Mert SARICA's Avatar

Mert SARICA

@hack4career.com.bsky.social

Cyber Security Researcher, Speaker & Blogger https://www.hack4career.com

66 Followers  |  9 Following  |  969 Posts  |  Joined: 18.06.2023  |  1.6179

Latest posts by hack4career.com on Bluesky

Preview
Istanbul Senin Data Breach | Hack 4 Career Introduction When the calendar showed May 26, 2025, a post appeared on DarkForums — a platform frequented by cybercriminals — from a threat actor using the alias kovalidis. In the message, the actor, ...

Was the İstanbul Senin app, linked to Istanbul Municipality, really hacked — or was it something else?

In my latest blog post, I investigate the alleged leak of 4.7M users’ data from a citizen’s perspective. 👇

🔗 www.hack4career.com/istanbul-sen...

07.11.2025 13:02 — 👍 0    🔁 0    💬 0    📌 0
Preview
ClickFix & FileFix: How a Copy-Paste Trick Became 2025’s Top Social Engineering Threat - SOCRadar® Cyber Intelligence Inc. ClickFix attacks are redefining what social engineering looks like in 2025. What began as a niche trick buried in shady corners of the web has...

ClickFix & FileFix: How a Copy-Paste Trick Became 2025’s Top Social Engineering Threat

06.11.2025 13:10 — 👍 0    🔁 0    💬 0    📌 0
Preview
Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data | Read more hacking news on The Hacker News cybersecurity news website and learn how to protect against…

Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data

06.11.2025 13:01 — 👍 1    🔁 0    💬 0    📌 0
Preview
Hacktivist-Driven DDoS Dominates Attacks on Public Sector ENISA report reveals DDoS accounted for 60% of public sector security incidents last year

Hacktivist-Driven DDoS Dominates Attacks on Public Sector

06.11.2025 13:00 — 👍 0    🔁 0    💬 0    📌 0
Preview
How an ex-L3Harris Trenchant boss stole and sold cyber exploits to Russia | TechCrunch Peter Williams sold eight exploits to a Russian zero-day broker by smuggling them from his employer’s highly secured air-gapped network. A court document, plus exclusive reporting by TechCrunch and…

How an ex-L3Harris Trenchant boss stole and sold cyber exploits to Russia

05.11.2025 13:01 — 👍 0    🔁 0    💬 0    📌 0
Preview
Choosing the VPN That's Right for You VPN stands for “Virtual Private Network.” When you connect to a VPN, all data that you send (such as the requests to servers when browsing the web) appears to originate from the VPN itself, rather…

Choosing the VPN That's Right for You

04.11.2025 13:05 — 👍 0    🔁 0    💬 0    📌 0
Preview
Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case Yuriy Igorevich Rybtsov, aka MrICQ, was arrested in Italy and lost his appeal to avoid extradition to the US.

Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case

04.11.2025 13:00 — 👍 0    🔁 0    💬 0    📌 0
Preview
AI Code Security Checkpoints for Human Oversight To write secure code with LLMs developers must have the skills to use AI as a collaborative assistant rather than an autonomous tool, Madou argues.

AI Code Security Checkpoints for Human Oversight www.darkreading.com/application-...

03.11.2025 13:46 — 👍 0    🔁 0    💬 0    📌 0
Preview
Introducing Aardvark: OpenAI’s agentic security researcher Now in private beta: an AI agent that thinks like a security researcher and scales to meet the demands of modern software.

Aardvark: OpenAI’s agentic security researcher openai.com/index/introd...

31.10.2025 12:24 — 👍 0    🔁 0    💬 0    📌 0
Preview
70% of CISOs say internal conflicts more damaging than cyberattacks CISO-CEO tension and unclear authority under duress are imperiling incident response. CISOs must establish not only clear response plans but also leadership alliances centered on business value,…

70% of CISOs say internal conflicts more damaging than cyberattacks www.csoonline.com/article/4079...

31.10.2025 12:07 — 👍 0    🔁 0    💬 0    📌 0
Preview
Millions Impacted by Conduent Data Breach The hackers stole names, addresses, dates of birth, Social Security numbers, and health and insurance information.

Millions Impacted by Conduent Data Breach

31.10.2025 12:01 — 👍 0    🔁 0    💬 0    📌 0
Preview
Is your perimeter having an identity crisis? Your biggest security risk might now sound exactly like your boss. AI clones identities so well that only zero-trust thinking can keep you safe.

Is your perimeter having an identity crisis? www.csoonline.com/article/4080...

31.10.2025 08:05 — 👍 0    🔁 0    💬 0    📌 0
Preview
Chrome to Turn HTTPS on by Default for Public Sites Starting October 2026, the browser will ask users if they want to access public websites that do not use secure connections.

Chrome to Turn HTTPS on by Default for Public Sites www.securityweek.com/chrome-to-tu...

30.10.2025 12:01 — 👍 0    🔁 0    💬 0    📌 0
Post image

Bugün bir duruşu, bir karakteri ve bir milletin yeniden doğuşunu kutluyoruz. Cumhuriyetimizin ışığı sonsuza dek yolumuzu aydınlatsın.

🇹🇷 29 Ekim Cumhuriyet Bayramımız kutlu olsun! 🇹🇷

29.10.2025 12:45 — 👍 0    🔁 0    💬 0    📌 0
Preview
Iran’s MOIS-linked Ravin Academy hit by data breach : Ravin Academy confirms the intrusion on Telegram, says student data was stolen

Iran’s MOIS-linked Ravin Academy hit by data breach www.theregister.com/2025/10/27/b...

28.10.2025 12:15 — 👍 0    🔁 0    💬 0    📌 0
Preview
Chrome Zero-Day Exploited to Deliver Italian Memento Labs' LeetAgent Spyware Kaspersky reveals Chrome zero-day CVE-2025-2783 exploited to deploy Memento Labs’ LeetAgent spyware.

Chrome Zero-Day Exploited to Deliver Italian Memento Labs' LeetAgent Spyware thehackernews.com/2025/10/chro...

28.10.2025 12:05 — 👍 0    🔁 0    💬 0    📌 0
Preview
New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands Researchers uncover a CSRF flaw in ChatGPT Atlas letting attackers inject persistent malicious code.

New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands thehackernews.com/2025/10/new-...

28.10.2025 12:02 — 👍 0    🔁 0    💬 0    📌 0
Preview
TCS Refutes Losing M&S Contract After Cyber-Attack The IT outsourcing giant said its service desk contract with Marks & Spencer was terminated long before the hack

TCS Refutes Losing M&S Contract After Cyber-Attack www.infosecurity-magazine.com/news/tcs-ref...

27.10.2025 12:21 — 👍 0    🔁 0    💬 0    📌 0
Preview
X to Retire Twitter.com, Users Must Re-Register Security Keys by Nov 10 Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

X to Retire Twitter.com, Users Must Re-Register Security Keys by Nov 10 hackread.com/x-retire-twi...

27.10.2025 12:16 — 👍 0    🔁 0    💬 0    📌 0
Preview
Ex-CISA chief says AI could mean the end of cybersecurity : Jen Easterly says most breaches stem from bad software, and smarter tech could finally clean it up

Ex-CISA chief says AI could mean the end of cybersecurity www.theregister.com/2025/10/27/j...

27.10.2025 12:07 — 👍 0    🔁 0    💬 0    📌 0
Preview
Mem3nt0 mori – The Hacking Team is back! Kaspersky researchers discovered previously unidentified commercial Dante spyware developed by Memento Labs (formerly Hacking Team) and linked it to the ForumTroll APT attacks.

The Hacking Team is back! securelist.com/forumtroll-a...

27.10.2025 12:06 — 👍 0    🔁 0    💬 0    📌 0
Preview
Researchers expose large-scale YouTube malware distribution network - Help Net Security Researchers help set back a large-scale malware distribution operation on YouTube they dubbed the "YouTube Ghost Network." 

Researchers expose large-scale YouTube malware distribution network www.helpnetsecurity.com/2025/10/23/y...

24.10.2025 14:30 — 👍 0    🔁 0    💬 0    📌 0
Preview
OpenAI defends Atlas as prompt injection attacks surface : 'Trust no AI' says one researcher

OpenAI defends Atlas as prompt injection attacks surface www.theregister.com/2025/10/22/o...

24.10.2025 12:01 — 👍 0    🔁 0    💬 0    📌 0
Preview
Exclusive: Apple alerts exploit developer that his iPhone was targeted with government spyware A developer at Trenchant, a leading Western spyware and zero-day maker, was suspected of leaking company tools and was fired. Weeks later, Apple notified him that his personal iPhone was targeted…

Apple alerts exploit developer that his iPhone was targeted with government spyware  techcrunch.com/2025/10/21/a...

23.10.2025 12:03 — 👍 0    🔁 0    💬 0    📌 0
Preview
Supply Chain Attack Targets VS Code Extensions With ‘GlassWorm’ Malware The malware uses invisible Unicode characters to hide its code and blockchain-based infrastructure to prevent takedowns.

Supply Chain Attack Targets VS Code Extensions With 'GlassWorm' Malware www.securityweek.com/supply-chain...

21.10.2025 12:10 — 👍 0    🔁 0    💬 0    📌 0
Preview
Today is when Amazon brain drain finally caught up with AWS column: When your best engineers log off for good, don’t be surprised when the cloud forgets how DNS works

Today is when Amazon brain drain finally caught up with AWS www.theregister.com/2025/10/20/a...

21.10.2025 12:05 — 👍 0    🔁 0    💬 0    📌 0
Preview
NSO permanently barred from targeting WhatsApp users with Pegasus spyware Ruling holds that defeating end-to-end encryption in WhatsApp harms Meta’s business.

NSO permanently barred from targeting WhatsApp users with Pegasus spyware arstechnica.com/security/202...

21.10.2025 12:00 — 👍 0    🔁 0    💬 0    📌 0
Preview
131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign Researchers uncover 131 Chrome extensions automating WhatsApp spam, impacting 20,905 users in Brazil.

131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign thehackernews.com/2025/10/131-...

20.10.2025 12:05 — 👍 0    🔁 0    💬 0    📌 0
Preview
TikTok videos continue to push infostealers in ClickFix attacks Cybercriminals are using TikTok videos disguised as free activation guides for popular software like Windows, Spotify, and Netflix to spread information-stealing malware.

TikTok videos continue to push infostealers in ClickFix attacks www.bleepingcomputer.com/news/securit...

20.10.2025 12:01 — 👍 0    🔁 0    💬 0    📌 0
Preview
North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts Google reports North Korean hackers using EtherHiding to embed adaptive malware in blockchain smart contracts.

North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts thehackernews.com/2025/10/nort...

17.10.2025 18:40 — 👍 0    🔁 0    💬 0    📌 0

@hack4career.com is following 9 prominent accounts