SunExpress tarafından KVKK’ a yapılan açıklamadan bazı müşteri bilgilerinin ele geçirildiği bildirildi. Veri sorumlusu sıfatını haiz Güneş Ekspres Havacılık A.Ş. (SunExpress) tarafından Kurula iletilen veri ihlal bildiriminde özetle; bilgilerine yer verilmiştir. Bilgi kaynağı KVKK sitesinde ilgili sayfa
Devamını Oku
Bugün yayınlanan Crowdstrike güncellemesi windows temelli sistemleri çökertti. Küresel BT kesintisi, havalimanları, bankalar, sağlık hizmetleri ve küresel bazı şirketlerde kaosa neden oldu. Yanlış güncelleme Crowdstrike’ e ait olmasına rağmen sadece windows temelli bilgisayarlarda mavi ekran vererek sistemlerin açılmamasına yol açtı. Crowdstrike yazılımı sensör adı verilen bir sistemle, işletim sisteminden önce […]
Devamını Oku
AWS GuardDuty is a cloud-based threat detection service that monitors your AWS accounts and workloads for malicious or unauthorized activity. You can use AWS GuardDuty to detect and respond to threats such as compromised instances, reconnaissance, port scanning, denial of service attacks, and more. AWS GuardDuty can also integrate with […]
Devamını Oku
In an era of ubiquitous Internet of Things (IoT) devices, their security has never been more crucial. The FBI, recognizing this need, advises that IoT device owners place these gadgets on a separate network. This precaution aims to mitigate the risk of hackers increasingly targeting such devices. The rationale is […]
Devamını Oku
AWS Chatbot is a service provided by Amazon Web Services (AWS). It allows you to create and deploy chatbots in various messaging channels like Slack, Amazon Chime, and Microsoft Teams. With AWS Chatbot, you can configure chatbots to monitor and interact with your AWS resources, such as Amazon CloudWatch and […]
Devamını Oku
Google is set to test a new feature in Chrome named “IP Protection,” aimed at bolstering user privacy. This feature, which masks users’ IP addresses using proxy servers, is Google’s response to the increasing misuse of IP addresses for covert tracking. IP addresses are crucial for web functionalities like traffic […]
Devamını Oku
The article from BleepingComputer reports a significant data breach involving the scraped data of 2.6 million Duolingo users, which was leaked on a hacking forum. This breach poses a risk of targeted phishing attacks using the exposed information. Key Points of the Duolingo Data Breach The Duolingo data breach highlights […]
Devamını Oku
In his Turing Award lecture titled “Reflections on Trusting Trust,” Ken Thompson delves into the complexities and inherent vulnerabilities in trusting software. He begins by acknowledging his contributions to UNIX and his collaboration with Dennis Ritchie, emphasizing the collective effort behind the project. Thompson identifies himself primarily as a programmer […]
Devamını Oku
The article from IoT For All, authored by EMQ Technologies Inc., presents a comprehensive overview of strategies to enhance the security of MQTT infrastructure systems. Here are the key strategies outlined: Building a culture of security awareness through employee training, security policies, and regular drills is also emphasized as a […]
Devamını Oku