Contact Defenxor Team
(+62 21) 2902 3055
Blog Banner

BLOG

Berita dan Informasi Keamanan

Article

Is Zoom Security Measures Enough to Protect You?

As working from home becomes the new norm in today’s COVID-19 pandemic, video conferencing solutions are utilized to foster communication, collaboration, and to stay connected with all business person...

Selengkapnya 
Article

How Hackers Can Exploit the Buffer Overflow Vulnerability

It is the goal of every hacker to gain access and control one’s IT system. This can be achieved by exploiting existing vulnerabilities, such as a buffer overflow. It occurs when an application tries t...

Selengkapnya 
Article

How to Setup Dsiem, a Defenxor Security Event Correlation Engine

Detecting potential issues before they become real problems is very essential in minimizing business risk of data breach or any other security attacks. Especially in today’s business technology situat...

Selengkapnya 
Article

Peranan SOC terhadap Peningkatan Keamanan TI Perusahaan

Teknologi informasi (TI) kini memegang peranan besar dalam menunjang kegiatan operasi bisnis di perusahaan. Bahkan, TI sendiri telah menjadi business enabler di mana tanpa adanya TI, suatu bisnis tida...

Selengkapnya 
Article

This is How Attackers Can Hack Your Account with the ‘Forget Your Password’ Feature

It is true that the ‘forget your password’ feature is very important in today’s digital world, especially for users who manage multiple accounts with different passwords since they tend to forget the...

Selengkapnya 
Article

Beware of Karl, New Virus Ransomware

Michael Gillespie, the widely known virus researcher recently has found a new malicious software functioning as typical ransomware dubbed Karl. He first found this new name in the DJVU ransomware fami...

Selengkapnya 
Article

Top Cybersecurity Trends in 2019 and What to Expect in 2020

Norton Security estimates that by 2023 nearly 33 billion records per year will be stolen by cybercriminals. Given the increasing of cybersecurity attacks, organizations are now racing to invest in sec...

Selengkapnya 
Article

Hacker Strikes LinkedIn DM to Spread Malware

When talking about phishing attacks, most people thinking it is about a malicious link sent by hackers through email or text message that could trick the reader to install the malware causing the reve...

Selengkapnya 
Article

EvilGnome, A New Backdoor Implant Spies On Linux Desktop Users

According to a research, malware activity increased 61% from December 2018 to January 2019. Spyware as one of malware types that is hard to detect is no exception. Therefore, as most of businesses are...

Selengkapnya