Author: Admin

With the implementation of Law No. 27 of 2022 on Personal Data Protection (“PDP Law”), both personal data controllers and personal data processors are mandated to provide external notification to personal data subjects, demonstrating organizational transparency in handling personal data. This notification, commonly known as a privacy notice, is typically accessible on the personal data controller’s or personal data processor’s website, mentioned either as a privacy notice or privacy policy. A privacy notice serves as an external document, informing visitors about the utilization of their data and outlining their data privacy rights. Meanwhile, a privacy policy functions as an internal…

Read More

The coming digital age requires businesses to adopt an “enterprise transformation” approach to management. enterprise transformation can create new business value from the possibilities offered by agility and technology. This approach can  enhance the value and competitiveness of businesses in the market. Businesses are also expected to transform through the use of technology. Achieving enterprise transformation requires companies to select from available technologies. They must account for both short-term trends and long-term perspectives. Enhancing internal capacity is the key theme for achieving swift and sustainable enterprise transformation. ABeam Consulting works side-by-side with clients to get the most out of technology…

Read More

July 5, 2024Information hallSupply Chain Attack / Malware The supply chain attack targeting the widely used JavaScript library Polyfill(.)io is larger than previously thought, with new findings from Censys reveals that as of July 2, 2024, more than 380,000 hosts embed a polyfill script that links to a malicious domain. This includes references to “https://cdn.polyfill(.)io” or “https://cdn.polyfill(.)com” in their HTTP responses, the attack surface management firm said. “Approximately 237,700 are in the Hetzner network (AS24940), mainly in Germany,” it said. “It’s no surprise – Hetzner is a popular web host and many website developers use it.” Further analysis of the…

Read More

50-50: British PM Rishi Sunak may be on the ropes these days — his polling numbers are in the gutter, his party is engulfed in a betting scandal, and he even got roasted by Menswear guy. But in his debate against Labour leader Keir Starmer this week, he managed to perform well enough (hammering Starmer for having no real plan for “change”) that straw polls showed a 50-50 tie. Still, with Labour ahead by double digits going into the July 4 election, Sunak’s days are numbered.103: Indonesian authorities arrested 103 foreign nationals suspected of being part of a cybercrime syndicate…

Read More

The notorious hacking group Brain Cipher has released decryption keys for free, allowing victims to recover their encrypted data without paying a ransom. This unexpected move has left cybersecurity experts and affected organizations scrambling to understand the implications. “Is Your System Under Attack? Try Cynet XDR: Automated Detection & Response for Endpoints, Networks, & Users!”- Free Demo A Surprising Move by Brain Cipher Brain Cipher, known for its sophisticated ransomware attacks, has been a major player in the cybercrime world. The group’s decision to release decryption keys for free marks a significant departure from their usual modus operandi. The decryption keys…

Read More

July 5, 2024Information hallSEO poisoning / cyber attack, Malware known as GootLoader continues to be actively used by threat actors looking to deliver additional payloads to compromised nodes. “Updates to the GootLoader payload have resulted in multiple versions of GootLoader, with GootLoader 3 currently in active use,” according to cybersecurity firm Cybereason. said in an analysis published last week. “While some details of GootLoader payloads have changed over time, infection strategies and general functionality remain similar to the malware’s resurgence in 2020.” GootLoader, a malware downloader part of Art Gootkit a banking trojan associated with a threat called Hive0127 (aka…

Read More

Bali and Jakarta, Indonesia – Late last year, Balinese woman Nih Lu Putu Rustini got the shock of her life when she tried to withdraw cash from an ATM to complete a renovation project at her ancestral home. Working as a cleaner during the day and a nanny by night, Rustini had saved 37 million Indonesian rupiahs ($2,340) in an account at Bank Rakyat Indonesia, Indonesia’s largest bank. But the ATM showed a balance of almost zero. When she visited her local BRI branch, a teller informed her that her money was gone. “They said a hacker had stolen my…

Read More

ndonesia faces significant hurdles in becoming a major player in high-tech industries, even among ASEAN member countries. The country lacks a coherent strategy for developing advanced facilities, particularly in semiconductor manufacturing.Today, competition for investments in Southeast Asia is fiercer than ever, driven by global tech firms seeking new manufacturing sites amid the ongoing United States-China tech rivalry. Coordinating Economic Minister Airlangga Hartarto recently accused Singapore and Malaysia of using environmental and social concerns to hinder Indonesia’s industrial ambitions. He observed regulatory issues had diverted investors to Malaysia, prompting Jakarta to refocus its efforts on attracting and retaining investments. Malaysia has…

Read More

JAKARTA — Indonesia is still trying to retrieve data lost in a cyberattack last month that affected 282 agency systems, including those for airport immigration and scholarships, with the damage amplified because much of the data was not backed up.A large-scale outage occurred at a government data center in East Java around June 20 following the cyberattack, which was carried out by ransomware group LockBit. The government refused to pay the $8 million demanded by the group to unlock the data. Source link

Read More

The implementation of Law No. 27 of 2022 on Personal Data Protection, ratified on October 17, 2023 (“PDP Law“), marks a pivotal moment in Indonesia’s regulatory landscape, particularly for enterprises navigating the complexities of big data. This legislation sets forth a comprehensive framework outlining various obligations for companies acting as personal data controllers or processors, including the imperative requirement to appoint a data protection officer (“DPO“). Originating from the European Union’s 2018 General Data Protection Regulation (“GDPR“), the concept of the DPO emerged as a cornerstone for ensuring compliance with data protection standards. The DPO assumes a pivotal role in…

Read More