2020: a year of cyber-infamy 2021: a year to antic...
By L L Seow | Dec 1, 2020 | Features, Newsletter | 0
More than 50,000 driving license details leaked in...
By CybersecAsia editors | Sep 3, 2020 | News, Newsletter | 0
Humans are the weak cybersecurity link. And humans can be the mitigators …
By Luke Tucker, Senior Director, Global Hacker Community, HackerOne | Dec 21, 2020 | Newsletter, Opinions
…if they are ethical and are hackers. At least that is what the bug bounty community thrives on …
Read More2020: a year of cyber-infamy
2021: a year to anticipate
By L L Seow | Dec 1, 2020 | Features, Newsletter
Here is a recap from seven experts, of the current year’s cybersecurity challenges and what we can look forward to next
Read MoreMore than 50,000 driving license details leaked in Australia
By CybersecAsia editors | Sep 3, 2020 | News, Newsletter
Cheap-and-cheerful cloud storage solutions are abundant, but so are the cases of misconfigurations that can lead to hackings or data leaks. On 1 Sep 2020, more than 108,000 scanned images...
Read MoreThe hacker-powered way to maximize security while reducing costs
By Rena Chua, Bug Bounty Advisor, HackerOne | Aug 17, 2020 | Newsletter, Opinions
Vendor consolidation and hacker-powered programs can reduce costs and improve cybersecurity, argues this bug bounty expert. Remember those pre-pandemic days when you thought your security scope was complex? Now, with...
Read MoreKnow the top 3 challenges of adopting hacker-powered security
By John Baker, Solutions Engineering Manager and Bug Bounty Advisor, HackerOne | Jul 21, 2020 | Newsletter, Opinions
A poll of CISOs about trusting bug bounty programs has revealed what makes them uneasy about hacker-powered security. Picture a hacker in a dark...
Read MoreWhat does using Bluetooth-enabled contact tracing mean for us?
By CybersecAsia editors | May 5, 2020 | Mobile Security, Newsletter, Tips
How Bluetooth contact tracing apps work, what it means for privacy, and what you should do about it. As more countries move along to develop contact...
Read More5 tips for an effective AppSec testing strategy
By Chua Bo Si, Technical Program Manager, HackerOne | Mar 27, 2020 | Newsletter, Tips
If software is the front line of your business, you probably have not overlooked any of these effective App Security strategy processes, right? In...
Read MoreAnother bug bounty hacker pockets US$1m
By CybersecAsia editors | Feb 28, 2020 | News, Newsletter
He is the seventh to do so on the HackerOne platform. The ranks of seven-figure-earning hackers on the HackerOne bug bounty platform have risen...
Read MoreMGM hotel guest data leaked on a hacking forum
By CybersecAsia editors | Feb 24, 2020 | News, Newsletter
Could this latest debacle of 10.6m lost personal records have been proactively avoided and better mitigated? Yes, say three experts. It was recently...
Read MoreCyber-security tips by hackers for non-hackers
By CybersecAsia editors | Feb 11, 2020 | Tips
Hackers can look really dumb when they themselves are hacked; so their security practices will be useful for the rest of us! With so much seemingly...
Read MoreStaying agile with hacker-powered security
By Rena Chua, Bug Bounty Advisor, HackerOne | Jan 23, 2020 | Opinions
As the saying goes, if you cannot beat the bad guys, hire them for good! Security teams are challenged by the radical shifts in software...
Read MoreExperts weigh in on Disney Plus’ user accounts hack
By CybersecAsia editors | Nov 22, 2019 | Data Breaches, News
Tis the season to be jolly, but not for Disney customers. Instead of preparing turkey stuffing, they suffered an attack of credential stuffing!...
Read MoreSingapore brokerages broken into – mitigating the risks
By CybersecAsia editors | Nov 15, 2019 | News, Opinions
Experts offer their views on the recent cyber-attacks on Singapore brokerages, and how such DDoS attacks on the DNS could be addressed. Over the...
Read MoreHacking the Singapore government: Q&A with a top hacker
By CybersecAsia editors | Nov 11, 2019 | Features, White, Black & Grey Hat Hackers
Last week, HackerOne announced the results of the second bug bounty challenge with the Ministry of Defence, Singapore (MINDEF). The three-week...
Read MoreSingapore’s Ministry of Defence bolstered security with bug bounty challenge
By CybersecAsia editors | Oct 1, 2019 | News, White, Black & Grey Hat Hackers
HackerOne invites 400 trusted hackers to look for security weaknesses in MINDEF to enhance cybersecurity. HackerOne recently announced that...
Read MoreNational University of Singapore empowers student ethical hackers to bolster cybersecurity
By CybersecAsia editors | Sep 7, 2019 | Cybersecurity Training & Certification, News, White, Black & Grey Hat Hackers
Students benefit from HackerOne’s training and expertise earning bounties while securing the university against security vulnerabilities. HackerOne...
Read MoreHackers report security vulnerability to 77% of customers within 24 hours
By CybersecAsia editors | Sep 2, 2019 | News
Organizations’ security vulnerabilities resolve fast whenever hackers are invited to contribute. HackerOne announced findings from its 2019...
Read MoreSix hackers earned over 1 million dollars each on HackerOne
By CybersecAsia editors | Sep 2, 2019 | News
Bounty awards increased 65% on average as quarter of all vulnerabilities reported were classified as high to critical severity. HackerOne just...
Read More
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
BB HTC
Middle-sidebar-banner
Whitepapers
451 Research Business Analyst Report On Cloud Security Delivery
Learn what to choose between native and third-party when delivering cloud security.Download WhitepaperState of Email Security Report for 2023
Mimecast’s seventh annual State of Email Security report comes as organisations all over the world …Download WhitepaperGartner Report on Choosing the Right Key Management as a Service
Learn how to mitigate your organization’s cloud data security and privacy risks.Download WhitepaperThe Next-Gen CSPM Buyer’s Guide
All you need to know about choosing your next-generation CSPM.Download Whitepaper
Case Studies
Mastercard ramps up fraud protection for e-commerce merchants with Vesta
Tie-up offers Mastercard Payment Gateway Services customers access to Vesta’s Payment Guarantee and Payment Protect …Read moreSome Q1 2023 DDoS trends point to hackers changing tack
They are now quicker to abandon unsuccessful attacks while beefing up campaigns on non-traditional targets, …Read morePharma firm reaps efficiency benefits after outgrowing network attached storage
By upgrading to a cloud-based and integrated data protection-and-cybersecurity platform, BDR Pharmaceuticals was finally exceeding …Read moreNTT Ltd expects to save US$5m annually after successful cloud migration test case
The firm recognizes that strong growth has led to inefficiencies and complexities that need to …Read more