The Dos & Don’ts Against Ransomware And Phishing Attempts Since the start of the pandemic, the network chains have been scattered around more than ever before. This way, the firmness of such chains has loosened, causing cyber threats to potentially be more impactful. The constant generating of personal information and data attracts cyber attackers, who […]
How do we know that we’ve been hacked? Two most valuable questions for security teams dealing with cyber attacks is “How do we know?” and “When can we understand?” Security Kill Chain In order to answer both questions, let’s talk about the general structure first. In the cyber security world, there is a scheme called […]
Healthcare industry is suffering against rapidly increasing ransomware FBI found that the TrickBot botnet, previously used in many large-scale attacks, targeted the healthcare industry. Cyber attacks against hospitals and healthcare providers has increased more than ever with the pandemic. Solving companies’ need to find cyber security vulnerabilities promptly, cost-efficiently and effectively with a community of […]
Bug bounty programs rewarded 45 million USD worth of security bugs According to a research, a total of $ 45 million awards were distributed in one year within the scope of ‘bug bounty’ programs. Thousands of ethical hackers play an important role in the fight against cyber attackers by testing systems around the world, discovering […]
Data breaches will cause massive penalties for companies BugBounter warns companies of the penalties they may face in case of data breach. Companies that do not meet the requirements within the scope of the Personal Data Protection Law and whose data is seized may face penalties of up to millions of USD. BugBounter, which quickly […]
Ransomware exposes files when they don’t get the payment Each electronic device user transmits their own habits to their devices and performs critical transactions that require the sharing of important information. Therefore, personal data generated as a result of such transactions are also of vital importance. Being aware of this, cyber attackers demand high ransoms […]
59% of companies are subject to cyberattack through their suppliers Devices and companies are getting more and more connected with each other. In addition to the measures that companies take to protect themselves, it is vital that the suppliers they include in their chains protect themselves. The report titled “Supply chain cyber security” published by […]