Read More

Malicious Image

When we look at the campaigns carried out by APT groups such as Muddy Water, which also targets institutions in Turkey, we see that they sometimes use the Steganography technique. With this technique, cyber attackers try to infiltrate the target end user system through a social engineering attack and ensure…
Read More
Read More

Instagram Scammers

Those of you who have read my previous blog posts titled “Sponsored Scamming” “LinkedIn Scammers” and “Who Viewed My Profile?” have learned that social media platforms are effectively used by scammers. However, what surprised me the most after writing these articles was that almost 2 years later, after almost 2…
Read More