Common Mistakes in Securing Devices in Organizations

Common Mistakes in Securing Devices in Organizations

SercanSayitogluApr 18, 20236 min read

As organizations increasingly rely on technology for their daily operations, the security of company-issued devices has become a top priority. These devices, often containing sensitive information and access to critical systems, are prime targets for cybercriminals. This blog post aims…

The Evolving Botnet Threat Landscape: A 4-Year Comparison

The Evolving Botnet Threat Landscape: A 4-Year Comparison

SercanSayitogluApr 11, 20234 min read

Botnets continue to pose significant risks to businesses, organizations, and individuals. In this blog post, I will compare the data gathered from a honeypot set up in 2019 with my recent findings from 2023. This comparison will provide insights into…

The Sinister Web of Cybercrime: An Analysis of a Multi-Stage Attack Targeting High-Profile Individuals

The Sinister Web of Cybercrime: An Analysis of a Multi-Stage Attack Targeting High-Profile Individuals

SercanSayitogluApr 6, 20235 min read

Welcome to a world where sophisticated attackers weave their intricate webs, and the boundaries between the digital and physical realms blur. As a cyber security consultant, I’ve seen my fair share of cybercrime investigations, but this one truly stands out.…

Common Mistakes to Avoid in DevSecOps: A Focus on Security

Common Mistakes to Avoid in DevSecOps: A Focus on Security

SercanSayitogluApr 2, 202314 min read

In today’s fast-paced technology landscape, the importance of DevSecOps cannot be overstated. As organizations strive to deliver software faster and more efficiently, security has become an integral part of the development process. However, many companies still make common mistakes that…

Making the Yahoo Paranoids’ Successful Hackers Poster

Making the Yahoo Paranoids’ Successful Hackers Poster

SercanSayitogluApr 1, 20232 min read

The Yahoo Paranoids’ poster is a highly coveted recognition for hackers who have successfully identified and reported potential security threats. It is a symbol of the team’s commitment to security and appreciation for the hard work and dedication of their…