QuanHeng “Q” Lim was the Chief of Staff to the CTO at Horangi.
Is Penetration Testing Sufficient For A Security Audit?
Pentesting may be one of the most popular practices in cybersecurity, but is it the same as a vulnerability assessment and is it comprehensive enough for your organization’s security workflow?
Securing Bitcoin (or just about any cryptocurrency)
There are many crypto wallet and storage options available, each with their own pros and cons, so we’ve evaluated each option for you! Here’s what we found.
Cybersecurity in the Medical Industry
SingHealth, Singapore’s largest healthcare group, was subject to a “deliberate, targeted and well-planned cyberattack”.
Pentesting Methodology 101
Penetration testing is an authorized simulation of an attack on a system, network, or application to find potential vulnerabilities that can be exploited. Pentesting can be loosely placed into 3 categories, black, gray or white box testing.
What's new in Cybersecurity - Feb 2018
We take you through what is new in cybersecurity in the month of February
Preventing .hta Attacks on Microsoft Office
A new Zero-day attack on Microsoft Office affecting all current Office versions on all Windows operating systems was detected by Mcafee and FireEye on 7th April. It is the latest in a long list of exploits; from the “Windows Word Intruder” kit that allowed beginners to create their own version of malware, to the phishing-led Cerber
Petya/NotPetya, another ransomware following close on the heels of WannaCry.