<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Bulut Caner</title>
    <description>The latest articles on DEV Community by Bulut Caner (@cnrco).</description>
    <link>https://dev.to/cnrco</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3882479%2F59116331-d1ee-4673-a8fa-40e7a08389a2.png</url>
      <title>DEV Community: Bulut Caner</title>
      <link>https://dev.to/cnrco</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/cnrco"/>
    <language>en</language>
    <item>
      <title>When Third Party Support Becomes Your Weakest Point: April 2026 Security Breach</title>
      <dc:creator>Bulut Caner</dc:creator>
      <pubDate>Thu, 16 Apr 2026 12:56:14 +0000</pubDate>
      <link>https://dev.to/cnrco/when-third-party-support-becomes-your-weakest-point-april-2026-security-breach-1f5c</link>
      <guid>https://dev.to/cnrco/when-third-party-support-becomes-your-weakest-point-april-2026-security-breach-1f5c</guid>
      <description>&lt;p&gt;On March 12 2026 threat actors got into Crunchyrolls support system by putting malware on a Telus International support agents computer. Stole their login details. With one login they could get into many internal systems like Zendesk, Gmail, Slack and Jira.&lt;br&gt;
The attackers main goal was Crunchyrolls support system, Zendesk. This software helps manage customer requests in one place. Within 24 hours they downloaded 8 million support tickets. These tickets contained information such as customer names, emails, IP addresses and locations.&lt;/p&gt;

&lt;p&gt;The attackers demanded $5 million. When Crunchyroll didn’t pay they leaked the data on April 4. Companies that do work for others like BPOs are major targets. If one employees computer gets compromised the bad actors can get into companies at once. Crunchyroll’s systems lacked basic defenses such as no API rate limiting, no anomaly detection but also no real-time monitoring. What would save or somewhat made this breach less worse, would be blocking bulk downloads, flag unusual access patterns, hardware multi factor authentication as well as network segmentation. This is not new either. Discord, Marks &amp;amp; Spencer, Co-op, and others have been hit the same way. Therefore until companies audit BPO permissions and implement zero-trust controls, expect more breaches.&lt;/p&gt;

&lt;p&gt;There was probably no reason for a support agent to have full access to Jira, Slack, Gmail and Zendesk at the same time. This suggests that the company failed to control who had access to what giving agents access than they needed for their job. Beyond password theft the hackers likely used malware to steal session cookies. These cookies let attackers pretend to be logged in bypassing -factor authentication. The damage goes beyond the initial $5 million ransom demand. With eight million tickets leaked the risk now is that attackers will use this information to send emails to trick users into giving away credit card details or login credentials. For the company that was breached the fallout is huge showing a failure in endpoint security that allowed malware to persist undetected.&lt;/p&gt;

&lt;p&gt;To prevent these kinds of attacks companies need to change how they think about security. They need to move from trusting vendors and toward a Zero Trust system. This starts with giving access to the specific application needed for a task. If an agent is working in Zendesk they should not be able to see the Jira login page. Companies should also require hardware-based -factor authentication, like physical security keys. These devices are much harder to hack than SMS or app-based codes. Data loss prevention must also be reinforced with API rate limiting and behavioral monitoring. The fact that millions of tickets were downloaded within a single day points to a lack of checks in the system. Security protocols should limit the number of records a single user can pull in a timeframe.&lt;br&gt;
For sensitive roles companies can eliminate the risk of local device compromise by using Virtual Desktop Infrastructure (VDI) or managed enterprise browsers. In a VDI environment the agent logs into a machine managed by the parent company ensuring that no data lives on the agent’s hardware.&lt;br&gt;
Finally security must be treated as an contractual obligation, not just a technical one. Organizations must implement third-party audits and “right-to-audit” clauses that allow for unannounced security scans of a vendor’s endpoint hygiene. Service Level Agreements should include financial penalties if a breach results from a vendor’s failure to maintain basic defenses. By treating BPO employees as high-risk users and wrapping their access, in these layers of friction companies can prioritize data safety.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>data</category>
      <category>hack</category>
      <category>security</category>
    </item>
    <item>
      <title>Why a High School Student is Covering Defensive Cybersecurity</title>
      <dc:creator>Bulut Caner</dc:creator>
      <pubDate>Thu, 16 Apr 2026 12:47:19 +0000</pubDate>
      <link>https://dev.to/cnrco/why-a-high-school-student-is-covering-defensive-cybersecurity-2225</link>
      <guid>https://dev.to/cnrco/why-a-high-school-student-is-covering-defensive-cybersecurity-2225</guid>
      <description>&lt;p&gt;I’m 16. I recently started discovering cybersecurity purely out of curiosity. To see what it’s like, protecting yourself and others from cybercriminals before it becomes a bigger problem within society. As I delved deeper into this field the more I saw that I needed to learn more, to fully comprehend how computers communicate, before understanding how they’re exploited.&lt;/p&gt;

&lt;p&gt;About me: In two years I would like to study cybersecurity &amp;amp; cybercrime at a university. This newsletter will be me documenting multiple aspects of cybersecurity to document how breaches happen globally and what we can learn from them. Many angles will be discovered such as defensive security analysis, the attack prevention measures of organizations, what went wrong and how it could possibly have been prevented. I am currently the Head of Technics of our MUN organization, where I built and deployed a website from scratch. Within the process I learned web design, web development and DNS configuration of our custom domain.&lt;/p&gt;

&lt;p&gt;Defense Stack, The Security Analysis Newsletter by a highschool student: The first posts will break down recent cybersecurity breaches, what happened, how attackers got in, as well as what defensive measures could help stopping it. If you’re curious about cybersecurity, learning alongside me, or just want to understand what’s happening in the digital threat landscape, you may want to join me. This will be a long journey and I am going to extract as much information as I can.&lt;/p&gt;

&lt;p&gt;— First Publication of Defense Stack &amp;gt;_&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>data</category>
      <category>cli</category>
    </item>
  </channel>
</rss>
