top of page

Blog


PipeMagic Malware Exploits Windows Vulnerability in RansomExx Attacks
Cybersecurity experts have revealed that the hackers behind the RansomExx ransomware attacks are using a stealthy malware called PipeMagic to infiltrate systems. According to jointly published security reports, the attackers target a previously patched security vulnerability in Microsoft Windows systems to maximize their privileges on devices and successfully infiltrate internal networks. First making a name for itself with attacks on industrial companies in Southeast Asia in
4 gün önce


PipeMagic malware exploits a Windows vulnerability in ransomExx attacks.
Cybersecurity experts have revealed that hackers targeting Android devices have changed tactics to bypass security measures. Malware previously used primarily to empty bank accounts is now disguised as fake official government or banking applications, using methods like stealing SMS messages and spying on devices. The main goal behind this shift is to silently bypass Google's stringent security scans. Hackers are employing a highly cunning tactic to evade security systems. Ne
4 gün önce


2025 Cybersecurity Predictions: Quantum Threat and Next-Generation Encryption
As digital transformation accelerates, the cybersecurity world is going through a critical juncture due to AI-powered attacks and the emerging quantum computing technologies. According to experts' analyses for 2025, rapidly increasing data breaches and tightening legal regulations are pushing companies to view data privacy not just as a procedure, but as a mandatory corporate strategy. In particular, the increasing personal responsibility of company executives for leaked data
4 gün önce


Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets
A new mobile spyware called "Crocodilus," which targets users' bank accounts and cryptocurrency wallets, continues to spread rapidly in many countries, including Turkey. Initially infiltrating devices by disguising itself as an innocent Google Chrome browser, this virus is now luring thousands of people into traps through fake "bonus point" advertisements or fake system updates on Facebook. Once installed on a device, this software operates quite stealthily, intercepting your
4 gün önce


New Threat Exploiting Ivanti Vulnerability: DslogdRAT Hits Japan
Cybersecurity experts are warning against a new malware named "DslogdRAT," which spreads by exploiting a critical zero-day vulnerability in Ivanti Connect Secure (ICS) systems. Particularly targeting organizations in Japan and believed to be linked to Chinese-backed cyber espionage groups, hackers manage to infiltrate systems by executing remote code. In the first step, attackers plant a hidden web shell into the system, and then they download the actual spyware to take full
4 gün önce


Major Cyberattack on the Tech Company Developing Russia's Military Database
An anonymous hacker group has announced that they successfully breached the servers of Mikord, the tech company allegedly building Russia's new digital military mobilization and registry database. Claiming to have maintained persistence in the company's systems for months and wiped a portion of the infrastructure, the threat actors handed over the exfiltrated source code, financial records, and internal communications to Russian anti-war human rights groups. Following the cyb
4 gün önce


Noodlophile Malware: A New Telegram-Backed Stealer Campaign
Cyber attackers continue to spread the malware named "Noodlophile" using new and much more insidious methods to steal the sensitive data of organizations worldwide. In this campaign, which specifically targets companies, fake "copyright infringement" notices have been utilized for over a year. To lure victims into a trap, attackers employ highly convincing phishing tactics by including companies' own Facebook page details and previously gathered information in the emails. Whe
4 gün önce


FunkSec Ransomware Group Became Deactivated, Free Decryptor Released
Cybersecurity experts have taken a significant step that will please victims of the "FunkSec" malware, which locks computers and demands a ransom. A tool developed to recover encrypted files has been made available completely free of charge to everyone. This welcome move comes after it was understood that the cybercriminal group behind the software had not launched any attacks for a long time and had ceased its activities. This ransomware, which has victimized hundreds of ins
4 gün önce


Critical Vulnerabilities in Citrix and SAP Systems: Passwords and Sessions at Risk
Cybersecurity researchers have discovered vulnerabilities in the Windows and Java versions of the SAP GUI software, which is frequently used in the business world, that could lead to serious data leaks. It was understood that sensitive historical data previously entered by users, such as T.R. identity numbers, bank account details, and passwords, could be easily stolen by attackers with access to the computer. It was revealed that this data is stored on the computer using a v
4 gün önce


CISA Safe Design Principles Commitment
The understanding of security in the software world is undergoing a radical change. The Secure by Design initiative, spearheaded by the United States Cybersecurity and Infrastructure Security Agency (CISA), aims to prevent cyberattacks before they even occur. Experts point out that a large portion of the vulnerabilities exploited today could easily be prevented during the software development phase. Instead of focusing solely on the most common known vulnerabilities, they emp
4 gün önce
bottom of page