Blog
vBulletin Vulnerability (CVE-2019-16759)
October 02, 2019

On September 25, 2019, an anonymous source issued a vulnerability to vBulletin (CMS) Content Management System.

vBulletin is an application written in php code to make it easier to manage or install the content of sites such as forums. Among them,

...
Covid-19 Mobil Tehdit Raporu
IP_Covid19_Mobile_Report

Corona/Covid-19 Mobil Tehdit Raporu

Bu rapor Corona/Covid-19 virüsü salgınının, dijital dünya üzerindeki etkilerinin incelenmesi sonucu oluşturulmuştur. Aralık 2019 tarihinde Вin Halk Cumhuriyeti’nin Wuhan kentinde başlayan ve kısa sürede tü

...
RCE & DoS Vulnerability on Exim Email Server (CVE-2019-16928)
October 1, 2019

A vulnerable security vulnerability was discovered on the popular e-mail server Open Source Exim, which allowed the remote attacker to perform DoS (Denial Of Service) attack and RCE (Remote Code Execution), a CVE-2019-16928 CVE given the critical vul...

HoneyPot Network
Cyber Intelligence Report 13 April 2020

“HoneyPot Network Cyber Intelligence Report”

This report was produced as a result of examining attacks on the "IntelProbe Honeypot Network". The first HoneyPot studies were published by Clifford Stoll in 1990 in “The Cuckoo's Egg” This concept

...
Microsoft Windows RDP RCE Vulnerability: DejaBlue
August 18, 2019

A similar Microsoft Windows vulnerability was released about 3 months after the K BlueKeep z (CVE-2019-0708) vulnerability, which was published in the Microsoft Patch Tuesday security bulletin on May 14, 2019.

This vulnerability, called ja DejaBlu

...
Zynga Data Leak
September 30, 2019

A Pakistani attacker announced that the game maker Zynga, who has more than a billion users, seized the user information of users who registered and installed oyun Words With Friends önce before 2 September 2019.

The attacker's claims that mor

...
SimJacker Vulnerability
September 17, 2019

The vulnerability discovered by ActiveMobile Security allows attackers to use a phone remotely by sending only text messages.

To exploit the vulnerability, attackers can send an SMS with a binary code to their mobile phone and perform several task

...
Top