Join the Webinar | Strong Protection Against Cyber Threats

Charming Kitten (APT35)

The APT group, known as Charming Kitten (APT35), is thought to be linked to the Iranian state. It is considered that it provides Cyber Intelligence to the Iranian state against human rights activities, academic researchers and media organizations, and the United States and Central Eastern countries are among the countries it targets. Charming Kitten

Directory Traversal Vulnerability Definition and Solutions

Directory Traversal Vulnerability Definition and Solution Suggestions Another security vulnerability that we may encounter in web applications is Directory Traversal. Directory exceedance vulnerability is the ability to read or write access to files that should not be accessed on the web server with input provided by the user. Necessary

OS Command Injection

Os Command Injection This vulnerability, which is called Os Command Injection in English and although it is not used much in our language, is called Operating System Command Injection, is in the Injection category, which is among the most popular vulnerabilities published by OWASP. Before talking about the details

The Scary Dream of E-commerce Sites: Credential Stuffing

The Nightmare of E-commerce Sites: Credential Stuffing. Credential Stuffing, a technique that uses the risk of using the same e-mail and password pairs on different platforms, affects e-commerce sites the most... What is Credential Stuffing? Credential Stuffing, which we can translate into our language as "Identity Stuffing", has become an astronomical issue in e-commerce, especially in recent years.

Prototype Pollution Vulnerability

Prototype Pollution vulnerability, which occurs due to various errors in JavaScript libraries, makes web applications unsafe. What is Prototype Pullution? When a new object is created in JavaScript, a prototype-based programming language; This new object creates functions such as toString, cunstructor and hasOwnProperty.

1 8 9 10 11 12