Resources
Updates about Protos Labs and helpful guides on cyber security and cyber insurance.
Cyber Insurance Cost Calculator for Singapore Businesses: Estimate Your Premiums Instantly
Learn to use the Protos Labs Cyber Insurance Cost Calculator to get instant, accurate premium estimates.
Read more
Cyber Insurance Market Trends in Singapore: Key Insights and Future Predictions for 2025
Discover the latest trends shaping Singapore's cyber insurance market and learn how to protect your business against evolving cyber threats.
Read more
Cybersecurity Risk Assessment: What It Is and How to Conduct One
Are you leaving your business vulnerable to cyber threats? Discover how a cybersecurity risk assessment can protect your assets, ensure compliance, and give you peace of mind.
Read more
Cyber Insurance in Singapore: Coverage Solutions for Individuals and Businesses
Learn about cyber insurance for individuals and businesses and how it safeguards against cyber threats, data breaches, and online fraud.
Read more
Cyber Risk Liability Insurance in Singapore: A Comprehensive Guide
Discover how Cyber Risk Liability Insurance in Singapore protects you from financial loss, PDPA fines, and reputational damage.
Read more
Cyber Insurance for Singaporean Businesses: A Comprehensive Guide
Discover how cyber insurance protects your business finances, reputation, and compliance.
Read more
Top 10 Cyber Liability Insurance Companies in Singapore for 2025
Compare cyber liability insurance providers, coverage, and costs to protect your business.
Read more
Cyber Liability Insurance Cost for Businesses in Singapore: A Comprehensive Guide
Learn what is cyber liability insurance and how much it costs in Singapore.
Read more
How Much Does Cyber Insurance Cost in Singapore? Factors and Insights
Discover how much cyber insurance costs in Singapore and what factors influence premiums.
Read more
Qualitative vs Quantitative: Methods of Cyber Risk
Is one more effective than the other? In part one of a new CRQ series, we take a closer look at the outcomes of each approach.
Read more
Evolving Malware Attacks: Bing Chat Compromised
Malicious advertisements are now being injected into Microsoft's AI-powered Bing Chat responses, promoting fake download sites that distribute malware.
Read more
Malicious Misconfiguration: AMBERSQUID Cryptojacking
A novel cloud-native cryptojacking operation, codenamed AMBERSQUID, has been targeting uncommon Amazon Web Services (AWS) offerings.
Read more
Exploitation of Vulnerabilities: Malicious Window’s ThemeBleed
A critical security vulnerability, known as CVE-2023-38146 or ThemeBleed is a high-severity security flaw affecting Windows systems.
Read more
The Perils of Phishing Attacks: Advanced W3LL Kit
The threat actor known as W3LL has developed an advanced phishing kit capable of bypassing multi-factor authentication (MFA).
Read more
The Perils of Phishing Attacks: MalDoc in PDF
Japan's computer emergency response team (JPCERT) has discovered an innovative phishing attack technique known as the 'MalDoc in PDF' attack.
Read more
Exploitation of Vulnerabilities: A Cryptocurrency & Trading Nightmare
A recent security incident involving a WinRAR zero-day vulnerability, tracked as CVE-2023-38831, has raised significant concerns.
Read more
Evolving Malware Attacks: Covert Attacks through LOLBAS
The evolving landscape of cyber threats introduces an emerging peril through the expansion of Living-off-the-Land Binaries and Scripts (LOLBAS).
Read more
The Perils of Phishing Attacks: A Case Study on EvilProxy
EvilProxy, a popular phishing-as-a-service platform, is at the forefront of a surge in cloud account takeover incidents over the past five months.
Read more
Protos Labs presents Cyber Risk Solutions at Lloyd’s Lab Demo Day
On 6 Dec 2023, Joel Lee, CEO of Protos Labs presented our cyber risk analytics solution for insurers at the Lloyd's Lab Demo Day,
Read more
Detriments of Ransomware Threats: BlackByte 2.0
Recent investigation into BlackByte 2.0 ransomware reveals a concerning trend of rapid attacks with devastating consequences.
Read more
Evolving Malware Attacks: The DeliveryCheck Backdoor
An analysis of a recent cyber espionage campaign by the Russian state-sponsored Turla hacking group, also known as Secret Blizzard, KRYPTON, and UAC-0003.
Read more
Evolving Malware Attacks: The LokiBot Trojan
An analysis of a recent malware campaign involving Microsoft Word documents exploiting known remote code execution flaws to deliver the LokiBot malware.
Read more
Detriments of Ransomware Threats: The Big Head Deception
An analysis on the Big Head ransomware, a recently emerged strain that spreads through malvertising campaigns promoting fake Windows updates and Microsoft Word installers.
Read more
Detriments of Ransomware Threats: BlackCat’s New Attack Vector
An analysis of the latest ransomware attack, highlighting the infection vector, attack chain, tools an d techniques used by the threat actors.
Read more
Evolving Malware Attacks: The ChromeLoader Shampoo Campaign
An analysis of the latest malware threats, covering the ChromeLoader campaign from March 2023, highlights the distribution method and behaviour of the Shampoo browser extension, emphasising on the persistence and complexity of removing the ChromeLoader Shampoo malware.
Read more
Evolving Malware Attacks: A Microsoft Teams’ Vulnerability
An analysis of the latest malware threats, focusing on a significant malware delivery method observed in Microsoft Teams.
Read more
New Malware Delivery Technique Exploits Microsoft Teams
This article will be covering on the CVE-2023-29336 vulnerability that affects the Win32k subsystem in older versions of Windows - including older Windows 10 versions, Windows Server, and Windows 8.
Read more
The Perils of Phishing Attacks: A Case Study on DocuSign
This article will be covering details on the DocuSign phishing campaigns, which have been observed as a growing trend, exploiting the trust associated with the well-known electric signature service.
Read more
Akira Ransomware Group Poses Growing Threat to Singapore Businesses
The Akira ransomware attack on Shook Lin & Bok highlights the growing threat posed by cybercriminals to businesses of all sizes.
Read more