Page 12 / Huseyin Can YUCEEL

Security Research Lead at Picus, Instructor at Purple Academy, MSc in Cyber Security, CISSP, OSCP A cyber security enthusiast who believes in learning through sharing

Ransomware Attack Detection and Prevention in the Final Phase of the Attack...

Article

The Top 4 MITRE ATT&CK Techniques from CISA’s RVA Report and Picus Red Repo...

Article

Microsoft Office CVE-2022-30190 Vulnerability (Follina) Exploitation

Article

Masquerading Attacks Explained - MITRE ATT&CK T1036

Article

Scheduled Task/Job - The Most Used MITRE ATT&CK Persistence Technique

Article

Ransomware Detection and Prevention in the Late Phase of the Lifecycle

Article

How Financial Firms Can Maximize Security Investments with Security Control...

Article

What Is Purple Teaming and Why Do You Need It in Your Security Operations?

Article

The MITRE ATT&CK T1027 Obfuscated Files or Information Technique

Article

How to Detect Ransomware Attacks in the Early Warning Phase

Article

Linux “Dirty Pipe” CVE-2022-0847 Vulnerability Exploitation Explained

Article

The LAPSUS$ Group -  A Chaotic Start of Ransomware-free Extortion