
Cyber Threats and AI-Powered Attacks
Artificial intelligence supported cyber threats pose an increasing danger today. Advanced phishing techniques, ransomware and many other cyber attack methods pose serious risks to cyber security both in Türkiye and around the world. As stated by ESET Turkey Product and Marketing Manager Can Erginkurban, “AI is effective in both defense and attack.” Therefore, institutions need to increase their digital resilience and be prepared against cyber threats.
Artificial Intelligence and Phishing Attacks
Generative AI gives cybercriminals a huge advantage in creating personalized and convincing phishing messages. This is especially true financial sectorposes serious risks to SMEs and public institutions. In Türkiye, AI-powered phishing and social engineering attacks pose an increasing threat to banking, SMEs and critical infrastructures.
Classic Phishing Methods and New Threats
Classical methods such as phishing, smishing and vishing are now turning into more targeted and convincing campaigns supported by artificial intelligence. Phishing attacks targeting the public and businesses are on the rise in Türkiye. Users are being deceived with fake emails and SMSs, especially for banks, SSI and e-government services. These types of attacks aim to steal users' personal information.
Internal Threats and Vulnerabilities
Institutions also need to be careful about internal threats. Intentional or accidental internal threats can lead to major security gaps. In Türkiye, the continued use of access information by former employees is a common security gap. For this reason, access management and user behavior analysis solutions have become important.
The Rise of Ransomware
Ransomware is on the rise with groups like Cl0p and LockBit. Energy, production and public infrastructures in Türkiye are direct targets of such attacks. For an effective defense, backup, network segmentation and Zero Trust It is recommended that the principles of these approaches be implemented. These approaches are critical to creating a more robust firewall against attacks.
Password Security and Weak Passwords
Simple passwords such as “123456” and “password” continue to be used worldwide. Similar weak password use in Türkiye also paves the way for system infiltration. Even in internal systems, 8-character, all-lowercase passwords are quite common; this increases the risk of infiltration. Strong passwords, multi-factor authentication and password managers are of vital importance at this point.
Remote Working and Security Threats
The adoption of the remote working model has created new security gaps. Employees who connect to the corporate network with personal devices can unintentionally create security vulnerabilities. The prevalence of BYOD (Bring Your Own Device) applications in Türkiye becomes risky if used without adequate control mechanisms. Mobile device security and access control play a critical role in this process.
Data Leaks and Legal Risks
Open databases and inadequate protection measures cause sensitive data to leak both in the world and in Türkiye. The increase in penalties under the KVKK makes it necessary for data protection processes to be carried out in a more systematic and disciplined manner. Institutions should review their data protection processes and create a more effective structure.
Mobile Threats and Fake Apps
Malicious software that looks like a real banking or chat application is stealing users' data. Downloading applications from unsafe sources, especially on the Android platform, poses a major threat. Fake banking and chatbot applications downloaded outside of Google Play are rapidly increasing in Türkiye. Users need to be careful about such applications.
Device Security and IoT Risks
The proliferation of smart devices brings with it new security vulnerabilities. The increase in smart city and factory applications in Türkiye ensures that protection solutions in this area become a priority. ESET, for IoT devices embedded security solutions, recommends periodic firmware updates and the creation of network-isolated segments. Such measures are critical to improving device security.
Cyber Resilience and Rapid Recovery Capacity
In the face of increasing cyberattacks, institutions need to not only take security measures but also have the ability to recover quickly after attacks. The concept of digital resilience is not yet widespread enough, especially in Türkiye; however, it is of critical importance. Institutions should take the necessary steps in this regard and become more prepared for future threats.