Cybersecurity News Research: Java RMI Services Often Vulnerable to SSRF Attacks January 7, 2022 Lale Çorumlu vulnerabilityJava RMIJava RMI SSRFrpccyber securitycyber security newscyber security tipsSSRF
Cybersecurity News Log4Shell-like Critical RCE Flaw Discovered in H2 Database Console January 7, 2022 Lale Çorumlu vulnerabilitylog4jlog4j vulnerabilitiesLog4Shellcyber securitycyber security news
Cybersecurity News Google Docs Commenting Feature Exploited for Spear-Phishing January 6, 2022 Lale Çorumlu google docs phishingGoogle Dokümanlar phishinggoogle hackPhishingcyber securitycyber security news
Cybersecurity News VMware Fixed CVE-2021-22045 Heap-Overflow in Workstation, Fusion and ESXi January 6, 2022 Lale Çorumlu esxifusionvulnerabilitycyber securitycyber security newsVMware
Cybersecurity News Microsoft Code-Sign Check Bypassed to Drop Zloader Malware January 5, 2022 Lale Çorumlu vulnerabilitymalwaremicrosoftcyber securitycyber security newsZloader
Cybersecurity News New Warning on Log4j from Microsoft! January 4, 2022 Lale Çorumlu log4jlog4j vulnerabilitiesLog4Shellcyber securitycyber security newscyber security tips
Cybersecurity News Apple iOS Vulnerable to HomeKit 'doorLock' Denial of Service Bug January 3, 2022 Lale Çorumlu apple bugdoorlockios bugios homekit bugmobile securitycyber securitycyber security news
Cybersecurity News Cyber-attack on UK’s Defence Academy Caused ‘Significant’ Damage January 3, 2022 Lale Çorumlu network securitycyber securitycyber security newscyber attack
Cybersecurity News What Every Business Should Know About Log4Shell January 2, 2022 Lale Çorumlu log4jlog4j vulnerabilitiesLog4Shellcyber securitycyber security newscyber security tips
Cybersecurity News APT ‘Aquatic Panda’ Targets Universities with Log4Shell Exploit Tools December 31, 2021 Lale Çorumlu vulnerabilitylog4jLog4Shellcyber securitycyber security news