Hacking Steps and Phases
All hackers have a series of steps to meet their demands, these steps help hackers to get important information step by step and then use that information to penetrate the…
Continue readingSolarwinds Attack and Lessons from the Incident
The Washington Post, one of the largest and oldest newspapers in the United States, reported on December 13, 2020, that many government agencies, including the U.S. Department of the Treasury…
Continue readingSIEM, SOAR and XDR Technologies
Many new safety specialists misunderstand this idea and believe the greater data you have got, the better off you’re. I’ve seen corporation register their tools to random threat intelligence feeds…
Continue readingNanotechnology Cyber Security Threats
Nanotechnology refers to the creation of helpful materials, devices and systems through matter on the metric linear unit (nm) scale, with characteristic dimensions below 100nm, and exploiting of novel phenomena…
Continue reading2021 Cyber Security Predictions
In my blog, which I started with Turkish content in 2018, I decided to continue my blog posts with English content in order to increase my international awareness. You can…
Continue reading