BLOG
News and Information of Security
How to Setup Dsiem, a Defenxor Security Event Correlation Engine
Detecting potential issues before they become real problems is very essential in minimizing business risk of data breach or any other security attacks. Especially in today’s business technology situat...
Read More
Peranan SOC terhadap Peningkatan Keamanan TI Perusahaan
Teknologi informasi (TI) kini memegang peranan besar dalam menunjang kegiatan operasi bisnis di perusahaan. Bahkan, TI sendiri telah menjadi business enabler di mana tanpa adanya TI, suatu bisnis tida...
Read More
This is How Attackers Can Hack Your Account with the ‘Forget Your Password’ Feature
It is true that the ‘forget your password’ feature is very important in today’s digital world, especially for users who manage multiple accounts with different passwords since they tend to forget the...
Read More
Beware of Karl, New Virus Ransomware
Michael Gillespie, the widely known virus researcher recently has found a new malicious software functioning as typical ransomware dubbed Karl. He first found this new name in the DJVU ransomware fami...
Read More
Top Cybersecurity Trends in 2019 and What to Expect in 2020
Norton Security estimates that by 2023 nearly 33 billion records per year will be stolen by cybercriminals. Given the increasing of cybersecurity attacks, organizations are now racing to invest in sec...
Read More
Hacker Strikes LinkedIn DM to Spread Malware
When talking about phishing attacks, most people thinking it is about a malicious link sent by hackers through email or text message that could trick the reader to install the malware causing the reve...
Read More
EvilGnome, A New Backdoor Implant Spies On Linux Desktop Users
According to a research, malware activity increased 61% from December 2018 to January 2019. Spyware as one of malware types that is hard to detect is no exception. Therefore, as most of businesses are...
Read More
This Security Flaw in Vim and Neovim Can Give Attackers Control to Your Systems
For businesses that have adopted a Linux-based operating system (OS), the term ‘Vim’ and ‘Neovim’ is no longer a foreign concept. It is the two most popular command-line text editing applications that...
Read More
Your Apple Devices Can Crash and Restart due to This WebKit Vulnerability
Today, Apple has become one of the most valuable companies in the world. Its products and devices such as iPhone, iPad, and Mac computers are owned by millions of people worldwide. However, being a le...
Read More