Email:

Phone No.

Whatsapp

Blog

North Korean Hackers Are Targeting Security Researchers With Malware, 0-Days
North Korean Hackers Are Targeting Security Researchers With Malware, 0-Days
North Korean Hackers Are Targeting Security Researchers With Malware, 0-Days
North Korean Hackers Are Targeting Security Researchers With Malware, 0-Days

North Korean Hackers Are Targeting Security Researchers With Malware, 0-Days

North Korean Hackers Are Targeting Security Researchers With Malware, 0-Days A North Korean government-backed hacking group targets security researchers who focus on vulnerability and exploit development via social networks, disclosed Google tonight. According to a report released tonight by Google’s Threat Analysis Group, a North Korean government-backed hacking group uses social networks to target security

Beware Of This Active UK NHS COVID-19 Vaccination Phishing Attack

Beware Of This Active UK NHS COVID-19 Vaccination Phishing Attack A very active phishing campaign is underway pretending to be from the UK’s National Health Service (NHS), alerting recipients that they are eligible to receive the COVID-19 vaccine. Today, numerous Twitter users began reporting that they received this phishing email, with some being in the

Seven Takeaways From MAS’ Technology Risk Management Guidelines

Seven Takeaways From MAS’ Technology Risk Management Guidelines The amended guidelines represent a firm step towards further strengthening the defences of Singapore’s financial ecosystem, placing the industry in good stead for the post-Covid economic recovery.  On 18 January 2021, the Monetary Authority of Singapore (“MAS”) issued the new Technology Risk Management Guidelines (“2021 Guidelines”), which

Adobe Flash Shutdown Halts Chinese Railroad For Over 16 Hours Before Pirated Copy Restores Ops

Adobe Flash Shutdown Halts Chinese Railroad for Over 16 Hours Before Pirated Copy Restores Ops Supportive of everything from browser games to live streaming, Adobe Flash wasn’t the internet’s favorite multimedia platform without reason. Even in its heyday, though, Flash wasn’t universally loved; it had security holes, could be tough to optimize, and wouldn’t play

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us