Author: Admin

A cyber attacker compromised Indonesia’s national data centre, disrupting immigration checks at airports, and asked for a US$8 million ($12 million) ransom, the country’s communications minister told Reuters. The attack disrupted several government services, most notably at airports last week, … Hi! You’ve reached one of our premium articles. This is available exclusively to subscribers. It’s free to register, and only takes a few minutes. Once you sign up you’ll have unlimited access to the full catalogue of Australia’s best business IT content, as well as a daily news bulletin delivered straight to your inbox. Register now Already have an…

Read More

July 5, 2024Information hallNetwork Security / Cyber ​​Attack Cybersecurity researchers have discovered a new botnet called Zergeca that is capable of conducting distributed denial of service (DDoS) attacks. Written in Golang, the botnet is named so for a reference to a string named “ootheca” present on the command and control (C2) servers (“ootheca(.)pw” and “ootheca(.)top”). “Functionally, Zergeca is not just a typical DDoS botnet; in addition to supporting six different attack methods, it also has capabilities for proxy, scanning, self-updating, storage, file transfer, reverse shell, and gathering sensitive device information.” — QiAnXin XLab. team said in the report. Zergeca is…

Read More

With the implementation of Law No. 27 of 2022 on Personal Data Protection (“PDP Law”), both personal data controllers and personal data processors are mandated to provide external notification to personal data subjects, demonstrating organizational transparency in handling personal data. This notification, commonly known as a privacy notice, is typically accessible on the personal data controller’s or personal data processor’s website, mentioned either as a privacy notice or privacy policy. A privacy notice serves as an external document, informing visitors about the utilization of their data and outlining their data privacy rights. Meanwhile, a privacy policy functions as an internal…

Read More

With the implementation of Law No. 27 of 2022 on Personal Data Protection (“PDP Law”), both personal data controllers and personal data processors are mandated to provide external notification to personal data subjects, demonstrating organizational transparency in handling personal data. This notification, commonly known as a privacy notice, is typically accessible on the personal data controller’s or personal data processor’s website, mentioned either as a privacy notice or privacy policy. A privacy notice serves as an external document, informing visitors about the utilization of their data and outlining their data privacy rights. Meanwhile, a privacy policy functions as an internal…

Read More

The coming digital age requires businesses to adopt an “enterprise transformation” approach to management. enterprise transformation can create new business value from the possibilities offered by agility and technology. This approach can  enhance the value and competitiveness of businesses in the market. Businesses are also expected to transform through the use of technology. Achieving enterprise transformation requires companies to select from available technologies. They must account for both short-term trends and long-term perspectives. Enhancing internal capacity is the key theme for achieving swift and sustainable enterprise transformation. ABeam Consulting works side-by-side with clients to get the most out of technology…

Read More

July 5, 2024Information hallSupply Chain Attack / Malware The supply chain attack targeting the widely used JavaScript library Polyfill(.)io is larger than previously thought, with new findings from Censys reveals that as of July 2, 2024, more than 380,000 hosts embed a polyfill script that links to a malicious domain. This includes references to “https://cdn.polyfill(.)io” or “https://cdn.polyfill(.)com” in their HTTP responses, the attack surface management firm said. “Approximately 237,700 are in the Hetzner network (AS24940), mainly in Germany,” it said. “It’s no surprise – Hetzner is a popular web host and many website developers use it.” Further analysis of the…

Read More

50-50: British PM Rishi Sunak may be on the ropes these days — his polling numbers are in the gutter, his party is engulfed in a betting scandal, and he even got roasted by Menswear guy. But in his debate against Labour leader Keir Starmer this week, he managed to perform well enough (hammering Starmer for having no real plan for “change”) that straw polls showed a 50-50 tie. Still, with Labour ahead by double digits going into the July 4 election, Sunak’s days are numbered.103: Indonesian authorities arrested 103 foreign nationals suspected of being part of a cybercrime syndicate…

Read More

The notorious hacking group Brain Cipher has released decryption keys for free, allowing victims to recover their encrypted data without paying a ransom. This unexpected move has left cybersecurity experts and affected organizations scrambling to understand the implications. “Is Your System Under Attack? Try Cynet XDR: Automated Detection & Response for Endpoints, Networks, & Users!”- Free Demo A Surprising Move by Brain Cipher Brain Cipher, known for its sophisticated ransomware attacks, has been a major player in the cybercrime world. The group’s decision to release decryption keys for free marks a significant departure from their usual modus operandi. The decryption keys…

Read More

July 5, 2024Information hallSEO poisoning / cyber attack, Malware known as GootLoader continues to be actively used by threat actors looking to deliver additional payloads to compromised nodes. “Updates to the GootLoader payload have resulted in multiple versions of GootLoader, with GootLoader 3 currently in active use,” according to cybersecurity firm Cybereason. said in an analysis published last week. “While some details of GootLoader payloads have changed over time, infection strategies and general functionality remain similar to the malware’s resurgence in 2020.” GootLoader, a malware downloader part of Art Gootkit a banking trojan associated with a threat called Hive0127 (aka…

Read More

Bali and Jakarta, Indonesia – Late last year, Balinese woman Nih Lu Putu Rustini got the shock of her life when she tried to withdraw cash from an ATM to complete a renovation project at her ancestral home. Working as a cleaner during the day and a nanny by night, Rustini had saved 37 million Indonesian rupiahs ($2,340) in an account at Bank Rakyat Indonesia, Indonesia’s largest bank. But the ATM showed a balance of almost zero. When she visited her local BRI branch, a teller informed her that her money was gone. “They said a hacker had stolen my…

Read More