Merhabalar, öncelikle tüm katılımcıların eline sağlık diyerek başlamak istiyorum 🙂 CTF sonrasında yaptığımız değerlendirmelerde, Osint400 sorusunu bir çok arkadaşımın çözemediğini öğrenince çözümü hakkında bilgi vermek için bir writeup da ben hazırlayayım dedim. Hadi başlıyoruz 🙂 Soruya baktığımızda tabikide ilk baktığım şey ‘Karnım acıktı restorant ararken’ cümlesi oldu. Başta sadece numara verilince, numarayı sosyal mecralarda aratsamda, … Devamını oku…CyberCamp 2019 CTF OSINT400 Writeup
Maintaining your trust is an ongoing commitment of ours, and your voice drives our growing portfolio of compliance reports, attestations, and certifications. As a result of your feedback and deep interest in privacy and data security, we are happy to announce the publication of our new SOC 2 Type I Privacy report. Keeping you informed … Devamını oku…New SOC 2 Report Available: Privacy
We sat down with Eric Docktor to learn more about his 19-year career at Amazon, what’s new with cryptography, and to get his take on this year’s re:Invent conference. (Need a re:Invent recap? Check out this post by AWS CISO Steve Schmidt.) How long have you been at AWS, and what do you do in … Devamını oku…AWS Security Profile (and re:Invent 2018 wrap-up): Eric Docktor, VP of AWS Cryptography
Does AWS comply with X program? How about GDPR? What about after Brexit? And what happens with machine learning data? In the latest AWS Security & Compliance Podcast, we sit down with VP of Security Chad Woolf, who answers your compliance and data privacy questions. Including one of the most frequently asked questions from customers … Devamını oku…New podcast: VP of Security answers your compliance and data privacy questions
Two vulnerabilities discovered and patched over the summer expose Jenkins servers to mass exploitation.
Bomb threat extortion campaign yielded less than $1 for the spammers.
Cybersecurity researchers have discovered a critical vulnerability in widely used SQLite database software that exposes billions of deployments to hackers. Dubbed as ‘Magellan’ by Tencent’s Blade security team, the newly discovered SQLite flaw could allow remote attackers to execute arbitrary or malicious code on affected devices, leak program memory or crash applications. SQLite is a
New ‘Magellan’ vulnerability will haunt the app ecosystem for years to come.
Oh, Bing! Not again!
Facebook’s latest screw-up — a programming bug in Facebook website accidentally gave 1,500 third-party apps access to the unposted Facebook photos of as many as 6.8 million users. Facebook today quietly announced that it discovered a new API bug in its photo-sharing system that let 876 developers access users’ private photos which they never shared … Devamını oku…New Facebook Bug Exposed 6.8 Million Users Photos to Third-Party Apps