<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Eresus Security Research Feed</title>
    <link>https://www.eresussec.com</link>
    <atom:link href="https://www.eresussec.com/rss.xml" rel="self" type="application/rss+xml" />
    <description>Research, advisories, and offensive security writing from Eresus Security.</description>
    <language>en-us</language>
    <lastBuildDate>Tue, 07 Apr 2026 16:47:01 GMT</lastBuildDate>
    
    <item>
      <title><![CDATA[Technical Analysis of Fortinet CVE-2026-35616: Actively Exploited API Vulnerability]]></title>
      <link>https://www.eresussec.com/blog/fortinet-cve-2026-35616-analysis</link>
      <guid>https://www.eresussec.com/blog/fortinet-cve-2026-35616-analysis</guid>
      <pubDate>Tue, 07 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[A deep dive into the critical CVSS 9.1 improper access control vulnerability (CVE-2026-35616) in FortiClient EMS, its exploitation landscape, and immediate remediation steps.]]></description>
    </item>
    <item>
      <title><![CDATA[Fortinet FortiClient EMS Zafiyeti (CVE-2026-35616) Analizi ve Acil Çözüm Rehberi]]></title>
      <link>https://www.eresussec.com/blog/fortinet-cve-2026-35616-analizi</link>
      <guid>https://www.eresussec.com/blog/fortinet-cve-2026-35616-analizi</guid>
      <pubDate>Tue, 07 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[FortiClient EMS sunucularını hedef alan ve aktif olarak sömürülen Kritik CVSS 9.1 zafiyetinin teknik analizi, yetki yükseltme mekanizması ve alınması gereken önlemler.]]></description>
    </item>
    <item>
      <title><![CDATA[How to Build a Production-Grade gRPC Service in Go: A Step-by-Step Guide]]></title>
      <link>https://www.eresussec.com/blog/eresuslog-open-source-grpc-logger</link>
      <guid>https://www.eresussec.com/blog/eresuslog-open-source-grpc-logger</guid>
      <pubDate>Tue, 07 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Learn how to write a gRPC service in Go from scratch: Protobuf definitions, Unary/Streaming RPCs, PostgreSQL with GORM, Auth Interceptors, Rate Limiting, and Health Checks. Updated for 2026.]]></description>
    </item>
    <item>
      <title><![CDATA[Go ile Sıfırdan gRPC Servisi Nasıl Yazılır? Adım Adım Production Rehberi]]></title>
      <link>https://www.eresussec.com/blog/eresuslog-acik-kaynak-grpc-logger</link>
      <guid>https://www.eresussec.com/blog/eresuslog-acik-kaynak-grpc-logger</guid>
      <pubDate>Tue, 07 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Go (Golang) ile gRPC servisi yazmayı öğrenin: Protobuf tanımlama, Unary/Streaming RPC, PostgreSQL entegrasyonu, Auth Interceptor ve Rate Limiting. 2026 güncel rehber.]]></description>
    </item>
    <item>
      <title><![CDATA[Legacy SAST vs. AI-Powered Code Analysis: The Future of AppSec]]></title>
      <link>https://www.eresussec.com/blog/traditional-sast-vs-ai-code-analysis</link>
      <guid>https://www.eresussec.com/blog/traditional-sast-vs-ai-code-analysis</guid>
      <pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Why are traditional Static Analysis (SAST) tools slowing down development teams? Learn how AI-powered autonomous agents are redefining application security.]]></description>
    </item>
    <item>
      <title><![CDATA[Cybersecurity for SMBs: A 5-Step Defense Strategy for Growing Teams]]></title>
      <link>https://www.eresussec.com/blog/smb-cybersecurity-strategy</link>
      <guid>https://www.eresussec.com/blog/smb-cybersecurity-strategy</guid>
      <pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[How can Small and Medium-Sized Businesses (SMBs) protect themselves from ransomware and data breaches on a tight budget? 5 actionable security steps.]]></description>
    </item>
    <item>
      <title><![CDATA[Ne Sıklıkla Sızma Testi (Pentest) Yaptırmalısınız? (Yıllık Denetim Efsanesi)]]></title>
      <link>https://www.eresussec.com/blog/sizma-testi-sikligi</link>
      <guid>https://www.eresussec.com/blog/sizma-testi-sikligi</guid>
      <pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Şirketler ne sıklıkla sızma testi yaptırmalı? Yılda bir kez yapılan geleneksel pentestler neden artık güvenliğinizi sağlamada yetersiz kalıyor?]]></description>
    </item>
    <item>
      <title><![CDATA[The Alphabet of AppSec: Understanding the Difference Between SAST, DAST, and IAST]]></title>
      <link>https://www.eresussec.com/blog/sast-vs-dast-vs-iast</link>
      <guid>https://www.eresussec.com/blog/sast-vs-dast-vs-iast</guid>
      <pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Confused by AppSec acronyms? Discover the core differences between SAST, DAST, and IAST to understand which testing methodology best secures your software lifecycle.]]></description>
    </item>
    <item>
      <title><![CDATA[Uygulama Güvenliğinin Alfabesi: SAST, DAST ve IAST Arasındaki Farklar]]></title>
      <link>https://www.eresussec.com/blog/sast-dast-iast-farki</link>
      <guid>https://www.eresussec.com/blog/sast-dast-iast-farki</guid>
      <pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Güvenli yazılım geliştirme sürecinin (SDLC) temel araçları olan SAST, DAST ve IAST nedir? Hangi yöntem hangi açık türlerini daha iyi bulur?]]></description>
    </item>
    <item>
      <title><![CDATA[LLM ve RAG Veri Zehirlenmesi: Otonom AI Modellerine Nasıl Sızılır?]]></title>
      <link>https://www.eresussec.com/blog/llm-rag-veri-zehirlenmesi</link>
      <guid>https://www.eresussec.com/blog/llm-rag-veri-zehirlenmesi</guid>
      <pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Retrieval-Augmented Generation (RAG) mimarisindeki Büyük Dil Modellerine (LLM) yönelik Indirect Prompt Injection ve Data Poisoning saldırıları nasıl gerçekleşir?]]></description>
    </item>
    <item>
      <title><![CDATA[LLM and RAG Data Poisoning: Infiltrating Autonomous AI Models]]></title>
      <link>https://www.eresussec.com/blog/llm-rag-data-poisoning</link>
      <guid>https://www.eresussec.com/blog/llm-rag-data-poisoning</guid>
      <pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[How do threat actors execute Indirect Prompt Injections and Data Poisoning in Retrieval-Augmented Generation (RAG) architectures?]]></description>
    </item>
    <item>
      <title><![CDATA[KOBİ'ler İçin Siber Güvenlik: 5 Kritik Adımda Savunma Stratejisi]]></title>
      <link>https://www.eresussec.com/blog/kobi-siber-guvenlik-stratejisi</link>
      <guid>https://www.eresussec.com/blog/kobi-siber-guvenlik-stratejisi</guid>
      <pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Küçük ve Orta Büyüklükteki İşletmeler (KOBİ) kısıtlı bütçeleriyle hacker saldırılarından nasıl korunabilir? 5 basit stratejik güvenlik adımı.]]></description>
    </item>
    <item>
      <title><![CDATA[How Often Should You Penetration Test? (Scrapping the Annual Audit Myth)]]></title>
      <link>https://www.eresussec.com/blog/how-often-should-you-pentest</link>
      <guid>https://www.eresussec.com/blog/how-often-should-you-pentest</guid>
      <pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[How frequently does your company need a penetration test? Why the traditional 'once-a-year' pentest is actively putting modern software infrastructure at risk.]]></description>
    </item>
    <item>
      <title><![CDATA[Geleneksel SAST vs. AI Destekli Kod Analizi: Hangisi Gelecek?]]></title>
      <link>https://www.eresussec.com/blog/geleneksel-sast-vs-ai-analizi</link>
      <guid>https://www.eresussec.com/blog/geleneksel-sast-vs-ai-analizi</guid>
      <pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Eski nesil statik analiz (SAST) araçları neden yazılım ekiplerini yavaşlatıyor? Yapay zeka tabanlı otonom kod analizi güvenliği nasıl baştan tanımlıyor?]]></description>
    </item>
    <item>
      <title><![CDATA[Black Box, White Box ve Grey Box Pentest Arasındaki Farklar: Hangisini Seçmelisiniz?]]></title>
      <link>https://www.eresussec.com/blog/black-box-white-box-pentest</link>
      <guid>https://www.eresussec.com/blog/black-box-white-box-pentest</guid>
      <pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Sızma testi türleri olan Black Box (Siyah Kutu), White Box (Beyaz Kutu) ve Grey Box (Gri Kutu) pentest yöntemlerinin avantajları ve dezavantajları nelerdir?]]></description>
    </item>
    <item>
      <title><![CDATA[Black Box, White Box vs Grey Box Penetration Testing: Which Should You Choose?]]></title>
      <link>https://www.eresussec.com/blog/black-box-vs-white-box-pentest</link>
      <guid>https://www.eresussec.com/blog/black-box-vs-white-box-pentest</guid>
      <pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Understand the key differences between Black Box, White Box, and Grey Box penetration testing to select the right cybersecurity approach for your business.]]></description>
    </item>
    <item>
      <title><![CDATA[BOLA ve IDOR Zafiyetinin Derinlikleri: REST ve GraphQL API'leri Nasıl Sömürülür?]]></title>
      <link>https://www.eresussec.com/blog/api-bola-idor-uzman-rehberi</link>
      <guid>https://www.eresussec.com/blog/api-bola-idor-uzman-rehberi</guid>
      <pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[ Broken Object Level Authorization (BOLA/IDOR) zafiyeti nedir? Fintek ve e-ticaret API'lerindeki yetki atlama açıkları otonom ajanlarla nasıl tespit edilir?]]></description>
    </item>
    <item>
      <title><![CDATA[The Depths of BOLA and IDOR: Exploiting REST and GraphQL APIs]]></title>
      <link>https://www.eresussec.com/blog/api-bola-idor-expert-guide</link>
      <guid>https://www.eresussec.com/blog/api-bola-idor-expert-guide</guid>
      <pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[What is BOLA (Broken Object Level Authorization)? Discover how threat actors exploit access control logic in APIs and how autonomous agents eradicate them.]]></description>
    </item>
    <item>
      <title><![CDATA[What is DevSecOps? Automating Security with the 'Shift-Left' Approach]]></title>
      <link>https://www.eresussec.com/blog/what-is-devsecops-shift-left</link>
      <guid>https://www.eresussec.com/blog/what-is-devsecops-shift-left</guid>
      <pubDate>Sun, 05 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Understand the core principles of DevSecOps and Shift-Left security. Learn how to automate security checks directly into your software development pipeline.]]></description>
    </item>
    <item>
      <title><![CDATA[Penetration Testing Pricing in 2026: Cost Factors & Budget Guide]]></title>
      <link>https://www.eresussec.com/blog/pentest-pricing-2026</link>
      <guid>https://www.eresussec.com/blog/pentest-pricing-2026</guid>
      <pubDate>Sun, 05 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[A comprehensive 2026 guide to penetration testing costs. Learn exactly how pricing is determined for web, mobile, and network security assessments.]]></description>
    </item>
  </channel>
</rss>