Affordable, manageable, understandable solution for cyber security. Get early access for Product X !
7 Major Cyber Security Incidents Targeting the Healthcare Industry
7 Major Cyber Security Incidents Targeting the Healthcare Industry

Nowadays, the target of cyber attackers is money and information from as many people as possible. Therefore, the areas where the most personal information is collected become the target. Each person's data is unique to him, and people cannot easily change some of this information, such as credit card, phone number, and identity information. This article will list and tell you the most significant cyberattacks in the health sector. Good reading.   1.Anthem Medical Data Breach A company that makes health insurances called Anthem BlueCross BlueShield was exposed to a massive cyberattack in…

Read More
Zero Trust Architecture
Zero Trust Architecture

Zero Trust is a security model introduced in 2010 by John Kindervag, a former Forrester analyst. Since then, Zero Trust has become one of the most common patterns in cybersecurity. In the last few years, the significant data breaches show that all companies, from small to largest, need to be more active in security. The Zero Trust Model is the right fit for this business. This article will discuss what Zero Trust architecture is, why it is so important, its principles, and principles. Good reading. What is Zero Trust? Zero Trust is a security model that requires strict authentication of…

Read More
The History Of Bug Bounty Program
The History Of Bug Bounty Program

Today, bug bounty programs are an increasingly common method to find and fix various vulnerabilities on the Internet. This method is used by small companies, as well as large companies such as Google, Yandex, Paypal, Facebook. The need for bug bounty programs is due to the increasing number of cyber attacks today. According to an article published in 2020, 16 billion records were stolen in 2020 due to these attacks. 8.4 billion of these stolen records constitute the first quarter of 2020, and in this case, it is observed that it has increased by 273% compared to the first…

Read More
Asus DSL-N17U Modem 0-day Vulnerability (CVE-2020-35219)
Asus DSL-N17U Modem 0-day Vulnerability (CVE-2020-35219)

The Asus DSL-N17U is a network device that usually provides wired or wireless connectivity for home users. As with many products, this network device also has software that we call firmware. The software was developed in asp language and received the latest update in 2019. The manufacturer continues to develop and update. As a result of our researches, we found out that the Asus DSL-N17U network device with version 1.1.0.2 has the authentication bypass vulnerability in the POST parameter sent to the "Advanced_System_Content.asp" page. How Did We Detect Asus DSL-N17U Modem Authentication Bypass Vulnerability?  As the Security For Everyone…

Read More