Foxit Software Products are Vulnerable to RCE Attacks

On 16 April 2020, Foxit Software announced security updates for its two products, namely Foxit Reader and PhantomPDF. Foxit Reader is a multilingual freemium PDF tool that can create, view, edit, digitally sign, and print PDF files with users up to 500 million, a popular alternative to Adobe Reader. Meanwhile, Foxit PhantomPDF enables users to […]
Is Zoom Security Measures Enough to Protect You?

As working from home becomes the new norm in today’s COVID-19 pandemic, video conferencing solutions are utilized to foster communication, collaboration, and to stay connected with all business personnel. One of the most popular video conferencing solutions being used is Zoom. The number of daily users experienced a significant increase, from an average of 10 […]
How Hackers Can Exploit the Buffer Overflow Vulnerability

It is the goal of every hacker to gain access and control one’s IT system. This can be achieved by exploiting existing vulnerabilities, such as a buffer overflow. It occurs when an application tries to write more data to a fixed memory than it is allocated to hold. This will lead to the data being […]
How to Setup Dsiem, a Defenxor Security Event Correlation Engine

Detecting potential issues before they become real problems is very essential in minimizing business risk of data breach or any other security attacks. Especially in today’s business technology situation, where every day there are millions and billions of events that happened on the system. Thus, it is impossible for any human being to manually check […]
Peranan SOC terhadap Peningkatan Keamanan TI Perusahaan

Teknologi informasi (TI) kini memegang peranan besar dalam menunjang kegiatan operasi bisnis di perusahaan. Bahkan, TI sendiri telah menjadi business enabler di mana tanpa adanya TI, suatu bisnis tidak bisa berjalan. Oleh karena itu, keberadaan TI pada suatu perusahaan menjadi begitu krusial, khususnya memasuki era digital saat ini. Di tengah dunia bisnis yang semakin kompetitif […]