vBulletin Vulnerability (CVE-2019-16759)
October 02, 2019
On September 25, 2019, an anonymous source issued a vulnerability to vBulletin (CMS) Content Management System.
vBulletin is an application written in php code to make it easier to manage or install the content of sites such as forums. Among them,
Covid-19 Mobil Tehdit Raporu
Corona/Covid-19 Mobil Tehdit Raporu
Bu rapor Corona/Covid-19 virüsü salgınının, dijital dünya üzerindeki etkilerinin incelenmesi sonucu oluşturulmuştur. Aralık 2019 tarihinde Вin Halk Cumhuriyeti’nin Wuhan kentinde başlayan ve kısa sürede tü
RCE & DoS Vulnerability on Exim Email Server (CVE-2019-16928)
October 1, 2019
A vulnerable security vulnerability was discovered on the popular e-mail server Open Source Exim, which allowed the remote attacker to perform DoS (Denial Of Service) attack and RCE (Remote Code Execution), a CVE-2019-16928 CVE given the critical vul...
Cyber Intelligence Report 13 April 2020
“HoneyPot Network Cyber Intelligence Report”
This report was produced as a result of examining attacks on the "IntelProbe Honeypot Network". The first HoneyPot studies were published by Clifford Stoll in 1990 in “The Cuckoo's Egg” This concept
Microsoft Windows RDP RCE Vulnerability: DejaBlue
August 18, 2019
A similar Microsoft Windows vulnerability was released about 3 months after the K BlueKeep z (CVE-2019-0708) vulnerability, which was published in the Microsoft Patch Tuesday security bulletin on May 14, 2019.
This vulnerability, called ja DejaBlu
Zynga Data Leak
September 30, 2019
A Pakistani attacker announced that the game maker Zynga, who has more than a billion users, seized the user information of users who registered and installed oyun Words With Friends önce before 2 September 2019.
The attacker's claims that mor
September 17, 2019
The vulnerability discovered by ActiveMobile Security allows attackers to use a phone remotely by sending only text messages.
To exploit the vulnerability, attackers can send an SMS with a binary code to their mobile phone and perform several task
These cookies are required to allow the user to navigate our website and to access features such as your profile and purchases, member-only resources, and other secure areas of the website. These cookies are used for marketing purposes.
We use Google Analytics cookies to collect information about how visitors use our website. These cookies collect information in the aggregate to give us insight into how our website is being used. We anonymize IP addresses in Google Analytics, and the anonymized data is transmitted to and stored by Google on servers in the United States. Google may also transfer this information to third parties where required to do so by law, or where such third parties process the information on Google's behalf. Google will not associate your IP address with any other data held by Google.
We also use a marketing database management program that deploys a cookie when a user interacts with a marketing communication, such as a marketing email or a marketing-based landing page on our website. This cookie collects personal information such as your name, which pages you visit on our website, your history arriving at our website, your purchases from the IAPP, and the like. Collected information is used to evaluate the effectiveness of our marketing campaigns or to provide better targeting for marketing.