cybersecurity

Cara Verified Instagram Syarat hingga Berbagai Keuntungannya

Hackers exploit users’ desire to get verified by Instagram

Threat actors take advantage of Instagram’s highly sought-after verification program to harvest user credentials. Cybersecurity company Vade discovered a sophisticated and targeted phishing campaign designed to lure Instagram users into a trap and harvest their personal information and account credentials. It all starts with an email saying that your Instagram account has been reviewed and …

Hackers exploit users’ desire to get verified by Instagram Read More »

national cancer institute NFvdKIhxYlU unsplash scaled

Health Ministry Responds to Massive Data Leak of Medical Records

Reports have emerged about an alleged massive data leak of Indonesian hospital patients’ medical information being sold in an illegal internet forum. Hackers claimed to have breached the Indonesian Health Ministry centralized server to obtain the data.  According to a report by Antaranews, the data that were sold in the dark web contains 720 GB of personal medical information from …

Health Ministry Responds to Massive Data Leak of Medical Records Read More »

Apache Log4j Logo

Log4j zero-day vulnerability: Apa yang perlu Anda ketahui

Celah keamanan di Log4j, suatu Java library untuk mencatat pesan error log dalam aplikasi, adalah security vulnerability paling terkenal di internet saat ini dan hadir dengan skor severity 10 dari 10.  Library ini dikembangkan oleh Apache Software Foundation open-source dan merupakan bagian utama dari Java-logging framework. Sejak minggu lalu, peringatan oleh CERT New Zealand menyatakan …

Log4j zero-day vulnerability: Apa yang perlu Anda ketahui Read More »