BLOG
Berita dan Informasi Keamanan
Is Zoom Security Measures Enough to Protect You?
As working from home becomes the new norm in today’s COVID-19 pandemic, video conferencing solutions are utilized to foster communication, collaboration, and to stay connected with all business person...
Selengkapnya
How Hackers Can Exploit the Buffer Overflow Vulnerability
It is the goal of every hacker to gain access and control one’s IT system. This can be achieved by exploiting existing vulnerabilities, such as a buffer overflow. It occurs when an application tries t...
Selengkapnya
How to Setup Dsiem, a Defenxor Security Event Correlation Engine
Detecting potential issues before they become real problems is very essential in minimizing business risk of data breach or any other security attacks. Especially in today’s business technology situat...
Selengkapnya
Peranan SOC terhadap Peningkatan Keamanan TI Perusahaan
Teknologi informasi (TI) kini memegang peranan besar dalam menunjang kegiatan operasi bisnis di perusahaan. Bahkan, TI sendiri telah menjadi business enabler di mana tanpa adanya TI, suatu bisnis tida...
Selengkapnya
This is How Attackers Can Hack Your Account with the ‘Forget Your Password’ Feature
It is true that the ‘forget your password’ feature is very important in today’s digital world, especially for users who manage multiple accounts with different passwords since they tend to forget the...
Selengkapnya
Beware of Karl, New Virus Ransomware
Michael Gillespie, the widely known virus researcher recently has found a new malicious software functioning as typical ransomware dubbed Karl. He first found this new name in the DJVU ransomware fami...
Selengkapnya
Top Cybersecurity Trends in 2019 and What to Expect in 2020
Norton Security estimates that by 2023 nearly 33 billion records per year will be stolen by cybercriminals. Given the increasing of cybersecurity attacks, organizations are now racing to invest in sec...
Selengkapnya
Hacker Strikes LinkedIn DM to Spread Malware
When talking about phishing attacks, most people thinking it is about a malicious link sent by hackers through email or text message that could trick the reader to install the malware causing the reve...
Selengkapnya
EvilGnome, A New Backdoor Implant Spies On Linux Desktop Users
According to a research, malware activity increased 61% from December 2018 to January 2019. Spyware as one of malware types that is hard to detect is no exception. Therefore, as most of businesses are...
Selengkapnya