top of page
Search


Compete in the Ultimate Secure Coding Virtual Tournament & Test Our Your Skills
These are crazy times, so come show off how crazy you are about secure coding! Take some time out of your day on 30th April and join the...

Div0 Blog Editor
Apr 19, 20201 min read


Empowering Youth In Cybersecurity
The lead of our youth initiative was featured by MCI on how CYS is empowering youth in the field of cybersecurity.

Div0 Blog Editor
Apr 16, 20201 min read


ATT&CK-like Matrix for Kuberrnetes
Microsoft has created an ATT&CK-like matrix comprising the major techniques that are relevant to container orchestration security.

Div0 Blog Editor
Apr 15, 20201 min read


Hacking Sheep, Ships, Space Stations & Everything In Between
Our close community/ecosystem partner — ICE71 — hosted an amazing webcast session with Chris Roberts.

Div0 Blog Editor
Apr 15, 20201 min read


Division Zero (Div0) Meetups Highlights
A glimpse of what Div0 monthly meetups are like.

Div0 Blog Editor
Apr 1, 20201 min read


Cybersecurity Experts Team Up to Raise Awareness & Share Knowledge
Div0 was featured on Singapore's national news — Channel NewsAsia.

Div0 Blog Editor
Feb 9, 20201 min read


Youth Community Movement Launched to Build Talent In Cybersecurity Sector
The launched of Div0's youth initiative — Cyber Youth Singapore —was featured on national news.

Div0 Blog Editor
Dec 19, 20191 min read


Div0 May Meetup — Cybersecurity Community Learning Circle
30 May 2019 — Div0 held our May monthly meetup in partnership with the Lifelong Learning Institute (LLI), SkillsFuture Singapore (SSG)...

Div0 Blog Editor
May 30, 20192 min read


Why You Should Verify the Tokens You Own: A Deep Dive Into 2 Vulnerable ERC20 Contracts
The prices of two crypto tokens — BeautyChain and SmartMesh — dramatically crashed this week. One or more attackers exploited bugs in...

Div0 Blog Editor
Apr 29, 20185 min read


Facts About the WPA/WPA2 Flaw: The KRACK Attack
I'd like to highlight some things about the KRACK attack. Regarding The Straits Times article "Security Flaw Prompts Fears on Wi-Fi...

Div0 Blog Editor
Oct 18, 20172 min read


Not So Lucky Draw
11 August 2017 — I participated in an online lucky draw. Instead of winning some prizes, I stumbled upon two vulnerabilities. It turned...

Div0 Blog Editor
Sep 5, 20174 min read


Malicious Attribution & Fallacy of Methodological Nationalism
"Who did it?" is a fairly common question to hear as soon as things calm down and there is time to think again. Hasty conclusions would...

Div0 Blog Editor
Aug 17, 20173 min read


Sending Spam SMSes via a Free WiFi Service
Wireless@SG is a nation-wide free WiFi service in Singapore. To get Internet access from a Wireless@SG hotspot, a user has to register...

Div0 Blog Editor
Aug 3, 20176 min read


Shields Up! Wild West of the Cyberspace
The early days in the cyberspace used to be rather safe when compared to the increasingly hostile worldwide wild west, where various...

Div0 Blog Editor
May 8, 20175 min read


Responsible Disclosure — The 4 Paths
Tim (not his real name) routinely spends some of his free time prowling the web for exotic security tools and exploits. Shortly, he...

Div0 Blog Editor
Mar 5, 20176 min read


Simulated Phishing Part 2 – Gophish
Some of the common questions, following up from my previous article, was “How can I efficiently scale my simulated phishing operation...

Div0 Blog Editor
Feb 28, 20173 min read


Ever Famous DDoS Attacks
Really simple things can be hugely influential and famous. Like SQL injection, buffer overflow and other classic types of software...

Div0 Blog Editor
Feb 18, 20175 min read


Simulated Phishing
After a recent simulated phishing exercise, we received a number of questions on how the emails were sent and how my team managed to...

Div0 Blog Editor
Dec 8, 20164 min read


Staying Ahead of Phishing Emails
An individual’s lack of awareness and ability to identify social engineering attacks can lead to a security breach or financial loss. ...

Div0 Blog Editor
Nov 27, 20165 min read


Learning Obstacles in the Capture-The-Flag (CTF) Model
Although my Diploma in Infocomm Security Management with the Singapore Polytechnic laid a good foundation to get me started in...

Div0 Blog Editor
Oct 16, 20162 min read
BLOG: Blog2
bottom of page
