About Pricing Explore Login
Free Risk Assessment ← Back
Cybersecurity Sector Risk Assessment: | Renatus

Cybersecurity Sector Risk Assessment: Southeast Asia

Risk Assessment

Download
Downloading PDF...

Southeast Asia's cybersecurity market is growing fast — the regional market is on track toward USD 141 billion by 2030 at a 13.7% annual growth rate — but the risk environment is deteriorating at roughly the same pace as the opportunity. Singapore recorded 6,100 phishing cases in 2024, a 49% increase year-on-year, while the broader APAC region absorbed 34% of all global cyberattacks that year. The threat is not theoretical: named incidents in Vietnam, Thailand, and across the ASEAN government sector confirm that state-sponsored and criminal actors are actively targeting the region's critical infrastructure and financial systems.

What makes this market structurally complicated right now is a three-way tension between accelerating regulation, a fragmented vendor landscape, and a threat environment that is outpacing enterprise defences. Vietnam's amended Cybersecurity Law took effect January 1, 2026. Malaysia's Personal Data Protection Act amendments introduced mandatory breach notification from June 2025. Indonesia's data protection law is moving toward enforcement. Each country is building its own compliance architecture, and cybersecurity vendors operating across the region face five distinct regulatory regimes simultaneously — with no harmonisation in sight. For investors, the compounding risk is that the companies best positioned to win on product are also most exposed to cross-border regulatory friction.

Technology & Software - Cybersecurity · SEA · 14 Apr 2026
APAC share of global cyberattacks (2024) 34% Down from 31% in 2022 but rebounding — IBM X-Force
Singapore phishing cases (2024) 6,100 49% year-on-year increase — CSA Singapore
Daily ransomware attempts, SEA (2024) 400+ Regional aggregate — Kaspersky via Vietnam News
Cybersecurity market size target by 2030 USD 141B At 13.7% CAGR — Research and Markets

Key findings

  1. Regulatory fragmentation is the defining structural risk for cross-border cybersecurity vendors. Vietnam, Malaysia, Indonesia, Singapore, and Thailand each operate distinct cybersecurity and data protection frameworks — Vietnam's amended law took effect January 1, 2026, Malaysia's PDPA amendments activated June 2025, and Indonesia's UU PDP is moving toward enforcement — with no regional harmonisation mechanism in place.

  2. State-sponsored threats are already inside Southeast Asian government networks, not approaching them. A confirmed campaign by CL-STA-1020 (late 2024–2025) used AWS Lambda for command-and-control against Southeast Asian governments, exfiltrating trade data; a separate Chinese-backed group breached Thai government institutions in October 2024 via initial access obtained in 2023.

  3. AI-powered deepfake fraud has moved from theoretical risk to operational reality across ASEAN. Deepfake-driven identity fraud cases in Asia-Pacific rose 1,530% between 2022 and 2023, with Indonesia and Vietnam identified as primary targets, prompting regulatory responses including stricter eKYC mandates and SIM registration reforms.

  4. Supply chain compromise is hitting one in three Southeast Asian organisations, and the region's vendor ecosystem is not mature enough to contain it. Threat actor Earth Lamia has been exploiting SQL injection and remote code execution vulnerabilities in exposed servers across Southeast Asia since 2023, with custom tools including PULSEPACK and BypassBoss confirmed active against IT and government sector targets.

1. Threat Landscape

The attack surface is expanding faster than enterprise defences can close it.

APAC absorbed 34% of global cyberattacks in 2024. The threat is concentrated, persistent, and already inside critical networks.

Southeast Asia absorbed more than 135,000 blocked ransomware attacks in 2024, with Indonesia accounting for 57,554 and Vietnam 29,282 according to Kaspersky data. [Vietnam News] These are blocked attempts — the number of successful intrusions is not publicly disclosed, which is itself a finding: the region lacks a mandatory breach notification culture outside Singapore, making the true incident rate unknowable. Singapore is the exception: its Cyber Security Agency confirmed 159 ransomware attacks in 2024, a 21% increase, alongside 6,100 phishing cases, up 49%. [CSA Singapore]

The character of the threat has shifted. State-sponsored actors are no longer probing perimeters — they are resident inside networks. The CL-STA-1020 campaign (late 2024 into 2025) used AWS Lambda for command-and-control communications against Southeast Asian government targets, exfiltrating trade negotiation data through legitimate cloud storage services to avoid detection. [Palo Alto Unit 42] The use of hyperscaler infrastructure as attack plumbing is a direct challenge to network-based detection: if malicious traffic looks identical to legitimate AWS API calls, signature-based tools fail. A separate campaign attributed to a Chinese-backed group breached Thai government institutions, with initial access traced to 2023 — meaning the attacker was resident for over a year before discovery. [Research and Markets]

Active threats confirmed in Southeast Asia: 2024–2025
Named incidents and threat actors, regional scope, 2024–2025
1.
CL-STA-1020 government espionage campaign (2024–2025)
Used AWS Lambda for C2 against SEA governments; exfiltrated trade data via legitimate cloud storage. Confirmed active into Q1 2025. Attribution: state-sponsored actor. Detected by Palo Alto Unit 42.
2.
Amaranth-Dragon / APT-41 linked: CVE-2025-8088 exploitation
WinRAR vulnerability operationalised within days of disclosure, used in espionage campaigns against ASEAN government targets in 2025. Confirms attacker speed-to-exploit is outpacing enterprise patch cycles.
3.
Earth Lamia supply chain campaign (2023–ongoing)
SQL injection and RCE exploitation in exposed web servers across SEA IT and government sectors. Custom tools PULSEPACK and BypassBoss confirmed. Campaign ongoing as of Trend Micro reporting, 2025.
4.
Thai government breach (October 2024)
Chinese-backed actors conducted data exfiltration against Thai government institutions. Initial access gained in 2023 via brute force — attacker resident for 12+ months before confirmed detection.
5.
Vietnam named incidents: PVOIL, VnDirect, Vietnam Post, CMC Corporation
CMC Corporation confirmed Crypto24 ransomware attack April 12, 2025. PVOIL and VnDirect incidents in 2024. Vietnam blocked 156,000 system infections in 2024. No MSSP engagement publicly confirmed.
6.
Singapore: 6,100 phishing cases, 159 ransomware attacks (2024)
49% and 21% year-on-year increases respectively. Infected systems rose from 70,200 in 2023 to 117,300 in 2024 — a 67% increase in compromised endpoints in a single year.

Manufacturing is the most targeted sector across APAC at 40% of incidents, followed by finance and insurance at 16% and transportation at 11%. [IBM X-Force via Research and Markets] For cybersecurity vendors, this concentration matters: a platform strong in financial services but light on OT and industrial protocol coverage is structurally exposed as the threat profile shifts toward operational technology.

2. Regulatory Risk

Five countries, five frameworks, zero harmonisation: regulatory complexity is a structural cost burden.

Vietnam's cybersecurity law took effect January 1, 2026. Malaysia's breach notification went live June 2025. Each country is building independently.

Southeast Asia has no equivalent of the EU's GDPR — a single framework that, however imperfect, allows a vendor to build one compliance architecture and deploy it across a bloc. Instead, a cybersecurity company operating across Malaysia, Singapore, Indonesia, Thailand, and Vietnam faces five distinct legal regimes, each at a different stage of development and each with different data localisation, incident reporting, and licensing requirements. This is not a future risk — it is a present operating cost. Vendors must maintain separate legal counsel, separate data infrastructure, and separate compliance teams in each jurisdiction. [DFDL]

Vietnam's amended Cybersecurity Law, effective January 1, 2026, is the most structurally significant recent development. [DFDL] It establishes a national list of critical information systems, introduces three-tier risk classification with escalating obligations — Level 3 systems require dedicated security teams and mandatory audits — and imposes licensing and import controls on cybersecurity products and services including penetration testing and threat monitoring. Any foreign cybersecurity vendor selling into Vietnam's government or critical infrastructure sector now requires a licence. The compliance timeline is immediate, not phased. Vietnam's Personal Data Protection Law (Law No. 91/2025/QH15) also took effect January 1, 2026, adding a second concurrent compliance obligation. [DLA Piper]

Active and pending cybersecurity and data protection obligations across SEA (2025–2026)
Named legislation, enforcement status, and key obligations by country
Vietnam Amended Cybersecurity Law (Law No. 34/2025) (In Force)

Effective January 1, 2026. Establishes National List of critical information systems with three-tier risk classification. Level 3 systems require dedicated security teams, mandatory audits, and incident response capabilities. Foreign vendors require licences for penetration testing, threat monitoring, and related services.

Effective
January 1, 2026
Regulator
Ministry of Public Security (MPS)
Key obligation
Licensing for foreign cybersecurity service providers
Vietnam Personal Data Protection Law (No. 91/2025/QH15) (In Force)

Effective January 1, 2026. Concurrent with amended Cybersecurity Law. Creates dual compliance obligation for any vendor processing Vietnamese personal data.

Effective
January 1, 2026
Regulator
Ministry of Public Security
Key obligation
Data processing consent, breach notification
Malaysia PDPA Amendment Act 2024 (Phased enforcement)

Cross-border data transfer rules (adequacy model) effective April 1, 2025. Mandatory DPO appointment and breach notification effective June 1, 2025. Data portability rights to follow. No named cybersecurity firm compliance statements publicly available.

Phase 1 effective
April 1, 2025
Phase 2 effective
June 1, 2025
Key obligation
DPO appointment, breach notification within defined timeframes
Indonesia Personal Data Protection Law (UU PDP) (Pending full enforcement)

Imposes data localisation requirements more stringent than regional peers. Enforcement timeline for full provisions not confirmed in available sources. No named firm responses documented.

Status
Transition period ongoing
Key obligation
Data localisation, consent framework
Regulator
Ministry of Communication and Information Technology
Singapore Cybersecurity Act (Amendments) (Under development)

Singapore's framework emphasises organisational accountability for data transfers without pre-approvals. Specific 2025–2026 amendment enforcement dates not confirmed in available sources. CSA Singapore remains the most disclosure-forward regulator in the region.

Status
Amendment details not confirmed
Key strength
Mandatory incident reporting already operational
Regulator
Cyber Security Agency of Singapore (CSA)

Malaysia activated key PDPA amendment provisions in two tranches: cross-border data transfer rules on April 1, 2025, and mandatory Data Protection Officer appointment plus breach notification on June 1, 2025. [ASEAN Briefing] No public statements from named cybersecurity firms confirming their compliance posture have appeared in available sources — this absence itself signals that the sector has not yet developed a culture of compliance transparency comparable to European peers. For investors assessing portfolio companies, the inability to verify compliance status is a due diligence gap that carries direct liability exposure if a breach triggers a regulatory action.

3. Emerging Risk

Deepfake fraud has already crossed from theoretical to operational — AI-powered attacks are next.

Asia-Pacific deepfake fraud cases rose 1,530% between 2022 and 2023. The next escalation is AI versus AI.

Deepfake-enabled identity fraud is not an emerging risk in Southeast Asia — it has already arrived. Asia-Pacific recorded a 1,530% increase in deepfake fraud cases between 2022 and 2023, the second-highest rate globally, concentrated in Indonesia and Vietnam where high mobile penetration and rapid fintech adoption create large attack surfaces. [Oz Forensics] The mechanism is straightforward: generative AI tools can now replicate faces, voices, and document appearances well enough to pass eKYC verification in banking, fintech, and telecoms onboarding flows. Regulators in Indonesia and Vietnam have already responded with stricter biometric mandates and SIM registration reforms — confirming that the threat is considered operational, not theoretical, by the authorities closest to it.

The World Economic Forum's 2026 Global Risks Outlook ranks cyber-enabled fraud and phishing as the top near-term concern for CISOs globally, with AI vulnerabilities ranked second. [WEF] For Southeast Asian markets, this is compounded by the region's position as a target for both criminal and state-sponsored actors: AI-powered attack tooling does not require advanced technical capability to deploy at scale, which means the barrier for financially motivated criminal groups — already active in the region — has dropped materially. Oz Forensics describes the emerging dynamic as 'AI vs AI': fraud platforms will scale attacks industrially, and defenders will need AI-powered detection to respond at equivalent speed.

Emerging threat vectors materialising in Southeast Asia: probability and proximity
Named threat categories, evidence of materialisation, 24-month outlook
Deepfake-enabled identity fraud Materialising now
1,530% increase in APAC deepfake cases 2022–2023. Indonesia and Vietnam primary targets. Biometric eKYC systems in banking and fintech directly vulnerable. Regulators already responding with SIM reforms and stricter verification mandates.
AI-powered attack tooling and phishing at scale Materialising now
WEF 2026 Outlook ranks cyber-enabled fraud and phishing first for CISOs. AI lowers the technical barrier for criminal actors already active in SEA. Oz Forensics identifies industrial-scale fraud escalation as the near-term trajectory.
State-sponsored espionage via cloud infrastructure Active and confirmed
CL-STA-1020 used AWS Lambda for C2 against SEA governments in 2024–2025. Legitimate cloud services used to mask malicious traffic. Signature-based detection tools blind to this vector.
OT and critical infrastructure targeting Emerging — limited SEA data
Manufacturing accounts for 40% of APAC cyberattacks (IBM X-Force). APCERT documents escalating regional activity. OT-specific incident data for SEA is not publicly available at granular level — confidence limited.
Quantum computing cryptographic threat Theoretical — 24-month horizon
No regional CERT or named vendor has published a SEA-specific quantum threat timeline. Theoretical risk to public-key infrastructure is well documented globally but not yet materialising in this market.

OT and critical infrastructure threats are growing but the regional evidence base is thinner. APCERT's 2024 Annual Report documents escalating malicious activities in the region but without granular OT-specific breakdowns. IBM X-Force data shows that manufacturing — the sector most dependent on OT security — accounts for 40% of APAC cyberattacks. [IBM X-Force] Quantum computing implications for cryptographic infrastructure are real but remain theoretical for this market over the 24-month horizon: no regional CERT or named vendor has published a timeline for quantum-relevant threats specific to Southeast Asia.

4. Supply Chain & Operational Risk

One in three Southeast Asian organisations has been compromised through a third-party vendor — and the region's vendor ecosystem is not mature enough to contain it.

Supply chain attacks are now the norm, not the exception. Earth Lamia has been active since 2023 with confirmed custom tools.

Supply chain compromise has become the default attack path for sophisticated actors targeting Southeast Asia. One in three organisations in the region has been affected by a third-party compromise according to available threat intelligence, a figure that reflects the region's rapid digital expansion outpacing its vendor security standards. [Trend Micro] Earth Lamia, tracked by Trend Micro, has been exploiting SQL injection and remote code execution vulnerabilities in web-facing servers across Southeast Asian IT and government targets continuously since 2023, using custom tooling — PULSEPACK and BypassBoss — developed specifically for this environment. The campaign is confirmed ongoing as of 2025 reporting. This is not an opportunistic actor; the sustained custom tool development signals dedicated targeting of the region.

The dependency of cybersecurity vendors themselves on hyperscale cloud providers creates a secondary layer of operational risk. CL-STA-1020's use of AWS Lambda for command-and-control demonstrates that cloud infrastructure is not a safe harbour — attackers are using it as cover. No specific named outages at regional cybersecurity vendors attributable to AWS, Azure, or Google Cloud failures appear in available sources, so this risk remains partially theoretical. What is confirmed is the direction: as more cybersecurity platforms shift their delivery to cloud-native architectures, their own infrastructure becomes a target surface, and a single hyperscaler incident affecting SEA availability would simultaneously impair multiple vendor platforms. No public data exists on how many regional cybersecurity vendors maintain multi-cloud redundancy or operate sovereign infrastructure in-country.

Cross-border data residency constraints add a third operational dimension. Vietnam's Decree 53/2022/ND-CP requires data localisation for specific service categories on Ministry of Public Security request. Indonesia's UU PDP imposes localisation requirements more stringent than regional peers. [Rouse] For a cybersecurity vendor running a regional security operations centre in Singapore and serving clients across five countries, these requirements may mandate either duplicated infrastructure or service segmentation — both of which increase cost and reduce the operational efficiency that justifies regional platform economics.

Supply chain and operational risk exposure: SEA cybersecurity vendors across key vulnerability dimensions
Named risk dimensions, directional assessment, Q2 2026
Vendor maturity Cloud dependency Data residency exposure Patch cycle speed Regulatory compliance
Vietnam market High localisation risk
Indonesia market UU PDP pending enforcement
Singapore market Most mature Best disclosure
Malaysia market PDPA active June 2025
Thailand market Limited data available
5. M&A and Investment Risk

No named cybersecurity deals, valuations, or revenue multiples are publicly available for Southeast Asia — this absence is itself a risk signal.

The absence of public transaction data makes valuation discipline and exit planning opaque for regional cybersecurity investors.

No specific funding rounds, acquirers, deal valuations, or revenue multiples for cybersecurity software companies in Southeast Asia have appeared in available sources for 2025 or 2026. This is not a research failure — it reflects a genuine market characteristic: Southeast Asia's cybersecurity sector is dominated by private companies and subsidiaries of regional conglomerates that do not disclose financials, and by foreign multinationals (CrowdStrike, Palo Alto Networks, Fortinet) whose regional revenue is not broken out in public filings. The practical consequence for investors is that there is no public comparable set from which to benchmark a valuation, assess a revenue multiple, or model an exit.

Globally, technology M&A reached approximately USD 809 billion through Q3 2025, with tech deals accounting for 24% of global M&A volume. [Chambers Technology M&A 2026] Strategic buyers dominate tech exits because they offer faster liquidity than public markets, and the regulatory environment for cybersecurity acquisitions — particularly those involving access to government networks or classified infrastructure — is more complex than in other tech sub-sectors. Southeast Asia's TMT sector showed resilient deal activity through Q3 2025 despite tighter funding conditions, dominated by strategic buyers. [Mondaq] But no cybersecurity-specific transactions were named in available sources, and no evidence of concentration risk among dominant regional players appears in the research.

What is and is not known: SEA cybersecurity investment landscape, 2025–2026
Available data points vs confirmed data gaps, Q2 2026
Global tech M&A volume (Q3 2025 YTD)
USD 809B
Tech = 24% of total global M&A — Chambers 2026
Named SEA cybersecurity deals (2025–2026)
0 confirmed
No public transaction data available in any source reviewed
Revenue multiples for SEA cybersecurity vendors
Not disclosed
All major regional players are private or subsidiaries — no public comps
SEA TMT deal activity (Q1–Q3 2025)
Resilient
Strategic buyers dominant; no cyber-specific transactions named — Mondaq

The concentration risk is real but unquantified: the region's enterprise cybersecurity spend is known to be dominated by global platforms (Palo Alto Networks, Fortinet, Microsoft Defender) whose distribution networks and government relationships create high switching costs. Local players like Ensign InfoSecurity (Singapore) and Securemetric (Malaysia) operate in a market where the largest contracts are contested by global vendors with deeper balance sheets. No market share data by vendor for Southeast Asia is publicly available from a named source — any figure would be an estimate, not a finding.

6. Scenario Planning

Three plausible trajectories for the SEA cybersecurity risk environment over the next 24 months.

The base case is continued escalation — the question is whether coordination or fragmentation defines the policy response.

The base case is that the threat environment continues to deteriorate faster than enterprise defences and regulatory frameworks can respond. The evidence for this trajectory is already in the data: attack volumes are rising, regulatory regimes are fragmenting rather than harmonising, and the adoption of AI-powered attack tooling is lowering the cost of sophisticated intrusions for criminal actors. The signal to watch is whether ASEAN governments move toward any shared incident reporting standard — absent that, the fragmentation risk compounds annually. Vietnam's January 2026 cybersecurity law is the most significant recent variable: its licensing requirements for foreign vendors could either strengthen the local ecosystem or reduce the quality of tools available to Vietnamese enterprises, depending on how the Ministry of Public Security applies them in practice.

Bull, base, and bear scenarios: SEA cybersecurity risk environment (2026–2028)
Probability-weighted scenarios based on current threat and regulatory trajectory
bear
Regulatory fragmentation locks out foreign vendors; major breach triggers regional contagion
25
  • Vietnam MPS applies licensing rules restrictively, blocking 3+ major foreign vendors by Q4 2026
  • Named breach of ASEAN financial infrastructure triggers simultaneous regulatory response in 3+ countries
  • Indonesia moves UU PDP to active enforcement with punitive early actions
base
Threat escalation continues; regulatory compliance costs rise but market growth absorbs them
55
  • AI-powered phishing and deepfake fraud incidents rise 40%+ in 2026 across Indonesia and Vietnam
  • Singapore maintains mandatory reporting as regional benchmark; Malaysia and Thailand follow partially
  • No major ASEAN-wide coordination mechanism emerges by end of 2027
bull
ASEAN regulatory convergence reduces compliance costs; major incidents drive accelerated enterprise spend
20
  • ASEAN member states agree shared incident reporting standard by mid-2027
  • One or more large-scale breach events drive government-mandated enterprise cybersecurity spend increases
  • AI-powered defensive tools reach price points accessible to SME segment across Vietnam and Indonesia
Intelligence Brief

Intelligence Brief

1.
Vietnam's three-tier cybersecurity classification system is a de facto licensing barrier for foreign vendors — not just a compliance requirement. Level 3 system operators must use licensed cybersecurity products and services; foreign vendors without a Ministry of Public Security licence are effectively excluded from Vietnam's most valuable government and critical infrastructure contracts from January 1, 2026 onwards.
2.
CL-STA-1020's use of AWS Lambda for command-and-control has broken the assumption that cloud-native architectures are inherently harder to attack. By routing malicious traffic through legitimate AWS API calls, the actor rendered network-based anomaly detection ineffective — a technique now confirmed in the wild against SEA government targets, per Palo Alto Unit 42's 2025 analysis.
3.
Singapore's infected endpoint count rose 67% in a single year — from 70,200 in 2023 to 117,300 in 2024 — despite having the region's most mature cybersecurity framework. This signals that even the most regulation-forward jurisdiction in SEA cannot contain the threat trajectory through policy alone; the implication for less mature markets is that endpoint compromise rates are almost certainly higher and less monitored.
4.
Earth Lamia has maintained a persistent, custom-tooled campaign across Southeast Asia for over two years without a confirmed disruption. The continued operation of PULSEPACK and BypassBoss against IT and government sector targets since 2023, as documented by Trend Micro in 2025, indicates that regional incident response and threat-hunting capabilities are insufficient to neutralise a determined, persistent actor.
5.
No public cybersecurity M&A transaction data exists for Southeast Asia in 2025–2026, which makes valuation benchmarking impossible for investors. The absence of named deals, revenue multiples, or disclosed valuations for regional players like Ensign InfoSecurity or Securemetric means any investment decision in this market is being made without a comparable transaction set — a due diligence gap with direct pricing risk implications.
6.
Malaysia's mandatory breach notification (effective June 2025) has produced no named public compliance statements from cybersecurity vendors — a transparency gap that creates liability exposure for investors. If a portfolio company was not compliant on June 1, 2025 and has not disclosed its status, the investor is carrying undisclosed regulatory risk; the absence of statements is not evidence of compliance.
7.
Deepfake fraud in APAC rose 1,530% between 2022 and 2023, and ASEAN regulators are already responding with new eKYC and SIM registration mandates — creating a compliance-driven demand surge for identity verification and fraud detection tools. This regulatory response is a near-term revenue catalyst for cybersecurity vendors with biometric and identity fraud detection capabilities, particularly in Indonesia and Vietnam where the mandate pressure is most acute.
Sources & Methodology

Research conducted 14 Apr 2026. All statistics carry inline citation markers.

Tier 2 — Supporting sources
Asia-Pacific IT Security Market Report · Research and Markets · 2025 · Industry research · Threat landscape, market size, APAC attack share
Singapore Cyber Landscape 2024 · Cyber Security Agency of Singapore (CSA) · 2025 · Government agency report · Singapore threat statistics, phishing, ransomware
Global Cybersecurity Outlook 2026 · World Economic Forum · 2026 · Global risk report · Emerging risks, CISO priorities, AI threat framing
APCERT Annual Report 2024 · Asia Pacific Computer Emergency Response Team · 2024 · Regional CERT report · Emerging threats, OT risk framing
Global Legislative Predictions 2025 · IAPP (International Association of Privacy Professionals) · 2025 · Regulatory analysis · Regulatory risk, data protection trends
Technology M&A 2026 Practice Guide · Chambers and Partners · 2026 · Legal practice guide · Global M&A context, technology deal dynamics
Navigating Southeast Asia's Digital Frontier: M&A Trends in the TMT Sector · Mondaq · 2025 · Legal/industry commentary · SEA TMT M&A landscape
Infrastructure Software Coverage Report 2025 · Houlihan Lokey · 2025 · Investment bank sector report · Global tech M&A context
Data Localisation and Transfer Issues in Southeast Asia · Rouse · 2025 · Legal analysis · Cross-border data residency risk, Indonesia and Vietnam
Malaysia Tightens Data Protection from June 2025 · ASEAN Briefing · 2025 · Regulatory update · Malaysia PDPA amendment enforcement timeline
Vietnam's New Cybersecurity Law to Take Effect January 2026 · DFDL · 2025 · Legal analysis · Vietnam regulatory risk, licensing requirements
Vietnam Country Data Protection Profile · DLA Piper · 2025 · Legal reference · Vietnam PDPL, data protection obligations
Tier 3 — Additional sources
Windows Backdoor for Novel C2 Communication (HazyBeacon / CL-STA-1020) · Palo Alto Unit 42 · 2025 · Threat intelligence report · State-sponsored threat, cloud infrastructure C2
Amaranth-Dragon Targeted Cyber Espionage Campaigns Across Southeast Asia · Check Point Research · 2025 · Threat intelligence report · APT-41 linked campaign, CVE-2025-8088 exploitation
Earth Lamia: Supply Chain and Web Application Attacks · Trend Micro · 2025 · Threat intelligence report · Supply chain risk, custom tooling, persistent campaigns
Southeast Asian Businesses Face 400 Ransomware Attacks Daily · Vietnam News (citing Kaspersky) · 2024 · Trade media citing vendor data · Ransomware volume, country-level blocking statistics
Deepfake Identity Fraud in Southeast Asia · Oz Forensics · 2024 · Vendor research · Deepfake fraud statistics, AI fraud escalation
Multi-Site Enterprise Technology Rollout Services: M&A Transactions and Valuations · Jahanian and Associates · 2025 · Boutique advisory commentary · Global tech M&A volume context
Conflicting sources

APAC share of global cyberattacks — IBM X-Force via Research and Markets: 34% in 2024 vs IBM X-Force historical (same source): 31% in 2022, 23% in 2023. The 34% figure for 2024 is used as current; the 2023 figure of 23% appears anomalous relative to trend and may reflect methodology changes. Both figures are from the same source chain — no third-party corroboration available.

Data gaps

No Tier 1 sources (McKinsey, Gartner, Deloitte, BCG, PwC, EY, KPMG) contributed to this report. All cybersecurity market data for Southeast Asia is from Tier 2 or Tier 3 sources. Confidence ratings are capped accordingly — no section rated above MEDIUM-HIGH.

No named funding rounds, deal valuations, revenue multiples, or acquisition targets for cybersecurity companies in Southeast Asia were available for 2025–2026. The investment landscape section is entirely based on confirmed absence of data, supplemented by global M&A context. Confidence: LOW.

No public compliance statements from named cybersecurity vendors or MSSPs regarding Malaysia PDPA, Vietnam Cybersecurity Law, or Indonesia UU PDP requirements were available. Vendor-level regulatory response cannot be assessed.

No granular OT-specific incident data for Southeast Asia was available. The OT threat assessment relies on APAC-level sector statistics (IBM X-Force manufacturing share) rather than confirmed SEA-specific incidents.

Thailand's cybersecurity and data protection regulatory posture (PDPA enforcement actions, named incidents) had minimal data available. Thailand-specific findings are limited throughout this report.

Singapore's Cybersecurity Act amendment details and 2025–2026 enforcement dates were not confirmed in available sources — the section describes the framework direction without confirmed legislative timelines.

This report is produced for informational purposes only. It does not constitute financial, legal, or investment advice. All data is sourced from publicly available information as at the date of research. Renatus Ventures makes no representations as to the completeness or accuracy of third-party data.

Create a free account
Register to download and share this report — it only takes a moment.
Register