Join the Webinar | Strong Protection Against Cyber Threats

What is MALWARE?

  Malware (malicious software) is a set of applications that slow down the computer or mobile device, cause the computer to crash and steal information. It also makes your computer part of a botnet. Computers in the botnet network can be used for DDoS attacks. to governments or through your computer.

Dig Command and Usage

Dig Command and Its Usage The dig command is a command line tool frequently used to query DNS name servers. IP address records are used to troubleshoot many DNS problems, including the responses of authoritative name servers. The dig command stands for Domain Information Groper.

SMTP Open Relay Vulnerability

SMTP Open Relay Vulnerability There are a few concepts that need to be known before gaining sufficient knowledge about the SMTP Open Relay vulnerability. Before SMTP Relay vulnerability, it is necessary to first know what SMTP and mail relay are. What is Simple Mail Transfer Protocol (SMTP)? “Simple Information” into Turkish

What is SQL Injection?

SQL INJECTION The basis of SQL injection vulnerability, which is one of the injection attack techniques, is the use of data received from the user in SQL queries. What is SQL Injection? We can define SQL Injection as obtaining the desired information from the system's database after injecting SQL codes into the target system. A developed

Windows NTLM Manager

  How Does NTLM Authentication Work? Computer networks are vulnerable to cyber attacks unless they are properly protected. Networks are protected, not allowing individual users to access shared data and services. This way, only a designated user can access a network. The aim is to keep the data confidential in the cyber world. Windows

Types of Injection Attack

  Code Injection Code injection is the term used to describe attacks that inject malicious code into the application. To put it simply, the injected code is executed by the application and changes the way the application works. Although Code Injection and Command Injection are very similar to each other, there are differences between them.

What is Velociraptor?

What is Velociraptor? Velociraptor, in its simplest definition, is an artificial intelligence-based EDR product that increases visibility on endpoints, has advanced features and is used in incident response processes. In general, it can run on Linux, Windows and mac OS systems. Giving examples of the advantages of this architecture

What is OpenCTI?

What is Cyber Threat Intelligence (CTI)? Cyber Threat Intelligence (CTI) is the process of taking necessary precautions by examining and analyzing the goals, objectives and behaviors of threat actors for institutions. Threat intelligence has become more important as these threat actors are increasingly increasing in institutions. Threat with threat intelligence

What is DNS Tunneling?

What is DNS Tunneling? DNS is a service that records the IP address equivalent of internet addresses. In short, it converts IP addresses into easy-to-remember addresses for users (e.g. xxxxxx.com). For this reason, the widespread use of DNS has created a DNS attack technique for attackers. From a protocol,

1 9 10 11 12