There Is A Threat Actor Out There
Introduction In recent years, as a cybersecurity researcher who frequently engages in conversations with threat actors who lack…
Istanbul Senin Data Breach
Introduction When the calendar showed May 26, 2025, a post appeared on DarkForums — a platform frequented by…
Phishing Cloaking Techniques
Introduction Those of you who have read my blog post titled Investment Scammers have seen how scammers try…
How Are We Getting Phished?
Introduction Over the past 10 years of my 20-year cybersecurity career—primarily within Turkey’s leading banks and IT subsidiaries—I’ve…
Chasing The Threat Actor
As seen in my research articles such as Investment Scammers, Deepfake Scammers, Was Turkey’s e-Government Hacked?, and WhatsApp…
Investment Scammers
Introduction If you remember, in the article I published in June 2024 titled Deepfake Scammers, I mentioned that…
Information Thieves
Introduction In recent years, when we look at cybersecurity incidents involving prominent entities such as Uber, Airbus, Grand…
Deepfake Scammers
Introduction As of May 2024, we continue to witness the revolution and development of generative artificial intelligence with…
Troll Hunting
Introduction In recent years, we have seen the increasing importance of cyber threat intelligence for organizations. As a…