Genel

Genel, Güvenlik

Herkese Merhaba, Fortigate’ in Multiple İnterfaces Policies özelliğinden bahsedeceğiz. Ne işimize yarar diye düşünürsek normalde source ve destination interface eklediğimiz kuralları düşünün ve onu sources ve destinations olarak değiştirelim kısaca kural kalabalığından kurtarıyor diyebiliriz. Dezavantaj olarak ise (makalenin sonunda farkı ...

Read more

Genel, İşletim Sistemleri, MS Server 2012 R2

  Merhaba arkadaşlar uzun bir aradan sonra güzel bir bilgiye değinmek istedim. SNI daha önce duymuş olabilirsiniz açılımı Server Name İndicaiton dır. Dibine kadar açıkla lan diyenler için LİNK ekledim VPN açıp bakabilirsiniz J     Kısaca özetlemek gerekirse yıllardır süre gelen IIS ...

Read more

Genel

Merhaba arkadaşlar, Bugünkü konumuz SQL Server da alt versiyonlara database nasıl taşınır ondan bahsedip bir kaç kilit noktaya değineceğiz. Generate Script oluşturarak taşıma yapacağız ve kilit noktalara değineceğiz. Aslında işlem sorunsuz çalışmakta fakat DB boyutları belirli bir seviyenin üstünde olursa ...

Read more

The Hacker News

  • DeepSeek App Transmits Sensitive User and Device Data Without Encryption
    by [email protected] (The Hacker News) on 7 Şubat 2025 at 14:58

    A new audit of DeepSeek's mobile app for the Apple iOS operating system has found glaring security issues, the foremost being that it sends sensitive data over the internet sans any encryption, exposing it to interception and manipulation attacks. The assessment comes from NowSecure, which also found that the app fails to adhere to best security practices and that it collects extensive user and

  • CISA Warns of Active Exploits Targeting Trimble Cityworks Vulnerability
    by [email protected] (The Hacker News) on 7 Şubat 2025 at 12:52

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned that a security flaw impacting Trimble Cityworks GIS-centric asset management software has come under active exploitation in the wild. The vulnerability in question is CVE-2025-0994 (CVSS v4 score: 8.6), a deserialization of untrusted data bug that could permit an attacker to conduct remote code execution. "This could

  • AI-Powered Social Engineering: Reinvented Threats
    by [email protected] (The Hacker News) on 7 Şubat 2025 at 11:10

    The foundations for social engineering attacks – manipulating humans – might not have changed much over the years. It’s the vectors – how these techniques are deployed – that are evolving. And like most industries these days, AI is accelerating its evolution.  This article explores how these changes are impacting business, and how cybersecurity leaders can respond. Impersonation attacks:

  • Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling Code Injection Attacks
    by [email protected] (The Hacker News) on 7 Şubat 2025 at 11:01

    Microsoft is warning of an insecure practice wherein software developers are incorporating publicly disclosed ASP.NET machine keys from publicly accessible resources, thereby putting their applications in attackers' pathway. The tech giant's threat intelligence team said it observed limited activity in December 2024 that involved an unknown threat actor using a publicly available, static ASP.NET

  • India’s RBI Introduces Exclusive "bank.in" Domain to Combat Digital Banking Fraud
    by [email protected] (The Hacker News) on 7 Şubat 2025 at 10:32

    India's central bank, the Reserve Bank of India (RBI), said it's introducing an exclusive "bank.in" internet domain for banks in the country to combat digital financial fraud. "This initiative aims to reduce cyber security threats and malicious activities like phishing; and, streamline secure financial services, thereby enhancing trust in digital banking and payment services," the RBI said in a