Over 90% of systems conducting Compromise Assessment detect hidden malware
According to Mr. Phan Hoang Giap, Deputy CEO and CTO of VSEC, more than 90% of enterprises conducting Compromise Assessment found hidden malware within their environments.
The 2025 Cybersecurity Report & Strategic Trends for 2026 by VSEC also highlights a significant surge in both the frequency and severity of cyberattacks. Total damages caused by cybercrime in 2025 increased by 31% year-over-year, with global damaged reach USD 10.5 trillion by the end of 2025.
In 2026, organizations will be compelled to shift from static defense to a proactive cybersecurity model. This transition enables businesses not only to accurately identify systemic weaknesses, but also to take immediate action, reducing detection, response, and recovery time across the incident.
Hanoi, October 18, 2025 – In the days leading up to the signing ceremony of the United Nations’ Hanoi Convention on Cybercrime, a historic milestone underscoring Vietnam’s strong commitment to global cybersecurity, The Vietnamese Security Network JSC (VSEC) — one of the first and longest-standing cybersecurity enterprises in Vietnam — once again demonstrates its leadership by sponsoring the first-ever Cybersecurity Student Contest Vietnam. 22 Years of Growth…
VSEC warns rising cloud security incidents in Vietnam demand timely assessments to protect businesses before deployment, during operations, and after incidents. According to Vietnamese Security Network (VSEC)’s 2024 Cybersecurity Situation Summary Report, 27% of organizations recorded cloud security incidents in 2024, with over 80% of cloud vulnerabilities exploited due to misconfigurations or lack of monitoring.…
The hacker group MUT-1244 has conducted a year-long campaign, stealing 390,000 WordPress login credentials along with many other sensitive data by using trojanized GitHub repositories to spread malware. These repositories were embedded with malicious code to steal WordPress credentials along with SSH keys and AWS access from victims, including security researchers, red team members, testers,…
This site uses cookies to provide you with a better user experience. For more information, refer to our Privacy & Policy