Skip to content

iwandanu

In Madya Mangun Karsa

  • Beranda
  • Pajak
  • Seputar TIK
  • Wisdoms
  • Curriculum Vitae
×

Tag: pencucian uang

Modus Trade Misinvoicing pada Aliran Uang Ilegal

Modus Trade Misinvoicing pada Aliran Uang Ilegal

  • 9 min
  • 2
  • 2

Tulisan ini bukan dimaksud untuk mengajari para ahli keuangan dan pihak di lapangan yang mungkin setiap hari berkutat menjaga perdagangan agar tetap pada Fair of Bussiness. Namun sekedar berbagi dan untuk menyadarkan kita semua bahwa bocornya pendapatan negara dengan adanya aliran uang […]

  • 03/01/2020
Tagged money laundry, pencucian uang, trade misinvoice, transfer pricing

About Me

Ing Madya Mangun Karsa~

My Socials

Random Posts

Virtual Tour dan Augmented Reality
Another Day of Mine
Lebaran, Kumpul Trah Ransomware
Makassar Day 2: Cramp

Quotes Of The Day

Be strong enough to be gentle;

Donate

Partners

Categories

  • Artikel Referensi
  • Ide dan Inspirasi
  • OSINT
  • Pajak
  • Peluang Usaha
  • Personal
  • Seputar TIK
  • Wisdoms

KitPloit

Shodan-Dorks - Dorks for Shodan; a powerful tool used to search for Internet-connected devices
Pegasus-Pentest-Arsenal - A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool
Witcher - Managing GitHub Advanced Security (GHAS) Controls At Scale

Hakin9

RSS Error: A feed could not be found at `https://hakin9.org/category/news/feed/`; the status code is `403` and content-type is `text/html; charset=iso-8859-1`

Hacktivity h1

Memory Leak in libcurl via Location Header Handling (CWE-770)
`Curl_socketpair()` fallback vulnerable to man-in-the-middle attack
Any WARP User Can Access Organization-Specific Application
Shopify Partners Invitation Process Allows Privilege Escalation Without Email Verification
Bedrock Guardrails Evasion with Prompt Formatting
Corrupted pointer in node::fs::ReadFileUtf8(const FunctionCallbackInfo<Value>& args) when args[0] is a string.
Weak Rate Limiting Controls in the (LOGIN) page Expose System to Brute Force and DoS Attacks
Open Redirect Vulnerability in OAuth Flow Leading to Potential Phishing Attack
[Xenoblade Chronicles X: Definitive Edition] Unrestricted RPCs allow DoS and writing arbitrary flags remotely
[Xenoblade Chronicles X: Definitive Edition] Improper validation of names allows injecting formatting tags and bypassing profanity filter

The Hacker News

FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections
Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics
PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms
Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims
Securing CI/CD workflows with Wazuh
How to Detect Phishing Attacks Faster: Tycoon2FA Example
Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps
Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager
Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads

iwandanu

Proudly powered by WordPress | Theme : Voice Blog free WordPress theme : by : Postmagthemes