Huseyin Can YUCEEL

Security Research Lead at Picus, Instructor at Purple Academy, MSc in Cyber Security, CISSP, OSCP A cyber security enthusiast who believes in learning through sharing

Virtualization/Sandbox Evasion - How Attackers Avoid Malware...

Article

Ransomware Attack Detection and Prevention in the Final Phas...

Article

The Top 4 MITRE ATT&CK Techniques from CISA’s RVA Report and...

Article

Microsoft Office CVE-2022-30190 Vulnerability (Follina) Expl...

Article

Masquerading Attacks Explained - MITRE ATT&CK T1036

Article

Scheduled Task/Job - The Most Used MITRE ATT&CK Persistence ...

Article

Ransomware Detection and Prevention in the Late Phase of the...

Article

How Financial Firms Can Maximize Security Investments with S...

Article

What Is Purple Teaming and Why Do You Need It in Your Securi...

Article

The MITRE ATT&CK T1027 Obfuscated Files or Information Techn...

Article

How to Detect Ransomware Attacks in the Early Warning Phase

Article

Linux “Dirty Pipe” CVE-2022-0847 Vulnerability Exploitation ...

Article