Archives

Genel, Güvenlik

Herkese Merhaba, bugün SEP 14 (Symantec Endpoint Protection) Cloud uygulamasında Pending License Activation hatasının çözümünü anlatacağım. Öncelikle şunu belirteyim Cloud sürümünde client e yüklediğimizde bu hatayı alıyorsanız 4 saat e kadar düzelme ihtimali var yani hemen işlem yapmak zorunda değilsiniz. ...

Read more

Genel, İşletim Sistemleri, Windows 10

Bu makalemde size ufak çaplı yeni Windows 10 un ilk ön izlenimini anlatmak istiyorum. Klasik Windows ve metro görünümle birleşmiş çok tatlı bir arayüz sunuluyor bize. Gerek görsellik gerek erişim açısından beklenilenin üstünde bir işletim sistemi. Not: Windows 10 ta ...

Read more

The Hacker News

  • Recover from Ransomware in 5 Minutes—We will Teach You How!
    by [email protected] (The Hacker News) on 18 Nisan 2024 at 11:17

    Super Low RPO with Continuous Data Protection:Dial Back to Just Seconds Before an Attack Zerto, a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near real-time. This solution leverages continuous data protection (CDP) to ensure all workloads have the lowest recovery point objective (RPO) possible. The most valuable thing about CDP is that it does not use

  • How to Conduct Advanced Static Analysis in a Malware Sandbox
    by [email protected] (The Hacker News) on 18 Nisan 2024 at 10:31

    Sandboxes are synonymous with dynamic malware analysis. They help to execute malicious files in a safe virtual environment and observe their behavior. However, they also offer plenty of value in terms of static analysis. See these five scenarios where a sandbox can prove to be a useful tool in your investigations. Detecting Threats in PDFs PDF files are frequently exploited by threat actors to

  • New Android Trojan 'SoumniBot' Evades Detection with Clever Tricks
    by [email protected] (The Hacker News) on 18 Nisan 2024 at 10:31

    A new Android trojan called SoumniBot has been detected in the wild targeting users in South Korea by leveraging weaknesses in the manifest extraction and parsing procedure. The malware is "notable for an unconventional approach to evading analysis and detection, namely obfuscation of the Android manifest," Kaspersky researcher Dmitry Kalinin said in a technical analysis.

  • Global Police Operation Disrupts 'LabHost' Phishing Service, Over 30 Arrested Worldwide
    by [email protected] (The Hacker News) on 18 Nisan 2024 at 10:28

    As many as 37 individuals have been arrested as part of an international crackdown on a cybercrime service called LabHost that has been used by criminal actors to steal personal credentials from victims around the world. Described as one of the largest Phishing-as-a-Service (PhaaS) providers, LabHost offered phishing pages targeting banks, high-profile organizations, and other service

  • Hackers Exploit OpenMetadata Flaws to Mine Crypto on Kubernetes
    by [email protected] (The Hacker News) on 18 Nisan 2024 at 05:54

    Threat actors are actively exploiting critical vulnerabilities in OpenMetadata to gain unauthorized access to Kubernetes workloads and leverage them for cryptocurrency mining activity. That's according to the Microsoft Threat Intelligence team, which said the flaws have been weaponized since the start of April 2024. OpenMetadata is an open-source platform that operates as a