Interviews

My research

Cyber Criminals

Introduction In recent years, high-profile cybersecurity incidents involving major entities such as Uber, Airbus, Grand Theft Auto VI, and others have highlighted a growing concern: [...]

Scammers Using Deepfake Technology

Introduction As of May 2024, the revolution and advancement of generative artificial intelligence continues to unfold with both excitement and concern. OpenAI introduced GPT-4, demonstrating [...]

Troll Hunting

IntroductionIn recent times, the significance of cyber threat intelligence for organizations has grown substantially. Consequently, the usage of products and services designed for this purpose [...]

Mini Tehdit İstihbaratı

In today’s world, where detecting and preventing targeted cyberattacks against organizations is crucial, a low-interaction honeypot system that can be easily detected with basic checks [...]

My House, My House, My Safe Place

Towards the end of 2022, when my spouse and I made the decision to settle in the United States, our first priority was to find [...]

Matryoshka

As a security researcher who trusts my instincts, I’ve been feeling the need to monitor my Gmail account’s Spam folder for quite some time. Being [...]

How I Gained Control Over My Smart Grill

The Russian Military Intelligence Department (GRU) targeted Emin Baylarov, a high-ranking bureaucrat, by deploying the notorious hacker group APT 28, also referred to as Unit [...]

Pineapple, Reality: GL-AR150

As someone who has spent years using ADSL modems provided by internet service providers and conducting security research on them (such as “How Secure are [...]

WhatsApp Scammers

IntroductionRecently, I received a number of calls and messages from foreign cell phone numbers, disturbing many users, particularly in Turkey, who have been using the [...]

Has e-Devlet Been Compromised?

To begin, let me clarify what I’ll conclude with: “No, it was not hacked!” So, as a Turkish citizen, can you feel relieved in this [...]

Android Error Troubleshooting

Over the years, the increasing market share of mobile devices running the Android operating system has drawn the attention not only of technology enthusiasts but [...]

Sponsored Scamming

As a security expert monitoring Twitter for updates in the cybersecurity landscape, I observed that phishing advertisements targeting banking clients started to surface on the [...]

What about you, CPCR-505?

At the start of 2012, as I began receiving invitations to deliver presentations, I decided that my first priority would be to purchase a wireless [...]

Scams in the Cryptocurrency World

Over the years, I’ve encountered scams both directly (LinkedIn fraud, Sponsored Scams) and indirectly (Who Viewed My Profile?), which has motivated me to document these [...]

Don’t Just Think “It’s Only a Printer!”

A few months ago, due to a need from my partner, I started looking for a printer. Having not owned one at home for the [...]

Starting Afresh

A few months ago, I announced on my blog and social media that I planned to take my career journey overseas. In line with this [...]

(W/C) Script Debugging

Readers will recall that in my “Man In The Proxy” blog post, a malicious JScript file (Flash-2017.js) was used to download and execute a banking [...]

Examination of Recent PayPal Phishing Attacks

PayPal is undoubtedly among the top brands most frequently impersonated worldwide. Between August and October alone, I personally received 19 phishing emails containing PayPal credential-stealing [...]

Covert Mouse

Back in 2015, I came across a product bundle on sale at an electronics store. When you purchased Kaspersky Internet Security software, you would receive [...]

Intelligence on Ransomware Decryption

Ransomware remains the most lucrative method of exploiting unauthorized access to compromised networks, posing the greatest threat to both private and public sector organizations of [...]

Man In The Proxy

Someone working at a bank like me, who enjoys reverse engineering and has a particular interest in banking malware, may often come across various samples [...]