Posted in Vulnerabilities

New Ransomware active – Black Claw Ransomware

A new Ransomware called Black Claw has been active a lot in March this year which the ransomware has a similar threat like any other…

Continue Reading...
Posted in Information Security

Importance of Security in Domain Name

Nowadays, a lot of organizations create a Domain Name for their website and internal usage. It considered as important to the organization to ensure the…

Continue Reading...
Posted in Information Security

CyberSecurity Experience

In this post, I would like to share the CyberSecurity Experiences that I gained while exploring those fields such as SOC analyst, Forensic analyst, and…

Continue Reading...
Posted in News

Cybersecurity Market

There is a lot of CyberSecurity issues that occur within the organization especially CyberAttack that coming from the attacker out there. Due to a lot…

Continue Reading...
Posted in Penetration Testing

Vulnerabilities Assessment vs Penetration Testing

In this post, I would like to share the difference between Vulnerabilities Assessment vs Penetration Testing during real-life security testing. However, some organizations might want…

Continue Reading...
Posted in Information Security

Zero-Trust is a new security paradigm

Due to the situation that occurs right now, all organizations will need to implement a new security model such as Zero-Trust. For those who are…

Continue Reading...
Posted in Information Security Tutorial

Policies that organization should implement

When talking about policies that the organization should be implemented would differ from each other. However, some organization will need to put some effort into…

Continue Reading...
Posted in Information Security

Security Guideline for System and Machine

Security Baseline can be considered as one of the important checklists that needed to ensure the system and application been secured from been compromised. A…

Continue Reading...
Posted in Penetration Testing

DLL Attack Review Part 1

I would like to share a few details and tricks to DLL Attack that can be useful to some people out there. DLL (Dynamic Link…

Continue Reading...
Posted in Information Security

Password Security

Nowadays, the user has to be careful when choosing the password for any system or device to avoid. I would advise that the user need…

Continue Reading...