Skip to content

iwandanu

In Madya Mangun Karsa

  • Beranda
  • Pajak
  • Seputar TIK
  • Wisdoms
  • Curriculum Vitae
×

Tag: laporan keuangan

Mengenal Opini Akuntan

Mengenal Opini Akuntan

  • 3 min
  • 7

Saat ini sedang ramai dibicarakan tentang skandal PT Jiwasraya yang menimbulkan kerugian trilyunan rupiah. Tertarik dengan hal ini, saya yang pernah belajar akuntansi mencoba mendapatkan laporan keuangan PT Jiwasraya. Ternyata publikasi terakhir laporan PT Jiwasraya adalah untuk tahun buku 2017. Saya agak […]

  • 10/01/2020
Tagged akuntansi, audit, Jiwasraya, laporan keuangan, modified opinion

About Me

Ing Madya Mangun Karsa~

My Socials

Random Posts

Lebaran, Kumpul Trah Ransomware
Segores Tulisan tentang Penempatan
Berkenalan dengan OSINT
Jurus Main Affiliate – SEO Track

Quotes Of The Day

Be strong enough to be gentle;

Donate

Partners

Categories

  • Artikel Referensi
  • Ide dan Inspirasi
  • OSINT
  • Pajak
  • Peluang Usaha
  • Personal
  • Seputar TIK
  • Wisdoms

KitPloit

Shodan-Dorks - Dorks for Shodan; a powerful tool used to search for Internet-connected devices
Pegasus-Pentest-Arsenal - A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool
Witcher - Managing GitHub Advanced Security (GHAS) Controls At Scale

Hakin9

RSS Error: A feed could not be found at `https://hakin9.org/category/news/feed/`; the status code is `403` and content-type is `text/html; charset=iso-8859-1`

Hacktivity h1

Memory Leak in libcurl via Location Header Handling (CWE-770)
`Curl_socketpair()` fallback vulnerable to man-in-the-middle attack
Any WARP User Can Access Organization-Specific Application
Shopify Partners Invitation Process Allows Privilege Escalation Without Email Verification
Bedrock Guardrails Evasion with Prompt Formatting
Corrupted pointer in node::fs::ReadFileUtf8(const FunctionCallbackInfo<Value>& args) when args[0] is a string.
Weak Rate Limiting Controls in the (LOGIN) page Expose System to Brute Force and DoS Attacks
Open Redirect Vulnerability in OAuth Flow Leading to Potential Phishing Attack
[Xenoblade Chronicles X: Definitive Edition] Unrestricted RPCs allow DoS and writing arbitrary flags remotely
[Xenoblade Chronicles X: Definitive Edition] Improper validation of names allows injecting formatting tags and bypassing profanity filter

The Hacker News

Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics
PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms
Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims
Securing CI/CD workflows with Wazuh
How to Detect Phishing Attacks Faster: Tycoon2FA Example
Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps
Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager
Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

iwandanu

Proudly powered by WordPress | Theme : Voice Blog free WordPress theme : by : Postmagthemes