ƒεґℌα+ Dİкßı⑂ıк (@ferhatdikbiyik) 's Twitter Profile
ƒεґℌα+ Dİкßı⑂ıк

@ferhatdikbiyik

Just a researcher...
Co-creator of @Siberperest Podcast
PhD @ucdavis

ID: 937926256334602240

linkhttps://www.linkedin.com/in/fdikbiyik/ calendar_today05-12-2017 06:07:00

1,1K Tweet

584 Followers

312 Following

ƒεґℌα+ Dİкßı⑂ıк (@ferhatdikbiyik) 's Twitter Profile Photo

The SVB incident will create some opportunities for cybercriminals. We will see phishing emails impersonating SVB or federal agencies sent to tech companies. I want you to please be aware of such scams. #siliconvalleybank #phishing

ƒεґℌα+ Dİкßı⑂ıк (@ferhatdikbiyik) 's Twitter Profile Photo

I've just seen a ransomware victim that is a subcontractor of a very large rocket company. The ransomware group, Lockbit, claims to have some certified schematics of the large company. The subcontractor is a small CNC service provider in Texas. I am not…lnkd.in/d-zjdjNf

ƒεґℌα+ Dİкßı⑂ıк (@ferhatdikbiyik) 's Twitter Profile Photo

It is public news now. SpaceX data is allegedly breached through a small third party. Small or large, monitoring the cyber security posture and ransomware susceptibility of all vendors is crucial. We discussed this incident and Lockbit's attacks in 2023 i…lnkd.in/efkcR8_Z

ƒεґℌα+ Dİкßı⑂ıк (@ferhatdikbiyik) 's Twitter Profile Photo

Have you ever wondered if AI language models like ChatGPT can be used to create convincing phishing emails? As it turns out, the answer is yes - with a little bit of manipulation. I recently conducted an experiment where I indirectly asked ChatGPT to gen…lnkd.in/eNykmpWQ

ƒεґℌα+ Dİкßı⑂ıк (@ferhatdikbiyik) 's Twitter Profile Photo

The FBI recently arrested one of the admins of BreachedForum, a popular platform for sharing leaked data and communicating with cybercriminals. However, it seems that the site's other admins were prepared for this eventuality, as another member has steppe…lnkd.in/dUy4ku3J

ƒεґℌα+ Dİкßı⑂ıк (@ferhatdikbiyik) 's Twitter Profile Photo

Are you curious about how conflicts are resolved in the cybercrime world? Unlike traditional business, where partners can sue one another, the cybercrime business ecosystem operates differently. Threat actors often resort to leaking each other's confident…lnkd.in/eisPjpn6

ƒεґℌα+ Dİкßı⑂ıк (@ferhatdikbiyik) 's Twitter Profile Photo

Update on BreachedForum: Both the surface website and the dark web-onion site are currently inaccessible, reportedly due to a migration to a new infrastructure as indicated by the new admin, Baphomet, in a message shared on a Telegram Channel. Despite th…lnkd.in/ebsg9P-r

ƒεґℌα+ Dİкßı⑂ıк (@ferhatdikbiyik) 's Twitter Profile Photo

Fantastic news! Cybercriminals' go-to forum for data leaks will not be making a comeback. Baph, who took over as the forum's administrator after the previous one's arrest in New York, has announced that it will be permanently closed. This closure is a sig…lnkd.in/eDqFrp-V

ƒεґℌα+ Dİкßı⑂ıк (@ferhatdikbiyik) 's Twitter Profile Photo

Sony reveals a data breach affecting 6,800, exploiting MOVEit's known flaw by Clop. Our 2023 research: 3,600+ victims from 60+ ransomware gangs, highlighting a gamut from aggressive new entrants to strategic seasoned players in cybercrime #SonyBreach bleepingcomputer.com/news/security/…

ƒεґℌα+ Dİкßı⑂ıк (@ferhatdikbiyik) 's Twitter Profile Photo

RansomedVC's extortion attempt on #ColonialPipeline mirrors their Sony claim, a pattern of bold yet unbacked. Initial probes suggest a third-party IT firm as the data source, not a direct system breach. Unlike 2021, no ransomware deployed this time. therecord.media/colonial-pipel…

ƒεґℌα+ Dİкßı⑂ıк (@ferhatdikbiyik) 's Twitter Profile Photo

North Korean hackers exploit a critical #TeamCity flaw (CVE-2023-42793) to deploy backdoor malware, possibly eyeing software supply chain attacks. Prompt action by TeamCity mitigated the flaw, underscoring the need for vigilance in #Cybersecurity​. bleepingcomputer.com/news/security/…

ƒεґℌα+ Dİкßı⑂ıк (@ferhatdikbiyik) 's Twitter Profile Photo

I shared my thoughts with Dark Reading on the recent ransomware attack allegations against Boeing by the LockBit gang, noting LockBit's cautious approach this time around. #Cybersecurity #Ransomware #LockBit #Boeing darkreading.com/endpoint/boein…

ƒεґℌα+ Dİкßı⑂ıк (@ferhatdikbiyik) 's Twitter Profile Photo

In a bold twist of irony, AlphV (aka Black Cat) isn't just infiltrating systems—they're navigating SEC filings with alarmingly impressive finesse. Their latest act? Filing SEC breach reports for those who don't. This isn't just a new level of cyber atrocity; it's cyber audacity.

In a bold twist of irony, AlphV (aka Black Cat) isn't just infiltrating systems—they're navigating SEC filings with alarmingly impressive finesse. Their latest act? Filing SEC breach reports for those who don't. This isn't just a new level of cyber atrocity; it's cyber audacity.
ƒεґℌα+ Dİкßı⑂ıк (@ferhatdikbiyik) 's Twitter Profile Photo

Shared my take with CSOonline on AlphV's latest SEC reporting maneuver. It's a stark reminder that cyber vigilance must be constant and compliance isn't the finish line. Let's keep the conversation going and our defenses agile. #CyberSecurity #SECRules csoonline.com/article/124812…

ƒεґℌα+ Dİкßı⑂ıк (@ferhatdikbiyik) 's Twitter Profile Photo

🎙️ Joined Cybercrime Magazine Podcast: Hidden Risk to talk #ransomware trends & third-party risks. Insightful & timely! 💻🔒 👉 Listen at 1.25x for a quick, engaging experience. #Cybersecurity #CybercrimeMagazine soundcloud.com/cybercrimemaga…

Help Net Security (@helpnetsecurity) 's Twitter Profile Photo

Ransomware in 2024: Anticipated impact, targets, and landscape shift - helpnetsecurity.com/2023/12/07/202… -Black Kite ƒεґℌα+ Dİкßı⑂ıк #Ransomware #DigitalTransformation #Strategy #CyberSecurity #netsec #security #InfoSecurity #CISO #ITsecurity #CyberSecurityNews #SecurityNews

Ransomware in 2024: Anticipated impact, targets, and landscape shift - helpnetsecurity.com/2023/12/07/202… -<a href="/BlackKiteTech/">Black Kite</a> <a href="/FerhatDikbiyik/">ƒεґℌα+ Dİкßı⑂ıк</a> #Ransomware #DigitalTransformation #Strategy #CyberSecurity #netsec #security #InfoSecurity #CISO #ITsecurity #CyberSecurityNews #SecurityNews
Afra Feyza Akyürek (@afeyzaakyurek) 's Twitter Profile Photo

How can we improve LM factuality and editability with nothing but the LM itself? Introducing Deductive Closure Training (DCT): 1. generate statements and their implications 2. identify a logically consistent subset 3. distill this subset back to LM lingo-mit.github.io/deductive-clos…

How can we improve LM factuality and editability with nothing but the LM itself?

Introducing Deductive Closure Training (DCT):

1. generate statements and their implications
2. identify a logically consistent subset
3. distill this subset back to LM

lingo-mit.github.io/deductive-clos…
Black Kite (@blackkitetech) 's Twitter Profile Photo

This weekend attackers made their way into into a popular compression utility, XZ-Utils. For two years, attackers worked to blend in with the community to begin making malicious strikes. ƒεґℌα+ Dİкßı⑂ıк continues to investigate the XZ Utils incident and highlights which lessons