top of page
Search


Compete in the Ultimate Secure Coding Virtual Tournament & Test Our Your Skills
These are crazy times, so come show off how crazy you are about secure coding! Take some time out of your day on 30th April and join the...

Div0 Blog Editor
Apr 19, 20201 min read
58 views
0 comments


Empowering Youth In Cybersecurity
The lead of our youth initiative was featured by MCI on how CYS is empowering youth in the field of cybersecurity.

Div0 Blog Editor
Apr 16, 20201 min read
173 views
0 comments


ATT&CK-like Matrix for Kuberrnetes
Microsoft has created an ATT&CK-like matrix comprising the major techniques that are relevant to container orchestration security.

Div0 Blog Editor
Apr 15, 20201 min read
157 views
0 comments


Hacking Sheep, Ships, Space Stations & Everything In Between
Our close community/ecosystem partner — ICE71 — hosted an amazing webcast session with Chris Roberts.

Div0 Blog Editor
Apr 15, 20201 min read
77 views
0 comments


Division Zero (Div0) Meetups Highlights
A glimpse of what Div0 monthly meetups are like.

Div0 Blog Editor
Apr 1, 20201 min read
24 views
0 comments


Cybersecurity Experts Team Up to Raise Awareness & Share Knowledge
Div0 was featured on Singapore's national news — Channel NewsAsia.

Div0 Blog Editor
Feb 9, 20201 min read
37 views
0 comments


Youth Community Movement Launched to Build Talent In Cybersecurity Sector
The launched of Div0's youth initiative — Cyber Youth Singapore —was featured on national news.

Div0 Blog Editor
Dec 19, 20191 min read
20 views
0 comments


Div0 May Meetup — Cybersecurity Community Learning Circle
30 May 2019 — Div0 held our May monthly meetup in partnership with the Lifelong Learning Institute (LLI), SkillsFuture Singapore (SSG)...

Div0 Blog Editor
May 30, 20192 min read
15 views
0 comments


Why You Should Verify the Tokens You Own: A Deep Dive Into 2 Vulnerable ERC20 Contracts
The prices of two crypto tokens — BeautyChain and SmartMesh — dramatically crashed this week. One or more attackers exploited bugs in...

Div0 Blog Editor
Apr 29, 20185 min read
53 views
0 comments


Facts About the WPA/WPA2 Flaw: The KRACK Attack
I'd like to highlight some things about the KRACK attack. Regarding The Straits Times article "Security Flaw Prompts Fears on Wi-Fi...

Div0 Blog Editor
Oct 18, 20172 min read
55 views
0 comments


Not So Lucky Draw
11 August 2017 — I participated in an online lucky draw. Instead of winning some prizes, I stumbled upon two vulnerabilities. It turned...

Div0 Blog Editor
Sep 5, 20174 min read
797 views
0 comments


Malicious Attribution & Fallacy of Methodological Nationalism
"Who did it?" is a fairly common question to hear as soon as things calm down and there is time to think again. Hasty conclusions would...

Div0 Blog Editor
Aug 17, 20173 min read
25 views
0 comments


Sending Spam SMSes via a Free WiFi Service
Wireless@SG is a nation-wide free WiFi service in Singapore. To get Internet access from a Wireless@SG hotspot, a user has to register...

Div0 Blog Editor
Aug 3, 20176 min read
328 views
0 comments


Shields Up! Wild West of the Cyberspace
The early days in the cyberspace used to be rather safe when compared to the increasingly hostile worldwide wild west, where various...

Div0 Blog Editor
May 8, 20175 min read
17 views
0 comments


Responsible Disclosure — The 4 Paths
Tim (not his real name) routinely spends some of his free time prowling the web for exotic security tools and exploits. Shortly, he...

Div0 Blog Editor
Mar 5, 20176 min read
41 views
0 comments


Simulated Phishing Part 2 – Gophish
Some of the common questions, following up from my previous article, was “How can I efficiently scale my simulated phishing operation...

Div0 Blog Editor
Feb 28, 20173 min read
701 views
0 comments


Ever Famous DDoS Attacks
Really simple things can be hugely influential and famous. Like SQL injection, buffer overflow and other classic types of software...

Div0 Blog Editor
Feb 18, 20175 min read
16 views
0 comments


Simulated Phishing
After a recent simulated phishing exercise, we received a number of questions on how the emails were sent and how my team managed to...

Div0 Blog Editor
Dec 8, 20164 min read
254 views
0 comments


Staying Ahead of Phishing Emails
An individual’s lack of awareness and ability to identify social engineering attacks can lead to a security breach or financial loss. ...

Div0 Blog Editor
Nov 27, 20165 min read
41 views
0 comments


Learning Obstacles in the Capture-The-Flag (CTF) Model
Although my Diploma in Infocomm Security Management with the Singapore Polytechnic laid a good foundation to get me started in...

Div0 Blog Editor
Oct 16, 20162 min read
134 views
0 comments
BLOG: Blog2
bottom of page