IT Vulnerabilities in Industries | Cybersecurity | softScheck Singapore
Cybersecurity protects all categories of data, such as sensitive data, intellectual property, government and industry information systems, personally identifiable information (PII), and protected health information from theft and damage. …
CISO Roundtable 2022 (Singapore)
We successfully organized our first CISO Roundtable event, where we gather leaders from various industries to learn and share insight on cyber security. …
How do supply chain attacks happen?
There has been an increase Supply Chain attacks in Asia-Pacific and the rest of the world as cyber threat actors seek to exploit the weakest connections in commercial and digital supply chains. …
What are supply chain attacks?
When the topic of a cyberattack or data breach comes to mind, it is most often that people imagine a direct assault – a bad actor looking for vulnerabilities in the software and systems of your organization to find a way in... …
softScheck’s CEO, Henry H. Tan – Elected as one of the CREST Southeast Asia Council Members
We ring in the new year with exciting news to announce - our CEO, Henry H. Tan, has been appointed to be on the Southeast Asia Council of CREST. …
WordPress Plugin TranslatePress < 2.0.9 - Authenticated Stored Cross-Site Scripting
We discovered a Stored Cross-site Scripting (XSS) vulnerability on the WordPress Plugin, TranslatePress, on 06 August 2021. This WordPress translation plugin assists with the translation of website content from and... …
Singtel’s Zero-Day Cyberattack – Anticipate OR Re-Act to Attacks?
Singapore’s telecom giant, Singtel, has fallen victim to a zero-day cyberattack which stemmed from security bugs in a third-party software – the Accellion legacy file-transfer platform. …
SolarWinds Hack (The Patch is the Attack)
We discovered a critical vulnerability on the corporate web ui of the mail server hosted on premise. …
Access Control Review
Knowing who has access to what information is hugely important when it comes to cybersecurity. Our Access Control Review will confirm your user’s identities, determine which resources they can access, and ensure business owners can track and manage who has permission to view specific data. …