Tamer Sahin (@tamersahin) 's Twitter Profile
Tamer Sahin

@tamersahin

Ethical Hacker

ID: 18550416

linkhttps://tamersahin.com calendar_today02-01-2009 11:26:39

65 Tweet

40,40K Takipçi

0 Takip Edilen

Tamer Sahin (@tamersahin) 's Twitter Profile Photo

I had the privilege of speaking at the recent 'Retail Days' event, a two-day gathering of industry leaders and innovators. With over 5200 companies and more than 10,000 participants, half of whom are C-level executives, the event was a hub of networking and knowledge sharing.

I had the privilege of speaking at the recent 'Retail Days' event, a two-day gathering of industry leaders and innovators. With over 5200 companies and more than 10,000 participants, half of whom are C-level executives, the event was a hub of networking and knowledge sharing.
Tamer Sahin (@tamersahin) 's Twitter Profile Photo

When my girlfriend asked her assistant if an envelope was left on her desk, we didn't expect the mystery it would bring. Upon receiving a photo of the table, we started speculating about its contents. There were two main possibilities, and instead of opening it, I decided to

When my girlfriend asked her assistant if an envelope was left on her desk, we didn't expect the mystery it would bring. Upon receiving a photo of the table, we started speculating about its contents. There were two main possibilities, and instead of opening it, I decided to
Tamer Sahin (@tamersahin) 's Twitter Profile Photo

A video went viral on TikTok. Documents containing private customer information from Indian IDFC First Bank were found in use by street food vendors, representing a surprising physical document security failure. The company was hacked in 2023, experiencing a digital security

Tamer Sahin (@tamersahin) 's Twitter Profile Photo

A significant outage is currently being experienced. The US Aviation Authority has mandated that all flights land due to a technical computer glitch. The situation is caused by a Crowdstrike update that is causing many systems to crash with a blue screen. Major tech companies,

Tamer Sahin (@tamersahin) 's Twitter Profile Photo

In the past, saying "our product constantly receives updates through its cloud connection to protect you from zero-day vulnerabilities" was almost a standard. Will this continue? The real question is whether to maintain protection against the latest threats with real-time

In the past, saying "our product constantly receives updates through its cloud connection to protect you from zero-day vulnerabilities" was almost a standard. Will this continue?

The real question is whether to maintain protection against the latest threats with real-time
Tamer Sahin (@tamersahin) 's Twitter Profile Photo

The hacking of KnowBe4 by a North Korean hacker using social engineering reminded me of Kevin Mitnick. Kevin was not only a technically skilled hacker but also a phenomenon in social engineering. Authorities were so afraid of him that they placed him in solitary confinement for

The hacking of KnowBe4 by a North Korean hacker using social engineering reminded me of Kevin Mitnick. Kevin was not only a technically skilled hacker but also a phenomenon in social engineering.

Authorities were so afraid of him that they placed him in solitary confinement for
Tamer Sahin (@tamersahin) 's Twitter Profile Photo

Pavel Durov, the founder of Telegram, has been arrested. The woman in the photo appears to have caused a complete OSINT disaster. She was posting real-time updates about the hotels they stayed in, the cities they visited, and even the tail numbers of the helicopters they used.

Pavel Durov, the founder of Telegram, has been arrested. The woman in the photo appears to have caused a complete OSINT disaster. 

She was posting real-time updates about the hotels they stayed in, the cities they visited, and even the tail numbers of the helicopters they used.
Tamer Sahin (@tamersahin) 's Twitter Profile Photo

Great idea... unless you’ve met AI, which can copy your voice faster than a YouTube ad skip button. Sure, voice authentication sounds futuristic, but in the current AI environment, it’s time to pause and think. In just 10 seconds, anyone can clone a voice. Let's push for

Great idea... unless you’ve met AI, which can copy your voice faster than a YouTube ad skip button.

Sure, voice authentication sounds futuristic, but in the current AI environment, it’s time to pause and think. In just 10 seconds, anyone can clone a voice.

Let's push for
Tamer Sahin (@tamersahin) 's Twitter Profile Photo

For the first time, an intelligence agency has successfully exploited such a vulnerability operationally at this scale. Hezbollah leadership, using older devices like pagers and flip phones to avoid hacking, saw thousands of them triggered to explode by Israel, resulting in

Tamer Sahin (@tamersahin) 's Twitter Profile Photo

Here’s my mobile survival guide to the top 10 ways to stay safe and secure. 1. Reboot Weekly, per the NSA: Even the NSA recommends rebooting your phone at least once a week. It disrupts stealthy zero-click exploits and gives potential intruders the boot. 2. Stay Up to Date:

Here’s my mobile survival guide to the top 10 ways to stay safe and secure.

1. Reboot Weekly, per the NSA: Even the NSA recommends rebooting your phone at least once a week. It disrupts stealthy zero-click exploits and gives potential intruders the boot.

2. Stay Up to Date:
Tamer Sahin (@tamersahin) 's Twitter Profile Photo

The most dangerous vulnerabilities of 2024. And no, this doesn’t cover Sally from accounting falling for a "Free iPhone!" scam-that’s a story for another day. 1. Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) - (CWE 79) 2. Out-of-bounds

The most dangerous vulnerabilities of 2024. 

And no, this doesn’t cover Sally from accounting falling for a "Free iPhone!" scam-that’s a story for another day.

1. Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) - (CWE 79)

2. Out-of-bounds
Tamer Sahin (@tamersahin) 's Twitter Profile Photo

It seems North Korea has gone beyond traditional espionage tactics, creating a spy scheme within the U.S. that even includes competitions and bonuses to incentivize its operatives. According to a detailed report by the Department of Justice, North Korean agents have made

It seems North Korea has gone beyond traditional espionage tactics, creating a spy scheme within the U.S. that even includes competitions and bonuses to incentivize its operatives.

According to a detailed report by the Department of Justice, North Korean agents have made
Tamer Sahin (@tamersahin) 's Twitter Profile Photo

The open-source Text-to-Speech AI model called Zonos has been introduced. It seems to be the most realistic one we’ve heard so far. Our eyes have deceived us before; now, it’s our ears’ turn.