Interviews
My research
Cyber Criminals
Introduction In recent years, high-profile cybersecurity incidents involving major entities such as Uber, Airbus, Grand Theft Auto VI, and others have highlighted a growing concern: [...]
Nov
Scammers Using Deepfake Technology
Introduction As of May 2024, the revolution and advancement of generative artificial intelligence continues to unfold with both excitement and concern. OpenAI introduced GPT-4, demonstrating [...]
Sep
Troll Hunting
IntroductionIn recent times, the significance of cyber threat intelligence for organizations has grown substantially. Consequently, the usage of products and services designed for this purpose [...]
Aug
Mini Tehdit İstihbaratı
In today’s world, where detecting and preventing targeted cyberattacks against organizations is crucial, a low-interaction honeypot system that can be easily detected with basic checks [...]
Aug
My House, My House, My Safe Place
Towards the end of 2022, when my spouse and I made the decision to settle in the United States, our first priority was to find [...]
Jul
Matryoshka
As a security researcher who trusts my instincts, I’ve been feeling the need to monitor my Gmail account’s Spam folder for quite some time. Being [...]
Jul
How I Gained Control Over My Smart Grill
The Russian Military Intelligence Department (GRU) targeted Emin Baylarov, a high-ranking bureaucrat, by deploying the notorious hacker group APT 28, also referred to as Unit [...]
Jun
Pineapple, Reality: GL-AR150
As someone who has spent years using ADSL modems provided by internet service providers and conducting security research on them (such as “How Secure are [...]
Jun
WhatsApp Scammers
IntroductionRecently, I received a number of calls and messages from foreign cell phone numbers, disturbing many users, particularly in Turkey, who have been using the [...]
May
Has e-Devlet Been Compromised?
To begin, let me clarify what I’ll conclude with: “No, it was not hacked!” So, as a Turkish citizen, can you feel relieved in this [...]
Apr
Android Error Troubleshooting
Over the years, the increasing market share of mobile devices running the Android operating system has drawn the attention not only of technology enthusiasts but [...]
Apr
Sponsored Scamming
As a security expert monitoring Twitter for updates in the cybersecurity landscape, I observed that phishing advertisements targeting banking clients started to surface on the [...]
Apr
What about you, CPCR-505?
At the start of 2012, as I began receiving invitations to deliver presentations, I decided that my first priority would be to purchase a wireless [...]
Mar
Scams in the Cryptocurrency World
Over the years, I’ve encountered scams both directly (LinkedIn fraud, Sponsored Scams) and indirectly (Who Viewed My Profile?), which has motivated me to document these [...]
Feb
Don’t Just Think “It’s Only a Printer!”
A few months ago, due to a need from my partner, I started looking for a printer. Having not owned one at home for the [...]
Feb
Starting Afresh
A few months ago, I announced on my blog and social media that I planned to take my career journey overseas. In line with this [...]
Jan
(W/C) Script Debugging
Readers will recall that in my “Man In The Proxy” blog post, a malicious JScript file (Flash-2017.js) was used to download and execute a banking [...]
Jan
Examination of Recent PayPal Phishing Attacks
PayPal is undoubtedly among the top brands most frequently impersonated worldwide. Between August and October alone, I personally received 19 phishing emails containing PayPal credential-stealing [...]
Jan
Covert Mouse
Back in 2015, I came across a product bundle on sale at an electronics store. When you purchased Kaspersky Internet Security software, you would receive [...]
Dec
Intelligence on Ransomware Decryption
Ransomware remains the most lucrative method of exploiting unauthorized access to compromised networks, posing the greatest threat to both private and public sector organizations of [...]
Dec
Man In The Proxy
Someone working at a bank like me, who enjoys reverse engineering and has a particular interest in banking malware, may often come across various samples [...]
Nov