Skip to main content

Public advisory of scammers impersonating CSA and the SPF

Cyber Security Agency of Singapore
  1. Home
  2. Frequently Asked Questions
  3. SingCERT

SingCERT

FAQs on SingCERT, detailing its role in providing cybersecurity incident response, guidance, and support to individuals and organisations in Singapore.

Last updated 20 January 2025

General

What does SingCERT do?
How do I contact SingCERT?
What is SingCERT?
Does SingCERT work with other law enforcement agencies to track down cyber-attackers?
What information should I provide to SingCERT when my site has had an intrusion?
What is the Vulnerability Disclosure Policy (VDP) about?
What is Responsible Vulnerability Disclosure (RVD)?
What should I do if I think I discovered a vulnerability in a system/product?
I discovered a vulnerability pertaining to a Singapore government-related system. Who should I report it to?
I discovered a vulnerability pertaining to a system/company that is not based in Singapore. What should I do?

For Informers

Does the VDP permit ethical hacking on organisations?
Does the VDP authorise or permit me to take any actions to find vulnerabilities in systems?
Are there actions that I can take to confirm a possible vulnerability?
How do I know if my actions may have breached the Computer Misuse Act (“CMA”)?
Will I get into trouble for breaching any law in the process of discovering or confirming a vulnerability?
Can I stay anonymous in the process of reporting a vulnerability?
Would I obtain a reward for reporting a vulnerability?
If I want to disclose the vulnerability information publicly, do I have to wait 90 days after informing the System Owner(s)?
I would like to have a Common Vulnerabilities and Exposures Identifier (CVE ID) assigned to the vulnerability which I have reported. How do I go about doing that?

For System Owners

What should I do if I receive a vulnerability report?
I received an email from SingCERT about a vulnerability in the system. How do I verify if this email is legitimate?
I suspect that the Informer may have breached the Computer Misuse Act and exploited my systems (e.g. installed virus or malicious software) in discovering the vulnerability. What should I do?