Recent Posts

Posted in News

Zoom’s Vulnerability Security Measure

Due to recent bugs or vulnerabilities in Zoom Application that have exposed to the public, Zoom has announced some security measures to ensure their customer’s…

Continue Reading...
Posted in Information Security

Cyber Security Framework

Introduction Cybersecurity Framework is a framework that will be based on existing global standards, guidelines and practices for any organization to improve their managing global…

Continue Reading...
Posted in Mobile

PhoneSploit Android Mobile Debug Tool

PhoneSploit is a new tool that would be exploiting Android Mobile Devices by using Android Debug Bridge (ADB). The tools can be running within the…

Continue Reading...
Posted in Information Security

Machine Language IA-32 Assembly

Machine Language is a must knowledge that IT-related staff learns during their studies era. Malware Researcher can be considered as one of the fields that…

Continue Reading...
Posted in News

Drupal and Cisco Patch Update

A few vulnerabilities have been found lately on the Chrome browser in the wild. The latest vulnerabilities have been found in Drupal and Cisco where…

Continue Reading...
Posted in Information Security

Zero-Trust is a new security paradigm

Due to the situation that occurs right now, all organizations will need to implement a new security model such as Zero-Trust. For those who are…

Continue Reading...
Posted in News

Google Chrome will hold its release

Recently, Chrome have been paused its release to the public due to Coronavirus. The release was supposed to be roll out on last Tuesday as…

Continue Reading...
Posted in Information Security Tutorial

Policies that organization should implement

When talking about policies that the organization should be implemented would differ from each other. However, some organization will need to put some effort into…

Continue Reading...
Posted in Application

Pentest Tool Framework

Pentest Tools Framework is a Penetration Testing tool that uses several exploits database with scanners. The interface looks identical to Metasploit with a simple type…

Continue Reading...
Posted in Information Security

Security Guideline for System and Machine

Security Baseline can be considered as one of the important checklists that needed to ensure the system and application been secured from been compromised. A…

Continue Reading...