Email:

Phone No.

Whatsapp

Blog

Singapore’s Freelancers Find New Income During The Coronavirus Pandemic
Singapore’s Freelancers Find New Income During The Coronavirus Pandemic
Singapore’s Freelancers Find New Income During The Coronavirus Pandemic
Singapore’s Freelancers Find New Income During The Coronavirus Pandemic

Singapore’s Freelancers Find New Income During The Coronavirus Pandemic

Singapore’s Freelancers Find New Income During The Coronavirus Pandemic As much as an economy is built by big businesses and start-ups, it’s also shaped by independent workers. So when the coronavirus pandemic emerged this year, sending markets into a tailspin and disrupting most aspects of daily life, freelancers were hard hit. The pandemic forced many of them to

Office 365 Phishing Runs Real-Time Check Of Stolen Domain Logins

Office 365 Phishing Runs Real-Time Check Of Stolen Domain Logins Threat researchers investigating phishing attacks encountered a less common technique in spear-phishing aimed at a senior executive at a top American company. The code behind the phishing page made sure that the threat actor got the right credentials for the company Active Directory and performed

New CDRThief Malware Steals VoIP Metadata From Linux Softswitches

New CDRThief Malware Steals VoIP Metadata From Linux Softswitches Malware researchers discovered a new threat that they named CDRThief targeting a specific Voice over IP system to steal call data records (CDR) from telephone exchange equipment. Analysis of the malware revealed that it was specifically created for a particular Linux VoIP platform, namely Linknat VOS2009/3000

BLURtooth Vulnerability Lets Attackers Defeat Bluetooth Encryption

BLURtooth Vulnerability Lets Attackers Defeat Bluetooth Encryption A vulnerability exists in certain implementations of Bluetooth 4.0 through 5.0 which allows an attacker to overwrite or lower the strength of the pairing key, giving them access to authenticated services. The bug was discovered independently by two teams of academic researchers and received the name BLURtooth. It

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us