Skip to main content

Posts

  tujuan hacker meretas gadget anda adalah karena mereka ingin mengambil data pribadi anda dan salah satu yang paling berbahaya adalah mengambil data bank anda. silahkan kunjungi website kami untuk informasi lebih lanjut di https://www.syde.co/ atau hubungi kami via email di info@sydecloud.com
Recent posts
  semua kalangan yang memiliki gadget apapun bisa terkena serangan hacker, daripada menunggu sampai diserang. kenapa tidak menjaganya sejak dini? jangan ragu hubungi kami di email info@sydecloud.com
Hacker akan berusaha mencoba masuk ke dalam komputer anda dengan cara apapun. sebelum hal itu terjadi, hubungi kami untuk mengamankan jaringan dan komputer anda. hubungi kami lebih lanjut melalui email di info@sydecloud.com  

ARE WE HEADING FOR AN EPIDEMIC OF ATTACKS IN THE SUPPLY CHAINS

  After UBER, GEMINI EXCHANGE has just been the victim of a cyber attack that compromised more than 5.7 million customer email addresses. To understand the vulnerability of supply chains, you need to know more about them. When you know what a supply chain is and how it works, it is easy to see why, if they do not take precautions, they are the first targets of choice for hackers. The very concept of a supply chain is the creation of a network that brings together the different actors in an economic activity, from the producer of the service or goods to the consumer, who may be another economic actor or an individual. In fact, the supply chain plays a role similar to that of a platform to which the participants have free access. And it is precisely this freedom of access that attackers use to spread their viruses. Once the network is penetrated, the damage caused by the viruses used can be colossal. We still remember the attacks on SolarWind and Kaseya and their disastrous consequences

A lesson in cyber safety

  In an article published on 19 June 2023 in globalsecuritymag.fr/, Benoit Grunemwald, cybersecurity expert at ESET France, recounts the cyberattack suffered by REDDIT, an American social news aggregation, content rating, and discussion website, in February of the same year, and draws some lessons from it. This article follows the hackers' attempts, last repeated on 16 June, to obtain a ransom of 4.5 million dollars in order to delete the 80 GB of data stolen from the company, to which the company did not respond. The data was not encrypted, so the company did not lose it. However, the same cannot be said for its reputation. Benoit Grunemwald explains that " It all started with a phishing email to harvest employee account data. All it takes is for a single employee to be trapped for cyber criminals to gain access to internal documents, software code, employee data , etc." He goes on to stress the " need to integrate in-depth security methods and resources, such as z

APT threats in Q1 2023 Ancaman APT pada Q1 2023

  According to Kaspersky's APT Q1 2023 report, publishe d at the end of April 2023, during the first quarter of 2023, APT actors are reported to have developed intense activity. From this report, it can be seen that the main trends from the first quarter of 2023 are as follows: -        The established threat actors would continue to develop their tools . In reality, it seems that these are not new attack techniques, but the borrowing by some actors of techniques already developed and used by other actors while new threat actors emerge, -        They extend the range of programming languages by using Go, Rust and Lua, -        APT campaigns continue to expand their attack vectors in terms of geographic location: more and more APTs are now targeting victims on a global scale to many countries around the world and they are no longer limited to certain countries, -        APT actors are looking at a wider range of sectors; they include state institutions and critical infrastru