Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Apple, Musk, Gates, Bezos, and Everyone You’ve Ever Heard of Hacked

Apple, Musk, Gates, Bezos, and Everyone You’ve Ever Heard of Hacked

Apple, Musk, Gates, Bezos, and Everyone You’ve Ever Heard of Hacked
Apple, Musk, Gates, Bezos, and Everyone You’ve Ever Heard of Hacked

Something normal happened on Twitter earlier this afternoon. Someone claiming to be Elon Musk started tweeting an obvious scam to entice his loyal bootlickers to send bitcoin to a random cryptocurrency wallet. This happens all the time, but the strange thing about today was that the tweets were coming from Musk’s verified account. And nearly identical tweets were coming from accounts of people like Bill Gates, Jeff Bezos, Kanye West, Joe Biden, Barack Obama, Warren Buffett, every major crypto-exchange, and I’m quickly losing track of all of ‘em.

This is obviously the result of a Twitter hack the likes of which we’ve never seen before. A spokesperson for the social network told Gizmodo that they are aware of the situation and will issue a statement shortly, which they did right before publication.

The hackers appear to be using a number of different wallets but the address being used on tweets from Musk and Gates has received around $59,000 worth of bitcoin so far.

The sudden flurry of activity seems to be calming down. Apple, for instance, is back to its usual standard of having zero tweets after it tweeted the scam just moments ago. But the list of prominent users who were affected continues to grow and now the fake screenshots are taking over so we’ll probably never sort out all the people who were hit by the attack.

Also read: How to Register Data Protection Officer (DPO) in ACRA Bizfile+

This is an ongoing story and we’ll continue updating this post as we receive more information.

Update 6:45pm ET: Twitter, apparently in an effort to stave off the embarrassing hackfest, has blocked many verified accounts from tweeting, which is probably for the best.

Also read: Policies For Security Procedures Examples

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us