2020: a year of cyber-infamy 2021: a year to antic...
By L L Seow | Dec 1, 2020 | Features, Newsletter | 0
More than 50,000 driving license details leaked in...
By CybersecAsia editors | Sep 3, 2020 | News, Newsletter | 0
Humans are the weak cybersecurity link. And humans can be the mitigators …
By Luke Tucker, Senior Director, Global Hacker Community, HackerOne | Dec 21, 2020 | Newsletter, Opinions
…if they are ethical and are hackers. At least that is what the bug bounty community thrives on …
Read More2020: a year of cyber-infamy
2021: a year to anticipate
By L L Seow | Dec 1, 2020 | Features, Newsletter
Here is a recap from seven experts, of the current year’s cybersecurity challenges and what we can look forward to next
Read MoreMore than 50,000 driving license details leaked in Australia
By CybersecAsia editors | Sep 3, 2020 | News, Newsletter
Cheap-and-cheerful cloud storage solutions are abundant, but so are the cases of misconfigurations that can lead to hackings or data leaks. On 1 Sep 2020, more than 108,000 scanned images...
Read MoreThe hacker-powered way to maximize security while reducing costs
By Rena Chua, Bug Bounty Advisor, HackerOne | Aug 17, 2020 | Newsletter, Opinions
Vendor consolidation and hacker-powered programs can reduce costs and improve cybersecurity, argues this bug bounty expert. Remember those pre-pandemic days when you thought your security scope was complex? Now, with...
Read MoreKnow the top 3 challenges of adopting hacker-powered security
By John Baker, Solutions Engineering Manager and Bug Bounty Advisor, HackerOne | Jul 21, 2020 | Newsletter, Opinions
A poll of CISOs about trusting bug bounty programs has revealed what makes them uneasy about hacker-powered security. Picture a hacker in a dark...
Read MoreWhat does using Bluetooth-enabled contact tracing mean for us?
By CybersecAsia editors | May 5, 2020 | Mobile Security, Newsletter, Tips
How Bluetooth contact tracing apps work, what it means for privacy, and what you should do about it. As more countries move along to develop contact...
Read More5 tips for an effective AppSec testing strategy
By Chua Bo Si, Technical Program Manager, HackerOne | Mar 27, 2020 | Newsletter, Tips
If software is the front line of your business, you probably have not overlooked any of these effective App Security strategy processes, right? In...
Read MoreAnother bug bounty hacker pockets US$1m
By CybersecAsia editors | Feb 28, 2020 | News, Newsletter
He is the seventh to do so on the HackerOne platform. The ranks of seven-figure-earning hackers on the HackerOne bug bounty platform have risen...
Read MoreMGM hotel guest data leaked on a hacking forum
By CybersecAsia editors | Feb 24, 2020 | News, Newsletter
Could this latest debacle of 10.6m lost personal records have been proactively avoided and better mitigated? Yes, say three experts. It was recently...
Read MoreCyber-security tips by hackers for non-hackers
By CybersecAsia editors | Feb 11, 2020 | Tips
Hackers can look really dumb when they themselves are hacked; so their security practices will be useful for the rest of us! With so much seemingly...
Read MoreStaying agile with hacker-powered security
By Rena Chua, Bug Bounty Advisor, HackerOne | Jan 23, 2020 | Opinions
As the saying goes, if you cannot beat the bad guys, hire them for good! Security teams are challenged by the radical shifts in software...
Read MoreExperts weigh in on Disney Plus’ user accounts hack
By CybersecAsia editors | Nov 22, 2019 | Data Breaches, News
Tis the season to be jolly, but not for Disney customers. Instead of preparing turkey stuffing, they suffered an attack of credential stuffing!...
Read MoreSingapore brokerages broken into – mitigating the risks
By CybersecAsia editors | Nov 15, 2019 | News, Opinions
Experts offer their views on the recent cyber-attacks on Singapore brokerages, and how such DDoS attacks on the DNS could be addressed. Over the...
Read MoreHacking the Singapore government: Q&A with a top hacker
By CybersecAsia editors | Nov 11, 2019 | Features, White, Black & Grey Hat Hackers
Last week, HackerOne announced the results of the second bug bounty challenge with the Ministry of Defence, Singapore (MINDEF). The three-week...
Read MoreSingapore’s Ministry of Defence bolstered security with bug bounty challenge
By CybersecAsia editors | Oct 1, 2019 | News, White, Black & Grey Hat Hackers
HackerOne invites 400 trusted hackers to look for security weaknesses in MINDEF to enhance cybersecurity. HackerOne recently announced that...
Read MoreNational University of Singapore empowers student ethical hackers to bolster cybersecurity
By CybersecAsia editors | Sep 7, 2019 | Cybersecurity Training & Certification, News, White, Black & Grey Hat Hackers
Students benefit from HackerOne’s training and expertise earning bounties while securing the university against security vulnerabilities. HackerOne...
Read MoreHackers report security vulnerability to 77% of customers within 24 hours
By CybersecAsia editors | Sep 2, 2019 | News
Organizations’ security vulnerabilities resolve fast whenever hackers are invited to contribute. HackerOne announced findings from its 2019...
Read MoreSix hackers earned over 1 million dollars each on HackerOne
By CybersecAsia editors | Sep 2, 2019 | News
Bounty awards increased 65% on average as quarter of all vulnerabilities reported were classified as high to critical severity. HackerOne just...
Read More
Voters-draw
Gamification listing
PARTICIPATE NOW |
|
Vote Now -Placment
BB HTC
Top-Sidebar-banner
Whitepapers
eBook: Ransomware Deception Use Cases
Learn how Metallic ® ThreatWiseTM , from Commvault, can provide proactive and advanced data protectionDownload WhitepaperPost-Pandemic APAC Digital Transformation and OT Cyber Security
All you need to know about digital transformation and OT cybersecurity in Asia in the …Download WhitepaperFour Things to Consider to Successfully and Securely Run Critical Applications in the Cloud
Use this checklist to securely and successfully run critical applications in the cloud and maximize …Download WhitepaperCriteria Guide When Choosing An Endpoint Detection and Response (EDR) Solution
Use this checklist to make a more informed decision when choosing an endpoint detection and …Download Whitepaper
Middle-sidebar-banner
Case Studies
Grace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead moreCase Study: Metallic ® ThreatWiseTM Data Protection Use Cases
How Metallic ThreatWise helped customers across industriesRead more