Page 5 / Suleyman Ozarslan, PhD

VP, Picus Labs, Founder A true security enthusiast with extensive experience in ethical hacking, cyber defense, computer networks, and cryptography.

Five Ways to Simulate Apache CVE-2021-41773 Exploits

Article

Picus Threat Library Updated for SideWalk Backdoor Malware of APT41

Article

Simulating Microsoft MSHTML CVE-2021-40444 Zero-Day Exploit

Article

Simulating and Preventing Atlassian Confluence CVE-2021-26084 Exploit

Article

Simulating and Preventing ProxyShell Exchange Exploits

BIOPASS RAT Malware Targets Its Victims via Watering Hole Attacks

Article

DarkRadiation Ransomware Targets Linux Distributions

Article

An Underrated Technique to Delete Volume Shadow Copies - DeviceIoControl

Tactics, Techniques, and Procedures (TTPs) Used by HAFNIUM to Target Micros...

Tactics, Techniques, and Procedures (TTPs) Used in the SolarWinds Breach

Article

How to Beat Nefilim Ransomware Attacks

Article

MITRE ATT&CK T1082 System Information Discovery

Article