Cybersecurity News Uber Dismisses Vulnerability That Lets You Email Anyone as Uber! January 2, 2022 Lale Çorumlu vulnerabilitycyber securitycyber security newsuberuber vulnerability
Cybersecurity News What Every Business Should Know About Log4Shell January 2, 2022 Lale Çorumlu log4jlog4j vulnerabilitiesLog4Shellcyber securitycyber security newscyber security tips
Cybersecurity News ESET Announces 22 Cybersecurity Statistics for 2022 January 1, 2022 Lale Çorumlu esetlog4jmalwareransomwarecyber securitycyber security newscyber security tips
Cybersecurity News Another T-Mobile Cyberattack Reportedly Exposed Customer Info and SIMs December 30, 2021 Lale Çorumlu cyber attackscyber securitycyber security newscyber attackt mobilet mobile hack
Cybersecurity News LAPSUS$ Hackers Claim to Have Breached Microsoft and Authentication Firm Okta March 23, 2022 Lale Çorumlu data breachLapsus$microsoftoktacyber securitycyber security news
Cybersecurity News New Linux Botnet Exploits Log4J, Uses DNS Tunneling for Comms March 17, 2022 Lale Çorumlu botnetlinuxlog4jLog4Shellcyber securitycyber security news
Cybersecurity News German Court Rules Websites Embedding Google Fonts Violates GDPR January 31, 2022 Lale Çorumlu GDPRgoogle fontsKVKKcyber securitycyber security news
Cybersecurity News Over 90 WordPress Themes, Plugins Backdoored in Supply Chain Attack January 22, 2022 Lale Çorumlu jetpackcyber securitycyber security newssupply chainwordpresswordpress security
Cybersecurity News 4 Essential Secyrity Skills for Modern Application Development January 13, 2022 Lale Çorumlu securitycyber securitycyber security newscyber security tipsapplication development
Cybersecurity News What is a Buffer Overflow Attack and How to Avoid it? January 9, 2022 Lale Çorumlu buffer overflow attackwhat is the buffer overflow attackbuffer owerflowbuffer owerflow attackcyber securitycyber security newscyber security tips