We are PT Seraphim Digital Technology, we are a system integrator in cyber security provider for businesses in Indonesia. Security is paramount, from the beginning to the very end and beyond ~ to the entire life cycle.
Read MoreWe provide security solution and technology services to help our client digitally transform their business and generate business value. We help security consult, design, develop and deliver. With our multidiciplin expertise with our leading industry partners, we offer a comprehensive range of security solution services, including security technology solutions, consulting and security professional services.
Read MoreWe believe that it is said that you’re only as good as your last job. With more than 15years focusing on digital and cyber security, we continue to deliver high-quality work, on time and on budget not having defaulted in any project.
Trust is built with expectations met and a positive experience. We set high personal and corporate standards and consistently exceed them. We do what is required, not the what is asked.
We strive to establish a “one team” mentality with our clients and partners working towards a common goal.
We love and enjoy collaborating with clients. We are passionate, not just to complete a project or solving your cases but we work as one to help you shape and realize your goals.
We believe that your success is our ability to make your team self-reliant. By sharing our knowledge, we help build self-sufficient teams and customer partners.
We understand your business needs and corporate strategy to design extra value added services in consulting as an integrated team to explore, identify and offer a business and technical solution that fits.
Rapid7 is responding to various compromises arising from the exploitation of CVE-2022-47966, a pre-authentication remote code execution (RCE) vulnerability impacting at least 24 on-premise ManageEngine products. CVE-2022-47966 stems from a vulnerable third-party dependency on Apache Santuario
Read MoreA recent IcedID malware attack enabled the threat actor to compromise the Active Directory domain of an unnamed target less than 24 hours after gaining initial access, while also borrowing techniques from other groups like Conti to meet its goals.
Read MoreHackers are abusing the Windows Problem Reporting (WerFault.exe) error reporting tool for Windows to load malware into a compromised system's memory using a DLL sideloading technique.
Read More