Beware of Critical SaltStack RCE Error (CVSS Score 10)
Two serious vulnerabilities were found in the open-source Salt Stack Salt configuration that could allow a competitor to execute arbitrary code on remote servers deployed …
Knowledge pool for Information Technologies
Two serious vulnerabilities were found in the open-source Salt Stack Salt configuration that could allow a competitor to execute arbitrary code on remote servers deployed …
There are two types of approaches in today’s information security. A proactive approach is generally accepted. Penetration tests and vulnerability assessment are one of the …
Corruption, theft and abuse have now gone from paper to electronic media, and almost all of the data in public and private institutions are now …
As you use smartphones, you need to know more about the risks that accompany them and take appropriate measures. Smartphones are powerful speakers and distributors …
Let’s start by applying some tests on the target; Let’s scan the target network using Nmap. With IPs, we determined which ports are working on …
WAF (Web Application Firewall) helps protect the web application by filtering and monitoring HTTP traffic between a web application and the internet. It generally protects …
I will show you how to install GenyMotion plugin on Android Studio development tool. As you know, most emulators work slowly and because of this …
You do not have an Android processor, but you want to try some applications or because you are an Application Developer, you want to try …
Sysmon (System Monitor) is one of its tools to monitor activities on Windows operating systems in detail. It provides detailed information on the created processes, …
Cross-Site Scripting (XSS) is a weakness that occurs if the developer does not pass the input from the user through the required HTML and JavaScript …