Contact Defenxor Team
(+62 21) 2902 3055
Blog Banner

BLOG

News and Information of Security

Article

How to Setup Dsiem, a Defenxor Security Event Correlation Engine

Detecting potential issues before they become real problems is very essential in minimizing business risk of data breach or any other security attacks. Especially in today’s business technology situat...

Read More 
Article

Peranan SOC terhadap Peningkatan Keamanan TI Perusahaan

Teknologi informasi (TI) kini memegang peranan besar dalam menunjang kegiatan operasi bisnis di perusahaan. Bahkan, TI sendiri telah menjadi business enabler di mana tanpa adanya TI, suatu bisnis tida...

Read More 
Article

This is How Attackers Can Hack Your Account with the ‘Forget Your Password’ Feature

It is true that the ‘forget your password’ feature is very important in today’s digital world, especially for users who manage multiple accounts with different passwords since they tend to forget the...

Read More 
Article

Beware of Karl, New Virus Ransomware

Michael Gillespie, the widely known virus researcher recently has found a new malicious software functioning as typical ransomware dubbed Karl. He first found this new name in the DJVU ransomware fami...

Read More 
Article

Top Cybersecurity Trends in 2019 and What to Expect in 2020

Norton Security estimates that by 2023 nearly 33 billion records per year will be stolen by cybercriminals. Given the increasing of cybersecurity attacks, organizations are now racing to invest in sec...

Read More 
Article

Hacker Strikes LinkedIn DM to Spread Malware

When talking about phishing attacks, most people thinking it is about a malicious link sent by hackers through email or text message that could trick the reader to install the malware causing the reve...

Read More 
Article

EvilGnome, A New Backdoor Implant Spies On Linux Desktop Users

According to a research, malware activity increased 61% from December 2018 to January 2019. Spyware as one of malware types that is hard to detect is no exception. Therefore, as most of businesses are...

Read More 
Article

This Security Flaw in Vim and Neovim Can Give Attackers Control to Your Systems

For businesses that have adopted a Linux-based operating system (OS), the term ‘Vim’ and ‘Neovim’ is no longer a foreign concept. It is the two most popular command-line text editing applications that...

Read More 
Article

Your Apple Devices Can Crash and Restart due to This WebKit Vulnerability

Today, Apple has become one of the most valuable companies in the world. Its products and devices such as iPhone, iPad, and Mac computers are owned by millions of people worldwide. However, being a le...

Read More