Fortifying ASEAN's Cyber Frontier Together

ACDN leads regional collaboration to strengthen ASEAN’s cybersecurity. We’re building a resilient digital ecosystem to protect our shared progress and shape a secure future for our interconnected region.

Explore Activities Navigate to the latest cybersecurity news and updates

Joint Exercises

Organizing joint exercises to enhance the region's cybersecurity capabilities and foster collaboration among member states

Strategic Alliances

Partnership with industry leaders and governments to foster innovation and resilient digital infastructure.

Secure Information Sharing

Facilitating secure information sharing across nations to enhance situational awareness and response capabilities.

Latest Activities

Upcoming Events

Cybersecurity events, training, and conferences across ASEAN

1 - 2 May
2025
Kuala Lumpur
Malaysia
ADMM Cybersecurity and Information Centre of Excellence (ACICE) Cybersecurity Course on "Cyber Incident Response and Threat Analysis (CIRTA)"

The CIRTA course by ACICE equips ASEAN military cyber practitioners with hands-on skills in incident response and threat analysis, enhancing regional cyber resilience through practical training and strategic knowledge sharing.

Cybersecurity News

Collection of the latest news and updates on cybersecurity

The Hacker News

n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens

Threat actors have been observed uploading a set of eight packages on the npm registry that masqueraded as integrations targeting the n8n workflow automation platform to steal developers' OAuth credentials. One such package, named "n8n-nodes-hfgjf-irtuinvcm-lasdqewriit," mimics a Google Ads integration, and prompts users to link their advertising account in a seemingly legitimate form and then

Read

The Hacker News

⚡ Weekly Recap: AI Automation Exploits, Telecom Espionage, Prompt Poaching & More

This week made one thing clear: small oversights can spiral fast. Tools meant to save time and reduce friction turned into easy entry points once basic safeguards were ignored. Attackers didn’t need novel tricks. They used what was already exposed and moved in without resistance. Scale amplified the damage. A single weak configuration rippled out to millions. A repeatable flaw worked again and

Read

The Hacker News

GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials

A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and blockchain projects to co-opt them into a botnet that's capable of brute-forcing user passwords for services such as FTP, MySQL, PostgreSQL, and phpMyAdmin on Linux servers. "The current wave of campaigns is driven by two factors: the mass reuse of AI-generated server deployment examples that propagate common

Read

The Hacker News

Anthropic Launches Claude AI for Healthcare with Secure Health Record Access

Anthropic has become the latest Artificial intelligence (AI) company to announce a new suite of features that allows users of its Claude platform to better understand their health information. Under an initiative called Claude for Healthcare, the company said U.S. subscribers of Claude Pro and Max plans can opt to give Claude secure access to their lab results and health records by connecting to

Read

The Hacker News

Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud

Cybersecurity researchers have shed light on two service providers that supply online criminal networks with the necessary tools and infrastructure to fuel the pig butchering-as-a-service (PBaaS) economy. At least since 2016, Chinese-speaking criminal groups have erected industrial-scale scam centers across Southeast Asia, creating special economic zones that are devoted to fraudulent investment

Read

The Hacker News

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting diplomatic, maritime, financial, and telecom entities in the Middle East with a Rust-based implant codenamed RustyWater. "The campaign uses icon spoofing and malicious Word documents to deliver Rust based implants capable of asynchronous C2, anti-analysis, registry persistence, and modular

Read