
Contact Us
Membership Enquiry
The Security Roundtable
membership@thesecurityroundtable.com

EMERGING ISSUES
State of Terrorism in Indonesia
Terrorism Cases Down, Uptick of Online Radicalisation Indonesia’s terrorism situation has improved over the past two decades due to consistent and robust efforts of Densus 88 and BNPT. Major extremist groups like Jemaah Islamiyah (JI) and Jamaah Ansharut Daulah (JAD) have been weakened, leading to fewer and smaller attacks. However, the threat remains in a new form – a sharp rise in online radicalisation, where extremist content spreads easily on social media and fuels self-radicalised “lone wolf” attacks.
Shift in Targeting Strategy A clear shift has emerged in terrorist targets. In the early 2000s, attacks mainly focused on foreign interests such as embassies, international hotels, and Western tourists. In recent years, however, militants have increasingly targeted domestic sites particularly especially police personnel and facilities. This reflects the shifting view of the Indonesian state as complicit in preventing the achievement of extremist objectives.
Overview Indonesia’s security landscape remains complex, shaped by political unrest, terrorism threats, and societal tensions. Extremist threats have declined significantly, with no major terrorist attacks in the past three years, thanks to effective counterterrorism by Densus 88, BNPT, and BABINSA (Village-based NCO). However, the threat persists in new forms – such as online radicalisation, lone-wolf actors, and splinter groups from disbanded networks like Jemaah Islamiyah and JAD. Militants aim to destabilise or even replace Indonesia’s secular state with an Islamic one, but these goals remain unlikely due to strong public resistance, state ideology (Pancasila), and robust security efforts. Despite current calm, the risk of isolated attacks remains.
Be a member for full brief
Cybersecurity Bulletin
Chinese State-Sponsored Actors Employ Advanced Evasion Techniques The Mustang Panda group has been observed using legitimate Windows utilities, such as MAVInject.exe, to inject malicious payloads and bypass antivirus detection, notably targeting ESET software.
macOS Users Targeted by Sophisticated Malware New malware strains, including FrigidStealer and variants of XCSSET, are being distributed through deceptive methods like fake browser updates and compromised Xcode projects. These malwares aim to steal sensitive information, including digital wallets and data from applications like Apple Notes.
Exploitation of Cloud Infrastructure Vulnerabilities The “whoAMI” attack leverages name confusion in Amazon Machine Images (AMIs), allowing attackers to gain remote code execution within AWS accounts by publishing malicious AMIs with specific names. This underscores the importance of stringent validation and configuration practices in cloud environments.
Overview There is a growing sophistication of cyberattacks targeting macOS users and cloud infrastructures. Attackers are leveraging social engineering, such as fake software updates, and exploiting configuration vulnerabilities in platforms to gain unauthorised access to sensitive data. The misuse of legitimate tools and resources to bypass detection emphasises the need for heightened vigilance.
Be a member for full brief
CRISIS MANAGEMENT
The Evolution of Crisis Management in Enterprises
Crisis Management is Always Evolving Crisis management has shifted from static contingency planning to a dynamic, strategic function. Organisations must continuously adapt their practices to address emerging threats and capitalise on opportunities for resilience.
Frameworks Must Fit the Industry Effective crisis strategies are tailored to sector-specific risks, whether in manufacturing, banking, or healthcare. A one-size-fits-all approach will fail to address the unique challenges each industry faces.
Digital Tools Transform Crisis Response Digital platforms enable real-time coordination and data-driven decisions. However, they also require ethical oversight and digital fluency to avoid new vulnerabilities.
Overview Digital platforms enable real-time coordination and data-driven decisions. However, they also require ethical oversight and digital fluency to avoid new vulnerabilities.
Be a member for full brief