Fatih ERDOĞAN (@fecassie) 's Twitter Profile
Fatih ERDOĞAN

@fecassie

🇹🇷 Sr. Security Engineer @PicusSecurity • endpoint security, dfir, detection engineering

ID: 603247428

linkhttps://ferdogan.me/ calendar_today08-06-2012 23:59:36

2,2K Tweet

2,2K Takipçi

3,3K Takip Edilen

Evren (@evrnyalcin) 's Twitter Profile Photo

I'm making a new LLM red team tool called LLMBUS – A little shout out to a schoolbus. Time travel to 1999 🚍 There are similar tools out there, but I wanted to create one with an interface that suits me better. For now, it includes basic features like obfuscation techniques and

Chuong Dong (@cpeterr) 's Twitter Profile Photo

Check out my Google blog on the garble obfuscator. The article dives deep into how garble obfuscates strings in Go binaries. I'm also introducing an open-source tool to dump strings and deobfuscate binaries protected by this obfuscating compiler! cloud.google.com/blog/topics/th…

PIVOTcon (@pivot_con) 's Twitter Profile Photo

📣 Oops!... They did it again!!! 61 Talks submitted and so many too good that, once again, we had to increase a bit the number of accepted talks. 🔥 #PIVOTcon25 Agenda is finally here, and the caliber is insane!!! Check it out ➡️ link below in second post #CTI #ThreatIntel 1/19

📣 Oops!... They did it again!!!
61 Talks submitted and so many too good that, once again, we had to increase a bit the number of accepted talks. 🔥

#PIVOTcon25 Agenda is finally here, and the caliber is insane!!! Check it out ➡️ link below in second post
#CTI #ThreatIntel 1/19
PRODAFT (@prodaft) 's Twitter Profile Photo

🚀 We’re excited to open-source CRADLE Intelligence Hub! 🔓 A batteries-included, collaborative knowledge management solution for threat intelligence researchers. Collect, organize & share intel seamlessly. 🔗 Explore: cradle.sh

Fatih ERDOĞAN (@fecassie) 's Twitter Profile Photo

I'm excited to announce that Aytek and I will be presenting PERSEPTOR: Automating Detection Rule Generation with AI-Driven Threat Intelligence at BSides Prishtina 🎉 We’ll talk about how AI is used to streamline detection engineering operations 🤖 #BSidesPrishtina🇽🇰

I'm excited to announce that Aytek and I will be presenting PERSEPTOR: Automating Detection Rule Generation with AI-Driven Threat Intelligence at <a href="/BSidesPrishtina/">BSides Prishtina</a> 🎉

We’ll talk about how AI is used to streamline detection engineering operations 🤖

#BSidesPrishtina🇽🇰
Picus Security (@picussecurity) 's Twitter Profile Photo

🎤 Catch us at BSides Prishtina! Our Blue Team engineers Fatih ERDOĞAN and Aytek Aytemur will present PERSEPTOR, a project that uses LLMs to turn threat intel into detection rules (Sigma, YARA & more). 📍 Prishtina, April 12–13 🔗 Learn more: hubs.li/Q03g2pj80 #CyberSecurity

🎤 Catch us at <a href="/BSidesPrishtina/">BSides Prishtina</a>!

Our Blue Team engineers <a href="/FeCassie/">Fatih ERDOĞAN</a> and Aytek Aytemur will present PERSEPTOR, a project that uses LLMs to turn threat intel into detection rules (Sigma, YARA &amp; more).

📍 Prishtina, April 12–13
🔗 Learn more: hubs.li/Q03g2pj80

#CyberSecurity
Devnot (@devnot_) 's Twitter Profile Photo

Şule Erdoğan, Swift 6 ile iOS geliştirmede sınırların nasıl aşıldığını gösterdi. “Swift 6 Horizons: Redefining What's Possible in iOS Development” #devnotmobil25

Şule Erdoğan, Swift 6 ile iOS geliştirmede sınırların nasıl aşıldığını gösterdi. “Swift 6 Horizons: Redefining What's Possible in iOS Development” #devnotmobil25
Devnot (@devnot_) 's Twitter Profile Photo

Anıl Taşkıran, Time Profiler ile iOS performans analizinin püf noktalarını uygulamalı olarak paylaştı. “Mastering iOS Performance Analysis” #devnotmobil25

Anıl Taşkıran, Time Profiler ile iOS performans analizinin püf noktalarını uygulamalı olarak paylaştı. “Mastering iOS Performance Analysis” #devnotmobil25
Arda Büyükkaya (@whichbufferarda) 's Twitter Profile Photo

🎉 Happy to share that my talk has been accepted at Virus Bulletin! I’ll be presenting in 🇩🇪 Berlin on Friday, September 26 at #VB2025: Details: virusbulletin.com/conference/vb2… See you there! #vbconference

🎉 Happy to share that my talk has been accepted at <a href="/virusbtn/">Virus Bulletin</a>! I’ll be presenting in 🇩🇪 Berlin on Friday, September 26 at #VB2025:  

Details: virusbulletin.com/conference/vb2…  

See you there! #vbconference
Alican Kiraz (@alicankiraz0) 's Twitter Profile Photo

Hi, friends! 🙏 🧡 I've completed version 2 of LLMRipper, the open-source tool I developed and shared to help you create your own LLM models without writing code! 🎉 With this version, you get: ⚙️ Support for choosing between LoRA or Full Fine-Tuning in your training workflows.

Trendyol Tech (@trendyoltech) 's Twitter Profile Photo

⚡️ TechTradition: Tech Q&A’25 Trendyol Tech olarak canlı yayında en çok merak edilen soruları yanıtlayacağız. Zor sorularını bekliyoruz: docs.google.com/forms/d/e/1FA... 19 Haziran saat 17:00'de buluşmak için etkinliğimizi takvimine ekleyebilirsin: linkedin.com/feed/update/ur…

⚡️ TechTradition: Tech Q&amp;A’25

Trendyol Tech olarak canlı yayında en çok merak edilen soruları yanıtlayacağız.

Zor sorularını bekliyoruz: docs.google.com/forms/d/e/1FA...

19 Haziran saat 17:00'de buluşmak için etkinliğimizi takvimine ekleyebilirsin: linkedin.com/feed/update/ur…
Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

Threat intel analysts produce threat intelligence. Detection engineers produce detection intelligence. Big difference. Gartner doesn’t list the second one yet. TI is about indicators tied to a known threat. DI is about rules that catch malicious behavior across threats. One

0x6rss (@0x6rss) 's Twitter Profile Photo

hi threat hunters and malware analysts! I’ve shared my new C2 hunting, reporting, and visualization tool, "Keklick," on github! It helps you discover and manage potential domains/IPs related to C2 infrastructure. Happy hunting! keklick: github.com/0x6rss/keklick

Ivan Krstić (@radian) 's Twitter Profile Photo

🔺iPhone models announced today include Memory Integrity Enforcement, the culmination of an unprecedented design and engineering effort that we believe represents the most significant upgrade to memory safety in the history of consumer operating systems. security.apple.com/blog/memory-in…