Compete in the Ultimate Secure Coding Virtual Tournament & Test Our Your Skills
These are crazy times, so come show off how crazy you are about secure coding! Take some time out of your day on 30th April and join the...
These are crazy times, so come show off how crazy you are about secure coding! Take some time out of your day on 30th April and join the...
The lead of our youth initiative was featured by MCI on how CYS is empowering youth in the field of cybersecurity.
Microsoft has created an ATT&CK-like matrix comprising the major techniques that are relevant to container orchestration security.
Our close community/ecosystem partner — ICE71 — hosted an amazing webcast session with Chris Roberts.
A glimpse of what Div0 monthly meetups are like.
Div0 was featured on Singapore's national news — Channel NewsAsia.
The launched of Div0's youth initiative — Cyber Youth Singapore —was featured on national news.
30 May 2019 — Div0 held our May monthly meetup in partnership with the Lifelong Learning Institute (LLI), SkillsFuture Singapore (SSG)...
The prices of two crypto tokens — BeautyChain and SmartMesh — dramatically crashed this week. One or more attackers exploited bugs in...
I'd like to highlight some things about the KRACK attack. Regarding The Straits Times article "Security Flaw Prompts Fears on Wi-Fi...
11 August 2017 — I participated in an online lucky draw. Instead of winning some prizes, I stumbled upon two vulnerabilities. It turned...
"Who did it?" is a fairly common question to hear as soon as things calm down and there is time to think again. Hasty conclusions would...
Wireless@SG is a nation-wide free WiFi service in Singapore. To get Internet access from a Wireless@SG hotspot, a user has to register...
The early days in the cyberspace used to be rather safe when compared to the increasingly hostile worldwide wild west, where various...
Tim (not his real name) routinely spends some of his free time prowling the web for exotic security tools and exploits. Shortly, he...
Some of the common questions, following up from my previous article, was “How can I efficiently scale my simulated phishing operation...
Really simple things can be hugely influential and famous. Like SQL injection, buffer overflow and other classic types of software...
After a recent simulated phishing exercise, we received a number of questions on how the emails were sent and how my team managed to...
An individual’s lack of awareness and ability to identify social engineering attacks can lead to a security breach or financial loss. ...
Although my Diploma in Infocomm Security Management with the Singapore Polytechnic laid a good foundation to get me started in...