Join the Webinar | Strong Protection Against Cyber Threats

Non-Customized Error Page

Non-Customized Error Page The details of this vulnerability, which is considered Improper Error Handling according to OWASP and called Non-Customized Error Page in our language, are listed below. What is an Error Page? Web applications may create error conditions during operation. These errors include out of memory, null pointer exceptions,

What is Pentest?

Pentest, which is translated into our language as penetration testing, is also known as penetration testing. The pentest service received by all institutions and organizations that care about their customers' data is provided by professionals who are experts in their field. What is Pentest? Penetration test is the system where hardening works will be carried out.

Security Measures Against Fileless Malware

Security Measures Against Fileless Malware Cyber attackers resort to different methods every day; It is working to develop new attack methods in order to avoid detection by security systems. In addition to malicious files that have become difficult to detect with the increase in ransomware,

What is NTP Amplification?

What is NTP Amplification? NTP Amplification attack; is a DDoS attack in which an attacker uses a Network Time Protocol (NTP) function to overwhelm the targeted network or server with excessive amounts of UDP traffic. It makes the target and surrounding infrastructure inaccessible to regular traffic. How to Attack NTP Amplification

What is Pivoting?

What is Pivoting? Pivoting (lateral movement) is an important post-exploitation step. Pivoting; It can be expressed as providing indirect access to hosts that cannot be directly accessed through other hosts/machines in the same network. Thus, machines that do not have direct access become open to abuse.

What is Open Redirect?

Open Redirect In this article, the issue of how a URL redirection can harm a system, that is, the "Open Redirect" vulnerability, will be examined in detail. What is URL? Uniform Resource Locator (URL) means the unique address of any file or resource on the internet. This

SSI Injection Vulnerability and Solution Suggestions

SSI Injection Vulnerability and Solution Suggestions Before moving on to what SSI Injection vulnerability is, it is necessary to know the definition of the term Server Side Include (SSI)... What is SSI? As it is known, websites are composed of more than one page and the pages are dynamically created through menus.

What is Pass the Hash Attack?

What is Pass the Hash Attack? Nowadays, passwords are widely used for security. To crack these passwords, attacks such as Dictionary and Brute Force can be used and the password can be found openly. But we may not need to just transcribe passwords into plaintext to compromise a system.

Iranian Backed APT Group APT34: OILRIG

Iran-Supported APT Group APT34: OILRIG APT34 generally carries out its cyber attacks against the Middle East in accordance with Iran's strategic interests, and therefore includes Turkey among its targets. It is reported that the group has been active since 2014. In April 2019, a lot of information about APT34 was leaked via telegram.

1 7 8 9 10 11 12