<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>LAYERWEB Blog - Cybersecurity and Software Development</title>
        <link>https://blog.layerweb.com.tr</link>
        <description>Expert content on cybersecurity, reverse engineering, software development, and security vulnerabilities.</description>
        <lastBuildDate>Sun, 16 Nov 2025 00:00:00 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>LAYERWEB Blog - Cybersecurity and Software Development</title>
            <url>https://blog.layerweb.com.tr/logo-light.svg</url>
            <link>https://blog.layerweb.com.tr</link>
        </image>
        <copyright>© 2025 LAYERWEB. All rights reserved.</copyright>
        <item>
            <title><![CDATA[Why Wireless Keyboards, Mice & Bluetooth Dongles Must Be Encrypted]]></title>
            <link>https://blog.layerweb.com.tr/posts/wireless-keyboards-mause-security</link>
            <guid isPermaLink="false">https://blog.layerweb.com.tr/posts/wireless-keyboards-mause-security</guid>
            <pubDate>Sun, 16 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Critical security analysis of wireless keyboards and mice. Learn why unencrypted dongles are remote command injection tools, not peripherals. MouseJack, KeySniff attacks explained with defense strategies.]]></description>
            <content:encoded><![CDATA[Critical security analysis of wireless keyboards and mice. Learn why unencrypted dongles are remote command injection tools, not peripherals. MouseJack, KeySniff attacks explained with defense strategies.]]></content:encoded>
            <category>Full-Stack Security</category>
        </item>
        <item>
            <title><![CDATA[Cisco Router NAT Configuration Guide for Metro Ethernet with VLANs]]></title>
            <link>https://blog.layerweb.com.tr/posts/cisco-router-nat-configuration-guide-for-metro-ethernet</link>
            <guid isPermaLink="false">https://blog.layerweb.com.tr/posts/cisco-router-nat-configuration-guide-for-metro-ethernet</guid>
            <pubDate>Thu, 13 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Complete CCNA-level guide for configuring Cisco router as NAT gateway with Metro Ethernet connectivity and VLAN segmentation. Step-by-step configuration for enterprise network deployment with security best practices.]]></description>
            <content:encoded><![CDATA[Complete CCNA-level guide for configuring Cisco router as NAT gateway with Metro Ethernet connectivity and VLAN segmentation. Step-by-step configuration for enterprise network deployment with security best practices.]]></content:encoded>
            <category>Network Security</category>
        </item>
        <item>
            <title><![CDATA[cPanel WHM CGI DDoS Fix - defaultwebpage.cgi Security Patch]]></title>
            <link>https://blog.layerweb.com.tr/posts/cpanel-cgiddos-fix</link>
            <guid isPermaLink="false">https://blog.layerweb.com.tr/posts/cpanel-cgiddos-fix</guid>
            <pubDate>Sun, 09 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Critical cPanel WHM defaultwebpage.cgi DDoS fix for Apache and LiteSpeed servers. Prevent Layer 7 CGI flood attacks that bypass Cloudflare. Essential server security configuration for cPanel administrators.]]></description>
            <content:encoded><![CDATA[Critical cPanel WHM defaultwebpage.cgi DDoS fix for Apache and LiteSpeed servers. Prevent Layer 7 CGI flood attacks that bypass Cloudflare. Essential server security configuration for cPanel administrators.]]></content:encoded>
            <category>Full-Stack Security</category>
        </item>
        <item>
            <title><![CDATA[MikroTik RouterOS Whitelist-Based Anti-DDoS Configuration Guide]]></title>
            <link>https://blog.layerweb.com.tr/posts/mikrotik-whitelist-antiddos-configuration</link>
            <guid isPermaLink="false">https://blog.layerweb.com.tr/posts/mikrotik-whitelist-antiddos-configuration</guid>
            <pubDate>Wed, 05 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Comprehensive guide to implementing whitelist-based DDoS protection on MikroTik RouterOS using RAW firewall rules, dynamic address lists, and intelligent traffic filtering for game servers and critical infrastructure.]]></description>
            <content:encoded><![CDATA[Comprehensive guide to implementing whitelist-based DDoS protection on MikroTik RouterOS using RAW firewall rules, dynamic address lists, and intelligent traffic filtering for game servers and critical infrastructure.]]></content:encoded>
            <category>Network Security</category>
        </item>
        <item>
            <title><![CDATA[Hello World - Welcome to LayerWeb Security Blog]]></title>
            <link>https://blog.layerweb.com.tr/posts/hello-world</link>
            <guid isPermaLink="false">https://blog.layerweb.com.tr/posts/hello-world</guid>
            <pubDate>Sun, 02 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Welcome to the LayerWeb Security Blog - your trusted source for cutting-edge cybersecurity research, vulnerability analysis, penetration testing insights, and red team operations. Join us on our mission to make the digital world more secure.]]></description>
            <content:encoded><![CDATA[Welcome to the LayerWeb Security Blog - your trusted source for cutting-edge cybersecurity research, vulnerability analysis, penetration testing insights, and red team operations. Join us on our mission to make the digital world more secure.]]></content:encoded>
            <category>General</category>
        </item>
        <item>
            <title><![CDATA[CVE-2023-44487 - HTTP/2 Rapid Reset Denial of Service]]></title>
            <link>https://blog.layerweb.com.tr/vuln/cve2023-44487-Raid-Reset-DDoS-HTTP2vuln</link>
            <guid isPermaLink="false">https://blog.layerweb.com.tr/vuln/cve2023-44487-Raid-Reset-DDoS-HTTP2vuln</guid>
            <pubDate>Tue, 16 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[A remote unauthenticated attacker can exploit the HTTP/2 Rapid Reset vulnerability to perform a high-impact denial-of-service attack by rapidly opening and resetting streams, exhausting server resources.]]></description>
            <content:encoded><![CDATA[A remote unauthenticated attacker can exploit the HTTP/2 Rapid Reset vulnerability to perform a high-impact denial-of-service attack by rapidly opening and resetting streams, exhausting server resources.]]></content:encoded>
            <category>Vulnerabilities</category>
        </item>
        <item>
            <title><![CDATA[CVE-2025-41228 - VMware vSphere Client 8.0.3.0 XSS]]></title>
            <link>https://blog.layerweb.com.tr/vuln/cve2025-41228-vmwarevcenterXSS</link>
            <guid isPermaLink="false">https://blog.layerweb.com.tr/vuln/cve2025-41228-vmwarevcenterXSS</guid>
            <pubDate>Mon, 11 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Reflected XSS in VMware vSphere Client 8.0.3.0 via unsanitized query string on /folder endpoint.]]></description>
            <content:encoded><![CDATA[Reflected XSS in VMware vSphere Client 8.0.3.0 via unsanitized query string on /folder endpoint.]]></content:encoded>
            <category>Vulnerabilities</category>
        </item>
        <item>
            <title><![CDATA[CVE-2023-43320 Proxmox VE - TOTP Brute Force]]></title>
            <link>https://blog.layerweb.com.tr/vuln/cve2023-43320-ProxmoxTOTPBrute</link>
            <guid isPermaLink="false">https://blog.layerweb.com.tr/vuln/cve2023-43320-ProxmoxTOTPBrute</guid>
            <pubDate>Wed, 31 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[Defensive advisory and mitigation guidance for reported Proxmox VE TOTP brute-force activity. PoC code omitted for safety.]]></description>
            <content:encoded><![CDATA[Defensive advisory and mitigation guidance for reported Proxmox VE TOTP brute-force activity. PoC code omitted for safety.]]></content:encoded>
            <category>Vulnerabilities</category>
        </item>
        <item>
            <title><![CDATA[CVE-2023-6553 - WordPress Backup Migration Plugin Remote Code Execution]]></title>
            <link>https://blog.layerweb.com.tr/vuln/cve2023-6553-Wordpress-Backup-Migration-RCE</link>
            <guid isPermaLink="false">https://blog.layerweb.com.tr/vuln/cve2023-6553-Wordpress-Backup-Migration-RCE</guid>
            <pubDate>Mon, 11 Dec 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Unauthenticated remote code execution in WordPress Backup Migration plugin (≤1.3.7) via PHP filter chain injection through Content-Dir header manipulation. Critical web application vulnerability enabling complete server compromise.]]></description>
            <content:encoded><![CDATA[Unauthenticated remote code execution in WordPress Backup Migration plugin (≤1.3.7) via PHP filter chain injection through Content-Dir header manipulation. Critical web application vulnerability enabling complete server compromise.]]></content:encoded>
            <category>Vulnerabilities</category>
        </item>
    </channel>
</rss>