Hunting Telegram, Web3 & Hydra Saiga

In our February 2026 detection webinar, Ertugrul Kara and Patrick Staubmann explored how threat actors abuse Telegram, Web3 platforms, and advanced post-exploitation tactics to evade detection — sharing new sandbox detections, YARA rules, and insights into Hydra Saiga’s attacks on critical infrastructure.

Covered in The Webinar

Telegram & Web3 Abuse Detection

Evolving Delivery & Evasion Techniques

Hydra Saiga Post-Exploitation Insights

About The Speakers

Ertugrul Kara

Sr. Product Marketing Manager

Ertugrul Kara is the Senior Product Marketing Manager for VMRay. With a career spanning over 10 years in cybersecurity, he has seen the advancement of security products from open-source firewalls to automation-powered threat detection technologies following the evolution of threat landscape. He is currently focused on leading the marketing efforts for VMRay’s security automation solutions while enhancing the alignment between the products with enterprise customer needs. Previously, he has held various roles in early-stage security startups, led the product launch and growth strategies, and run his own startup specialized in network security. Ertugrul attended the Middle East Technical University for undergraduate studies where he earned his bachelor’s degree in Aerospace Engineering.

Patrick Staubmann

Team Lead, Threat Analysis

Patrick Staubmann joined VMRay as a threat researcher back in 2019. As part of the Threat Analysis team, he continuously researches the threat landscape and conducts analyses of malware samples in depth. To further improve the companies’ product, he also extends its detection capabilities in form of behaviour-based rules, YARA rules, and configuration extractors. He is especially interested in reverse-engineering, low-level system security and exploitation.

Explore Valuable Cybersecurity Resources