PinnedBaşak ErdoğanWeb Application Firewall (WAF): Guardian of the Internet — How It Works and Why It Matters?What is a WAF and How Does It Work?Jun 20Jun 20
PinnedBaşak ErdoğaninSystem WeaknessEPSS: A New Era in Vulnerability PrioritizationThe Exploit Prediction Scoring System (EPSS) is a metric used to predict the likelihood of vulnerabilities in software being exploited…Jun 8Jun 8
PinnedBaşak ErdoğanSecurity Analysis with Open Source SBOM Projects: Using CycloneDx and Dependency- TrackSBOM (Software Bill of Materials) stands for a detailed list of all components, libraries, and dependencies used in a software project…Jun 4Jun 4
PinnedBaşak ErdoğanLeveraging Go’s Crypto Packages for Secure ApplicationsCryptographic packages in the Go language provide an essential toolkit for developing secure applications. These packages offer a wide…May 9May 9
Başak ErdoğaninSystem WeaknessUnderstanding XSS: Exploiting Web VulnerabilitiesWhat is XSS?Jul 9Jul 9
Başak ErdoğaninSystem WeaknessFinding Endpoints and Secrets in JavaScript Files for Web Application SecurityIn web application security, JavaScript files can potentially contain sensitive information. Endpoints, API keys, secret keys, and other…Jul 3Jul 3
Başak ErdoğanExploring Subdomain Enumeration: Importance, Tools, and Best PracticesIn the world of cybersecurity, reducing the attack surface and identifying potential vulnerabilities are crucial to ensuring the security…Jun 24Jun 24
Başak ErdoğanSecuring SOAP Services: Strategies to Prevent XML External Entity (XXE) AttacksSOAP (Simple Object Access Protocol) is a protocol used to facilitate information exchange between applications. It is an XML (Extensible…Jun 13Jun 13