Y.FurkaninHedgusUnmasking Deception: Unveiling Phishing Emails through Static and Dynamic AnalysisPhishing is super important to understand because it’s a really common way for scammers to steal your information or money. They trick you…May 2May 2
Y.FurkaninHedgusDeceptive Waters: Insights into Modern PhishingAlmost every time you set up an online account, it’s likely you’re providing some form of personal information.Apr 15Apr 15
Y.FurkaninHedgusRise of the Machines: A Practical Approach to Bot ManagementBOT-MANAGEMENTMar 29Mar 29
Y.FurkaninHedgusDiving Into the Dark Depths: Demystifying DDoS and DoS AttacksWhat is Dos and DDoS?Mar 271Mar 271
Y.FurkanA Study on the Psychology of Social Engineering-Based CyberattacksThis article is about Social Engineering and Cybersecurity.I want to tackle this article together with Behavior of Sciences.I chose this…Jan 2Jan 2
Y.FurkanWHAT IS APT?- Advanced Persistent Threat groups, as well as those sponsored by a nation-state, aim to gain undetected access to a network. They then…Dec 21, 2023Dec 21, 2023
Y.FurkanEDRWhat is EDR and how it works? What is endpoint detection and response (EDR)?Nov 24, 2023Nov 24, 2023
Y.FurkanPHISHING ATTACK VECTORS AND E-MAIL ANALYZINGSpam and Phishing are common social engineering attacks.Nov 6, 2023Nov 6, 2023
Y.FurkanMalware TypesMalware is malicious software or code that typically takes control of, collects information from, or damages an infected endpoint. Malware…Oct 29, 2023Oct 29, 2023