Cyber security for sme, Vulnerability assessment in Singapore, Penetration testing in Singapore, Source code review in Singapore, Singapore cyber security compary, Mobile pennetration test in Singapore, Pentest Singapore, Cybersecurity Company Singapore, Pentest company Singapore, Penetration testing company Singapore, Pentest service Singapore, Penetration testing service Singapore, Mobile pentest Singapore, Website pentest Singapore, Web app pentest Singapore, Cyber Security Agency of Singapore, Singapore Cyber Security Services, Managed Security Services Provider, IT Security Provider Singapore, Ethical Hacking Singapore

Our Services

MK Cybersecurity enables you to have a complete insight of your information system vulnerabilities through our Vulnerability Assessment, Penetration Testing and Security Code Review services. After a complete security assessment, you could make a right decision to secure your information systems and reduce your business risks.

Vulnerability Assessment

Discover vulnerabilities of your networks, operating systems and applications wherever they are (perimeter, internal networks, cloud). Regardless of the infrastructure in use, our experts will assess the security of your systems using both automatic and analytical (manual) methodologies.

Penetration Testing

Evaluation of your networks, operating systems and applications ability to withstand attacks. Our certified ethical hackers, armed with the same techniques as cyber-criminals and raise awareness about vulnerabilities and the effects of exploitation as well as end-user adherence to security policies.

Security Code Review

Examination of your web application's code performed by security specialists to identify security flaws and withstand attacks. Analyzing the code gives the opportunity to find vulnerabilities that would not be found otherwise. This service is complementary with penetration testing.

Latest news

  • Jun, 18

    Nehru port is the first victim in India of Petya cyber attack

    A major malware attack, named Petya, has brought one of the three ports in Jawaharlal Port Trust (JNPT) to a complete standstill. Senior JNPT officials told mid-day, “The Gateway Terminals India (GTI), third container terminal operated by (APM Terminals and the container Corporation of India Ltd) was affected due to the cyber attack, on Tuesday, […]

    Read more
    Jun, 17

    Cyber attack on Mexican opposition party website triggers election nerves

    Vastavam web: The website of a Mexican political opposition party was hit by a cyber attack during Tuesday’s final television debate between presidential candidates ahead of the July 1 vote, after the site had published documents critical of the leading candidate. The National Action Party (PAN) said that its website, targeting front-runner Andres Manuel Lopez […]

    Read more
  • Jun, 16

    Cyber attack: Two Indonesian hospitals, German rail operator affected

    A global cyberattack leveraging hacking tools widely believed by researchers to have been developed by the US National Security Agency hit international shipper FedEx, disrupted Britain’s health system and infected computers in nearly 100 countries on Friday. A window announcing the encryption of data including a requirement to pay appears on an electronic timetable display […]

    Read more
    Jun, 15

    Bridging the Cyber Security Skills Landscape

    A global study has highlighted the UK’s crippling skills shortage, with businesses “put at risk” as employer demand for expertise is treble the supply. The number of cyber security job searches in Britain reached just 31.6% of the number of cyber security jobs posted, giving the UK a skills gap second only to that of […]

    Read more
  • Jun, 14

    Meet the 20-somethings who stopped a worldwide cyberattack

    Two 20-something cyber experts helped bring down the widespread ransomware attack that infiltrated networks at hospitals, banks, and government agencies in multiple countries. A 22-year-old British researcher unintentionally found the so-called “kill switch” that authors of the malicious software left in the code. Later, he teamed up with a 28-year-old engineer in western Michigan to […]

    Read more
    Jun, 13

    Keeping notes during a pentest/security assessment/code review

    Keeping notes is one of the key aspects of penetration testing. In this article I’m going to share some information on how I keep notes during a test. I personally use vim to keep notes. It’s easy and it works for me. The important part is to find a tool that makes you as efficient as […]

    Read more
  • Jun, 12

    UK cyber security: “Could do better” -TEISS® : Cracking Cyber Security

    The UK Government’s Cyber Breaches Survey 2018 has just been released and things aren’t getting any better. This year’s DCMS cyber breaches survey highlights the continued pressure that UK businesses are under from cyber-attacks as well as what they are – or are not – doing to defend themselves. The report, based on a survey […]

    Read more
    Jun, 11

    US, Britain blame Russia for global cyber attack

    A man poses inside a server room at an IT company, June 19, 2017, REUTERS/Athit Perawongmetha/Illustration/Files The United States and Britain on Monday warned of a global cyber attack targeting routers and other networking equipment, blaming Russian government-backed hackers for the campaign on government agencies, businesses and critical infrastructure operators. Washington and London issued a […]

    Read more
  • Jun, 10

    Cisco India Unveils 3 Cyber-Security Initiatives

    At a time when cyber security has become paramount for digital enterprises, Cisco India on Thursday announced three new initiatives to help the country build a transparent and secure digital infrastructure environment. Cisco will open a new Security Operations Centre (SOC) in Pune which will provide services ranging from monitoring and management to comprehensive threat […]

    Read more
    Jun, 9

    HIPAA Network and Application Layer Penetration Testing

    HIPAA Network & Application Layer Penetration Testing Network & Application Layer Penetration Testing Find your weaknesses before THEY do. Recent healthcare breaches are exposing the ugly truth that the network infrastructure at many providers is insecure. What’s the fastest way to identify your gaps and weaknesses? A Network and Application Layer Penetration Test simulates a […]

    Read more