Cagatay Kacar
Türkiye
4 B takipçi
500+ bağlantı
Cagatay Kacar ile ortal bağlantıları görüntüle
Tekrar hoş geldiniz
Devam Et seçeneğini tıklayarak veya oturum açarak LinkedIn Kullanıcı Anlaşması’nı, Gizlilik Politikası’nı ve Çerez Politikası’nı kabul etmiş olursunuz.
LinkedIn‘de yeni misiniz? Hemen katılın
veya
Devam Et seçeneğini tıklayarak veya oturum açarak LinkedIn Kullanıcı Anlaşması’nı, Gizlilik Politikası’nı ve Çerez Politikası’nı kabul etmiş olursunuz.
LinkedIn‘de yeni misiniz? Hemen katılın
Cagatay Kacar ile ortal bağlantıları görüntüle
Tekrar hoş geldiniz
Devam Et seçeneğini tıklayarak veya oturum açarak LinkedIn Kullanıcı Anlaşması’nı, Gizlilik Politikası’nı ve Çerez Politikası’nı kabul etmiş olursunuz.
LinkedIn‘de yeni misiniz? Hemen katılın
veya
Devam Et seçeneğini tıklayarak veya oturum açarak LinkedIn Kullanıcı Anlaşması’nı, Gizlilik Politikası’nı ve Çerez Politikası’nı kabul etmiş olursunuz.
LinkedIn‘de yeni misiniz? Hemen katılın
Deneyim
Cagatay Kacar adlı üyenin tam profilini görüntüleyin
Diğer benzer profiller
-
Kıvanç Harputlu
Security Consultant at ZeroSecond
TürkiyeBağlantı Kur -
Abdurrahman Beyazaslan
Managing Partner at InfoSEC
İstanbulBağlantı Kur -
Şemseddin AKSOY
System Engineer at Fortinet
İstanbulBağlantı Kur -
Perim Asena Polat
TürkiyeBağlantı Kur -
Bedri Sertkaya
Penetration Tester / Auditor at Türk Standardları Enstitüsü
Ankara, TürkiyeBağlantı Kur -
Görkem Malkoç
Unit Manager of Cyber Security Solutions at Kafein Technology Solutions
İstanbulBağlantı Kur -
Baver Menteş
Cyber Security Consultant
İstanbulBağlantı Kur -
Engin Yüce
Technical Instructor & PS Consultant | Network & Cyber Security Architect | M.Sc., PCSPI, PCNSC, PCNSE, PMRC, CyberForce Guardian, Cisco CyberOps, JNCIA
Ankara, TürkiyeBağlantı Kur -
Gökhan S.
Senior Cyber Security Consultant at PRODAFT
İstanbul, TürkiyeBağlantı Kur -
ibrahim karagöz
Senior Information Security Specialist at Sahibinden
İstanbulBağlantı Kur -
Serkan Akpolat
Senior Application Security Engineer
TürkiyeBağlantı Kur -
Buşra K.
İstanbulBağlantı Kur -
Erkan Türk
Head of Cyber Security @ Akinon | Cybersecurity Planning, DevSecOps Expert
İstanbulBağlantı Kur -
Recep Özbay
Cyber Security Consultant - OSCP
Kütahya, TürkiyeBağlantı Kur -
Sami Askin
Group Manager of Cyber Security Solutions at Kafein Technology Solutions
GebzeBağlantı Kur -
Özkan Çağıran
Information Security Professional, CCISO, CDPSE, ISMS LA-LI, PIMS LA-LI, BCMS LA
İstanbulBağlantı Kur -
Onur Karasalihoğlu
Managing Partner & Senior Security Consultant
İstanbul, TürkiyeBağlantı Kur -
Sina TABANLIOGLU
Principal Presales Consultant at MBCOM Technologies, Broadcom Representative
İstanbul, TürkiyeBağlantı Kur -
Hakan KILIÇ
MSc.|CISSP|CySA+|CEH|NSE4
AmsterdamBağlantı Kur -
Mehmet Türker
Technical Account Manager & Cyber Security Engineer at Endpoint-labs Cyber Security R&D Corp.
PendikBağlantı Kur
Diğer gönderileri keşfedin
-
Köksal & Partners Attorney Partnership
The Personal Data Protection Authority (#KVKK) fined social media platform X (formerly #Twitter) 1 million 470 thousand liras for data security breaches. According to Anadolu Agency, KVKK initiated an ex officio investigation following X's statement that ‘contact information collected for security purposes was mistakenly used for #advertising purposes’ and related news. Considering the high number of users in Turkey and the risk of third parties obtaining the information, KVKK has determined that the use of personal data requested for security in advertising activities is contrary to the principles of ‘compliance with the law and good faith’ and ‘being connected, limited and proportionate to the purpose for which they are processed’ in the law, which is contrary to the Personal Data Protection Law No. 6698. #DataSecurity #PersonalData #AdvertisingSecurity #X You can reach the details from the link below: https://lnkd.in/dQNe2ZGR
13 -
CyberDistro
📢 New Android Trojan Alert: BlankBot Targets Turkish Users' Financial Data! Stay ahead of the curve with our latest mobile security insights. Cybersecurity researchers have identified a new Android banking trojan named BlankBot, specifically targeting Turkish users to steal financial information. What makes BlankBot unique? This malware takes advantage of Android's accessibility services permissions to gain complete control over infected devices. With features including customer injections, keylogging, screen recording, and more, BlankBot poses a significant risk to users who download seemingly harmless apps. Don't fall prey to this emerging threat! Here are some of BlankBot's disguised APK filenames to watch out for: app-release.apk (com.abcdefg.w568b) app-release.apk (com.abcdef.w568b) app-release-signed (14).apk (com.whatsapp.chma14) app.apk (com.whatsapp.chma14p) app.apk (com.whatsapp.w568bp) showcuu.apk (com.whatsapp.w568b) Don't forget to share your thoughts and keep the conversation going! #cybersecurity #mobilesecurity #androidbankingtrojan
7 -
CyberLabs Israel
Kaspersky Incident Response report 2023 is out! In the report: ✅ 2023 trends: ransomware and supply chain attacks ✅ Common tactics, techniques and procedures ✅ Legitimate tools used in attacks ✅ Recommendations for preventing cyberincidents ...& more. Summary https://kas.pr/4bun PDF for download: https://kas.pr/p8wv
-
Cybertronium
“A suspected South Asian cyber espionage threat group known as Bitter targeted a Turkish defense sector organization in November 2024 to deliver two C++-malware families tracked as WmRAT and MiyaRAT. "The attack chain used alternate data streams in a RAR archive to deliver a shortcut (LNK) file that created a scheduled task on the target machine to pull down further payloads," Proofpoint researchers Nick Attfield, Konstantin Klinger, Pim Trouerbach, and David Galazin said in a report shared with The Hacker News. The enterprise security company is tracking the threat actor under the name TA397. Known to be active since at least 2013, the adversary is also referred to as APT-C-08, APT-Q-37, Hazy Tiger, and Orange Yali.” The hacking group Bitter has primarily targeted countries in Asia, including China, India, Pakistan, Saudi Arabia, and Bangladesh, using malware such as BitterRAT, ArtraDownloader, and ZxxZ. They have also deployed Android malware like PWNDROID2 and Dracarys in earlier attacks. In February 2024, Bitter conducted a spear-phishing attack on a Chinese government agency, delivering a trojan designed for data theft and remote control. The group's deployment of diverse malware strains across both desktop and mobile platforms shows their adaptability and broad attack capabilities. Governments and organizations in targeted regions should implement advanced threat detection and response measures to guard against sophisticated attacks. https://lnkd.in/gSFgjpB9 #cybertronium #cybertroniummalaysia #cyberespionage #malware
-
CyberCureME - Cyber Security Marketplace
Web Hacking Service ‘Araneida’ Tied to Turkish IT Firm: Cybercriminals are selling hundreds of thousands of credential sets stolen with the help of a cracked version of Acunetix, a powerful commercial web app vulnerability scanner, new research finds. The cracked software is being resold as a cloud-based attack tool by at least two different services, one of which KrebsOnSecurity traced to an information technology firm based in Turkey.
-
911Cyber
#CyberIncidents On December 10, 2024, the HGS (Hizli Gecis Sistemi) mobile application, a widely used electronic toll collection system in Turkey, was targeted by a cyberattack. The attack involved unauthorized access to the app’s messaging system, resulting in offensive messages and ransom threats sent to users, demanding Bitcoin payments. Although there were no breaches of user data or sensitive information, the incident raised concerns about the security of the app and other platforms using the same notification service, OneSignal. Read More: https://lnkd.in/dfMvBDy4 #Turkey #Toll #App #Ransomware #Bitcoin
-
Net Protector
𝐁𝐢𝐭𝐭𝐞𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐩𝐢𝐞𝐬 𝐓𝐚𝐫𝐠𝐞𝐭 𝐃𝐞𝐟𝐞𝐧𝐬𝐞 𝐎𝐫𝐠𝐚𝐧𝐢𝐳𝐚𝐭𝐢𝐨𝐧𝐬 𝐰𝐢𝐭𝐡 𝐌𝐢𝐲𝐚𝐑𝐀𝐓 𝐌𝐚𝐥𝐰𝐚𝐫𝐞 The Bitter cyberespionage group, active since 2013, has targeted Turkish defense organizations with an advanced malware family, MiyaRAT. This new threat, alongside WmRAT, leverages alternate data streams (ADS) and sophisticated techniques to exfiltrate sensitive data and control compromised systems. 𝐊𝐞𝐲 𝐈𝐧𝐬𝐢𝐠𝐡𝐭𝐬: 𝐀𝐭𝐭𝐚𝐜𝐤 𝐕𝐞𝐜𝐭𝐨𝐫: Phishing emails with malicious RAR attachments and disguised shortcut files (.lnk). 𝐓𝐞𝐜𝐡𝐧𝐢𝐪𝐮𝐞𝐬: ADS-based PowerShell commands and staged payload delivery. 𝐌𝐢𝐲𝐚𝐑𝐀𝐓 𝐅𝐞𝐚𝐭𝐮𝐫𝐞𝐬:Superior encryption, reverse shell capabilities, and enhanced file control for high-value targets. 𝐍𝐞𝐭 𝐏𝐫𝐨𝐭𝐞𝐜𝐭𝐨𝐫 𝐚𝐝𝐯𝐢𝐬𝐞𝐬 𝐨𝐫𝐠𝐚𝐧𝐢𝐳𝐚𝐭𝐢𝐨𝐧𝐬 𝐭𝐨: Monitor Indicators of Compromise (IoCs) shared by Proofpoint. Enforce strict email security protocols. Deploy advanced endpoint protection and conduct regular vulnerability assessments. Stay proactive to combat evolving cyber threats. #CyberSecurity #MalwareAlerts #DefenseSector #DigitallyFitTohLifeSuperhit
1 -
S2W Inc.
S2W's Threat Intelligence Center has published a brief analysis report on the #Handala Group. The report details Handala's claim of responsibility for the #Israeli supply chain attack related to the Hezbollah walkie-talkie explosion incident. If you're interested in the full report, please reach out through the contact information below, and we will respond to you. 👉 Contact us: https://bit.ly/3ZG9MNb ✅ Report Title: The Handala Group claims responsibility for an Israeli supply chain attack involving the explosion of Hezbollah's walkie-talkies. ✅ Executive Summary: The Handala hacking group, active on DDW, claims on forums like BreachForums and Ramp that the Israeli shell companies Vidisco and IIB are linked to Hezbollah's walkie-talkie explosion incident. The connection between Vidisco and IIB (Israeli Industrial Batteries) has not been officially confirmed, and further verification is required to establish the credibility of this link. 📌 What is the #Hezbollah walkie-talkie explosion incident? The Hezbollah walkie-talkie explosion incident, as reported by The #NewYorkTimes, resulted in 37 deaths and about 3,000 injuries. #Iran's ambassador to #Lebanon, Mojtaba Amani, was among the injured. The batteries in the exploded walkie-talkies were labeled with "Gold Apollo," a Taiwanese brand initially suspected to be behind the attack. However, Gold Apollo denied any connection to terrorism, stating that the batteries were actually produced by BAC Consulting, a Hungarian company licensed to use their brand. Hungary's government later clarified that BAC Consulting was merely a trade intermediary without manufacturing facilities. According to The New York Times, BAC Consulting was revealed to be a shell company set up by Israel in Hungary. Israel had been operating BAC Consulting for several years, posing as a walkie-talkie manufacturer and producing devices for general public use. After years of deception, they managed to supply walkie-talkies to Hezbollah. Since 2022, these devices, equipped with specially made batteries, were secretly exported to Lebanon, awaiting the right moment for sabotage. 👉 Contact us: https://bit.ly/3ZG9MNb #Intelligence #Bigdata #Security #AI #Cybersecurity #Darkweb #Telegram #Securityintelligence #AIsecurity #IT #Hacking #DarkBERT #S2W
7 -
CyberSRC® Consultancy
Check out our latest blog on New Android Trojan “BlankBot” Targets Turkish Users’ Financial Data and our recommendations. https://lnkd.in/gFzeF--q #cybersecurity #cyberawareness #cyberthreats #cyberdefense #malware #vmware #pickle #threats #exploits #malicious #attacks #usertracking #user #tracking #excobalt #windows #android #botnet #macos #data #exfiltration #badspace #hackerscard #wordpress #scattered #website #wordpress #authentication #cybergang #vulnerability #privacy #critical #cyberattack #databreach #cyber #cybercriminals #blankbot #turkish #turkishusers #trojan
11 -
NetManageIT
Cybercriminals are selling hundreds of thousands of credential sets stolen with the help of a cracked version of Acunetix, a powerful commercial web app vulnerability scanner, new research finds. The cracked software is being resold as a cloud-based attack tool by at least two different services, one of which KrebsOnSecurity traced to an information technology firm based in Turkey.
-
eForensics Magazine & Courses
We decided to dedicate this month’s edition to the topic of threat hunting - a cyber defence activity, that has strong connections to digital forensics. https://lnkd.in/dVUMgSXz #infosec #cybersecurity #redteam #pentest #pentesting #hacking #hackers #coding
1 -
eForensics Magazine & Courses
We decided to dedicate this month’s edition to the topic of threat hunting - a cyber defence activity, that has strong connections to digital forensics. https://lnkd.in/dVUMgSXz #infosec #cybersecurity #redteam #pentest #pentesting #hacking #hackers #coding
1 -
Countermeasures Group
DroidBot is a modern RAT that combines hidden VNC and overlay attack techniques with spyware-like capabilities, such as keylogging and user interface monitoring. Moreover, it leverages dual-channel communication, transmitting outbound data through MQTT and receiving inbound commands via HTTPS, providing enhanced operation flexibility and resilience. At the time of writing, DroidBot targets 77 distinct entities, including banking institutions, cryptocurrency exchanges, and national organisations. Active campaigns have been observed in countries such as the United Kingdom, Italy, France, Spain, and Portugal, indicating a potential expansion into Latin America.
Türkiye ülkesindeki Cagatay Kacar adına sahip diğer kişiler
-
Çağatay Kaçar
Game Designer & Co-Founder at COB Games
İstanbul, Türkiye -
Çağatay Kaçar
Yıldız Teknik Üniversitesi eğitim kurumunda öğrenci
Türkiye -
ÇAĞATAY KAÇAR
Bursa, Türkiye -
Çağatay Kaçar
Beylikdüzü Basketbol Kursu şirketinde Basketball Coach
Beylikdüzü
LinkedIn‘de Türkiye ülkesinde Cagatay Kacar adında 6 diğer kişi
Cagatay Kacar adlı diğer kişiler