İçeriğe geç

Datakey Bilişim Blog

Datakey Bilişim Ltd. Şti.

  • Başlangıç
  • Teknik Yazılar
    • Genel
    • Acronis
    • Ares Commander
    • Kaspersky
    • Forcepoint
    • Fortigate
    • Sophos
    • Trend Micro
  • Download’s
  • Hakkımızda
  • İletişim

Kaspersky Security Center – Güvenli Uygulama Tanımlama Video

2 Şubat 201818 Haziran 2018Enver ÇOLAKOĞLU

Kaspersky Security Center – Güvenli Uygulama Tanımlama Video

Genel, Kaspersky Kaspersky Config Exclusion and trusted zone

Yazı dolaşımı

← Kaspersky Secure Mail Gateway Nedir? Özellikleri Nelerdir?
Veeam Backup & Replication →

Datakey Site Statistics

  • Users online: 0 
  • Visitors today : 15
  • Page views today : 21
  • Total visitors : 70,445
  • Total page view: 94,087




Sizce En İyi DLP Programı Hangisi?

Sonuçları görüntüle

Yükleniyor ... Yükleniyor ...
  • Anket Arşivi

Sizce En İyi Antivirüs Çözümü Nedir?

Sonuçları görüntüle

Yükleniyor ... Yükleniyor ...
  • Anket Arşivi

RSS Kaspersky LAB

  • Zero-day vulnerability in Desktop Window Manager (CVE-2021-28310) used in the wild 13 Nisan 2021
    CVE-2021-28310 is an out-of-bounds (OOB) write vulnerability in dwmcore.dll, which is part of Desktop Window Manager (dwm.exe). We believe it is exploited in the wild, potentially by several threat actors.
    Boris Larin, Costin Raiu, Brian Bartholomew
  • Malicious code in APKPure app 9 Nisan 2021
    Malicious code was detected in version 3.17.18 of the APKPure alternative app store for Android. We recommend deleting the infected version and installing APKPure 3.17.19 asap.
    Igor Golovin, Anton Kivva
  • The leap of a Cycldek-related threat actor 5 Nisan 2021
    The investigation described in this article started with one such file which caught our attention due to the various improvements it brought to this well-known infection vector.
    Ivan Kwiatkowski, Pierre Delcher, Mark Lechtik
  • Browser lockers: extortion disguised as a fine 2 Nisan 2021
    In this article we discuss browser lockers that mimic law enforcement websites.
    AMR
  • Financial Cyberthreats in 2020 31 Mart 2021
    This research is a continuation of our annual financial threat reports providing an overview of the latest trends and key events across the financial threat landscape. The study covers the common phishing threats, along with Windows and Android-based financial malware.
    Kaspersky

RSS TrendMicro

  • Trend Micro Offerings Are FedRAMP Authorized and Available on AWS 14 Nisan 2021
    New support for U.S. federal agencies accelerating secure cloud adoption in 2021
  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G 8 Nisan 2021
    Streamlined security for IoT devices and networks helps accelerate manufacturing digital transformation
  • Trend Micro Receives 5-Star Rating in 2021 CRN® Partner Program Guide 30 Mart 2021
    Tech publication is IT channel's most widely read title
  • Smart Factory Cyber Attacks Knock Out Production for Days 29 Mart 2021
    Trend Micro research reveals lack of IT-OT collaboration is holding back security projects
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud 17 Mart 2021
    Trend Micro is one of the first security SaaS providers to offer flexible platform of cloud security services under single listing in AWS Marketplace, enabling self-service protection

RSS MailStore ChangeLog

  • MailStore Server 13.0.4 24 Kasım 2020
    Improved DATEV EMA migration profile allows configuration of the timeout. Improved DATEV EMA migration profile supports adjustment of error handling via JSON control file.
  • MailStore Server 13.0.5 24 Kasım 2020
    Fixed Directory Services: "Sync only these groups" filter behaves different for Microsoft 365 (Modern Authentication) than for other directory services.
  • MailStore Server 13.0.3 28 Ekim 2020
    Improved Replaced "Ignore SSL Warnings" label with "Accept all certificates" in archive and export profiles to resolve confusion around MailStore's own warnings if the option is enabled. The behavior itself remains as is, as "Accept all certificates" is an insecure setting. Fixed Certificate warnings cause RunProfileArc audit event of type "Error". Fixed Client and Outlook […]
  • MailStore Server 13.0.2 10 Ağustos 2020
    Note Before updating from version 13.0.1: If the directory service type Microsoft 365 (Modern Authentication) is used, please check if there are MailStore users whose email addresses contain upper case letters. In such a case, please contact tech support for assistance in preparing the update. Fixed Directory Services: When using Microsoft 365 (Modern Authentication), email […]
  • MailStore Server 13.0.1 16 Temmuz 2020
    Fixed Directory Services: Incomplete list of email addresses when using Microsoft 365 (Modern Authentication) profile and if Azure AD is synchronized with an Active Directory.

RSS Son Etkin Virüsler

  • Troj/Zbot-PJO 14 Nisan 2021
  • Troj/Formbo-AAE 14 Nisan 2021
  • VBS/DwnLdr-AAPM 14 Nisan 2021
  • Troj/TeslaA-AOG 14 Nisan 2021
  • Troj/Kryptik-WI 14 Nisan 2021
  • Troj/Steal-BIF 14 Nisan 2021
  • Troj/TeslaA-AOH 14 Nisan 2021
  • Troj/Remcos-AAG 14 Nisan 2021
  • Troj/MSILIn-APB 14 Nisan 2021
  • Troj/Formbo-AAF 14 Nisan 2021

RSS Google Security Blog

  • Rust in the Linux kernel 14 Nisan 2021
    Posted by Wedson Almeida Filho, Android Team In our previous post, we announced that Android now supports the Rust programming language for developing the OS itself. Related to this, we are also participating in the effort to evaluate the use of Rust as a supported language for developing the Linux kernel. In this post, we […]
    Scott Westover
  • Rust in the Android platform 6 Nisan 2021
    Posted by Jeff Vander Stoep and Stephen Hines, Android Team Correctness of code in the Android platform is a top priority for the security, stability, and quality of each Android release. Memory safety bugs in C and C++ continue to be the most-difficult-to-address source of incorrectness. We invest a great deal of effort and resources […]
    Scott Westover
  • Announcing the Android Ready SE Alliance 25 Mart 2021
    Posted by Sudhi Herle and Jason Wong, Android Team When the Pixel 3 launched in 2018, it had a new tamper-resistant hardware enclave called Titan M. In addition to being a root-of-trust for Pixel software and firmware, it also enabled tamper-resistant key storage for Android Apps using StrongBox. StrongBox is an implementation of the Keymaster […]
    Scott Westover
  • Announcing the winners of the 2020 GCP VRP Prize 17 Mart 2021
    Posted by Harshvardhan Sharma, Information Security Engineer, Google We first announced the GCP VRP Prize in 2019 to encourage security researchers to focus on the security of Google Cloud Platform (GCP), in turn helping us make GCP more secure for our users, customers, and the internet at large. In the first iteration of the prize, we […]
    Sarah O'Rourke
  • Google, HTTPS, and device compatibility 15 Mart 2021
    Posted by Ryan Hurst, Product Management, Google Trust ServicesEncryption is a fundamental building block when you’re on a mission to organize the world’s information and make it universally accessible with strong security and privacy. This is why a little over four years ago we created Google Trust Services—our publicly trusted Certificate Authority (CA).The road to […]
    Kaylin Trychon

RSS Sophos Security Blog

  • Microsoft’s April update patches 114 bugs—half of which allow remote code execution 13 Nisan 2021
    The fourth Patch Tuesday of 2021 is another big one. Today, Microsoft revealed 114 vulnerabilities fixed in the monthly security, over half of which could potentially be exploited for remote code execution by attackers. Of the 55 remote execution bugs, over half were tied to Windows’ Remote Procedure Call (RPC) interface. Four more were Microsoft […]
    gallagherseanm
  • Compromised Exchange server hosting cryptojacker targeting other Exchange servers 13 Nisan 2021
    An ouroboros of malicious cryptominers takes advantage of the ProxyLogon exploit
    Andrew Brandt
  • The unintended consequences of rewarding beg bounty hunters 7 Nisan 2021
    This is the third article in a series on the phenomenon of “beg bounty" hunters. The first two articles consider what it is, why people do it, and how. This one details the experience of one particular target.
    Chester Wisniewski
  • New features in the XG Firewall v18 MR5 release 6 Nisan 2021
    Every maintenance release (MR) for XG Firewall v18 brings compelling new features, including a variety of performance, stability, and security enhancements. MR5 is no exception. What’s new in v18 MR5 VPN enhancements A huge 50% increase in concurrent IPSec VPN tunnel capacity across the line Port 443 sharing between SSL VPN and the Web Application […]
    Chris McCormack
  • Beg bounty hunting – why do people do it, and how? 6 Nisan 2021
    I recently wrote a Sophos News article on the whole phenomenon of “beg bounties” and invited organizations that had been affected to get in touch. Many did and some had amazing stories to tell. In this article I will explain what I learned about why people become beg bounty hunters and how they approach it. […]
    Chester Wisniewski

RSS Force Point

  • How Three Forcepoint Customers Protect Their Data While Enabling Productivity 12 Nisan 2021
    Why must we accept that breaches are inevitable? While traditional data protection provides visibility into your employee’s data activity, it lacks the context behind user interactions. Systems struggle to distinguish between legitimate and risky data usage, triggering excessive alerts that overwhelm IT security teams.
    Kim Cook
  • EMEA Perspective - Build Trust like a Bank 8 Nisan 2021
    It’s a mighty enviable position to be in, that of an industry people trust most with their data! Banks are true models of resilience, their customers see them as safe and robust and that puts them in the position of having a sterling reputation to uphold. And yet, in a recent SC Media UK webcast, […]
    Team EMEA
  • It’s Time to Take a New Path to SASE 6 Nisan 2021
    Chances are you’re reading this blog post from your laptop at home. Perhaps, you haven’t been in the office in weeks, if not months. Who knows when you’ll badge back into the lobby? And when you do, you’ll probably be sitting in one of those flexible, shared workspaces rather than a personal cubicle or office. […]
    Jim Fulton
  • Zero Trust and SASE: Teaming Up to Stop Threats 31 Mart 2021
    Part of our ongoing series about Zero Trust and SASE Spring is here and that means teams-of-superheroes movies aren’t far behind (studios no longer wait until summer). It also means we’ll see unfortunate portrayals of cybersecurity threats as villains who are battled to the death (and presumably vanquished) by whatever a particular vendor is hawking […]
    Jim Fulton
  • “Tiny Crimes” – How Minor Mistakes When Remote Working Could Lead to Major Cybersecurity Breaches (Part 2) 30 Mart 2021
    Part Two - Read Part One here In this post, we'll continue our exploration of the recent study Forcepoint undertook into the shifts and changes impacting office workers under work from home mandates. Exploring whether security behaviors changed due to this shift in working patterns, we surveyed 2000 office workers in Germany and the UK, […]
    Dr. Margaret Cunningham
  • Forcepoint Honored to be a Finalist in Two Microsoft Security 20/20 Award Categories 29 Mart 2021
    When Microsoft announced the finalist s for their upcoming Microsoft Security 20/20 awards, many of us here at Forcepoint were pumped to be nominated in two categories: Most Transformative Integration Partner and Zero Trust Champion - ISV . For us, these nominations serve as a testament to the work we’ve done with Microsoft over the […]
    Connie Dodmead
  • “Tiny Crimes” – How Minor Mistakes When Remote Working Could Lead to Major Cybersecurity Breaches (Part 1) 25 Mart 2021
    Part One - Read Part Two here The coronavirus pandemic caused a mass shift to remote working, and IT teams met the numerous challenges to keep everyone connected and ready to work. However, how do major societal shifts impact the people behind the keyboards? Does it change their behaviors? Does it negatively impact their wellbeing? […]
    Dr. Margaret Cunningham
  • The New Cybersecurity Equation: Anywhere Worker + Always Verify = Zero Trust 24 Mart 2021
    This is part of our ongoing series about Zero Trust . One of the big changes coming in 2021 is the ‘rebound’ from working-from-home to more of a hybrid model in which people work a few days at home, a day or two in an office (in shared ‘hoteling’ spaces), and even on the road […]
    Jim Fulton
  • Forcepoint Next-Gen Firewall with Secure SD-WAN Achieves Top Ratings from CyberRatings.org 23 Mart 2021
    Der Schutz Ihrer Organisation, Ihrer Mitarbeiter und Ihrer Daten beginnt bei Ihrer ersten Verteidigungslinie. Die Next Generation Firewall von Forcepoint bietet eine softwarebasierte Netzwerksicherheitslösung, die auf Skalierbarkeit, Geschwindigkeit, Zero-Touch-Bereitstellungen und granulare Steuerelemente basiert, um Ihren Perimeter zu schützen – egal, wo er sich befindet. Forcepoint NGFW ist eine umfassende Lösung, die effiziente Sicherheit, 360-Grad-Sichtbarkeit und […]
    Cat Allen
  • See Zero Trust in Action at the Zero Trust Demo Forum 22 Mart 2021
    Zero Trust is a hot topic , but one that can be a little confusing. Is it a product? Is it a specific technology? ( Answer : Neither, it’s a set of principles for doing cybersecurity that requires explicit permission every time somebody tries to access resources or use data).
    Jim Fulton

RSS Fortinet

  • Deep Analysis: New FormBook Variant Delivered in Phishing Campaign – Part I 12 Nisan 2021
    FortiGuard Labs captured a phishing campaign that was sending a Microsoft PowerPoint document as an email attachment to spread the new variant of the FormBook malware. Learn more.
  • Did You File Your Taxes Yet? 2 Nisan 2021
    The FortiGuard Labs team shares a number of lures being used by malicious actors in tax scams, how they are being used, and what you can do to mitigate these risks. Read for more on protections and mitigations.
  • Defending Against Critical F5 Vulnerabilities 23 Mart 2021
    FortiGuard Labs provides more details on reports of active in-the-wild exploitation of F5 Big-IP appliances. Read for additional information on protections and mitigations.
  • New DearCry Ransomware Targets Microsoft Exchange Server Vulnerabilities 12 Mart 2021
    FortiGuard Labs provides initial information on a new ransomware campaign, known as DearCry, which exploits recent Microsoft Exchange Server vulnerabilities. Microsoft has released patches for these vulnerabilities. Learn more.
  • Whitelist Me, Maybe? “Netbounce” Threat Actor Tries A Bold Approach To Evade Detection 11 Mart 2021
    FortiGuard Labs research uncovers a new threat actor, using social engineering to have their malware evade detection and look as legitimate as possible. Learn more.
  • Fortinet Addresses Latest Microsoft Exchange Server Exploits 8 Mart 2021
    FortiGuard Labs provides more details on recent Microsoft Exchange Server exploits. Read more.
  • FortiGuard Labs Threat Report: Disruption Key Threat Trend in 2020 24 Şubat 2021
    Explore security research and threat intelligence highlights from the latest semiannual FortiGuard Labs Global Threat Landscape Report.
  • New Bazar Trojan Variant is Being Spread in Recent Phishing Campaign – Part I 12 Şubat 2021
    FortiGuard Labs recently noticed a suspicious email through our SPAM monitoring system designed to entice victims into opening a web page to download an executable file. Learn more about our research on this new variant of the Bazar malware.
  • New Bazar Trojan Variant is Being Spread in Recent Phishing Campaign – Part II 12 Şubat 2021
    FortiGuard Labs recently detected a suspicious email found to be a new variant of the Bazar malware. Read the second part of our research analysis to find out additional details about anti-analysis techniques and more.
  • New Variant of Ursnif Continuously Targeting Italy 12 Ocak 2021
    The FortiGuard Labs team detected a phishing campaign in the wild that was spreading a fresh variant of the Ursnif banking Trojan via an attached MS Word document that is continuously targeting Italy. Learn more.

Son Yazılar

  • ForcePoint ile CV Verilerinin USB Yolu İle Dışarı Sızmasını Engelleyin
  • Acronis Backup 12.5 ile Yedekleme Planı Nasıl Dışa ve İçe Aktarılır
  • ForcePoint ile CAD Tasarım Verilerinin USB Yolu İle Dışarı Sızmasını Engelleyin
  • ForcePoint ile T.C. Kimlik Verilerinin One Drive Yolu İle Dışarı Sızmasını Engelleyin
  • ForcePoint ile CV Verilerinin One Drive Yolu İle Dışarı Sızmasını Engelleyin
  • ForcePoint ile Cad Verilerinin One Drive Yolu İle Dışarı Sızmasını Engelleyin
  • FortiSIEM Genel Bakış
  • GDPR Nedir?
  • ForcePoint ile T.C. Kimlik Verilerinin Mail Yolu İle Dışarı Sızmasını Engelleyin
  • ForcePoint ile CV Verilerinin Mail Yolu İle Dışarı Sızmasını Engelleyin

Kategoriler

  • Acronis
  • Ares Commander
  • Forcepoint
  • Fortigate
  • Genel
  • Kaspersky
  • Sophos
  • Trend Micro

Etiketler

Acronis Backup Acronis Destek Acronis Snap Deploy alternatif AutoCAD ARES 3'lü CAD ARES CAD ARESCAD arescad fiyat AresCAD Türkiye Ares Commander Ares Commander fiyat ARES Commander Türkiye ARES fiyat Ares Kudo ARES türkiye AutoCAD CAD CAD programı CV güvenliği DLP DLP Programı DWG en iyi cad programı Exchange Backup GFI Türkiye Graebert Kasperksy Destek Kaspersky Destek Mail Arşivleme mail backup MailStore destek MailStore fiyat mailstore türkiye Mail Yedekleme mail yedekleme programı Online CAD Safetica destek Safetica Fiyat Safetica türkiye Sophos Sophos fiyat sophos kurulum Trend Micro Trend Micro Antivirus Veri koruma
Gururla sunan WordPress | Tema: ThemeGrill tarafından Radiate.