Fortifying ASEAN's Cyber Frontier Together

ACDN leads regional collaboration to strengthen ASEAN’s cybersecurity. We’re building a resilient digital ecosystem to protect our shared progress and shape a secure future for our interconnected region.

Explore Activities Navigate to the latest cybersecurity news and updates

Joint Exercises

Organizing joint exercises to enhance the region's cybersecurity capabilities and foster collaboration among member states

Strategic Alliances

Partnership with industry leaders and governments to foster innovation and resilient digital infastructure.

Secure Information Sharing

Facilitating secure information sharing across nations to enhance situational awareness and response capabilities.

Latest Activities

Upcoming Events

Cybersecurity events, training, and conferences across ASEAN

1 - 2 May
2025
Kuala Lumpur
Malaysia
ADMM Cybersecurity and Information Centre of Excellence (ACICE) Cybersecurity Course on "Cyber Incident Response and Threat Analysis (CIRTA)"

The CIRTA course by ACICE equips ASEAN military cyber practitioners with hands-on skills in incident response and threat analysis, enhancing regional cyber resilience through practical training and strategic knowledge sharing.

Cybersecurity News

Collection of the latest news and updates on cybersecurity

The Hacker News

OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams

OpenAI on Tuesday unveiled GPT-5.4-Cyber, a variant of its latest flagship model, GPT‑5.4, that's specifically optimized for defensive cybersecurity use cases, days after rival Anthropic unveiled its own frontier model, Mythos. "The progressive use of AI accelerates defenders – those responsible for keeping systems, data, and users safe – enabling them to find and fix problems

Read

The Hacker News

New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released

Two high-severity security vulnerabilities have been disclosed in Composer, a package manager for PHP, that, if successfully exploited, could result in arbitrary command execution. The vulnerabilities have been described as command injection flaws affecting the Perforce VCS (version control software) driver. Details of the two flaws are below - CVE-2026-40176 (CVSS

Read

The Hacker News

Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security

Google has announced the integration of a Rust-based Domain Name System (DNS) parser into the modem firmware as part of its ongoing efforts to beef up the security of Pixel devices and push memory-safe code at a more foundational level. "The new Rust-based DNS parser significantly reduces our security risk by mitigating an entire class of vulnerabilities in a risky area, while also laying

Read

The Hacker News

AI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad Fraud

Cybersecurity researchers have unmasked a novel ad fraud scheme that has been found to leverage search engine poisoning (SEO) techniques and artificial intelligence (AI)-generated content to push deceptive news stories into Google's Discover feed and trick users into enabling persistent browser notifications that lead to scareware and financial scams. The campaign, which has been

Read

The Hacker News

Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads

A nascent Android remote access trojan called Mirax has been observed actively targeting Spanish-speaking countries, with campaigns reaching more than 220,000 accounts on Facebook, Instagram, Messenger, and Threads through advertisements on Meta. "Mirax integrates advanced Remote Access Trojan (RAT) capabilities, allowing threat actors to fully interact with compromised devices in real

Read

The Hacker News

Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

OX Security recently analyzed 216 million security findings across 250 organizations over a 90-day period. The primary takeaway: while raw alert volume grew by 52% year-over-year, prioritized critical risk grew by nearly 400%. The surge in AI-assisted development is creating a "velocity gap" where the density of high-impact vulnerabilities is scaling faster than

Read