Sign in to view Tae Woong’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Singapore
Sign in to view Tae Woong’s full profile
Tae Woong can introduce you to 10+ people at EY
Join with email
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
470 followers
469 connections
Sign in to view Tae Woong’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Tae Woong
Tae Woong can introduce you to 10+ people at EY
Join with email
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Tae Woong
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Tae Woong’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Activity
470 followers
-
Tae Woong Kang shared thisView my verified achievement from Amazon Web Services (AWS).AWS Certified Cloud Practitioner was issued by Amazon Web Services Training and Certification to Tae Woong Kang.AWS Certified Cloud Practitioner was issued by Amazon Web Services Training and Certification to Tae Woong Kang.
-
Tae Woong Kang shared thisI'm happy to share that I have passed OSWP exam! On to the next one!OffSec Wireless Professional (OSWP) • Tae Woong Kang • Cybersecurity Training Badges from OffSecOffSec Wireless Professional (OSWP) • Tae Woong Kang • Cybersecurity Training Badges from OffSec
-
Tae Woong Kang shared thisFinally! https://lnkd.in/gDGeVnp6
-
-
Tae Woong Kang liked thisTae Woong Kang liked thisAP위성과 함께 맞이한 두번째 봄🌷 1년사이 어색함은 사라지고 서로에 대한 신뢰와 이해 속에서 성장하고 있음을 느끼는 봄입니다 🌸 #APSI#AP위성#2026봄을나누다#안양천#플로깅#ESG
-
Tae Woong Kang liked thisTae Woong Kang liked thisIt was actually quite a fun experience, more fun than expected.
-
Tae Woong Kang liked thisTae Woong Kang liked thisFinally, after 6 years since starting out with the OSCP, I've achieved OSCE3! This journey was anything but easy. I saved OSED for last, knowing that it was my weakest area among the three. Huge thanks to Hui Min Chin for tolerating my endless theory-crafting whenever I got stuck studying the modules haha. Thanks to my homies (yall know who yall are), whom guided and gave me insights on different approaches to the problem. Also since I am making this post, thanks to Gibby for bringing me into Cybersecurity 😁OffSec Certified Expert 3 (OSCE3) • Hazley Samsudin • OffSecOffSec Certified Expert 3 (OSCE3) • Hazley Samsudin • OffSec
-
Tae Woong Kang liked thisTae Woong Kang liked thisThat’s a wrap. 🎄 The quest was conquered. King Malhare is contained. Our keyboards need therapy. Advent of Cyber: complete. Now it’s time to rest… before the next mission drops. Happy Holidays from all of us at TryHackMe 💚
-
Tae Woong Kang liked thisTae Woong Kang liked this2 months ago, right after wrapping up the OffSec SG chapter’s last meetup of 2025 on Offensive Cloud Security: Part 2, I was supposed to finally head home and rest. While traveling, I got an email from Bugcrowd about a finding I had disclosed to NASA - National Aeronautics and Space Administration a few months back. After getting a bunch of duplicates, I honestly didn’t expect anything… but it got accepted, and I received my LOR (Letter of Recommendation) 👀 - which, being real, I only wanted because of the LinkedIn FOMO 😂 iykyk. The whole process was painful, but I learned a lot of new techniques folks use in bug bounty. I’ll probably get back into hunting properly next year. Fast forward, I got a great deal and grabbed WEB‑RTA by CyberWarFare Labs in which i speedrun the entire course, and cleared the exam in a few days. It was all good….. until I started planning for the sale for this year and realized something: i had backlog from last year's purchases 😐CPTS and a voucher on HTB!! So.... no choice. I went for the CPTS by Hack The Box and received an email earlier this week that: I passed! 🎉 (results in literally 2 days). Tbh love the course and exam, chaining exploitations were killing me (my fav part tho but def not reporting them 😭), felt like a real life engagement. Unfortunately, I got another email reminder that one of voucher is expiring in a month 💀. I plan was CAPE - after reading reviews I still am terrified but i'm sure the taste would be sweetest at the end or CWEE - which is white box web app and sure is interesting after looking at the modules. I am not going for any of them "for now". Why? cause I need to finish 100% of course+labs before I can schedule in the exam. With my current schedule, the most realistic one is CWES ._. (almost 90% done), since some of the modules overlap with CPTS and i did some extra modules recently. So hopefully, will be ending this year with existing CPTS or CWES? Lets see... 👀 WEB-RTA: https://lnkd.in/gQuSXrcc #CyberSecurity #BugBounty #EthicalHacking #HackTheBox #OffSec #CloudSecurity #InfoSecCommunity #Pentesting #CTF #HTB #CPTS #CWES #OffensiveSecurity #WebRTA #CyberWarFareLabs #Swarmetics
-
Tae Woong Kang liked thisTae Woong Kang liked thisView my verified achievement from Red Hat.Red Hat Certified Specialist in OpenShift Virtualization was issued by Red Hat to Cheng En Kong.Red Hat Certified Specialist in OpenShift Virtualization was issued by Red Hat to Cheng En Kong.
Experience & Education
-
EY
****** **********
-
********
***** **** ******
-
**** ****
******** ******** ******
-
********* ********** ** ********** *** ****** ******
********** ****** *********** ******* ********** *** ****** ****** ***** * ***** ********* undefined
-
View Tae Woong’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Licenses & Certifications
View Tae Woong’s full profile
-
See who you know in common
-
Get introduced
-
Contact Tae Woong directly
Explore more posts
-
Eurofins Electrical and Electronics (E&E)
2K followers
National cyber marks may soon be required for sensitive contracts Singapore’s monetary authority (MAS) and cyber security agency (CSA) have signalled a regulatory shift that could soon require vendors to obtain national cybersecurity certifications Cyber Essentials or Cyber Trust marks before they can secure licences or participate in government tenders involving access to sensitive systems or data. This proactive stance comes in response to growing concerns about third-party supply chain risks. 📈 Business impact for across cybersecurity ecosystem - Mandatory compliance likely: Certification may become a prerequisite for vendors bidding for public contracts or engaging in regulated sectors such as finance. - Increased assurance standards: Businesses will need to align with the frameworks outlined under the Cyber Essentials (for SMEs) or Cyber Trust (for high-risk operations) marks both now expanded to include cloud, AI, and OT security. - Readiness assessment urged: Organisations handling sensitive data or seeking partnerships with public or regulated entities in Singapore should begin evaluating their current cybersecurity posture against certification requirements. - Competitive advantage: Early adopters may gain a distinct edge in procurement and licensing by signalling stronger cybersecurity governance and trustworthiness. - Government support available: CSA’s co-funded CISO-as-a-service programme supports eligible SMEs working towards cyber essentials compliance. At Eurofins Electrical & Electronics, we provide cybersecurity testing, standards compliance assessments, and technical validation services to help businesses prepare for mandatory certifications. Whether aligning with national frameworks or international benchmarks, our expertise supports secure, future-ready digital operations. 🔗 Get ahead of cybersecurity regulations and build digital trust from the ground up. Explore our cybersecurity and regulatory assessment services: https://lnkd.in/gG9_VnMm #CyberSecurityCertification #SupplyChainSecurity #CyberEssentials #CyberTrust #MAS #CSA #ThirdPartyRisk #DigitalTrust #RegulatoryCompliance #Eurofins #TestingForLife
1
-
Eagl3sec
414 followers
The Cyber Security Agency of Singapore (CSA) issued a high-priority bulletin after identifying a critical zero-authentication vulnerability in SmarterTools’ SmarterMail email server software that could allow attackers to execute arbitrary code on affected mail servers. This security flaw poses a serious threat — potentially compromising email infrastructure, sensitive communications, and broader network environments if left unpatched. Read More... https://lnkd.in/g6ijFs4d
-
Michele Chubirka
Red Hat • 5K followers
Help Wanted: Vietnamese Actors Using Fake Job Posting Campaigns to Deliver Malware and Steal Credentials https://ift.tt/gDq9JIy Google Threat Intelligence Group (GTIG) is tracking a cluster of financially motivated threat actors operating from Vietnam that leverages fake job postings on legitimate platforms to target individuals in the digital advertising and marketing sectors. The actor effectively uses social engineering to deliver malware and phishing kits, ultimately aiming to compromise high-value corporate accounts, in order to hijack digital advertising accounts. GTIG tracks parts of this activity as UNC6229. The activity targets remote digital advertising workers who have contract or part-time positions and may actively look for work while they currently have a job. The attack starts when a target downloads and executes malware or enters credentials into a phishing site. If the target falls victim while logged into a work computer with a personal account, or while using a personal device with access to company ads accounts, threat actors can gain access to those company accounts. Successful compromise of a corporate advertising or social media account allows the threat actor to either sell ads to other actors, or sell the accounts themselves to other actors to monetize, as they see fit. This blog describes the actor's tactics, techniques, and procedures (TTPs). As part of our efforts to combat serious threat actors, GTIG uses the results of our research to improve the safety and security of Google’s products and users. Upon discovery, all identified websites, domains and files are added to the Safe Browsing blocklist in order to protect web users across major browsers. We are committed to sharing our findings with the security community to raise awareness and to disrupt this activity. We hope that improved understanding of tactics and techniques will enhance threat hunting capabilities and lead to stronger user protections across the industry. Introduction GITG identified a persistent and targeted social engineering campaign operated by UNC6229, a financially motivated threat cluster assessed to be operating from Vietnam. This campaign exploits the trust inherent in the job application process by posting fake career opportunities on popular employment platforms, as well as freelance marketplaces and their own job posting websites. Applicants are lured into a multi-stage process that culminates in the delivery of either malware that allows remote access to the system or highly convincing phishing pages designed to harvest corporate credentials. The primary targets appear to be individuals working in digital marketing and advertising. By targeting this demographic, UNC6229 increases its chances of compromising individuals who have legitimate access to high-value corporate advertising and social media accounts. The campaign is notable for its patient, victim-initiated social engineering, abuse of legitimate commercial...
-
Secwiser
137 followers
GenixCMS Faces SQL Injection Threat: Stay Protected Samuel Parlindungan Ulysses, eJPT, eWPT, CEH certified, discusses GenixCMS SQL Injection in this update. Stay informed on cybersecurity threats and mitigation strategies. Read more on Medium for detailed insights into this vulnerability and how to protect your systems effectively. Read more: https://lnkd.in/ghXXKsWu Discover the app: https://lnkd.in/gdNHWUru #ApplicationSecurity #WebSecurity #OWASP #VulnerabilityManagement #CyberSecurity #InfoSec #DataProtection #ThreatMitigation #AI #CloudSecurity #Secwiser
-
Silvia Lam Ihensekhien
Swire Coca-Cola • 5K followers
Tuesday's reading - Cybersecurity Report 2024 by Hong Kong’s Cyber Security and Technology Crime Bureau (CSTCB) — a landmark publication that offers a thorough analysis of the evolving cyber threat landscape both globally and within Hong Kong. As cyber threats grow in scale and sophistication, this report shared the key challenges facing governments, businesses, and individuals in today’s digital age. It explores emerging risks such as AI-powered attacks, supply chain vulnerabilities, and deepfake scams. It also highlighted the critical importance of protecting our digital infrastructure and personal data. Beyond identifying threats, the report emphasizes proactive defense strategies, legislative advancements, and the vital role of collaboration between law enforcement, industry, and the public. It presents actionable insights to help organisations strengthen their cybersecurity posture and cultivate resilience against an ever-changing array of cyber risks. For anyone invested in understanding the future of cybersecurity and building safer digital ecosystems, this report is an essential resource that underscores the collective effort required to safeguard our interconnected world. https://lnkd.in/g-yKHY3P #Cybersecurity #CSTCB #HongKong #DigitalSecurity #CyberThreats #AI #CyberResilience
43
2 Comments -
Pulsedive Threat Intelligence
6K followers
Our Threat Research team recently added 1.4K+ indicators of compromise associated with Oriental Gudgeon. This phishing kit, recently covered by the urlscan.io research team (https://lnkd.in/evj-KuUY), targets Japanese companies with a focus on the financial services industry. Threat Page: https://lnkd.in/eetiNqZA Explore Indicators: https://lnkd.in/eUFy-fdY
8
-
Batam News Asia
365 followers
Singapore is under cyber siege as the state-linked group UNC3886 targets critical infrastructure. Authorities have raised the cyber threat alert level and introduced new regulations requiring CII owners to report advanced threats promptly. These measures mark a decisive move to protect essential services from espionage and sabotage. Read full details in the article. #CyberSecurity #Singapore #UNC3886 #NationalSecurity #CriticalInfrastructure #APT https://lnkd.in/gSvWWv5r
-
Cyber Asia
4K followers
Marina Bay Sands has been fined S$315,000 by PDPC over a data breach two years ago that affected more than 665,000 customers. CNA Personal Data Protection Commission (PDPC) Cyber Security Agency of Singapore (CSA) #cybersecurity #cyberattack #databreach #singapore
19
3 Comments -
PETA PAVAN KUMAR
Quality Thought Infosystems • 2K followers
🚨 Emerging Data-Breach Alert – DOAE Thailand 🚨 I wanted to bring attention to a significant incident: the Department of Agricultural Extension (DOAE), which operates under the Ministry of Agriculture and Cooperatives in Thailand, has reportedly suffered a data breach. A threat actor claims to have accessed and is offering for sale ~5.4 million records, including ID card numbers, full names, nationality, mobile numbers, email addresses, dates of birth, main/minor career details. Why this matters: • The scale of exposed PII (personally identifiable information) means the potential for identity-theft, phishing or targeted social-engineering attacks is amplified. • This is an agricultural-sector government body—not a tech giant—highlighting that no sector is immune. • For organisations working with public/consumer-data, the event underscores the need for robust data-protection strategies and incident-response readiness. Key takeaways for us in cybersecurity / risk / compliance roles: 1. Review how our data-flows are designed: Who holds PII, how it's stored, accessed, encrypted? 2. Ensure monitoring & alerting is configured for unusual access or exfiltration patterns. 3. Test incident-response plans: notification to affected subjects, regulatory obligations, forensic investigation. 4. Raise awareness: even organisations perceived as “lower-risk” (agriculture, government services) must treat data as high-value asset. Questions worth asking your teams / leadership: • Do we have a clear inventory of what personal data we process, where it resides, and who can access it? • Is our supplier- / third-party-risk process up-to-date? (Because breaches often stem via vendors.) • Have we measured the effectiveness of our data-protection controls (encryption at rest/in transit, access logging, MFA, least-privilege)? • Would our communications be ready—both internally and externally—if we discovered we were the next victim? 📌 For those working in email-threat detection, phishing, BEC, SEGs etc.: a breach like this often triggers a ripple effect of phishing campaigns targeting the exposed individuals. Now might be a good time to review email-filtering rules, simulated-phishing exercises, and DMARC/SPF/DKIM posture. If you’d like to discuss how this kind of breach connects into broader cyber-risk strategies—or how to translate it into actionable steps for your org—feel free to reach out. #CyberSecurity #DataBreach #InformationSecurity #RiskManagement #GovernmentIT #Phishing #EmailSecurity
6
-
Orange Cyberdefense
250K followers
🚨 Want to know how a seemingly simple WhatsApp message can lead to a sophisticated intrusion? Our latest investigation uncovers a detailed attack chain linked to Operation DreamJob, involving advanced malware variants like BURNBOOK and MISTPEN, used by North Korean threat actors. This in-depth report reveals their methods and techniques. It’s a must-read for anyone serious about cyber threat intelligence! 🔎 Want to see the full story and learn how to defend against these sophisticated threats? 👉 Read the full blog here: https://ow.ly/V4mr50Xug1l #CERT #ThreatIntelligence #OperationDreamJob #DPRK #Cyberdefense
47
-
Ethan Chia 谢昭恩, CISSP, CCSP, ECIH
Ensign InfoSecurity • 345 followers
When it comes to IT Audit, is Singapore ready to switch from attestation approach to evidence approach? Do we have enough IT auditors with deep tech skills that can read system architecture and ask for the right evidence, and from which system the logs or configurations to pull from? Think this is an area where current auditors who want to future proof their career can dive right into.
3
-
AppSec / DevSecOps Jobs
8K followers
OWASP AppSec Days Singapore Chapter, together with Practical DevSecOps, is bringing a free Mini API Security Hands-On Workshop 🚀 This is a 90-minute online, hands-on session focused purely on real world API security. No slides. No theory heavy talks. Just live demos, whiteboard explanations, and guided exercises in a controlled lab environment. 📅 29 January 2026 ⏰ 8:00 PM SGT onwards 🌐 Online 🔗 Access details will be shared with registered participants What you will learn: ✅ Hands-on API security from both offensive and defensive perspectives ✅ API authentication mechanisms such as HTTP Basic, API Keys, OAuth, and JWT ✅ Enumeration and exploitation techniques using tools like FFUF ✅ Exploiting critical API vulnerabilities including insecure deserialization and path traversal ✅ Defensive techniques using automated scanning tools and controls like rate limiting All exercises are conducted in a browser-based lab environment provided by Practical DevSecOps. It works smoothly on laptops, notebooks, and even iPads, with no additional software required. If you build, test, or secure APIs and want practical skills you can apply immediately, this workshop is for you. 🎟️ Free registration & Spots are limited. 👉 Register here: https://lnkd.in/gdTzAtCa #APISecurity #AppSec #DevSecOps #CyberSecurity #OWASP
3
-
LITMUS
908 followers
Singapore’s malware infections surged 67% in 2024 – hitting 117,300 systems – according to the Cyber Security Agency of Singapore’s Cyber Landscape 2024 report. The cause? A familiar one: failure to patch vulnerable software. Many infections stemmed from older malware strains with fixes that were available but not applied. The report highlights three key trends: 1. Advanced Persistent Threats (APTs): State-sponsored groups are increasingly targeting critical infrastructure in South-east Asia, exploiting network edge devices. 2. AI-driven Botnets & DDoS: Singapore ranked as the third-largest source of DDoS traffic globally, with data centres and cloud hubs misused as launch pads for attacks. 3. Rise of Vishing: Voice phishing scams soared globally in 2024, with attackers impersonating IT support to steal credentials. Singapore’s response includes stricter reporting rules under the amended Cybersecurity Act, large-scale drills like Exercise Cyber Star, and international cooperation to disrupt global botnets. Cyber hygiene matters more than ever. Patching known vulnerabilities, training employees to recognise scams, and securing infrastructure are baseline defences in today’s threat landscape. As Commissioner David Koh put it: “We have to redouble our efforts… and continue to work towards a future where everyone can live and work online in a trusted, resilient and vibrant cyberspace.” #CyberSecurity #Singapore #APT #Malware #Vishing #DDoS #AI #CyberResilience #CSA #CyberHygiene
-
Cyber Warriors Middle East
571 followers
Understanding the Critical Vulnerability in SmarterMail: CVE-2025-52691 In recent weeks, the Cyber Security Agency of Singapore (CSA) has raised alarm over a severe security vulnerability impacting SmarterMail, a popular email and collaboration platform. This vulnerability, designated CVE-2025-52691, carries the highest severity rating and exposes systems to significant risks, prompting immediate attention from organizations and system […] https://lnkd.in/d-KzbH93 Cyber Warriors Middle East #CyberWarriorsMiddleEast #CyberWarriorsConclave #CWME #CWC #Cybersecurity #CyberThreats #MitigatingCyberAttacks #MiddleEast #UAE #Dubai
-
Adrian O.
Fydes Consulting Pte Ltd • 9K followers
𝗕𝘂𝗶𝗹𝗱𝗶𝗻𝗴 𝗮 𝗥𝗲𝘀𝗶𝗹𝗶𝗲𝗻𝘁 𝗗𝗶𝗴𝗶𝘁𝗮𝗹 𝗦𝗶𝗻𝗴𝗮𝗽𝗼𝗿𝗲 Yesterday at the GTACS Conference organised by ISACA, we had the privilege of hearing from Mr Ong Kok Wee, Assistant Chief Executive of the Policy and Corporate Development (P&CD) cluster at the Cyber Security Agency (CSA), in his insightful keynote speech on bolstering cyber resilience in Singapore. As Singapore strides towards becoming a digitally trusted economy, with the digital sector contributing nearly 18% to the national economy and 95% digital adoption among firms in 2023, the importance of robust cybersecurity cannot be overstated. Mr Ong highlighted how this rapid digitalisation, especially with widespread cloud usage, introduces complex risks. Common misconfigurations in the cloud, like public storage buckets, are often culprits in data breaches. A significant focus was placed on the expanding digital threat surface due to Artificial Intelligence (AI). Mr Ong outlined critical AI-related risks: • Agentic AI: The elevated security stakes as AI takes on more autonomous roles in critical workflows. • Shadow AI: The unwitting exposure of confidential data through unsanctioned AI tool usage by employees. • Prompt Injection: A novel attack vector that manipulates AI models into revealing sensitive information, with defences still maturing. • AI-driven Cybercrime: The alarming prospect of AI "turbocharging" cybercrime, from automated malware to phishing campaigns, with estimates suggesting 80% of ransomware attacks could be AI-driven. To counter these evolving threats, Mr Ong emphasised matching digital ambition with digital resilience. The CSA's SG CyberSafe programme and national cybersecurity standards are key enablers. Crucially, the CyberEssentials and CyberTrust certification marks will be expanded in April 2025 to cover cloud security, AI security, and operational technology (OT) security, providing vital guidance on secure AI utilisation, including visibility into third-party AI tools. Recognising implementation hurdles, CSA also offers a CISO-as-a-service scheme for SMEs, providing consultants and up to 70% funding to help them achieve the Cyber Essentials mark. Mr Ong's closing message resonated deeply: cybersecurity must continuously evolve. Organisations must proactively align their security measures with their technology adoption to fully reap the benefits of digitalisation without compromising their security posture. A vital call to action for all of us navigating this dynamic digital future. #Cybersecurity #DigitalResilience #AITrends #CyberThreats
25
1 Comment -
Global Game Connect
180 followers
🇸🇬 Marina Bay Sands fined SG$315,000 over major data breach Singapore’s data watchdog has fined Marina Bay Sands (MBS) SG$315,000 after a cyber incident exposed the personal details of over 665,000 patrons. The breach happened during a 2023 system migration, when weak security controls allowed hackers to steal guest data later found on the dark web. Authorities called it a “serious governance failure,” stressing that large companies must take stronger measures to protect customer data and maintain public trust. #GGC2026 #GlobalGameConnect #SriLanka #Huidu #Singapore #DataBreach #MarinaBaySands #CyberSecurity
-
Beyond
506 followers
Singapore's Cyber Security Agency issued an alert this week for a critical vulnerability in IBM API Connect that organizations should be aware of. CVE-2025-13915 has a CVSS score of 9.8 and involves an authentication bypass flaw. In practical terms, this means attackers could potentially gain unauthorized access without needing valid credentials. IBM released patches on January 2nd. If your organization relies on API Connect for managing APIs, this should be prioritized in your patching schedule. Authentication bypass vulnerabilities are particularly concerning because they eliminate one of the most fundamental security controls. The fixes are available, so there's no reason to delay. #CyberSecurity #InfoSec #VulnerabilityManagement #APISecurity
5
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More