Pages
- #26429 (no title)
- #25451 (no title)
- #25495 (no title)
- About us
- Affiliate Program
- Awards & Recognition
- Backup as a Service
- Blog
- Blogtest
- Building Human Fireawall: A Deep Dive into Cyber Awareness Strategies
- Business Partner
- Business Partnership Program
- Business Partnership Program
- Career
- Career
- Certification Verification
- Company Profile
- Company Profile
- Compromise Assessment
- Condition Zebra – IT Security Solutions
- Condition Zebra And Ezy Avantus Announce Strategic Training Partnership
- Condition Zebra and MAMPU Join Hands for Strategic Partnership
- Condition Zebra And Qnet Announce New Strategic Partnership
- Condition Zebra Announce New Partnership with Alert Logic
- Condition Zebra Announces Training Partnership with NetCampus
- Condition Zebra Brings New Training Methodology
- Condition Zebra Strategic Partnership with KUDOS LLC
- Condition Zebra Wins Cyber Security Award
- Confirm your Email
- Contact Us
- Course Training Regsitration
- Customized Training
- Customized Training
- Cyber Safety & Awareness: Influencer Meet-Up
- Cyber Security Company
- Cyber Security Course
- Cyber Security Course
- Cyber Security Services
- Cyber Security Services
- Cyber Security Training
- Cyber Security Training
- Cyber Security Training 2021
- Cybersecurity
- Cybersecurity as a Service
- Cybersecurity Awareness Webinar
- Cybersecurity Consulting
- Cybersecurity Training
- Digital Forensics and Incident Response
- Digital Forensics and Incident Response
- Digital Forensics Course
- Digital Forensics Course
- Digital Forensics Services
- Digital Forensics Services
- Download Brochure 2022
- E-learning
- Endpoint Detection and Response
- Endpoint Security
- Extended Detection and Response
- Free eBook
- Free Email Phishing Test – Terms and Conditions
- Free Penetration Testing
- Free Pentest offer
- Free Phishing Security Test
- Free Vulnerability Assessment
- Free Vulnerability Assessment
- Gallery
- Hacking and Security Vulnerability Management
- Hacking and Security Vulnerability Management
- Home
- Home-test
- Information Security Awareness Program
- Information Security Awareness Talk
- Information Security Engineer
- Information Security Policy Review
- Inquiry form
- Intelligence-led Penetration Testing
- IoT / Embedded Device Hacking
- ISC / SCADA Security and Penetration Testing
- IT Security Awareness Program
- IT Security Services
- IT Security Solutions
- IT Security Training Free Consultation
- IT Security Training Giveaway
- IT Security Training Giveaway
- Kaspersky Partner Event
- KnowBe4 Partner Event
- Managed Detection & Response
- Managed Detection and Response
- Managed Detection and Response
- MDR
- MDR Consultation
- MDR for Microsoft 365 Defender
- MDR Free Trial
- MDR Free Trial – Terms and Condition
- MDR Webinar
- Microsoft Security Solutions
- Mobile Application Hacking & Security
- Mobile Application Hacking and Security
- MSP webinar
- Network Penetration Testing Services
- Network Penetration Testing Services
- Network Penetration Testing Training
- Network Resilience Risk Assessment
- Network Security & Penetration Testing
- Network Security & Penetration Testing
- Network Security & Penetration Testing
- Network Security Services Company
- Network Security Training
- Network Security Training
- Network Security Training
- Network Training
- Penetration Testing
- Penetration Testing
- Penetration Testing
- Penetration Testing Free Consultation
- Penetration Testing Malaysia
- Penetration Testing Services
- Penetration Testing Webinar
- Penetration Testing Webinar
- Pentest
- Perimeter Security
- Perkhidmatan & Latihan Keselamatan Siber (Cybersecurity)
- Perkhidmatan & Latihan Keselamatan Siber (Cybersecurity)
- Perkhidmatan Keselamatan Siber
- Phishing Attack Simulation
- Press Release
- Privacy Policy
- Privacy Policy
- Referral Program
- Run & Gun: Network Penetration Testing
- Secure SDLC
- Security Awareness Program Demo
- Security Posture Assessment
- Security Posture Assessment
- Services
- SIEM as a Service
- Sitemap
- Social Engineering Awareness: Protecting Against Human-Based Attacks
- Social Engineering Testing
- Software Engineer
- Source Code Review
- System Hardening
- Terms and Conditions
- test
- Testimonials
- Thank You
- Thank You
- Thank You
- Thank You
- Thank You
- Thank You
- Thank you
- Thank you
- Thank You
- Thank you!
- The Combat of Web
- The Combat of Web Application: Hacker vs Developer
- Threat Intelligence
- Training
- Training Registration
- Training Schedule 2023
- Vulnerability Assessment
- Web Application Hacking & Defense
- Web Application Hacking & Defense
- Web Application Hacking and Defense
- Web Application Penetration Testing
- Web Application Penetration Testing
- Web Application Penetration Testing Training
- Web Application Security Training
- Web Pentest
- Web Security
- Web Security Assessment
- Web Security Testing
- Web Security Training
- Webinar Link
- Webinar Link Details
- Website Security Penetration Testing
Posts
Awareness
- 3 Main Types of Hackers
- 52% Cybersecurity Incidents in 2018 Were Caused by Human Error.
- Airline’s Poor Security Lead to A Fine of £500,000
- An email scam costs the company RM464,400
- An expert hacker arrested for data theft
- An insurance agent got scammed for RM283,225.
- Battling Social Engineering Tactics in Malaysia
- Budget 2020 : Cyber Security Sector Needs To Be Further Strengthened
- Cryptocurrency Investment Scam: Victims Lost Millions
- Cyber Fraud: Spotlighting 34,497 Online Scam Cases
- Cybercrime is a Challenge for Financial Institutions
- Cybersecurity Awareness Guide for Employees
- Cybersecurity Firm FireEye becomes Victim of State-sponsored
- Fake Gold Investment Scam: Businesswoman lose RM6.2 million
- How remote working puts organizational cybersecurity infrastructure at risk?
- How To Protect Your Smartphone From Hackers & Intruders
- Identity Threat Protection
- Key Criteria for Selecting an MDR Partner
- Malaysian Police initiative to combat cybercrime
- Malware Awareness: Understanding and Protecting Against Digital Threats
- Online Scams Nightmare for Malaysians
- Protect your device and data from malvertising rogues
- Protect your Facebook Account from Hackers
- Removable Media Security: Protecting Data in a Portable World
- Russian Cybercriminal Groups Target Americans Working at Home
- Safeguarding Your Organization: The Crucial Role of Compliance Training in Cybersecurity
- Scammer exploiting Michelle Yeoh’s identity
- Security Budget Battles Due to COVID-19
- The Different Types Of Cyber Attacks
- The impact of covid on cybersecurity
- The Rise of Cybercrime in Malaysia: What you Need to Avoid
- The surge of FB and IG scams in Malaysia
- Top 10 Creative Scams That Will Trick You
- Top 4 Causes of Data Loss
- What Is End-to-End Encryption?
- What Is The Single Biggest Mistake A Company Can Do That Makes Them Vulnerable To Phishing Attacks?
Guide
- 10 Most Important Cyber Security Tips for Your Employees
- 8 Tips To Defend Your Organization Against Phishing Attacks.
- A Brief Introduction to VPN
- ARTIFICIAL INTELLIGENCE THE FUTURE OF CYBERSECURITY
- Best Data Security Practices in 2021
- Biggest Cybersecurity Challenges And Threats Of 2021
- Cybersecurity Awareness Guide for Employees
- Cybersecurity: 5 Great Ideas for Small Businesses
- Do you always allow ACCESS / PERMISSION when you download and run a new app?
- How remote working puts organizational cybersecurity infrastructure at risk?
- How to protect yourself from password breach?
- INTRODUCTION TO BEST VPNs FOR PC & MOBILE
- Malware Awareness: Understanding and Protecting Against Digital Threats
- MDR Solutions by Industry: Custom Cybersecurity for Targeted Protection
- MDR vs. SIEM: Understanding the Differences in Cybersecurity
- Nanocore Rat Trojan
- Ransomware Attacks in 2022: Malaysia’s Ultimate Guide
- Ransomware Operation Coming Up with Renew Dangerous Tactics: Basic Steps To Securing Your Network
- Security Budget Battles Due to COVID-19
- Tackling Cybersecurity in the New Hybrid Office
- Technological Advancements in Managed Detection and Response (MDR)
- The Basic of How To Make Your Network Secure
- The impact of covid on cybersecurity
- The Rise of Social Engineering Attacks: How to Recognize and Defend Against Them.
- Top 10 Cyber Security Awareness Tips for Employees
Industry Updates
- Cybersecurity Firm FireEye becomes Victim of State-sponsored
- CyberSecurity Recap for 2017 and Predictions for 2018
- Information Technology Security: A Wake-up Call
- IT security budget approval is the toughest job for IT managers?
- Penetration Testing Services To SMI & SME
- SME & SMI are putting more effort on Penetration testing
- The Panama Papers – Human Errors?
Information Security Training
- Condition Zebra’s Network Penetration Testing Training
- Condition Zebra’s Web Application Penetration Testing Training
- CyberSecurity Recap for 2017 and Predictions for 2018
- Information Security Training Institutions: Your Organization’s Needed Partners
- IT security budget approval is the toughest job for IT managers?
IoT – Internet of Things
Network Security
News
- ‘Agent Smith’ Android Malware Infected 25M Devices
- ‘Trojan Spymax’ syndicate members arrested
- 2,700 individuals rescued: Tricked by Cybercrime syndicates in the Philippines.
- 3 Million Italian Customers’ Records Exposed In Data Leak Incident In Unicredit Bank.
- 60% Of Small Companies Out Of Business Within Six Months Of Being Victimised By Cyberattacks, On Average Cost Them $200,000 of Losses.
- 69% of Employees Lack Annual Cyber Security Trainings
- A rise in Malaysian data thefts cases
- AirAsia Ransomware incident explained
- An expert hacker arrested for data theft
- An insurance agent got scammed for RM283,225.
- ANNOUNCEMENT: Condition Zebra accredited by CREST for Penetration Testing services
- Beware of new methods of phone chat application hacking
- Chinese Hackers Deploy New Attack Scheme to Gaming Industry, Now Caught By FBI
- CIMB’s Systems Allegedly Hit By Ransomware?
- Condition Zebra Announce New Partnership with KnowBe4
- Cyber Attack on Indian’s Largest Nuclear Power Plant Confirmed
- Data in Jeopardy for Tesco Clubcard Members
- Digital Forensics in Cyber Security
- FBI Offers $5 Millions For Russian Hackers
- FBI Reminds Users of Mobile Scams During Lockdown
- Google Has Found Out That iPhones Have Been Hacked For Years Through Malicious Websites.
- Hackers Claim ‘Any’ Smartphone Fingerprint Lock Can Be Broken In 20 Minutes
- Hackers compromising on companies’ digital payment system
- Hackers stole NFTs worth millions
- How A GIF Image Can Be Used To Hack Your Android Phone Using WhatsApp?
- Introduction to Cyber espionage prevailing through the latest SolarsWind hack
- Investment scam syndicate crippled by police.
- Malaysian Immigration Scale-Up Security Measures After Recent Hacking
- Malaysians Credit Card Details Exposed in the Deep, Dark Web
- Malicious Chrome Extensions Garnered 33 Million Downloads
- Man loses RM13,640 in online job scams
- Monster.Com Job Applicants Info Exposed On Unprotected Server
- On Average Of $1.3 Million Were Spent By Financial Companies To Restore Services After Each DNS Attack.
- Retiree lost more than RM200k in love scam.
- Security Researchers Who Can Find Android Apps & Chrome Extensions Misusing User Data Will Be Paid By Google.
- SILENT HACKERS target banks across 30 Countries.
- University Malaya Massive Data Breach
Penetration Testing
- Critical security challenges and concerns facing IoT
- CyberSecurity Recap for 2017 and Predictions for 2018
- Impact of cybersecurity on a company
- IT security budget approval is the toughest job for IT managers?
- Learn The Top Five Tips To Prevent Cyber Threats
- Network Security Threat: How Your Company Should Deal with It
- Penetration Testing Services To SMI & SME
- SME & SMI are putting more effort on Penetration testing
Press Release
Uncategorized
- 2020 Is The Year For Cybersecurity
- 3 Tips to Avoid E-Mail Spoofing
- 5 Ways to Spot a Phishing Email
- Beware Android Users! Joker Malware Commits Ad Fraud & Data Theft
- Beware of Online Sextortion scam
- Cybersecurity Awareness Training: Securing The Human Elements
- Cybersecurity skills shortage in today’s workforce
- Data Scrapping Used to Obtain Millions of WhatsApp Numbers
- Hackers Exploit COVID-19 Fright With Fake Tracking Map
- Hackers use fake websites to hide malware
- Hacktivism: A Threat to Cybersecurity
- How not to be the victim of cyber fraud?
- Indian Airline Ransomware Attack
- Malaysian singer’s Youtube channel hacked
- Malaysians, Beware of these new ways hackers are stealing your banking data
- Overview of Social Engineering
- Part 1: How to protect your Instagram account?
- Part 2: How to protect your Instagram account?
- Physical security in the realm of cybersecurity
- Safeguarding Your Organization: The Crucial Role of Compliance Training in Cybersecurity
- Singapore OCBC Bank SMS Phishing Incident