Alican KirazDestroy the Ransomware Threat: Part 1.2 — Know your enemy!Hi, I decided to continue this unfinished series of articles aloneside our YouTube videos to focus more on the technical aspects and delve…Jun 11Jun 11
Alican KirazDestroy the Ransomware Threat: Part 1.1 — Detection and PreventionHi everyone, in this series of articles we’ll discuss a more exciting topic: ransomware. First, we will learn how to detect ransomware…Apr 24, 2023Apr 24, 2023
Alican KirazThreat Hunting for Windows Event LogsFirewall, Windows Event Logs, and Linux Audit Logs are the most basic logs that strengthen our hands when we hunt threats in an…Apr 11, 2023Apr 11, 2023
Alican KirazCyber Security -Incident Response Part 4: Post-Incident Activity| ENHi everyone, In the last step of our Incident Response series, I will discuss Post-Incident Activities. Throughout our IR series, we…Apr 6, 2023Apr 6, 2023
Alican KirazMy Blue Team Certification Journey and Creating Your Own Blue Team Certification RoadmapHi everyone, you know how much I am interested in certificate programs :) You often ask me questions about the certificates I have earned…Apr 2, 20232Apr 2, 20232
Alican KirazCyber Security - Incident Response Part 3.3: Recovery | ENHi everyone, after a long break, we continue with our Incident Response series’s second to last article. At this stage, we will…Mar 30, 2023Mar 30, 2023
Alican KirazThreat Hunting for Windows RegistryThe registry is a file system by Microsoft Windows operating systems that stores application settings, low-level system settings, and user…Aug 30, 20221Aug 30, 20221
Alican KirazinTrendyol TechCyber Security -Incident Response Part 3.2: Eradication |ENIn this part of our series, we will ensure that the system(s) or Network(s) affected by the attack after the Containment phase are…May 29, 2022May 29, 2022
Alican KirazinTrendyol TechCyber Security -Incident Response Part 3.1: Containment |ENIn this part of our series, we will examine a security breach incident where the defense layer of our system or systems was somehow…May 5, 2022May 5, 2022
Alican KirazinTrendyol TechCyber Security -Incident Response Part 2.2: Analysis |ENIn this part of my Article Series, we will focus on the Analysis phase. We will write detection rules on HIDS, NIDS, and SIEM systems that…Apr 25, 2022Apr 25, 2022