Istanbul Gelisim University Technology Transfer Office (IGU TTO) carries out R&D activities to improve living standards at national and international level and accelerate economic development. IGU TTO, which has carried out many projects in cooperation with the public and private sectors, ensures the commercialization of technology by establishing a connection between industry and academia.
A workshop was held at Istanbul Gelisim University (IGU) Technology Transfer Office (TTO) on the technological areas being studied. In the workshop attended by TTO staff, responsible intern students and students in long-term internships; ideas about technological areas such as artificial intelligence, aviation, mechanical design, cyber security and automation were exchanged.
İstanbul Gelişim University is emerging as a hub of innovation, encouraging its students in R&D and technology. The university boasts 18 teams participating in Teknofest, one of Turkey's most prestigious technology competitions.
The Russia-linked threat actor, known as APT29, targeted European diplomatic missions and Foreign Ministries as part of a series of spear phishing campaigns in October and November 2021.
Cisco has released software updates to address four vulnerabilities in its software that could be weaponized by malicious actors to take control of affected systems.
As a deliberate sabotage, the developer behind the popular "node-ipc" NPM package sent a tampered-up new version to denounce the Russian invasion of Ukraine, raising concerns about open source and security in the software supply chain.
ABD Federal Soruşturma Bürosu (FBI), geçen Kasım ayında ortaya çıkmasından bu yana Mart 2022 itibariyle dünya çapında en az 60 kuruluşu mağdur ettiğini söylediği BlackCat hizmet olarak fidye yazılımı (RaaS) için alarm veriyor.
Twitter, which is in the process of being acquired by Tesla CEO Elon Musk, has agreed to pay the US Federal Trade Commission (FTC) $150 million to resolve allegations that it misused non-public information collected for security purposes to serve targeted ads.
A suspected ransomware attack against an anonymous target exploited a Mitel VoIP device as an entry point to perform remote code execution and provide initial access to the environment. The findings come from cybersecurity firm CrowdStrike, which traced the source of the attack to a Linux-based Mitel VoIP device located in the network perimeter, while also identifying a previously unknown exploit, as well as several actor-adopted forensics measures.
Nation-state threat actors are increasingly adopting and integrating the Sliver command and control (C2) framework in their intrusion campaigns, replacing Cobalt Strike.