Resources

Filter By:
The Bluetooth Security Issues
In the past, the only way to connect devices was via cables, which can be cumbersome and messy. With ...
The Bluetooth Security Issues
Wireless Security for Home Network
How many times have you “borrowed” the wireless connectivity from your neighbours when ...
Wireless Security for Home Network
5 Safety Tips when Using a Public Computer
Public computers in libraries, Internet cafes and airports can be safe if you follow a few simple ...
5 Safety Tips when Using a Public Computer
Killnet - From Cybercriminals to Cyber-Partisans
As the Russia-Ukraine conflict progressed, hacktivism slowly took centre-stage, with many hacker groups taking sides and providing support for the cyber-conflict. ...
Killnet - From Cybercriminals to Cyber-Partisans
Data breaches
Since 2005, data breaches have been on the rise, with millions of records exposed in each breach. While data breaches are not new, the proliferation of ...
Data breaches
Computer Security – How you can stay on top of it
There used to be a time when the only computer threat you had to worry about was viruses. Today, the ...
Computer Security – How you can stay on top of it
Overview of Legislations on Cybersecurity, Personal Data Protection & Computer Misuse
The Overview of Legislations on Cybersecurity, Personal Data Protection & Computer Misuse e-handbook explains the differences between the Cybersecurity Act, Computer Misuse Act and Personal Data Protection Act.
Overview of Legislations on Cybersecurity, Personal Data Protection & Computer Misuse
Blockchain Technology and the Metaverse
Web3, blockchain technology and the metaverse - these three buzzwords have recently gained intense popularity in 2021, as interest in cryptocurrencies ...
Blockchain Technology and the Metaverse
Guidelines for CII Owners to Enhance Cyber Security for 5G Use Cases
The Guidelines for CII Owners to Enhance Cyber Security for 5G Use Cases suggests measures to help Critical Information Infrastructure Owners (CIIOs) identify threats that can be introduced into systems connected to 5G services.
Guidelines for CII Owners to Enhance Cyber Security for 5G Use Cases
A Closer Look At Wiper Malware
Wiper malware is a relatively new but highly destructive class of malicious software, first observed to have been used in the Middle East in 2012. During ...
A Closer Look At Wiper Malware
Linked By An Unstable Bridge
Notwithstanding the collapse in cryptocurrency values, or ‘crypto crash’ that the world witnessed in May 2022, 2021 was a phenomenal year for digital currencies. ...
Linked By An Unstable Bridge
Dangers and implications of Hacktivism during the Russia-Ukraine Conflict
Two days after Russia’s invasion of Ukraine on 24 February 2022, Ukraine’s Vice Prime Minister and Minister for Digital Transformation, Mykhailo Fedorov, ...
Dangers and implications of Hacktivism during the Russia-Ukraine Conflict
Hacktivism during Military Conflict: The Anonymous Hacker Collective
CyberSense is a monthly bulletin by CSA that spotlights salient cybersecurity topics, trends and technologies, based on curated articles and commentaries. ...
Hacktivism during Military Conflict: The Anonymous Hacker Collective
2021 Key Trends and Takeways
2021 Key Trends and Takeways
The Log4Shell Vulnerability
In early December, a vulnerability in Apache Log4j – an open-source Java package use to support activity-logging in many popular Java applications was ...
The Log4Shell Vulnerability
Zeroing on Zero-Click Attacks Against Mobile Devices
All over the world, people have become dependent on mobile devices for everyday activities, such as banking, communications, e-commerce, and transportation. ...
Zeroing on Zero-Click Attacks Against Mobile Devices
Cybersecurity – Not Just A Technical Issue
Why cybersecurity is more than a technical concern, and how it can become a shared responsibility involving the whole organisation.
Cybersecurity – Not Just A Technical Issue
Disruptive Threats Against Business Operations and Their Impact - Focus on Cyber-Physical Systems
Cyber-physical systems consist of smart networked systems that are made up of embedded sensors, processors, and actuators that sense and interact with ...
Disruptive Threats Against Business Operations and Their Impact - Focus on Cyber-Physical Systems
The Multiplier Effect – Targeting The MSP Supply Chain
Cybersecurity threats targeting supply chains have been around for more than a decade, but recent cyberattacks show just how adept threat actors are.
The Multiplier Effect – Targeting The MSP Supply Chain
Here Comes a New Challenger – Conti Ransomware
Conti ransomware is one of the more common ransomware attacks in Q1 of 2021. The Conti cybercriminal group targeted organisations providing essential services.
Here Comes a New Challenger – Conti Ransomware

Report an Incident

CSA’s core mission is to keep Singapore’s cyberspace safe and secure, to underpin out National Security, power a Digital Economy, and protect our Digital Way of Life.
Report Incident