Over five million web-based attacks blocked in Singapore—Kapersky

2026-03-05 05:30

File-less malware does not care how many threats you blocked last year. It runs in memory, leaves nothing on disk, and exits cleanly. Most endpoint stacks in Singapore's public sector are not built to catch it, and the organisations that think they are have usually not tested that assumption against anything realistic. Drive-by downloads persist because browser plugin governance is genuinely hard and nobody has made it a board-level problem yet. Until the conversation shifts from "train users to be careful" to "audit and restrict what runs in the browser across the estate," the vector stays open. When scam case counts fall but total losses climb, that is a targeting upgrade, not a win. Criminals running fewer, more precise operations are harder to detect and harder to prosecute than the ones running volume. The real risk for Singapore's public sector is not the 5.3 million blocked threats. It is the assumption that a strong block rate reflects a strong detection posture, when the two things are not the same measurement at all.