What is Carbon Black EDR? How to Use It? – Part 2
In the previous section, we explained Carbon Black EDR (Endpoint Detection and Response) and the “Detect” section. Lastly, we stayed in the “Watchlist” tab in …
Knowledge pool for Information Technologies
In the previous section, we explained Carbon Black EDR (Endpoint Detection and Response) and the “Detect” section. Lastly, we stayed in the “Watchlist” tab in …
The zero-day vulnerability that emerged in Google Chrome was shown as high severity. An update has been released by Google. If your current version is …
The Web for Pentester application is a laboratory environment that can be used in web penetration testing training. Developed by PentesterLab, this platform contains vulnerabilities …
Thycotic Secret Server is simply a “Password Vault“. Today, privileged accounts and passwords have become invaluable targets for hackers. Thycotic Secret Server is a privileged …
Honeypot; They are decoy servers that are used to gather information about attackers or users who access information systems without authorization. A honeypot can usually …
Sysmon is a tool developed by Microsoft that allows recording the activities on the device it is on. It provides detailed information for activities such …
Fileless malware is the malware that maliciously uses existing software (Ex: PowerShell) on the device to infect a device, instead of installing new software on …
The most basic characteristic of the services offered by MDR (Managed Detection and Response), apart from classical attacks, is to detect advanced attacks in detail …
A critical vulnerability (CVE-2021-44228) has been reported to assist log4j2. The Apache Log4j vulnerability advances the most widely used log collection framework in Java. Security …
Uniscan is a very useful, simple and useful web scanner tool. It is console-based. It’s a pretty neat tool with parameters. Uniscan is essentially an …