Skip to content

iwandanu

In Madya Mangun Karsa

  • Beranda
  • Pajak
  • Seputar TIK
  • Wisdoms
  • Curriculum Vitae
×

Tag: pencucian uang

Modus Trade Misinvoicing pada Aliran Uang Ilegal

Modus Trade Misinvoicing pada Aliran Uang Ilegal

  • 9 min
  • 2
  • 2

Tulisan ini bukan dimaksud untuk mengajari para ahli keuangan dan pihak di lapangan yang mungkin setiap hari berkutat menjaga perdagangan agar tetap pada Fair of Bussiness. Namun sekedar berbagi dan untuk menyadarkan kita semua bahwa bocornya pendapatan negara dengan adanya aliran uang […]

  • 03/01/2020
Tagged money laundry, pencucian uang, trade misinvoice, transfer pricing

About Me

Ing Madya Mangun Karsa~

My Socials

Random Posts

5 Tren Bisnis UMKM yang Akan Meledak di Tahun 2025
Uwais Al Qarni
Regulasi Baru 2025: Apa Dampaknya bagi Kelangsungan Bisnis UMKM?
Cerdas Kelola Keuangan: Kunci Bertahan dan Berkembang bagi UMKM di 2025

Quotes Of The Day

Be strong enough to be gentle;

Donate

Partners

Categories

  • Artikel Referensi
  • Ide dan Inspirasi
  • OSINT
  • Pajak
  • Peluang Usaha
  • Personal
  • Seputar TIK
  • Wisdoms

KitPloit

RSS Error: https://feeds.feedburner.com/PentestTools is invalid XML, likely due to invalid characters. XML error: Mismatched tag at line 72, column 80

Hakin9

RSS Error: Retrieved unsupported status code "403"

Hacktivity h1

Terminal Output Not Great
Certificate Hostname Validation Bypass via Leading Dot in Hostname
Stack Buffer Overflow in cURL wolfSSL Backend (lib/vtls/wolfssl.c)
curl built with GnuTLS backend defaults to weak crypto parameters
Unauthenticated GraphQL access by prepending __schema to private operations
Stored XSS Vulnerability via SVG File
Title: Use-After-Free in cURL Test Suite via Improper Cleanup of Global Handle
admin_audit does not log actions on files in a group folder
Deck app allowed user with "Can share" permission to modify permissions of other non-owners
Calendar app allowed booking appointments without the generated token

The Hacker News

Active Attacks Exploit Gladinet's Hard-Coded Keys for Unauthorized Access and Code Execution
React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL
Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling
Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes
Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups
Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days
Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws
North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware
Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure

iwandanu

Proudly powered by WordPress | Theme : Voice Blog free WordPress theme : by : Postmagthemes