Monthly Archives - October 2017

Hurriyet : Experts covered Cybersecurity end to end

The First Global Cybersecurity Research Center Conference was held in Istanbul, Turkey this year, and our presentations took the attention of the Turkish Natinal media, Hurriyet was one of them The link ( The web site is Turkish ) http://www.hurriyet.com.tr/siber-guvenlik-konusu-tum-boyutlariyla-ele-alin-40620745 Siber güvenlik konusu tüm boyutlarıyla ele alındı İSTANBUL, (DHA)-  SİBER güvenliği teknik, hukuki, ekonomik ve sosyal boyutlarıyla ele alarak akademik bir ortama taşımayı [...]


Paul Dumbleton, Enterprise Information Security

I attended an information security exam workshop with Erdal, and his knowledge and expertise of the subject material was extensive while his positive energy was infectious for the whole group. His knowledge and experience in the field of Information Security secures him as a leader in our sector. I consider Erdal a friend and mentor, and I would [...]


Keynote at Global Cybersecurity Research Center

A cyber security conference for the first time outside the public sector in Turkey ,took place on 20 October 2017 with the cooperation of CSRC-Global and New Media Department of Istanbul Gelisim University with the attendance of many experts from Turkey and abroad. The organizer of the Conference, Asst. Prof. Dr. Deniz Akçay and Chair Person of CSRC-Global Asst.Prof. Dr. [...]


Turkish Standard Organization

It was a great Cybersecurity event at the Turkish Standard Organization (TSE). I would like to thank one more time to TSE for their great hospitality, and the appreciation certificate , it's' a great feeling to get awarded on staff that you love to do. Thank you Turk Standartlari Enstitusu , tesekkuler . It's always great to meet talented [...]


BadRabbit Execution Flow

What is Bad Rabbit? Bad Rabbit is a previously unknown ransomware family. How is Bad Rabbit distributed? The ransomware dropper was distributed with the help of drive-by attacks. While the target is visiting a legitimate website, a malware dropper is being downloaded from the threat actor’s infrastructure. No exploits were used, so the victim would have to manually execute the malware dropper, which pretends to [...]


Posted By Category: Cyber SecurityTags: , , Comments: 0