Alican KirazDestroy the Ransomware Threat: Part 1.1 — Detection and PreventionHi everyone, in this series of articles we’ll discuss a more exciting topic: ransomware. First, we will learn how to detect ransomware…9 min read·Apr 24, 2023----
Alican KirazThreat Hunting for Windows Event LogsFirewall, Windows Event Logs, and Linux Audit Logs are the most basic logs that strengthen our hands when we hunt threats in an…5 min read·Apr 11, 2023----
Alican KirazCyber Security -Incident Response Part 4: Post-Incident Activity| ENHi everyone, In the last step of our Incident Response series, I will discuss Post-Incident Activities. Throughout our IR series, we…6 min read·Apr 6, 2023----
Alican KirazMy Blue Team Certification Journey and Creating Your Own Blue Team Certification RoadmapHi everyone, you know how much I am interested in certificate programs :) You often ask me questions about the certificates I have earned…8 min read·Apr 2, 2023--2--2
Alican KirazCyber Security - Incident Response Part 3.3: Recovery | ENHi everyone, after a long break, we continue with our Incident Response series’s second to last article. At this stage, we will…4 min read·Mar 30, 2023----
Alican KirazThreat Hunting for Windows RegistryThe registry is a file system by Microsoft Windows operating systems that stores application settings, low-level system settings, and user…3 min read·Aug 30, 2022--1--1
Alican KirazinTrendyol TechCyber Security -Incident Response Part 3.2: Eradication |ENIn this part of our series, we will ensure that the system(s) or Network(s) affected by the attack after the Containment phase are…4 min read·May 29, 2022----
Alican KirazinTrendyol TechCyber Security -Incident Response Part 3.1: Containment |ENIn this part of our series, we will examine a security breach incident where the defense layer of our system or systems was somehow…6 min read·May 5, 2022----
Alican KirazinTrendyol TechCyber Security -Incident Response Part 2.2: Analysis |ENIn this part of my Article Series, we will focus on the Analysis phase. We will write detection rules on HIDS, NIDS, and SIEM systems that…12 min read·Apr 25, 2022----
Alican KirazinTrendyol TechCyber Security -Incident Response Part 2.1: Installation of Detection Systems | ENAt this stage of my article series; We will focus on the monitoring, event tracking, and detection phases of our corporate inventories…11 min read·Apr 21, 2022----