Alican KirazSet Up Your Own Cybersecurity-Focused AI Development, Training, and Fine-Tuning Lab at HomeAs AI applications rapidly evolve, commercial platforms like OpenAI, Gemini, and many other LLM versions are offering advanced capabilities…1d ago11d ago1
Alican KirazCybersecurity Commander’s Manifesto: The Art of Tactical and Strategic Defense – Chapter 3: Build…Başarı, nasıl ki; Şans, yetenek ve çalışmanın bir formülü ile uyarlanınca elde ediliyorsa, liderlik becerileride kendi içinde bir formüle…Oct 31Oct 31
Alican KirazCybersecurity Commander’s Manifesto: The Art of Tactical and Strategic Defense — Chapter 2 : Shape…Liderlikte ve ekipçe karar alırken sık düşülen hatalar ve teorilerle bu hatalar ile baş etme yolları.Oct 8Oct 8
Alican KirazInvestigation of the Exploding Pager Devices Incident in Lebanon: Hardware Analysis and Operational…Firstly, based on the information I gathered following my initial research after hearing about the incident, I will present the following…Sep 24Sep 24
Alican KirazLübnan’da Yaşanan Pager Cihazlarının Infilak Etmesi Olayının İncelenmesi: Motorola Advisor Pager /…Öncelikle ilk makalemde yaptığım olayın ilk duyum aşamasındaki teorik incelemesine aşağıdaki makalemden ulaşabilirsiniz.Sep 243Sep 243
Alican KirazMotorola Advisor Pager Patlaması Incident’ı Analizi — Part 1Gündem ve olayın akışına zaten hakimsinizdir. Gelin önemli ve teknik detaylara odaklanalım. Bu yazımda öncelikle olayı oluşturan etmenleri…Sep 182Sep 182
Alican KirazOperation Olympic Games: In-Depth Incident and Threat Actor Analysis (a.k.a Stuxnet)On a cloudy Saturday in Belarus, about 400 kilometers from Minsk, Sergey Ulasen attended a friend’s wedding ceremony. If someone had told…Jul 29Jul 29
Alican KirazCybersecurity Commander’s Manifesto: The Art of Tactical and Strategic Defense — Chapter 1“The battlefield is the test of true leaders.”Jul 24Jul 24
Alican KirazDestroy the Ransomware Threat: Part 1.2 — Know your enemy!Hi, I decided to continue this unfinished series of articles aloneside our YouTube videos to focus more on the technical aspects and delve…Jun 11Jun 11
Alican KirazDestroy the Ransomware Threat: Part 1.1 — Detection and PreventionHi everyone, in this series of articles we’ll discuss a more exciting topic: ransomware. First, we will learn how to detect ransomware…Apr 24, 2023Apr 24, 2023