Email:

Phone No.

Whatsapp

Blog

12,000 leaked documents: Cybersecurity challenges in supply chain
12,000 leaked documents: Cybersecurity challenges in supply chain
12,000 leaked documents: Cybersecurity challenges in supply chain
12,000 leaked documents: Cybersecurity challenges in supply chain

12,000 leaked documents: Cybersecurity challenges in supply chain

12,000 leaked documents: Cybersecurity challenges in supply chain In late February 2026, reports claimed that a dark web leak involved 255 Singapore organisations linked to critical information infrastructure (CII) that had been infiltrated. The report described around 12,000 leaked documents tied to a group alleged to have conducted hacking while publicly operating as a cybersecurity

UNC3886 Triggers Singapore’s Largest Telco Defence Effort

UNC3886 Triggers Singapore’s Largest Telco Defence Effort UNC3886 is now the name that frames Singapore’s modern threat reality. When a single advanced persistent threat actor can infiltrate multiple major telecommunications networks, the question is no longer whether a compromise is possible, but whether defenders can detect it early, contain it fast, and prevent it from

4 Telcos, One Wake-Up Call for Telecom Cybersecurity

4 Telcos, One Wake-Up Call for Telecom Cybersecurity Telecommunications infrastructure is often described as the backbone of the digital economy. It supports banking transactions, emergency communications, remote healthcare, public transport systems, and the expanding ecosystem of connected devices. When that backbone is targeted, the consequences extend far beyond a single company or sector. The disclosure

2027: Why NRIC Authentication Is Now a Data Protection Risk

2027: Why NRIC Authentication Is Now a Data Protection Risk Singapore’s data protection regime is entering a decisive phase. With enforcement action against the misuse of NRIC numbers for authentication set to begin on 1 January 2027, organisations are being given a finite window to modernise their authentication practices. This shift is not merely technical.

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us