Email:

Phone No.

Whatsapp

Blog

Hacker Behind Biggest Cryptocurrency Heist Ever Returns Stolen Funds
Hacker Behind Biggest Cryptocurrency Heist Ever Returns Stolen Funds
Hacker Behind Biggest Cryptocurrency Heist Ever Returns Stolen Funds
Hacker Behind Biggest Cryptocurrency Heist Ever Returns Stolen Funds

Hacker Behind Biggest Cryptocurrency Heist Ever Returns Stolen Funds

Hacker Behind Biggest Cryptocurrency Heist Ever Returns Stolen Funds The threat actor who hacked Poly Network’s cross-chain interoperability protocol yesterday to steal over $600 million worth of cryptocurrency assets is now returning the stolen funds. AAs the Chinese decentralized finance (DeFi) platform Poly Network shared two hours ago, the hacker has already returned almost $260 million

Vulnerability Management For Cybersecurity Dummies

Vulnerability Management For Cybersecurity Dummies Studies show that about 50% of organizations have suffered one or more data breaches in the past year. That’s 1 out of 2 companies. What’s more, the Forrester Global Security Survey reveals that software vulnerabilities were the largest factor to contribute in those breaches. In the landscape of cybersecurity, a

Compliance With Singapore Privacy Obligations; Made Easier!

Compliance With Singapore Privacy Obligations; Made Easier! The Personal Data Protection Act 2012 (PDPA) governs the collection, use, and disclosure of private personal data by organizations in Singapore. Through this legislation, companies are mandated to observe key obligations upon the general directive of the Personal Data Protection Commission (PDPC). With the enactment of new regulations

One million stolen credit cards leaked to promote carding market

One million stolen credit cards leaked to promote carding market  A threat actor is promoting a new criminal carding marketplace by releasing one million credit cards stolen between 2018 and 2019 on hacking forums. Carding is the trafficking and use of stolen credit cards. These credit cards are stolen through point-of-sale malware, magecart attacks on websites, and information

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us