<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:admin="http://webns.net/mvcb/"
     xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/">
<channel>
    <title>Geopolitik Civilizations &amp; : Cyber and Technology</title>
    <link>https://fox13.id/en/rss/category/cyber-war</link>
    <description>Geopolitik Civilizations &amp; : Cyber and Technology</description>
    <dc:language>en</dc:language>
    <dc:creator></dc:creator>
    <dc:rights>Copyright 2023 fox13.id &amp; All Rights Reserved.</dc:rights>
    <item>
        <title>Starlink in Indonesia: Benefits, Controversies, and Digital Sovereignty Challenges</title>
        <link>https://fox13.id/en/starlink-in-indonesia-benefits-controversies-and-digital-sovereignty-challenges</link>
        <guid>https://fox13.id/en/starlink-in-indonesia-benefits-controversies-and-digital-sovereignty-challenges</guid>
        <description><![CDATA[ Several potential threats could arise from using Starlink services. Significant dependence on satellite internet services operated by foreign companies could lead to less direct control over the infrastructure, meaning the country may not be able to take necessary actions during emergencies or conflicts. Excessive reliance on foreign-operated satellite internet services could make the country more vulnerable to foreign interference in its communication infrastructure operations. The country might not have full control over the network, including the ability to stop or redirect services according to national policies in emergencies. If access to these services is disrupted or terminated by a foreign country or malicious entities, it could hinder the country&#039;s ability to coordinate and take effective action in emergencies or conflicts. Satellite internet services are crucial for communication and coordination between government and military institutions. Disruption or termination of access to these services by foreign countries could interfere with vital functions involving national security, such as disaster response coordination, military actions, or law enforcement. ]]></description>
        <enclosure url="http://fox13.id/uploads/images/202405/image_870x580_664dff3215554.jpg" length="115087" type="image/jpeg"/>
        <pubDate>Thu, 23 May 2024 06:28:19 +0800</pubDate>
        <dc:creator>adminfox13</dc:creator>
        <media:keywords></media:keywords>
    </item>
    <item>
        <title>Intelligence Day and the Importance of Maintaining Cyber Space</title>
        <link>https://fox13.id/en/intelligence-day-and-the-importance-of-maintaining-cyber-space</link>
        <guid>https://fox13.id/en/intelligence-day-and-the-importance-of-maintaining-cyber-space</guid>
        <description><![CDATA[  ]]></description>
        <enclosure url="http://fox13.id/uploads/images/202404/image_870x580_660ff86ba9701.jpg" length="104059" type="image/jpeg"/>
        <pubDate>Sat, 06 Apr 2024 05:16:23 +0800</pubDate>
        <dc:creator>adminfox13</dc:creator>
        <media:keywords></media:keywords>
    </item>
    <item>
        <title>Cyber Siege at PT. Kereta Api Indonesia: The Collapse of Security Walls and Resisting the Threat</title>
        <link>https://fox13.id/en/cyber-siege-at-pt-kereta-api-indonesia-the-collapse-of-security-walls-and-resisting-the-threat</link>
        <guid>https://fox13.id/en/cyber-siege-at-pt-kereta-api-indonesia-the-collapse-of-security-walls-and-resisting-the-threat</guid>
        <description><![CDATA[ Based on the investigation conducted by CISSReC, the hacking of PT. KAI was carried out by a ransomware group named Stormous about a week before the hacking information was released by them. The Stormous ransomware gang gained access to PT. KAI&#039;s system through a VPN access using several credentials from multiple employees. After successful entry, they accessed dashboards from several PT. KAI systems and downloaded the data contained in those dashboards. ]]></description>
        <enclosure url="http://fox13.id/uploads/images/202401/image_870x580_65a67062d616c.jpg" length="108124" type="image/jpeg"/>
        <pubDate>Wed, 17 Jan 2024 04:07:04 +0800</pubDate>
        <dc:creator>adminfox13</dc:creator>
        <media:keywords></media:keywords>
    </item>
    <item>
        <title>Equifax Data Breach (2017): Major Cybercrime with Far&amp;reaching Impacts</title>
        <link>https://fox13.id/en/equifax-data-breach-2017-major-cybercrime-with-far-reaching-impacts</link>
        <guid>https://fox13.id/en/equifax-data-breach-2017-major-cybercrime-with-far-reaching-impacts</guid>
        <description><![CDATA[ This incident underscores the importance of data security, prompting increased awareness and a reevaluation of how companies manage and protect sensitive information. Equifax was forced to implement stronger security measures and enhance its overall cybersecurity infrastructure. The international spotlight on this breach sparked discussions about the need for stricter regulations to protect personal information and establish higher data security standards for major companies. ]]></description>
        <enclosure url="http://fox13.id/uploads/images/202312/image_870x580_65732c4424556.jpg" length="145504" type="image/jpeg"/>
        <pubDate>Sun, 07 Jan 2024 20:32:04 +0800</pubDate>
        <dc:creator>adminfox13</dc:creator>
        <media:keywords></media:keywords>
    </item>
    <item>
        <title>SandWorm 2014: Shocking Cyber Attack</title>
        <link>https://fox13.id/en/sandworm-2014-shocking-cyber-attack</link>
        <guid>https://fox13.id/en/sandworm-2014-shocking-cyber-attack</guid>
        <description><![CDATA[  ]]></description>
        <enclosure url="http://fox13.id/uploads/images/202312/image_870x580_657bafc2d623b.jpg" length="101420" type="image/jpeg"/>
        <pubDate>Fri, 15 Dec 2023 14:14:04 +0800</pubDate>
        <dc:creator>adminfox13</dc:creator>
        <media:keywords></media:keywords>
    </item>
    <item>
        <title>NotPetya Unleashed: A Global Cyber Catastrophe in 2017</title>
        <link>https://fox13.id/en/notpetya-unleashed-a-global-cyber-catastrophe-in-2017</link>
        <guid>https://fox13.id/en/notpetya-unleashed-a-global-cyber-catastrophe-in-2017</guid>
        <description><![CDATA[ Although it is difficult to identify the perpetrators of cyber attacks with absolute certainty, the evidence has sparked controversy and tension at the geopolitical level, particularly in the relationships between Russia, Ukraine, and Western countries. NotPetya serves as an example of how cyber attacks can become instruments in geopolitical conflicts, and the involvement of government entities in such attacks can create broad and profound impacts. ]]></description>
        <enclosure url="http://fox13.id/uploads/images/202312/image_870x580_6573251d357ca.jpg" length="139770" type="image/jpeg"/>
        <pubDate>Thu, 14 Dec 2023 06:18:04 +0800</pubDate>
        <dc:creator>adminfox13</dc:creator>
        <media:keywords></media:keywords>
    </item>
    <item>
        <title>DarkSeoul: Mysterious Cyber Act Shaking the World</title>
        <link>https://fox13.id/en/darkseoul-2013-mysterious-cyber-act-shaking-the-world</link>
        <guid>https://fox13.id/en/darkseoul-2013-mysterious-cyber-act-shaking-the-world</guid>
        <description><![CDATA[ While the exact motives of this attack remain speculative, the DarkSeoul incident highlights how cyber attacks can be used as tools to achieve political or military objectives, raising concerns about the ability of states to conduct damaging cyber operations. ]]></description>
        <enclosure url="http://fox13.id/uploads/images/202312/image_870x580_6573225eedc8c.jpg" length="83002" type="image/jpeg"/>
        <pubDate>Thu, 14 Dec 2023 06:06:42 +0800</pubDate>
        <dc:creator>adminfox13</dc:creator>
        <media:keywords></media:keywords>
    </item>
    <item>
        <title>Stuxnet: Coordinated Cyber Attack on Nuclear Infrastructure</title>
        <link>https://fox13.id/en/stuxnet-coordinated-cyber-attack-on-nuclear-infrastructure</link>
        <guid>https://fox13.id/en/stuxnet-coordinated-cyber-attack-on-nuclear-infrastructure</guid>
        <description><![CDATA[ The identity of the perpetrators of Stuxnet cannot be definitively confirmed, but the attack is believed to be the result of collaboration between the United States and Israel. Stuxnet was designed to sabotage Iran&#039;s nuclear infrastructure, particularly its uranium enrichment program. While there has been no official acknowledgment from the U.S. or Israeli governments regarding their involvement, several reports and analyses suggest that both countries collaborated in this cyber campaign. In a book published in 2014, The New York Times reported that Stuxnet was part of a covert program called &quot;Olympic Games,&quot; a joint effort between the U.S. National Security Agency (NSA) and Unit 8200, the Israeli military intelligence unit. While this cannot be officially confirmed, many cybersecurity experts and intelligence officials consider the United States and Israel as the primary actors behind Stuxnet. ]]></description>
        <enclosure url="http://fox13.id/uploads/images/202312/image_870x580_6573203c1ca3f.jpg" length="130165" type="image/jpeg"/>
        <pubDate>Thu, 14 Dec 2023 05:58:57 +0800</pubDate>
        <dc:creator>adminfox13</dc:creator>
        <media:keywords></media:keywords>
    </item>
    </channel>
</rss>