Skip to content

iwandanu

In Madya Mangun Karsa

  • Beranda
  • Pajak
  • Seputar TIK
  • Wisdoms
  • Curriculum Vitae
×

Tag: ExPetr

Petya, Tak Sesimpel Namanya

Petya, Tak Sesimpel Namanya

  • 5 min

Petya ini bukanlah nama mbak-mbak, nama bunga, apalagi nama makanan snack di hari kemenangan. Malware yang disinyalir hasil dari pengembangan Petya versi awal ini sukses membuat aktivis keamanan IT bekerja ekstra di saat kaum muslimin menikmati sajian lebaran di kediaman handai taulan, […]

  • 29/06/2017
Tagged ExPetr, Malware, NoPetya, Petya, Ransomware

About Me

Ing Madya Mangun Karsa~

My Socials

Random Posts

Sambut 2025: Peta Jalan Sukses untuk UMKM Indonesia
Dari AI hingga Green Business: Tren yang Wajib Diadopsi UMKM di 2025
Disrupsi 2025: Tantangan Nyata yang Harus Diwaspadai Pelaku UMKM
Makassar Day 6: Coming Home

Quotes Of The Day

Be strong enough to be gentle;

Donate

Partners

Categories

  • Artikel Referensi
  • Ide dan Inspirasi
  • OSINT
  • Pajak
  • Peluang Usaha
  • Personal
  • Seputar TIK
  • Wisdoms

KitPloit

RSS Error: https://feeds.feedburner.com/PentestTools is invalid XML, likely due to invalid characters. XML error: Mismatched tag at line 72, column 80

Hakin9

RSS Error: Retrieved unsupported status code "403"

Hacktivity h1

Terminal Output Not Great
Certificate Hostname Validation Bypass via Leading Dot in Hostname
Stack Buffer Overflow in cURL wolfSSL Backend (lib/vtls/wolfssl.c)
curl built with GnuTLS backend defaults to weak crypto parameters
Unauthenticated GraphQL access by prepending __schema to private operations
Stored XSS Vulnerability via SVG File
Title: Use-After-Free in cURL Test Suite via Improper Cleanup of Global Handle
admin_audit does not log actions on files in a group folder
Deck app allowed user with "Can share" permission to modify permissions of other non-owners
Calendar app allowed booking appointments without the generated token

The Hacker News

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw
Active Attacks Exploit Gladinet's Hard-Coded Keys for Unauthorized Access and Code Execution
React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL
Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling
Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes
Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups
Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days
Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws
North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware

iwandanu

Proudly powered by WordPress | Theme : Voice Blog free WordPress theme : by : Postmagthemes