Mehmet Caner KÖROĞLU(@cnrkrglu) 's Twitter Profileg
Mehmet Caner KÖROĞLU

@cnrkrglu

Co-Founder & CTO : @brandefense Former Team Lead : @octosec Organizer : @hacknightsorg @hacktrickconf

ID:150957577

linkhttp://www.brandefense.io calendar_today02-06-2010 07:20:01

886 Tweets

4,5K Followers

1,4K Following

H A C K N I G H T S(@hacknightsorg) 's Twitter Profile Photo

Hacknights serisi yeniden başlıyor.

'Proaktif Siber İstihbarat ve Güvenlik' başlıklı sunumu ile ilk konuğumuz BRANDEFENSE kurucu ortaklarından Mehmet Caner Köroğlu. Mehmet Caner KÖROĞLU

Kayıt için: eu1.hubs.ly/H020n650

Hacknights serisi yeniden başlıyor. 'Proaktif Siber İstihbarat ve Güvenlik' başlıklı sunumu ile ilk konuğumuz BRANDEFENSE kurucu ortaklarından Mehmet Caner Köroğlu. @cnrkrglu Kayıt için: eu1.hubs.ly/H020n650
account_circle
BRANDEFENSE(@Brandefense) 's Twitter Profile Photo

After this series, you've knowledge about the most known APT and ransomware groups focused on mainly Europe. Now, our CTI Team wrote about the threat actors still continuing their strategies. To read more 👇
eu1.hubs.ly/H01T3jY0

account_circle
BRANDEFENSE(@Brandefense) 's Twitter Profile Photo

The Brandefense Team and our CEO, Mehmet Caner Köroğlu, will be at the IDC Security Summit on 22 Sep. 2022. He will talk about intelligence-led security and Digital Risk Protection Solutions and their importance in today's security world.
Register Now: eu1.hubs.ly/H01NdBt0

The Brandefense Team and our CEO, Mehmet Caner Köroğlu, will be at the IDC Security Summit on 22 Sep. 2022. He will talk about intelligence-led security and Digital Risk Protection Solutions and their importance in today's security world. Register Now: eu1.hubs.ly/H01NdBt0
account_circle
massumo(@mazlumagar) 's Twitter Profile Photo

Arkadaşlar, vue 3 tecrübesi olan frontend developer arayışımız mevcuttur. İlgilenenler benimle iletişime geçebilir.

account_circle
BRANDEFENSE(@Brandefense) 's Twitter Profile Photo

As the Brandefense team, we have covered the technical innovations and analysis on Lockbit3.0 in detail, depending on the indication of the ongoing trend of threat actors looking for ready-to-use ransomware. To learn more about the ransomware group👇
eu1.hubs.ly/H01KwC-0

As the Brandefense team, we have covered the technical innovations and analysis on Lockbit3.0 in detail, depending on the indication of the ongoing trend of threat actors looking for ready-to-use ransomware. To learn more about the ransomware group👇 eu1.hubs.ly/H01KwC-0
account_circle
BRANDEFENSE(@Brandefense) 's Twitter Profile Photo

The APT Group supported by Iran, MuddyWater, is carrying out attacks targeting vulnerable systems against the Log4j 2 vulnerability in Israeli institutions and organizations.

eu1.hubs.ly/H01GCWD0

The APT Group supported by Iran, MuddyWater, is carrying out attacks targeting vulnerable systems against the Log4j 2 vulnerability in Israeli institutions and organizations. eu1.hubs.ly/H01GCWD0 #israel #iran #cyberattacks
account_circle
Finberg(@finbergyatirim) 's Twitter Profile Photo

FastCompany tarafından hazırlanan ve Türkiye'deki girişimcilik ekosisteminin önde gelen liderlerinin jüri olarak yer aldığı değerlendirmeyle belirlenen listesinde yer alan portföy girişimlerimizi tebrik ediyoruz.

FastCompany tarafından hazırlanan ve Türkiye'deki girişimcilik ekosisteminin önde gelen liderlerinin jüri olarak yer aldığı değerlendirmeyle belirlenen #Startup1OO listesinde yer alan portföy girişimlerimizi tebrik ediyoruz.
account_circle
BRANDEFENSE(@Brandefense) 's Twitter Profile Photo

has released security updates that fix a in the operating system. The security vulnerability code is CVE-2022-28756 and has been fixed in version 5.11.5.

eu1.hubs.ly/H01xQj30

#Zoom has released security updates that fix a #vulnerability in the #macOS operating system. The security vulnerability code is CVE-2022-28756 and has been fixed in version 5.11.5. eu1.hubs.ly/H01xQj30 #securitynews #cybersecurity
account_circle
BRANDEFENSE(@Brandefense) 's Twitter Profile Photo

A critical security vulnerability has been detected in the Adaptive Security Appliance ( ) and Firepower Threat Defense ( ) software that could allow an unauthenticated threat actor to gain access to the Private Key.

eu1.hubs.ly/H01xGNS0

account_circle
BRANDEFENSE(@Brandefense) 's Twitter Profile Photo

Steganography is a camouflage method of a message or an activity. It hides the code. It is not just used for cyber attacks, it was also used for messaging anonymously in battle. Our CTI Team detailed steganography attacks for you. Learn more👇
eu1.hubs.ly/H01v4yr0

Steganography is a camouflage method of a message or an activity. It hides the #malicious code. It is not just used for cyber attacks, it was also used for messaging anonymously in battle. Our CTI Team detailed steganography attacks for you. Learn more👇 eu1.hubs.ly/H01v4yr0
account_circle
BRANDEFENSE(@Brandefense) 's Twitter Profile Photo

Brandefense CTI Team started a new series about the groups and their capabilities. Here is the one for this week. Dynamite Panda or APT-18. To learn more about them, their TTPs, and much more👇

eu1.hubs.ly/H01tRX_0

Brandefense CTI Team started a new series about the #APT groups and their capabilities. Here is the one for this week. Dynamite Panda or APT-18. To learn more about them, their TTPs, and much more👇 eu1.hubs.ly/H01tRX_0 #CyberThreat #ThreatIntelligence #brandefense
account_circle
BRANDEFENSE(@Brandefense) 's Twitter Profile Photo

Brandefense CTI Team started a new series about the groups and their capabilities. Here is the first one. El Machete or APT-C-43. To learn more about them, their TTPs, and much more👇

eu1.hubs.ly/H01rPPv0

Brandefense CTI Team started a new series about the #APT groups and their capabilities. Here is the first one. El Machete or APT-C-43. To learn more about them, their TTPs, and much more👇 eu1.hubs.ly/H01rPPv0 #CyberThreat #ThreatIntelligence #brandefense
account_circle
BRANDEFENSE(@Brandefense) 's Twitter Profile Photo

, or Open Source Intelligence, can scan to Decipher and find connections between criminals and other actors around them. Our Cyber Threat Intelligence Team detailed dark web, OSINT approaches, and tools for dark web monitoring👇
eu1.hubs.ly/H01r2040

#OSINT, or Open Source Intelligence, can scan to Decipher and find connections between criminals and other actors around them. Our Cyber Threat Intelligence Team detailed dark web, OSINT approaches, and tools for dark web monitoring👇 eu1.hubs.ly/H01r2040 #darkweb #threatintel
account_circle
BRANDEFENSE(@Brandefense) 's Twitter Profile Photo

The researchers identified a distribution campaign to industrial control systems.

'Sality' has advanced features such as terminating trojan-injected system processes, connecting to remote servers, or leaking data from the host.

eu1.hubs.ly/H01nB9B0

The #security researchers identified a #malware distribution campaign to industrial control systems. 'Sality' has advanced features such as terminating trojan-injected system processes, connecting to remote servers, or leaking data from the host. eu1.hubs.ly/H01nB9B0
account_circle
BRANDEFENSE(@Brandefense) 's Twitter Profile Photo

Brand & Reputation Protection Service scans every corner of the web to protect the BRAND, which you have made efforts to build for years. We provide early action by alerting your company to situations that may damage the value. Request your 'security'👇

eu1.hubs.ly/H01jcjR0

Brand & Reputation Protection Service scans every corner of the web to protect the BRAND, which you have made efforts to build for years. We provide early action by alerting your company to situations that may damage the value. Request your 'security'👇 eu1.hubs.ly/H01jcjR0
account_circle