InSystem WeaknessbyFahri KorkmazWeb Application SecurityIn 2024, web application security remains a cornerstone of modern cybersecurity, protecting digital platforms from a growing spectrum of…Sep 6, 2024Sep 6, 2024
Fahri KorkmazBsides Munich 2023I recently had the pleasure of attending the Bsides Munich conference and want to share my experience.Oct 25, 2023Oct 25, 2023
Fahri KorkmazWhat is Cloud Security?First of all, what is the cloud anyway? The cloud is a model for delivering and accessing IT resources and applications over the Internet…Jul 1, 2023Jul 1, 2023
Fahri KorkmazWhat is the Cyber Kill Chain?The cyber kill chain is a model that describes the attack process on IT systems and identifies the stages that an attacker goes through to…Aug 31, 2023Aug 31, 2023
InNerd For TechbyFahri KorkmazMy experience getting a Cybersecurity Job as a fresh graduateIn this article I want to share my experience in getting a cybersecurity job after freshly graduating my master’s in computer science.Oct 6, 2023Oct 6, 2023
Fahri KorkmazCyber Security Trends 2023Cybersecurity experts are in demand like never before. With each passing year, more and more destructive hacks and vulnerabilities are…Mar 15, 2023Mar 15, 2023
InSystem WeaknessbyFahri KorkmazAnalysis and Modeling of U.S. Cyber Security SalariesThis article will analyze U.S. Cyber Security Salaries and build a machine learning model to predict expected salary.Feb 20, 20231Feb 20, 20231
Fahri KorkmazSecuring Windows Hosts: Best Practices and TipsIt is widely known that Windows is one of the most popular operating systems in use today, and it is estimated that over 90% of desktop…Feb 1, 2023Feb 1, 2023
Fahri KorkmazThe problem with SmbmapWhen using Smbmap in your Red Team engagement, keep in mind, that Smbmap creates a random directory at the root of each SMB Share to check…Jan 23, 2023Jan 23, 2023
InSystem WeaknessbyFahri Korkmaz11 Tips for creative and continous Security Awareness#1 Offer your employees books about Social EngineeringJan 20, 2023Jan 20, 2023
InSystem WeaknessbyFahri KorkmazScheduled Tasks for Cyber Security ProfessionalsWhat are Scheduled Tasks?Dec 18, 2022Dec 18, 2022
Fahri KorkmazEmotet is back!An article about recent operatios of the Emotet malwareNov 7, 2022Nov 7, 2022
Fahri KorkmazThe Cyber War between RUSSIA and UKRAINE explainedIn this article I describe key happenings in the cyber war between Ukraine and RussiaNov 2, 2022Nov 2, 2022
InSystem WeaknessbyFahri KorkmazMy Top 3 HACKING ToolsFor a Penetration Tester the right methodology is key. In order to implement that methodology, it is still crucial to have some sort of a…Aug 25, 20223Aug 25, 20223
Fahri KorkmazTop 3 HACKING Operating Systems + BONUS TIPIn my opinion an operating system is just a tool. The tool has to help me to achieve my goals in the most efficient way possible. I have…Aug 24, 20221Aug 24, 20221
Fahri KorkmazYou should learn THIS before HACKINGHacking, Penetration Testing and Red Teaming is a broad field and requires huge amounts of skills in order to succeed. If you want to learn…Aug 23, 20221Aug 23, 20221
InSystem WeaknessbyFahri Korkmaz5 Tips to ADVANCE your HACKING SkillsIf you want to become a penetration tester or Red Teamer, then you need to have strong hacking skills. First of all you need to build these…Aug 22, 20221Aug 22, 20221
Fahri KorkmazThe Bangladesh Bank HeistYou thought the best bank robbers use weapons, masks and fast vehicles? Then you are wrong!Dec 12, 2021Dec 12, 2021
Fahri KorkmazCybersecurity made easy!Cybersecurity skills are quite in demand. With all the hacking going on, like the Colonial Pipeline Attack or the recent Kaseya supply…Jul 5, 2021Jul 5, 2021