Lightweight Cryptology Standardization
Lightweight Cryptology Standardization

  Standard cryptology methods are well designed for desktop or server environments, so they are applicable for old systems. But today's technology evolves on small devices that connect with each…

Read More
7 Major Cyber Security Incidents Targeting the Healthcare Industry
7 Major Cyber Security Incidents Targeting the Healthcare Industry

Nowadays, the target of cyber attackers is money and information from as many people as possible. Therefore, the areas where the most personal information is collected become the target. Each…

Read More
Zero Trust Architecture
Zero Trust Architecture

Zero Trust is a security model introduced in 2010 by John Kindervag, a former Forrester analyst. Since then, Zero Trust has become one of the most common patterns in cybersecurity.…

Read More
The History Of Bug Bounty Program
The History Of Bug Bounty Program

Today, bug bounty programs are an increasingly common method to find and fix various vulnerabilities on the Internet. This method is used by small companies, as well as large companies…

Read More
Asus DSL-N17U Modem 0-day Vulnerability (CVE-2020-35219)
Asus DSL-N17U Modem 0-day Vulnerability (CVE-2020-35219)

The Asus DSL-N17U is a network device that usually provides wired or wireless connectivity for home users. As with many products, this network device also has software that we…

Read More
MiniWeb HTTP Server 0-day Vulnerability (CVE-2020-29596)
MiniWeb HTTP Server 0-day Vulnerability (CVE-2020-29596)

MiniWeb is open-source software that often acts as a tiny HTTP server for small systems. The software was developed in C language and received the latest update in 2018.…

Read More
Wordpress Security Tips to Protect Your Site
Wordpress Security Tips to Protect Your Site

One of the most tightly protected platforms is WordPress compared to others. However, the saying "no system is secure" is, of course, also valid for WordPress. The more known a…

Read More
FireEye Hacked
FireEye Hacked

FireEye, one of the world's largest cybersecurity companies, was attacked on December 8, 2020. The attack stated that the company's tools used in Red Team penetration tests and vulnerability assessments…

Read More