Cybersecurity News CISA Adds 17 Vulnerabilities to List of Bugs Exploited in Attacks January 23, 2022 Lale Çorumlu CISAvulnerabilitycyber securitycyber security news
This Week in Cyberspace This Week in Cyberspace (15-21 January 2022) January 21, 2022 Lale Çorumlu log4jLog4ShellmalwarePhishingransomwarecyber securitysiber güvenlik bültencyber security news
Cybersecurity News The Supply Chain Needs Better Cybersecurity and Risk Management January 18, 2022 Lale Çorumlu cyber securitycyber security newscyber security tipssupply chain
Cybersecurity News Crypto Mining Software Threatens GCP Virtual Servers January 17, 2022 Lale Çorumlu GCPgoogle cloud platformmalwarecyber securitycyber security news
Cybersecurity News New Unpatched Apple Safari Browser Bug Allows Cross-Site User Tracking January 16, 2022 Lale Çorumlu appleIndexedDBIndexedDB LeaksSafaricyber securitycyber security news
Cybersecurity News GDPR Data Privacy Regulations and Impact on SaaS Companies and Their Vendors January 16, 2022 Lale Çorumlu GDPRKVKKSaaScyber securitycyber security newscyber security tips
Cybersecurity News Iranian Hackers Exploit Log4j Vulnerability to Deploy PowerShell Backdoor January 13, 2022 Lale Çorumlu log4jLog4Shellpowershellcyber securitycyber security news
Cybersecurity News Log4Shell-like Critical RCE Flaw Discovered in H2 Database Console January 7, 2022 Lale Çorumlu vulnerabilitylog4jlog4j vulnerabilitiesLog4Shellcyber securitycyber security news
Cybersecurity News It’s Time for a Unified Approach to Securing Sata, Applications, and the Edge December 30, 2021 Lale Çorumlu IT securityIT securityIT securitycyber securitycyber security news
Cybersecurity News Global Cyberattacks from Nation-State Actors Posing Greater Threats December 30, 2021 Lale Çorumlu Casey Elliscyber securitycyber security newscyber attack