Email:

Phone No.

Whatsapp

Tag: cybersecurity

Tales from Cyberspace: The Fortytwo Data Breach Incident
Tales from Cyberspace: The Fortytwo Data Breach Incident
Tales from Cyberspace: The Fortytwo Data Breach Incident
Tales from Cyberspace: The Fortytwo Data Breach Incident

Tales from Cyberspace: The Fortytwo Data Breach Incident

On December 24, 2021, an online furniture retailer known as Fortytwo reported a security incident to the Personal Data Protection Commission (PDPC). The incident involved malicious code injections on their website, which compromised the email addresses and passwords of 6,241 individuals who had logged into the site. Further, the personal information, including names, credit card

Cybersecurity Threats: How Employee Actions Can Lead to Organizational Data Breaches

Cybersecurity Threats: How Employee Actions Can Lead to Organizational Data Breaches We often hear stories of individuals who fall victim to cyber scams, but have you ever considered how these incidents could impact an organization’s cybersecurity? A recent case in Singapore involving a retiree serves as a cautionary tale of how easily an employee’s actions

The Human Element: How a Simple QR Scan Can Lead to Organizational Cybersecurity Breaches

The Human Element: How a Simple QR Scan Can Lead to Organizational Cybersecurity Breaches In an era where technology advances at an unprecedented pace, cybersecurity threats have evolved just as rapidly. A recent incident in Singapore highlights just how easily these threats can infiltrate unsuspecting victims and, by extension, potentially compromise the cybersecurity defenses of

VA Scans vs. VAPT: Why knowing the difference matters

VA Scans vs. VAPT: Why knowing the difference matters Vulnerability Assessment Scans and Vulnerability Assessment and Penetration Testing (VAPT) are both crucial components of a comprehensive cybersecurity strategy, but they serve different purposes and offer different insights. Understanding the difference between the two is essential for an organization to effectively manage its cybersecurity risks. Vulnerability

× Chat with us