Threat, Research, and Solution in Cybersecurity Realms

See what we’ve
written lately
ITSEC Asia Research & Development
Meyta Zenis Taliti
Muhammad Rasyid Sahputra
Lalu Raynaldi Pratama Putra
YoKo Kho
Meet our author Meet our authors Meet our top authors
Lalu Raynaldi Pratama Putra

Static Analysis of Akira Ransomware

Akira (also known as REDBIKE) has emerged as one of the most disruptive ransomware operations targeting small-to-medium-sized businesses (SMBs) across North America and Europe. Since its appearance in 2023, Akira has extorted more than $42 million from over 350 confirmed victims, according to a Joint Cybersecurity Advisory by US and...

Meyta Zenis Taliti

I am using Apple, do I still need protection?

with Renaldi Antonio The internet is full of useful information, but not every website is safe. Some malicious sites secretly attempt to steal personal data without us even realize. And this time, we are trying to addresses this risk by creating a DNS Resolver App. IntelliBroń Aman - Apps on...

Meyta Zenis Taliti

POC Network Attack Visualization: SLIPS x STIX

by Ihsan Alamal Ahmad Network traffic has always been one of the richest sources of truth in cybersecurity. Every packet has its own story, whether it is a harmless web request, a misconfigured service, or a stealthy connection to a command-and-control server.  For an analyst, this is both a blessing...

Meyta Zenis Taliti

IntelliBroń Gadget: The rise of ARM based embedded system

by Mulyadi Santosa Since the early release of IntelliBroń security suite, ITSEC team deployed Mini PC based sensors to clients, either in production or demo stage. The device is small yet powerful in terms of computing power. There is also yet another from of deployment that we release. A docker...

You’ve successfully subscribed to ITSEC Asia R&D
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.