Not So Lucky Draw

11 August 2017 — I participated in an online lucky draw. Instead of winning some prizes, I stumbled upon two vulnerabilities. It turned...

Ever Famous DDoS Attacks

Really simple things can be hugely influential and famous. Like SQL injection, buffer overflow and other classic types of software...

Simulated Phishing

After a recent simulated phishing exercise, we received a number of questions on how the emails were sent and how my team managed to...

Staying Ahead of Phishing Emails

An individual’s lack of awareness and ability to identify social engineering attacks can lead to a security breach or financial loss. ...

N.E.mation! 11 Sharing Session

3 Sep 2016 — Div0 Crew Emil Tan shared insights on cybersecurity in the context of Total Defence to the Top 100 N.E.mation! 11...

CVE-2011-2894

Background According to CVE, Spring Framework has security restrictions as one serialise an object, but does not have any security...

From Russia With Love

In the world of cybersecurity and imposed concept of security, 2 mundane vulnerabilities have been looming around for years. Nobody...