KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!




0 downtime, real exposure: detecting the data breach you don’t see If your systems are running and customers are not complaining, it is tempting to assume you are safe. Yet many of today’s most damaging breaches are designed to feel like business as usual. Attackers increasingly prefer to log in, move quietly, and leave with
CTM Level 5: the new baseline for supply chain cybersecurity Singapore is raising the bar on cybersecurity in a way that goes beyond the obvious “critical systems” narrative. The latest push is not only about protecting Critical Information Infrastructure (CII) itself, but about hardening the surrounding ecosystem that keeps essential services running, including supporting IT,
12,000 leaked documents: Cybersecurity challenges in supply chain In late February 2026, reports claimed that a dark web leak involved 255 Singapore organisations linked to critical information infrastructure (CII) that had been infiltrated. The report described around 12,000 leaked documents tied to a group alleged to have conducted hacking while publicly operating as a cybersecurity
UNC3886 Triggers Singapore’s Largest Telco Defence Effort UNC3886 is now the name that frames Singapore’s modern threat reality. When a single advanced persistent threat actor can infiltrate multiple major telecommunications networks, the question is no longer whether a compromise is possible, but whether defenders can detect it early, contain it fast, and prevent it from