Wordpress Security Tips to Protect Your Site
Wordpress Security Tips to Protect Your Site

One of the most tightly protected platforms is WordPress compared to others. However, the saying "no system is secure" is, of course, also valid for WordPress. The more known a…

Read More
FireEye Hacked
FireEye Hacked

FireEye, one of the world's largest cybersecurity companies, was attacked on December 8, 2020. The attack stated that the company's tools used in Red Team penetration tests and vulnerability assessments…

Read More
The Hidden Threat in Emails: Ransomware
The Hidden Threat in Emails: Ransomware

We know that social engineering attacks are continuously being made by cyber attackers using fake emails. Using fake emails, they can tell you that you won a lottery and ask…

Read More
Zerologon Vulnerability: Becoming a domain admin in 10 seconds CVE-2020-1472
Zerologon Vulnerability: Becoming a domain admin in 10 seconds CVE-2020-1472

A security firm named Secura has published a white paper of a vulnerability (CVE-2020-1472) affecting Microsoft's Netlogon authentication component. The vulnerability allows unauthorized code execution on…

Read More
Your Startup May Need a Security Test
Your Startup May Need a Security Test

Overview Web applications are critical for all organizations, especially for startups, when it involves building customer trust, in a very short time. An application for a startup is the first…

Read More
What Are The Risks Of Bring Your Own Device (BYOD) Application In Terms Of Information Security?
What Are The Risks Of Bring Your Own Device (BYOD) Application In Terms Of Information Security?

This article considers the risks of “ Bring Your Device” method that enables using personal mobile devices in business life in terms of information security and the policies that should…

Read More
Wordpress File Manager Plugin Vulnerability CVE-2020-25213
Wordpress File Manager Plugin Vulnerability CVE-2020-25213

A critical vulnerability was detected in WordPress's file management plugin, one of the most used content management systems. This vulnerability can lead to the complete hijacking of…

Read More
How to Protect From Cyber Attacks While Working From Home
How to Protect From Cyber Attacks While Working From Home

 During the pandemic, daily habits such as the workplaces, work conditions and work methods of the people around the world are changing. Various employers say their employees to…

Read More