Alican KirazCybersecurity Commander’s Manifesto: The Art of Tactical and Strategic Defense – Chapter 3: Build…Başarı, nasıl ki; Şans, yetenek ve çalışmanın bir formülü ile uyarlanınca elde ediliyorsa, liderlik becerileride kendi içinde bir formüle…6d ago6d ago
Alican KirazCybersecurity Commander’s Manifesto: The Art of Tactical and Strategic Defense — Chapter 2 : Shape…Liderlikte ve ekipçe karar alırken sık düşülen hatalar ve teorilerle bu hatalar ile baş etme yolları.Oct 8Oct 8
Alican KirazInvestigation of the Exploding Pager Devices Incident in Lebanon: Hardware Analysis and Operational…Firstly, based on the information I gathered following my initial research after hearing about the incident, I will present the following…Sep 24Sep 24
Alican KirazLübnan’da Yaşanan Pager Cihazlarının Infilak Etmesi Olayının İncelenmesi: Motorola Advisor Pager /…Öncelikle ilk makalemde yaptığım olayın ilk duyum aşamasındaki teorik incelemesine aşağıdaki makalemden ulaşabilirsiniz.Sep 243Sep 243
Alican KirazMotorola Advisor Pager Patlaması Incident’ı Analizi — Part 1Gündem ve olayın akışına zaten hakimsinizdir. Gelin önemli ve teknik detaylara odaklanalım. Bu yazımda öncelikle olayı oluşturan etmenleri…Sep 182Sep 182
Alican KirazOperation Olympic Games: In-Depth Incident and Threat Actor Analysis (a.k.a Stuxnet)On a cloudy Saturday in Belarus, about 400 kilometers from Minsk, Sergey Ulasen attended a friend’s wedding ceremony. If someone had told…Jul 29Jul 29
Alican KirazCybersecurity Commander’s Manifesto: The Art of Tactical and Strategic Defense — Chapter 1“The battlefield is the test of true leaders.”Jul 24Jul 24
Alican KirazDestroy the Ransomware Threat: Part 1.2 — Know your enemy!Hi, I decided to continue this unfinished series of articles aloneside our YouTube videos to focus more on the technical aspects and delve…Jun 11Jun 11
Alican KirazDestroy the Ransomware Threat: Part 1.1 — Detection and PreventionHi everyone, in this series of articles we’ll discuss a more exciting topic: ransomware. First, we will learn how to detect ransomware…Apr 24, 2023Apr 24, 2023
Alican KirazThreat Hunting for Windows Event LogsFirewall, Windows Event Logs, and Linux Audit Logs are the most basic logs that strengthen our hands when we hunt threats in an…Apr 11, 2023Apr 11, 2023