InfinitumIT

Blog

Latest insights from the threat landscape

Log Yönetimi ve 5651

Log Parsing in QRadar with DSM: A Practical Walkthrough on a Real-World Scenario

IBM QRadar üzerinde DSM Editor ile tanınmayan logları adım adım parse edip QID ile eşleştirerek anlamlı event'lere dönüştürmenin tam yol haritası.

05.05.2026 · 8 min

Makaleler

IBM QRadar User Guide

Zero-Day attacks are cyber attacks that target security vulnerabilities in computer software or operating systems that have not yet been discovered and patched. The term "Zero-Day" refers to the days before the vulnerability was discovered.

11.03.2026 · 1 min

Makaleler

FortiNDR: Next-Generation Network Threat Detection and Response

Zero-Day attacks are cyber attacks that target security vulnerabilities in computer software or operating systems that have not yet been discovered and patched. The term "Zero-Day" refers to the days before the vulnerability was discovered.

24.02.2026 · 1 min

Makaleler

Zero-Day Attacks: Discovery, Monitoring and Defense Methods

Zero-Day attacks are cyber attacks that target security vulnerabilities in computer software or operating systems that have not yet been discovered and patched. The term "Zero-Day" refers to the days before the vulnerability was discovered.

10.08.2023 · 1 min

Makaleler

What is a Botnet? How are botnet attacks carried out?

In today's digital world, botnet attacks have become an ever-increasing threat. Botnets are complex networks that allow hackers to infiltrate target systems and take control of millions of devices.

24.07.2023 · 1 min

Makaleler

What is Spyware? Beware of This Spy Software That Threatens Your Computers

Spyware, as the name suggests, is a type of spy software that watches us and secretly collects our information. In today's rapidly advancing technology, the digital world has settled at the center of our lives. As internet usage has become widespread, the security of our personal data has also become an important issue. One of the biggest threats we face at this point is spyware.

19.07.2023 · 1 min

Makaleler

What is a Network Attack? What Are the Types of Network Attacks?

A network attack is a type of attack in which intentional and damaging actions are carried out on computer systems, network infrastructures, or internet-connected devices.

17.07.2023 · 1 min

Our team certifications

Experts accredited by SANS, Offensive Security, EC-Council, CompTIA, ISACA, CREST, and INE.

SANS GPEN
SANS GWAPT
SANS GICSP
SANS GRTP
SANS GCIH
SANS GSEC
Offensive Security OSCP
Offensive Security OSWP
EC-Council CEH
CompTIA Security+
ISACA CISM
ISACA CISA
CREST CRT
INE eWPTX
Fortinet FCP Secure Networking
Fortinet FCP Cloud Security
Fortinet FCP Security Operations
Fortinet FCSS Secure Networking
Fortinet FCSS SASE
Fortinet FCSS Cloud Security
Fortinet FCSS Security Operations
IBM QRadar Admin
SANS GPEN
SANS GWAPT
SANS GICSP
SANS GRTP
SANS GCIH
SANS GSEC
Offensive Security OSCP
Offensive Security OSWP
EC-Council CEH
CompTIA Security+
ISACA CISM
ISACA CISA
CREST CRT
INE eWPTX
Fortinet FCP Secure Networking
Fortinet FCP Cloud Security
Fortinet FCP Security Operations
Fortinet FCSS Secure Networking
Fortinet FCSS SASE
Fortinet FCSS Cloud Security
Fortinet FCSS Security Operations
IBM QRadar Admin

Cookie usage

We only use essential session and language preference cookies; no third-party tracking cookies. For details, see our Cookie Policy and KVKK Privacy Notice.