Password1.90%
    New User Created / Login Using Admin Privileges1.65%
    Successful Root SSH Login1.41%
    Privileged Account Brute Force1.17%
    File Changes at Sensitive Directory (FIM)1.17%
    Industry Analysis

    Top Targeted Industries

    When we look at which industries faced the highest number of escalated incidents, three sectors stand apart in the Malaysia cybersecurity threat report 2025. These sectors face a combination of high data value, complex supply chain dependencies, and often under-resourced security teams, a combination that threat actors actively exploit.

    🎓 EDUCATION #1 Most Incidents 📦 LOGISTICS #2 Most Incidents 🏢 LARGE CONGLOMERATE #3 Most Incidents

    Education ranks first in incident volume in the Malaysia cybersecurity threat report 2025, a pattern consistent with global trends. Universities and schools hold vast amounts of personally identifiable information (PII), research data, and financial records, all while operating open-access networks designed for collaboration rather than security. Logistics companies, managing time-sensitive supply chains, are similarly vulnerable; operational disruption via ransomware or data theft carries significant financial penalty. Large Conglomerates present a broad attack surface with subsidiaries of varying security maturity, making them attractive for lateral movement and supply chain attacks.

    MITRE ATT&CK Framework

    How Attackers Operate in Malaysia

    Simply Data maps every escalated incident documented in the Malaysia cybersecurity threat report 2025 to the MITRE ATT&CK framework, providing a standardised view of adversary tactics and techniques. The 2025 results confirm that Malaysian threat actors are following a deliberate, structured kill chain that begins with credential theft and ends with data extraction.

    Top 5 Tactics (TA)

    Tactic IDTactic Name% of Incidents
    TA0006Credential Access25.38%
    TA0001Initial Access22.79%
    TA0003Persistence11.53%
    TA0010Exfiltration9.45%
    TA0011Command and Control8.29%

    Top 5 Techniques (T)

    Technique IDTechnique Name% of Incidents
    T1078Valid Accounts18.71%
    T1110Brute Force15.17%
    T1098Account Manipulation8.54%
    T1190Exploit Public-Facing Application5.77%
    T1048Exfiltration Over Alternative Protocol3.90%

    The Malaysia cybersecurity threat report 2025 tells a clear story: attackers enter via valid credentials (T1078, 18.71%) or brute-force methods (T1110, 15.17%), then manipulate accounts to establish persistence and escalate privileges. Command-and-Control infrastructure is then used to orchestrate data exfiltration. This is a textbook Advanced Persistent Threat (APT) pattern, no longer reserved for nation-state actors, but now widely adopted by financially-motivated cybercriminal groups targeting Malaysian organisations.

    Threat Intelligence

    Indicators of Compromise: The Numbers

    428.7M Total IOC Lookups
    33.2M Bad Reputation IOCs Matched
    18.027 Avg TI Feeds Matched per IOC

    Simply Data correlates every IOC — a methodology central to the Malaysia cybersecurity threat report 2025 — against an extensive threat intelligence ecosystem. Out of 428,681,768 unique IOC lookups, 33,213,117 were confirmed as malicious, a match rate of 7.75%. Critically, when a match was confirmed, it triggered an average of 18.027 separate threat intelligence feed hits, indicating that the malicious infrastructure being encountered is well-documented and actively tracked by the global threat intelligence community.

    Top Threat Source Countries

    The Malaysia cybersecurity threat report 2025 maps how Malaysia’s threat landscape is heavily influenced by infrastructure based in the following countries. Note that infrastructure location does not necessarily indicate attacker origin, as many threat actors deliberately route through cloud providers and VPNs in these jurisdictions.

    🇺🇸 50.93% United States
    🇬🇧 10.31% United Kingdom
    🇨🇳 4.75% China
    🇳🇱 3.85% Netherlands
    🇫🇷 3.76% France

    The United States’ dominant share (50.93%) reflects the widespread use of major US-based cloud platforms such as AWS, Azure, Cloudflare, and similar providers, as attack infrastructure. This underscores the need for threat intelligence that goes beyond simple geo-blocking and focuses instead on behavioural indicators and reputation-based detection.

    Risk Analysis

    Top 3 Risks Identified

    01

    Identity and Credential Compromise

    Password spraying, brute-force attempts, and impossible travel login events are the most common threats documented in the Malaysia cybersecurity threat report 2025. Credential Access is the most prevalent MITRE tactic (25.38%) and Valid Accounts (T1078) is the most frequently observed technique at 18.71%. Microsoft 365 environments are the primary entry point, making identity security the single most critical control gap in Malaysian organisations today.

    02

    Weak Access Controls and Privilege Management

    The Malaysia cybersecurity threat report 2025 data reveals systemic weaknesses in identity governance: accounts configured with non-expiring passwords, newly created users being granted administrative privileges immediately, and unauthorised directory object modifications. Persistence tactics account for 11.53% of observed TTPs, while Account Manipulation (T1098) at 8.54% highlights the ease with which attackers escalate privileges once inside the environment.

    03

    Data Exfiltration Exposure

    The Malaysia cybersecurity threat report 2025 identifies exfiltration as the fourth most prevalent tactic at 9.45%, with SMB traffic to external destinations and exfiltration over alternative protocols as key indicators. When viewed alongside Command-and-Control activity (8.29%), it is evident that successful intrusions frequently progress to active data extraction, particularly in Education and Logistics, where sensitive personal and operational data is held at scale.

    Strategic Insights

    What the 2025 Data Really Tells Us

    The Malaysia cybersecurity threat report 2025 data uncovers three overarching themes when the full dataset is viewed holistically. These themes transcend any single incident or technique and describe the structural nature of Malaysia’s cybersecurity challenge in 2025.

    1. Identity Infrastructure Is the Primary Battleground

    According to the Malaysia cybersecurity threat report 2025, Microsoft 365 is consistently the first target. Adversaries predominantly rely on credential-based techniques such as password spraying, brute force, and anomalous login activity, to gain access. This risk is further amplified by extensive third-party and supply chain integrations with M365, where compromised external applications, OAuth permissions, or automation workflows can be leveraged to abuse trusted access paths. Identity compromise is no longer confined to direct user activity; it extends to every integrated tool and service.

    2. Governance Gaps Enable Attack Progression

    Once initial access is obtained — a recurring pattern in the Malaysia cybersecurity threat report 2025 — weaknesses in access controls, privilege management, and identity governance frequently allow attackers to progress through multiple stages of the kill chain. Indicators such as excessive privileges, non-expiring passwords, rapid elevation of newly created accounts, and risky directory changes point to configuration and enforcement gaps, not a lack of detection capability. Organisations are often detecting the right events; they are simply not enforcing the right preventative controls to stop attackers from exploiting the window of opportunity.

    3. High-Value Targets Drive Concentrated Risk

    The Malaysia cybersecurity threat report 2025 shows observed threat activity is highly concentrated around a limited number of attack techniques that directly enable access to sensitive systems and data. Credential Access, Valid Accounts, Persistence, and Exfiltration consistently appear together, indicating that attackers are prioritising efficiency and impact. Education and Logistics are disproportionately affected due to the nature of the data they manage, including personal information and critical operational data, combined with typically constrained security budgets.

    Attackers are selectively targeting environments where successful compromise is more likely to result in meaningful data access or operational leverage. This is precision cybercrime, not opportunism.

    Looking Back

    Reflecting on Our 2024 Predictions

    How well did last year’s predictions hold up? The Malaysia cybersecurity threat report 2025 allows us to measure accuracy — and the majority proved correct.

    2024 PredictionOutcome
    Rise of Supply Chain Compromise✓ Yes
    Password Compromise and Social Engineering✓ Yes
    Ransomware and Security Practices~ Partial

    Supply chain compromises were fully validated in the Malaysia cybersecurity threat report 2025, with third-party vendor risk materialising across multiple sectors. Password compromise and social engineering also played out as predicted, amplified by generative AI-powered phishing. Ransomware was partially realised: RaaS and EDR killer tools confirmed the threat, but progress on People, Processes, and Technology balance remained uneven across organisations.

    Starlight Cyber Threat Intelligence Malaysia
    starlightintel.com ↗ starlightcti.com ↗
    Data Contributor · Pages 10–11 · Ransomware & Threat Actor Intelligence
    Special Thanks: Threat Intelligence Partner

    Starlight Intelligence:
    Ransomware & Threat Actor Data

    Pages 10 and 11 of the Malaysia cybersecurity threat report 2025 were made possible through the exclusive contribution of Starlight Intelligence, a premier Malaysian cybersecurity firm and NACSA-licensed service provider, recognised as a Malaysia Digital Status company for its innovation in Artificial Intelligence. Starlight leverages its proprietary Starlight Neural Networks (SNN) to generate high-fidelity threat intelligence and assess risks with precision.

    Founded in 2019 and BSI-certified to ISO 27001:2022, Starlight Intelligence bridges the gap between high-end protection and budgetary constraints, delivering locally-developed, cost-effective cybersecurity solutions that directly serve the Malaysian market. Their meticulous research and data generosity have significantly elevated the quality of this report’s threat actor and ransomware analysis.

    This report was meticulously prepared with Starlight Intelligence’s ransomware and threat actor data, giving Malaysian organisations an unprecedented window into exactly who is targeting them and how.

    Malaysia Ransomware Statistics (Starlight Data)

    The Malaysia cybersecurity threat report 2025 confirms ransomware activity targeting Malaysia has escalated sharply. Starlight’s data reveals a more than doubling of incidents from 2023 to 2025, a trend that demands immediate attention from every sector.

    2023 20 Incidents
    →
    2024 21 Incidents
    →
    2025 45 Incidents +114% YoY

    Top 10 Ransomware Threat Actors in Malaysia

    Starlight Intelligence tracks the most active ransomware groups operating against Malaysian targets. LockBit continues to dominate, while newer actors like Qilin and Akira are rapidly gaining ground.

    Threat ActorIncidents
    LockBit 3.017
    Qilin13
    Direwolf9
    Ransomhub6
    Obscura5
    Threat ActorIncidents
    Hunter4
    Babuk24
    TheGentlemen4
    Akira3
    Lv2

    Key Threat Actor Profiles

    Threat ActorAffiliations / OriginsStrategic Focus & Tactics
    LockBit (3.0/5.0)Global RaaS / Eastern EuropeUses “invisible mode” and API harvesting; targets manufacturing sector
    Qilin (Agenda)Russia-linked RaaSUses Rust language for speed; primary threat to aviation and healthcare
    DirewolfSE Asia (Human-operated)Specialised in double-extortion against tech and legal sectors
    INDOHAXSECIndonesia-based HacktivistIdeologically motivated; targets government for data leaks
    AkiraGlobal RaaSFocuses on Windows and ESXi; highly prolific in late 2025

    2026 Outlook: AI as a Double-Edged Sword

    Starlight Intelligence’s forward-looking analysis warns that AI is no longer a future concept. It is a functional weapon already deployed by adversaries and defenders alike in the 2026 threat landscape.

    ⚔️ Offensive AI Threats
    • High-value Business Email Compromise (BEC) now uses AI-generated voice and video to impersonate CEOs
    • NLP used to craft “Manglish” (Malaysian English) localised phishing lures that bypass traditional filters
    • Strains like LAMEHUG and PROMPTFLUX use LLM interactions to re-generate source code on execution, making them invisible to signature-based EDR
    🛡️ Defensive AI Capabilities
    • AI agents now handle the “volume problem”, triaging thousands of alerts to identify true positives in milliseconds
    • Shifting from detection to anticipation by identifying pattern anomalies before a breach occurs

    High-Risk Sectors for 2026 (Starlight Forecast)

    🏥

    Healthcare

    Primary target due to critical nature of patient records and zero downtime tolerance

    ⚙️

    Manufacturing & Energy

    Increasing risk from IT-OT convergence; corporate breaches can trigger physical production halts

    🏛️

    Critical Infrastructure

    Targeted by state-sponsored actors to sow economic chaos and disrupt essential public services

    ⭐

    Thank You, Starlight Intelligence

    Simply Data extends its deepest gratitude to the entire team at Starlight Intelligence for their exceptional contribution of Malaysia-specific ransomware statistics, threat actor profiles, and forward-looking intelligence to this report. Your commitment to building a safer Malaysian cyberspace through open collaboration and knowledge-sharing is an inspiration to the entire regional security community.

    Starlight Intelligence’s proprietary Neural Network-driven analysis has given Malaysian organisations a level of adversary insight that is rare, actionable, and genuinely life-saving for businesses navigating the 2025–2026 threat landscape.

    🌐 starlightintel.com 🔗 starlightcti.com
    Flawtrack ASM and Dark Web Monitoring
    flawtrack.com ↗
    Data Contributor · Pages 12–13 · External Exposure & Dark Web Intelligence
    Special Thanks: ASM & Dark Web Intelligence Partner

    Flawtrack:
    External Exposure & Dark Web Observations

    Pages 12 and 13 of the Malaysia cybersecurity threat report 2025 are powered exclusively by data from Flawtrack’s Intelligence Platform, covering 2025 statistics on external exposure and dark web activity targeting Malaysian organisations. Flawtrack’s Attack Surface Management (ASM) and Dark Web Monitoring capabilities provide a critical outside-in view of Malaysia’s digital exposure, intelligence that internal SOC telemetry alone cannot capture.

    To complement the Malaysia cybersecurity threat report 2025 internal SOC findings, we collaborated with Flawtrack to analyse external exposure and dark web intelligence trends observed across Malaysian organisations. The result is one of the most complete pictures of Malaysian cyber exposure ever published.

    Overall Exposure Statistics: Malaysia 2025

    44,593 Malaysian Domains Exposed
    5,776,612 Total Credentials Compromised
    2,408,402 Unique Users Affected
    3,980 Government Domains (.gov.my)
    21,451 Commercial Domains (.com.my)
    5,404 Educational Domains (.edu.my)

    Sector Breakdown: Exposed Domains and Credentials

    The Malaysia cybersecurity threat report 2025 shows the Commercial sector leads in absolute credential volume, but Government’s exposure per domain is particularly alarming given the sensitivity of data held within those environments.

    SectorDomains AffectedTotal CredentialsUnique Users% of Total
    Commercial21,4512,249,263973,99838.9%
    Government3,9801,619,708712,99628.0%
    Education5,4041,013,829317,85917.5%
    Other13,753893,812403,54915.5%

    Compromised Endpoint Breakdown by Sector

    SectorEndpointsCredentialsUnique Users
    Commercial499,2651,909,848158,913
    Government460,8251,832,196159,825
    Education189,339918,72472,024
    Other182,867702,94858,135

    Compromised Device Operating System Distribution

    The Malaysia cybersecurity threat report 2025 shows Windows 10 dominates the compromised device landscape at 71.3%, a significant concern given Microsoft’s end-of-support timeline. Windows 11 devices yield the highest average credentials per device at 250, suggesting that even newer systems are heavily compromised once stealer malware takes hold.

    Operating SystemDevicesCredentials% of DevicesAvg Creds/Device
    Windows 1054,9948,307,51171.3%151
    Windows 1117,1854,297,12822.3%250
    Other3,103557,5064.0%180
    Windows 71,787143,6442.3%80
    Windows Server175,673<0.1%334

    Dark Web Marketplace Activity: Key Findings

    🕷️
    Active Marketplace Trading

    The Malaysia cybersecurity threat report 2025 reveals Malaysian credentials are actively traded on underground marketplaces and forums, with fresh dumps appearing daily from large-scale infostealer campaigns.

    💰
    Premium Government & Banking Credentials

    Government and banking credentials command premium prices in dark web listings, reflecting high-value access to sensitive systems and financial infrastructure.

    📋
    Combo Lists Redistributed at Scale

    Combo lists containing Malaysian email addresses are frequently updated and redistributed across hacker forums, amplifying the reach of each breach.

    📦
    Stealer Logs Sold in Bulk

    Stealer logs from Malaysian endpoints, containing saved passwords, session cookies, and autofill data, bundled and sold in bulk packages, enabling low-skill attackers to execute large-scale account takeover campaigns.

    🔁
    Credential Reuse Amplification

    As highlighted in the Malaysia cybersecurity threat report 2025, credential reuse across services significantly amplifies the impact of each individual breach. A single leaked password can unlock email, cloud storage, HR systems, and financial platforms simultaneously.

    🛡️

    Thank You, Flawtrack

    Simply Data sincerely thanks the Flawtrack team for their outstanding contribution of Attack Surface Management and Dark Web Monitoring intelligence to this report. The external exposure data covering 44,593 Malaysian domains and 5.77 million compromised credentials represents a level of visibility that is uniquely valuable, and that no internal monitoring capability alone could provide.

    Flawtrack’s dedication to tracking Malaysia’s external threat surface and dark web exposure in real-time is a critical service to the nation’s cybersecurity ecosystem. We are proud to have Flawtrack as a data partner and look forward to continuing this collaboration in protecting Malaysian organisations from outside-in threats.

    🌐 flawtrack.com
    Malaysia Cybersecurity Threat Report 2025 SIEM SOC Malaysia MITRE ATT&CK Credential Compromise Microsoft 365 Security Dark Web Simply Data IoT Security Identity Threat Detection Cybersecurity Malaysia 2025
    Forward-Looking Analysis

    Prediction & Recommendations
    for 2026

    Building on the Malaysia cybersecurity threat report 2025 data and intelligence from Simply Data’s SOC, Starlight Intelligence, and Flawtrack, three primary threat categories are forecast to define the 2026 Malaysian cyber landscape.

    🤖 AI Agents Security Risk
    • AI agent and AI-driven workflow adoption will introduce new attack vectors not fully addressed by traditional application security controls
    • Prompt injection attacks are expected to increase, enabling attackers to manipulate agent behaviour to extract API keys, credentials, system prompts, or internal logic
    • Agent-to-agent phishing, where malicious agents impersonate trusted agents or inject malicious instructions into multi-agent workflows, which is likely to emerge as a viable technique in automated business processes
    Recommendations

    Implement strict input validation and output filtering for AI agents. Enforce least-privilege access for APIs and secrets, and isolate agent execution environments. Secrets should never be embedded directly in prompts or agent memory. Continuous monitoring of agent behaviour, strong authentication between agents, and human-in-the-loop controls for high-risk actions are critical to reducing the blast radius of successful prompt manipulation.

    🔗 Supply Chain Risk
    • Supply chain risk will remain significant and persistent in 2026 as organisations continue to rely on interconnected SaaS platforms, cloud services, and third-party integrations
    • Compromises affecting vendors, software dependencies, or trusted external services are expected to continue enabling indirect access to enterprise environments, including identity systems such as Microsoft 365
    Recommendations

    Strengthen third-party risk management by integrating threat intelligence feeds, attack surface managem

    to exposed assets, abused doid=”recommendations”>
    Actionable Recommendations

    What Malaysian Organisations Must Do Now

    Based on the Malaysia cybersecurity threat report 2025, Simply Data recommends four immediate priorities for Malaysian organisations.

    🔐

    Implement Phishing-Resistant MFA Across All M365 Accounts

    Password spraying and credential theft are the leading attack vectors. Hardware tokens or FIDO2 keys should be mandatory for all privileged accounts and progressively rolled out to all users. Conditional Access policies must enforce MFA from every location, including trusted networks.

    🛡️

    Deploy Identity Threat Detection & Response (ITDR)

    Traditional EDR is insufficient when the primary attack surface is the identity layer. ITDR solutions provide continuous monitoring of identity behaviours, detecting anomalous logins, privilege escalations, and directory object changes before they progress to full compromise.

    🔍

    Conduct a Privilege Access Review Now

    The Malaysia cybersecurity threat report 2025 identifies accounts with non-expiring passwords, excessive admin rights, and immediate elevation of new accounts as persistent findings. A structured Privileged Access Management (PAM) programme with regular review cycles is essential to closing the governance gaps attackers rely on.

    🌐

    Review and Restrict Third-Party OAuth Permissions in M365

    Compromised external applications and OAuth tokens represent a growing supply chain attack vector. Organisations should audit all connected applications, revoke unnecessary permissions, and implement Microsoft Defender for Cloud Apps to monitor OAuth abuse in real time.

    📡

    Adopt IoT-Specific Network Segmentation Controls

    IoT-related threats are forecast to increase in 2026, a key finding of the Malaysia cybersecurity threat report 2025. Organisations should segment IoT device traffic from core business systems using dedicated VLANs, enforce continuous traffic inspection, and maintain an up-to-date device inventory. Poorly secured IoT devices remain low-effort entry points for network-based attacks.

    🕵️

    Monitor Dark Web Exposure Continuously

    Given the volume of Malaysian credentials documented in the Malaysia cybersecurity threat report 2025 trading on underground markets, dark web monitoring should be a standard component of any organisation’s threat intelligence programme. Early detection of leaked credentials enables proactive password resets and account lockdowns before adversaries can exploit them.

    📊

    Engage a 24/7 Managed SOC with Malaysian Threat Context

    The volume of alerts in the Malaysia cybersecurity threat report 2025 (12.4 million in 2025) is beyond the capacity of most internal security teams to triage effectively. A managed SOC with deep understanding of the Malaysian threat landscape, enriched threat intelligence, and 24/7 operational capability is the most effective way to reduce attacker dwell time and incident escalation rate.

    A Collaborative Intelligence Report

    The Malaysia cybersecurity threat report 2025 represents a unique three-way collaboration between Simply Data, Starlight Intelligence, and Flawtrack, combining internal SOC telemetry, ransomware & threat actor intelligence, and external attack surface visibility into one unified view of Malaysia’s cyber threat landscape. We are immensely grateful to both partners for making this the most comprehensive Malaysia threat report ever published.

    Starlight Cyber Threat Intelligence Malaysia × Flawtrack ASM and Dark Web Monitoring
    Simply Data
    /container
    Intelligence Briefing

    Want the Full Picture?

    Access the complete 40-page 2025 Malaysia Cybersecurity Threat Report — packed with incident breakdowns, threat actor profiles, sector-specific risk data, and actionable defence recommendations for Malaysian businesses.

    ✅

    Download Starting!

    Thank you. If your download doesn’t start automatically, click below.

    ⬇ Download Report (PDF)

    Complete the form to download

    Fill in your details below. Your report will download automatically after submission. To protect your business from the threats highlighted in this report, consider engaging a local cybersecurity company in Malaysia with proven SOC and VAPT capabilities. To protect your business from the threats highlighted in this report, consider engaging a local cybersecurity company in Malaysia with proven SOC and VAPT capabilities.

    What were the key findings in the 2025 Malaysia Cybersecurity Threat Report?

    The report revealed increasing ransomware targeting Malaysian SMEs and government agencies, rising phishing and social engineering attacks, and a significant skills gap in Malaysian cybersecurity teams.

    Which sectors face the highest cyber threat levels in Malaysia?

    Financial services, healthcare, government, and critical infrastructure face the most severe threats according to the report. SMEs across retail and manufacturing are also increasingly targeted.

    How should Malaysian businesses respond to the threat landscape identified in this report?

    Implement zero-trust security models, invest in SOC capabilities, conduct regular security awareness training, maintain updated backup systems, and establish incident response plans aligned with Malaysian regulatory requirements.

    • Credential Compromise
    • Cyber Threats
    • Dark Web
    • Malaysia
    • Malaysia Cybersecurity 2025
    • MITRE ATT&CK
    • Ransomware
    • SIEM
    • soc
    • Threat Report

    Post navigation

    Previous
    Next

    Search

    Categories

    • Announcements (8)
    • Cybersecurity Tips (39)
    • Industry Insights & Trends (5)
    • Latest News (2)
    • Service Spotlight (4)

    Recent posts

    • featured penetration testing malaysia vapt 1024x683
      VAPT Penetration Testing Malaysia: How We Scope & Size Your Security Assessment
    • featured cyber threat landscape malaysia 2026 1024x683
      Cyber Threat Landscape Malaysia 2026: Top Threats, APT Groups & How to Stay Protected
    • featured soc as a service malaysia 2026 1024x683
      SOC-as-a-Service Malaysia: What It Is, How It Works & What to Look For

    Tags

    2026 Trends AI Threats apm Certification China CCTV cloud-security Company News Compliance Cost-Benefit Analysis Credential Compromise cyber-security-act cybersecurity-malaysia Cybersecurity News Cybersecurity Spending Cyber Threats Dark Web DFIR Hardware Security Hikvision Incident Response IoT Security IoT VAPT iso27001 Malaysia Malaysia Cybersecurity 2025 Managed Services MITRE ATT&CK nacsa Network Security PDPA penetration-testing Ransomware ROI SIEM SME Budget SME Security soc threat-intelligence Threat Report vapt Web Application Security

    Related posts

    IoT penetration testing Malaysia blog thumbnail
    Cybersecurity Tips

    IoT Penetration Testing: Real Findings from 7 Enterprise IoT Devices

    April 2, 2026

    What actually happens during IoT penetration testing? Our team physically tested 7 enterprise IoT devices — CCTV, NVR, intercoms, facial recognition — and found real vulnerabilities including a live firmware extraction proof-of-concept.

    Why Your Business Needs Real Time Security Intelligence to Stay Ahead of Cyber Threats
    Cybersecurity Tips

    Why Your Business Needs Real-Time Security Intelligence to Stay Ahead of Cyber Threats

    March 1, 2026

    Home – Why Your Business Needs Real-Time Security Intelligence to Stay Ahead of Cyber Threats In today’s interconnected world, businesses are under constant threat from cybercriminals looking to exploit vulnerabilities in digital infrastructure. To stay ahead, organizations must invest in real-time security intelligence, a critical aspect of a Security Operations Center (SOC). Simply Data’s Threat […]

    blog image 2 vapt fixed
    Cybersecurity Tips

    Penetration Testing Malaysia: What Is VAPT, Why Your Business Needs It, and What to Look For in a Provider

    March 1, 2026

    Penetration testing in Malaysia is now a regulatory requirement for financial institutions and a best practice for all businesses. Learn what VAPT covers, what NACSA and BNM RMiT require, and how to choose a CREST-certified provider.

    simply data logo

    Started in 2022, Simply Data is a CREST certified and NACSA Licensed Cyber Security company in Malaysia that provides cyber security services including Network & Security IT Managed Service, Security Operation Centre (SOC), Cyber Threat Intelligence, Vulnerability Assessment & Penetration Testing (VAPT) service, Application Performance Monitoring (APM) services, and more.n

    • B-03A-03, 3RD Floor, Block B Setiawalk, Persiaran Wawasan, Pusat Bandar Puchong, 47100 Puchong, Selangor
    • +603 5886 2714
    • contactus@simplydata.com.my
    Quick Links
    • Home
    • About Us
    • Innovation
    • Technology Vendor Partners
    • Blog / News
    • Career Opportunities
      Hiring
    • Become a Simply Data Partner
    • Cybersecurity Readiness Assessment
    • Malaysia CyberSecurity Act 854
    Application Framework 
    • Safety Net Core System Framework
    CyberSecurity Services
    • VAPT & Penetration Testing
    • Cyber - 911 - DFIR Services
    • Compromise Assessment
    • Security Operations Center (SOC)
    • Extended Threat Intelligence
    • Security Posture Assessment (SPA) Services
    • Network & Security Configuration Audit & Hardening
    • Phishing Email Simulation
    Managed Network & Security Services
    • Managed Network & Security Services
    Observability ApplicationnPerformance Monitoring
    • Observability APM as a Service
    • Cloud Monitoring
    • Database Performance Monitoring
    • Web Application Monitoring
    • Synthetic Testing Monitoring
    • Real User Monitoring
    • Stress Test / Load Test – Performance Assessment
    Consultancy Services
    • NCSB Risk Assessment
    • Security BluePrint™ Consultancy Services

    © 2025 Simply Data Sdn Bhd. All rights reserved.

    • Terms & Conditions
    • Data Protection & User Privacy
    • Privacy Policy
    • Cookie Policy