BDO CyberDigest


By Krishnaprasad Naidu | 28 October 2022

Breaking The Cyber Kill Chain

The Cyber Kill Chain (CKC) developed by Lockheed Martin is a sequence of stages required for an attacker to infiltrate and exfiltrate data from a network successfully. It assists cyber defenders in understanding how adversaries conduct cyber offensive operations in 7 stages...


By Tok Huey Cheit | 28 October 2022

Building Cyber Resilience in Businesses

The inability to adequately respond to and manage cyber-attacks are often costly for organisations, leading to loss of consumer trust, diminished reputation, and economic losses due to theft of intellectual property or fines for the loss of confidential information, to name a...


By Jeffrey Legua | 28 October 2022

The Growth & Dominance of Web 3.0

Web 3.0 or Semantic Web (as named by original creator Tim Berners-Lee) is a type of Internet that is based on blockchain technology and operates on token-based economics. Blockchain is a record-keeping system best known for enabling bitcoin transactions. The idea behind Web 3...


By Gerald Tang | 19 September 2022

Beyond Ransomware, What are Cyber Criminals Looking At? Can I Protect Myself Against These Evolving Cyber Threats?

Ransomware is the de facto threat organisations have faced over the past few years. Threat actors were making easy money by exploiting the high valuation of cryptocurrencies and their victims' lack of adequate preparation. The appreciation in the value of cryptocurrencies...


By Cecil Su | 09 September 2022

The Rising Concern of Data Privacy Around the World

For a long time, organisations large and small have been collecting data from their customers without their complete knowledge and consent. Since the true purpose of such data collection is kept hidden from consumers and tucked deep inside the terms and conditions, many...


By Low Zhan Yuan | 19 April 2022

Understanding the Rising Cyber Warfare Trends in the World

Cyber warfare is usually defined as a cyberattack or series of attacks that targets a country. It has the potential to wreak havoc on government, civilian infrastructure and disrupt critical systems which result in damage to the state and even loss of lives. Cyber warfare...


By Jeffrey Legua | 04 April 2022

Dissecting the Dark Side of the Net

What are your thoughts when you hear the word “Dark Web”? Or if you have heard about it, have you imagined how transactions are being done with the use of computers in this digital age? The Dark Web is known as the core of illegal online activity and its landscape is always...


By Eric Tee | 24 March 2022

Strengthening the Cybersecurity Posture with Adversary Emulation

Adversary emulation is a type of red team engagement that leverages on tactics, techniques, procedures (TTPs) that were used by adversaries to mimic real world intrusion campaigns. Adversary emulators build a scenario to test certain aspects of an adversary’s TTPs. An...


By Tok Huey Cheit | 28 February 2022

Blind Spots for Cybersecurity 2022

Are users able/trained to identify customised phishing/scam/BEC emails and messages? Cyber criminals have been relentless in coming up with new ways to carry out cyberattacks such as phishing, scam, and BEC. One such method is to lure the victim to reach out to the attacker by...


By Low Zhan Yuan | 22 February 2022

Combating Rising Cybersecurity Crimes in Singapore Financial Fraud

Amid the COVID-19 pandemic, cyber crimes have become an increasing cause of concern. It has not been a good start to 2022 for at least 469 people who have fallen prey to phishing scams involving Bank A*, with reported losses totalling at least $8.5 million. While technology...