Author: Admin

His ministry confirmed that the attacks had disrupted services at 210 state institutions nationwide – though they declined to name the affected organisations.Ariandi Putra, spokesman for the National Cyber and Crypto Agency, or BSSN, said in a statement on Tuesday that the attack was first detected on June 17 when the agency received a notification about “attempts to shut down Windows Defender” – pre-installed security software that helps identify viruses, spyware, and other malware.Cyberattacks and massive data breaches are all too common in Indonesia, but critics argue that authorities routinely stay tight-lipped about such breaches in a bid to reassure…

Read More

Jakarta (ANTARA) – Law and Human Rights Minister Yasonna H. Laoly discussed bolstering bilateral cooperation between Indonesia and Australia during a meeting with Australia’s Minister for Home Affairs and Minister for Cyber Security Clare O’Neil.At the meeting in Jakarta on Tuesday, Laoly said that the working group meeting on immigration needs, which is regularly held with Australia, is running well.”Currently, Indonesia is accelerating the immigration process at airports through automatic checking. Apart from that, the exchange of information on border checking is also important,” he informed in a statement released by his ministry here on Wednesday.The minister also underscored the…

Read More

Celestia is a classic but modernised phinisi – a traditional Indonesian schooner – that made its maiden voyage in June 2023 and has since brought small charter groups on tours of the Komodo Islands, the Maluku Islands, Raja Ampa and other destinations around the archipelagic nation. Celestia is the result of a pandemic-times family project by Indonesian siblings Jason Tabalujan and Jasmine Chong, who commissioned the construction of the 45-metre vessel, combining old, Unesco-recognised boat-building techniques, new technologies, and modern amenities across its seven staterooms and common areas. It’s aesthetically held together by a clean and elegant interior design tastefully…

Read More

Indonesia has increased security at its airports after a threat was directed at an airport serving the capital Jakarta and recent attacks around the world, the transport ministry said Wednesday. Sniffer dogs are checking cargo and luggage, random checks are being carried out on cars entering airports, and screening of workers will be tightened under the heightened security measures which came into force Tuesday, the ministry said. “The move has been taken after recent terror attacks, and threats in several countries,” ministry spokesman J. A. Barata said in a statement. Barata also said that a Jakarta airport had received a…

Read More

VATICAN CITY — Pope Francis will visit Indonesia, East Timor, Papua New Guinea and Singapore in September, the Vatican announced Friday, confirming the longest trip of Francis’ papacy that is sure to test his health, stamina and mobility. HT Image {{^userSubscribed}} {{/userSubscribed}} {{^userSubscribed}} {{/userSubscribed}} The Vatican confirmed the Sept. 2-13 visit, saying the 87-year-old pope would visit Jakarta, Indonesia; Port Moresby and Vanimo, Papua New Guinea; Dili, East Timor; and Singapore. Further details will be announced later. Francis’ health has become a source of increasing concern and speculation, even though the pontiff is able to carry on with a rigorous…

Read More

Jakarta (ANTARA) – Indonesia stressed the importance of the ethical use of artificial intelligence (AI) at the AI Safety Summit (AISS) 2023.”It is the responsibility of humans to ensure that AI development will improve people’s welfare now and in the future,” Deputy Minister of Communication and Informatics, Nezar Patria, said in a statement received here on Thursday.Representing Indonesia at the AISS forum in London on Wednesday (November 1, 2023), he observed that if not anticipated, AI can pose several threats to humanity, such as incorrect algorithms and human bias in using AI.”Especially those related to deep-faking and phishing, legal issues…

Read More

As a vCISO, you are responsible for your client’s cybersecurity strategy and risk management. It involves multiple disciplines, from research to execution to reporting. We recently published a complete tutorial for vCISO, “Your First 100 Days as a vCISO – 5 Steps to Success”which covers all the steps involved in running a successful vCISO engagement, along with recommended actions and step-by-step examples. After the success of the tutorial and the requests we received from the MSP/MSSP community, we decided to dig deeper into specific parts of the vCISO reports and provide more color and examples. In this article, we will…

Read More

The opportunities for using AI to automate workflows are many and varied, but one of the easiest ways to use AI to save time and improve your organization’s security is by building an automated SMS analysis service. The Tines workflow automation platform provides a good example of how to do this. The supplier recently released its first own functions of artificial intelligenceand security teams have already started sharing AI-enhanced workflows they’ve created using the platform. Tines library of built-in workflows includes AI-enhanced built-in workflows for normalizing alerts, creating cases, and determining which phishing emails require escalation. Let’s take a closer…

Read More

The relationship between the various TDS and DNS associated with the Vigorish Viper and the final landing experience for the user A Chinese organized crime syndicate linked to money laundering and people-trafficking across Southeast Asia is using a sophisticated “technological complex” that runs the full spectrum of cybercrime supply chains to spearhead its operations. There is an info block tracking pseudonymous owner and custodian Cheerful vipernoting that it was developed by the Yabo Group (aka Yabo Sports), which has been linked to illegal gambling and pig slaughter scam in the past. It was renamed Kaiyun Sports in late 2022 and…

Read More

July 22, 2024Information hallCloud Security / Phishing Attack Financially motivated actor codenamed Latin America (LATAM). FLUX ROOT saw the use of Google Cloud serverless projects to orchestrate credential phishing, highlighting the misuse of the cloud computing model for malicious purposes. “Serverless architectures are attractive to developers and enterprises because of their flexibility, cost-effectiveness and ease of use,” Google said in its biennial release. Threat Horizons Report (PDF) shared with The Hacker News. “These same features make serverless computing services for all cloud providers attractive to threat actors who use them to deliver and communicate their malware, host and direct users…

Read More