Page 5 / Huseyin Can YUCEEL

Security Research Lead at Picus, Instructor at Purple Academy, MSc in Cyber Security, CISSP, OSCP A cyber security enthusiast who believes in learning through sharing

Top 5 Benefits of Implementing Adversarial Exposure Validation

Article

Palo Alto CVE-2024-0012 and CVE-2024-9474 Vulnerabilities Explained

Article

The Role of Adversarial Exposure Validation in CTEM

Article

RansomHub Ransomware Analysis, Simulation, and Mitigation - CISA Alert AA24...

Article

Andariel: North Korean APT Group Targets Military and Nuclear Programs

Article

APT40: Leviathan Targets Asia-Pacific Countries for Cyber Espionage

Article

CVE-2024-24919: Check Point Security Gateways Zero-Day Vulnerability Explai...

Article

Agentless Security Validation - How Picus Emerging Threat Simulator Works?

Article

Black Basta Ransomware Analysis, Simulation, and Mitigation - CISA Alert AA...

Article

Akira Ransomware Analysis, Simulation and Mitigation- CISA Alert AA24-109A

Article

CVE-2024-3400: Palo Alto PAN-OS Command Injection Vulnerability Explained

Article

MITRE ATT&CK T1547 Boot or Logon Autostart Execution

Article