• Kavacık Mah. Balamir Sk. 3/1 Beykoz Istanbul
  • info@bchainconcept.com
  • EN
  • TR
logo
CONTACT
  • Home
  • About Us
  • Services
    • Blockchain Consulting
    • Project Development
    • What is NFT
    • NFTS
  • Use Cases
  • Faq
  • Blog
  • Language
    • English
    • Türkçe

Blog Detail

  • Home
  • Blog Detail
APT Actors Exploit Authentication Bypass Techniques And Pulse Secure Zero-Day
APT Actors Exploit Authentication Bypass Techniques And Pulse Secure Zero-Day

American cybersecurity firm Mandiant has recently faced a number of security incidents surrounding compromises of Pulse Secure VPN appliances...

Newly Discovered Wi-Fi Vulnerabilities Called FragAttacks Place All Mobile Devices At Risk
Newly Discovered Wi-Fi Vulnerabilities Called FragAttacks Place All Mobile Devices At Risk

IFragmentation and aggregation attacks—or frag attacks—refer to a series of design flaws and programming security vulnerabilities affecting Wi-Fi devices...

Misconfiguration Of Third Party Mobile Apps Exposes The Data Of 100 Million Users
Misconfiguration Of Third Party Mobile Apps Exposes The Data Of 100 Million Users

Despite the obvious benefits of contemporary cloud-based, mobile application development solutions—such as cloud storage, notification...

logo-ft

© BchainConcept 2021.
All Right Reserved.

info@bchainconcept.com

Kavacık Mah. Balamir Sk. 3/1 Beykoz Istanbul

  • Home
  • About Us
  • Use Cases
  • Faq
  • Blog
  • Contact
Subscribe

Subscribe to our email newsletter for useful tips and valuable resources.