Author: Admin

A malicious peer-to-peer network known as P2PInfect it was found to target misconfigured Redis servers with ransomware and cryptocurrency miners. The development marks the transition of the threat from what appeared to be a dormant botnet with unclear motives to a financially motivated operation. “The latest updates to the cryptominer, ransomware, and rootkit elements demonstrate the malware author’s continued efforts to profit from their illegal access and further spread the network as it continues to spread across the Internet,” Cado Security. said in a report released this week. P2PInfect appeared almost a year ago and has since received updates for…

Read More

A domestically produced KF-21 fighter jet is displayed at the Seoul ADEX 2023 event held at Seoul Air Base in Seongnam, Gyeonggi Province. With Indonesia proposing to pay only one-third of its share for developing the Korean KF-21 fighter jet while requesting a corresponding amount of technology transfer, all eyes are on whether the South Korean government will accept this proposal. Concerns are rising that about 1 trillion won of the government budget might be needed depending on the situation, or that technology may have already been leaked. The Defense Acquisition Program Administration (DAPA) plans…

Read More

TEMPO.CO, Jakarta – Indonesia pushed for the granting of special privileges to Palestine during an Emergency Session of the United Nations General Assembly (UNGA) in New York, United States, on Friday, May 10, 2024.Indonesia was among 77 co-sponsoring countries of a resolution titled “Admission of New Members in the United Nations,” which was also supported by 143 UN member states.”This marks the first time an observer state has been given special rights and privileges approaching those of other UN members,” the Indonesian Ministry of Foreign Affairs said in a statement on Saturday, May 11, 2024.Palestine has been a UN observer state…

Read More

Jakarta: A cyberattack on Indonesia’s national data centre compromised hundreds of government offices and caused long delays at the capital’s main airport, with the hacker demanding an $8 million ransom, officials said Monday.Long queues formed at immigration gates at Jakarta’s Soekarno-Hatta International Airport last week after systems went down in the attack, carried out using software developed by Russian ransomware outfit LockBit, an official from the communications ministry said.The attack “affected 210 institutions at the national and local levels,” senior official Semuel Abrijani Pangerapan told reporters on Monday, adding a dark web hacker had demanded a $8 million ransom.He added…

Read More

Researchers with vpnMentor have uncovered a data breach involving the COVID-19 test and trace app created by the Indonesian government for those traveling into the country. The ‘test and trace app’ — named electronic Health Alert Card or eHAC — was created in 2021 by the Indonesian Ministry of Health. The vpnMentor team, led by Noam Rotem and Ran Locar, said it did not have the proper data privacy protocols and exposed the sensitive data of more than one million people through an open server. The app was built to hold the test results of those traveling into the country to make…

Read More

On Thursday, TeamViewer announced that on June 26, 2024, it discovered an “irregularity” in its internal corporate IT environment. “We immediately activated our response team and procedures, began an investigation with a team of world-renowned cybersecurity experts, and implemented the necessary remedial measures,” the company said in a statement. said in the statement. It also noted that its corporate IT environment is completely cut off from the product environment and that there is no evidence that any customer data was affected by the incident. He did not reveal any details about who may have been behind the intrusion or how…

Read More

Large technology companies or Big Tech often engage in datafication, which they claim on the surface as a responsibility for “social good.” Datafication is carried out for big data processing with the statement that those who possess big data have a privileged position in proposing social solutions, whether through contact tracing, artificial intelligence to manage scarce health resources, or population tracking driven by artificial intelligence (Magalhães and COULDRY 2021). However, the use of big data for “social good” needs to be reconsidered as it can be extracted for economic interests, making Big Tech’s role in exploiting user data not purely…

Read More

JAKARTA (Vietnam News/ANN): Indonesian police will deploy more than 5,000 personnel to ensure security for the 10th World Water Forum (WWF), which will take place from May 18-25 in Bali – the country’s famous tourist island. Police Inspector General and Bali Police Chief Ida Bagus Kade Putra Narendra said on April 21 that Bali police are ready to coordinate with the National Armed Forces (TNI) and other stakeholders to secure the global forum. Security at the WWF will be similar to the G20. The venues will be divided into three rings of security, he said. The security operation will be…

Read More

Late last month, Indonesia’s Ministry of Communication and Information Technology (KOMINFO) announced a sudden July 20 deadline for online actors to register with the ministry or face consequences. This includes social media companies, search engines, messaging services, mobile applications, and nearly any other online service or application. This week, as the deadline approaches, Indonesia is poised to bring about one of the most repressive internet governance regimes in the world. Should Indonesia proceed, it could inspire a cascade of further repressive laws and policies in the region. The registration order from KOMINFO is a step toward implementing Ministerial Regulation 5…

Read More

June 28, 2024Information hallIndustrial Security / Critical Infrastructure Multiple security vulnerabilities have been discovered in Emerson Rosemount gas chromatographs that could be exploited by attackers to obtain sensitive information, cause a denial of service (DoS) condition, and even execute arbitrary commands. The vulnerabilities affect the GC370XA, GC700XA, and GC1500XA and are present in versions 4.1.5 and earlier. According to operational technology (OT) security firm Claroty, the vulnerabilities turn on two command injection flaws and two separate authentication and authorization vulnerabilities that could be used by unauthenticated attackers to perform a wide variety of malicious activities, from authentication bypass to command…

Read More