<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <id>https://blog.layerweb.com.tr</id>
    <title>LAYERWEB Blog - Cybersecurity and Software Development</title>
    <updated>2025-11-16T00:00:00.000Z</updated>
    <generator>https://github.com/jpmonette/feed</generator>
    <author>
        <name>LAYERWEB</name>
        <email>info@layerweb.com.tr</email>
        <uri>https://blog.layerweb.com.tr</uri>
    </author>
    <link rel="alternate" href="https://blog.layerweb.com.tr"/>
    <link rel="self" href="https://blog.layerweb.com.tr/atom.xml"/>
    <subtitle>Expert content on cybersecurity, reverse engineering, software development, and security vulnerabilities.</subtitle>
    <logo>https://blog.layerweb.com.tr/logo-light.svg</logo>
    <icon>https://blog.layerweb.com.tr/favicon.ico</icon>
    <rights>© 2025 LAYERWEB. All rights reserved.</rights>
    <entry>
        <title type="html"><![CDATA[Why Wireless Keyboards, Mice & Bluetooth Dongles Must Be Encrypted]]></title>
        <id>https://blog.layerweb.com.tr/posts/wireless-keyboards-mause-security</id>
        <link href="https://blog.layerweb.com.tr/posts/wireless-keyboards-mause-security"/>
        <updated>2025-11-16T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Critical security analysis of wireless keyboards and mice. Learn why unencrypted dongles are remote command injection tools, not peripherals. MouseJack, KeySniff attacks explained with defense strategies.]]></summary>
        <content type="html"><![CDATA[Critical security analysis of wireless keyboards and mice. Learn why unencrypted dongles are remote command injection tools, not peripherals. MouseJack, KeySniff attacks explained with defense strategies.]]></content>
        <author>
            <name>LayerWeb</name>
            <uri>https://blog.layerweb.com.tr</uri>
        </author>
        <category label="Full-Stack Security" term="Full-Stack Security"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Cisco Router NAT Configuration Guide for Metro Ethernet with VLANs]]></title>
        <id>https://blog.layerweb.com.tr/posts/cisco-router-nat-configuration-guide-for-metro-ethernet</id>
        <link href="https://blog.layerweb.com.tr/posts/cisco-router-nat-configuration-guide-for-metro-ethernet"/>
        <updated>2025-11-13T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Complete CCNA-level guide for configuring Cisco router as NAT gateway with Metro Ethernet connectivity and VLAN segmentation. Step-by-step configuration for enterprise network deployment with security best practices.]]></summary>
        <content type="html"><![CDATA[Complete CCNA-level guide for configuring Cisco router as NAT gateway with Metro Ethernet connectivity and VLAN segmentation. Step-by-step configuration for enterprise network deployment with security best practices.]]></content>
        <author>
            <name>LayerWeb</name>
            <uri>https://blog.layerweb.com.tr</uri>
        </author>
        <category label="Network Security" term="Network Security"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[cPanel WHM CGI DDoS Fix - defaultwebpage.cgi Security Patch]]></title>
        <id>https://blog.layerweb.com.tr/posts/cpanel-cgiddos-fix</id>
        <link href="https://blog.layerweb.com.tr/posts/cpanel-cgiddos-fix"/>
        <updated>2025-11-09T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Critical cPanel WHM defaultwebpage.cgi DDoS fix for Apache and LiteSpeed servers. Prevent Layer 7 CGI flood attacks that bypass Cloudflare. Essential server security configuration for cPanel administrators.]]></summary>
        <content type="html"><![CDATA[Critical cPanel WHM defaultwebpage.cgi DDoS fix for Apache and LiteSpeed servers. Prevent Layer 7 CGI flood attacks that bypass Cloudflare. Essential server security configuration for cPanel administrators.]]></content>
        <author>
            <name>LayerWeb</name>
            <uri>https://blog.layerweb.com.tr</uri>
        </author>
        <category label="Full-Stack Security" term="Full-Stack Security"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[MikroTik RouterOS Whitelist-Based Anti-DDoS Configuration Guide]]></title>
        <id>https://blog.layerweb.com.tr/posts/mikrotik-whitelist-antiddos-configuration</id>
        <link href="https://blog.layerweb.com.tr/posts/mikrotik-whitelist-antiddos-configuration"/>
        <updated>2025-11-05T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Comprehensive guide to implementing whitelist-based DDoS protection on MikroTik RouterOS using RAW firewall rules, dynamic address lists, and intelligent traffic filtering for game servers and critical infrastructure.]]></summary>
        <content type="html"><![CDATA[Comprehensive guide to implementing whitelist-based DDoS protection on MikroTik RouterOS using RAW firewall rules, dynamic address lists, and intelligent traffic filtering for game servers and critical infrastructure.]]></content>
        <author>
            <name>LAYERWEB</name>
            <uri>https://blog.layerweb.com.tr</uri>
        </author>
        <category label="Network Security" term="Network Security"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Hello World - Welcome to LayerWeb Security Blog]]></title>
        <id>https://blog.layerweb.com.tr/posts/hello-world</id>
        <link href="https://blog.layerweb.com.tr/posts/hello-world"/>
        <updated>2025-11-02T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Welcome to the LayerWeb Security Blog - your trusted source for cutting-edge cybersecurity research, vulnerability analysis, penetration testing insights, and red team operations. Join us on our mission to make the digital world more secure.]]></summary>
        <content type="html"><![CDATA[Welcome to the LayerWeb Security Blog - your trusted source for cutting-edge cybersecurity research, vulnerability analysis, penetration testing insights, and red team operations. Join us on our mission to make the digital world more secure.]]></content>
        <author>
            <name>LayerWeb Security Team</name>
            <uri>https://blog.layerweb.com.tr</uri>
        </author>
        <category label="General" term="General"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[CVE-2023-44487 - HTTP/2 Rapid Reset Denial of Service]]></title>
        <id>https://blog.layerweb.com.tr/vuln/cve2023-44487-Raid-Reset-DDoS-HTTP2vuln</id>
        <link href="https://blog.layerweb.com.tr/vuln/cve2023-44487-Raid-Reset-DDoS-HTTP2vuln"/>
        <updated>2025-09-16T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[A remote unauthenticated attacker can exploit the HTTP/2 Rapid Reset vulnerability to perform a high-impact denial-of-service attack by rapidly opening and resetting streams, exhausting server resources.]]></summary>
        <content type="html"><![CDATA[A remote unauthenticated attacker can exploit the HTTP/2 Rapid Reset vulnerability to perform a high-impact denial-of-service attack by rapidly opening and resetting streams, exhausting server resources.]]></content>
        <author>
            <name>Layerweb Security Teams</name>
            <uri>https://blog.layerweb.com.tr</uri>
        </author>
        <category label="Vulnerabilities" term="Vulnerabilities"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[CVE-2025-41228 - VMware vSphere Client 8.0.3.0 XSS]]></title>
        <id>https://blog.layerweb.com.tr/vuln/cve2025-41228-vmwarevcenterXSS</id>
        <link href="https://blog.layerweb.com.tr/vuln/cve2025-41228-vmwarevcenterXSS"/>
        <updated>2025-08-11T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Reflected XSS in VMware vSphere Client 8.0.3.0 via unsanitized query string on /folder endpoint.]]></summary>
        <content type="html"><![CDATA[Reflected XSS in VMware vSphere Client 8.0.3.0 via unsanitized query string on /folder endpoint.]]></content>
        <author>
            <name>Imraan Khan (Lich-Sec)</name>
            <uri>https://blog.layerweb.com.tr</uri>
        </author>
        <category label="Vulnerabilities" term="Vulnerabilities"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[CVE-2023-43320 Proxmox VE - TOTP Brute Force]]></title>
        <id>https://blog.layerweb.com.tr/vuln/cve2023-43320-ProxmoxTOTPBrute</id>
        <link href="https://blog.layerweb.com.tr/vuln/cve2023-43320-ProxmoxTOTPBrute"/>
        <updated>2024-01-31T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Defensive advisory and mitigation guidance for reported Proxmox VE TOTP brute-force activity. PoC code omitted for safety.]]></summary>
        <content type="html"><![CDATA[Defensive advisory and mitigation guidance for reported Proxmox VE TOTP brute-force activity. PoC code omitted for safety.]]></content>
        <author>
            <name>Cory Cline, Gabe Rust (original); Prepared by: LAYERWEB Security Team</name>
            <uri>https://blog.layerweb.com.tr</uri>
        </author>
        <category label="Vulnerabilities" term="Vulnerabilities"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[CVE-2023-6553 - WordPress Backup Migration Plugin Remote Code Execution]]></title>
        <id>https://blog.layerweb.com.tr/vuln/cve2023-6553-Wordpress-Backup-Migration-RCE</id>
        <link href="https://blog.layerweb.com.tr/vuln/cve2023-6553-Wordpress-Backup-Migration-RCE"/>
        <updated>2023-12-11T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Unauthenticated remote code execution in WordPress Backup Migration plugin (≤1.3.7) via PHP filter chain injection through Content-Dir header manipulation. Critical web application vulnerability enabling complete server compromise.]]></summary>
        <content type="html"><![CDATA[Unauthenticated remote code execution in WordPress Backup Migration plugin (≤1.3.7) via PHP filter chain injection through Content-Dir header manipulation. Critical web application vulnerability enabling complete server compromise.]]></content>
        <author>
            <name>Prepared by: LAYERWEB Security Team</name>
            <uri>https://blog.layerweb.com.tr</uri>
        </author>
        <category label="Vulnerabilities" term="Vulnerabilities"/>
    </entry>
</feed>