ADVISOR BMMay 2511 min readExploits and vulnerabilities in the second quarter of 2024Exploits and vulnerabilities in the second quarter of 2024. In this report, we will showcase a number of interesting statistical and analyti
ResecurityOct 15, 20238 min readHow cyber threat actors coordinate PSYOPS campaigns and kinetic warfare, cyber attacks, consequences#OpIsrael, #FreePalestine And #OpSaudiArabia - How Cyber-Threat Actors Coordinate PSYOPS Campaigns With Kinetic Military Actions The...
ADVISOR BMSep 26, 20235 min readBusinesses need to know this or the basics of information security! In this article, I would like to talk about information that needs to be protected from attackers planning to harm your business. Please...
ADVISOR BMSep 18, 20234 min readHow can you incorporate social engineering into an investigation?How can you incorporate social engineering into an investigation? his article is about IPLogger and other little tricks ........
ADVISOR B&MNov 28, 20227 min readCatching the scammer through cryptocurrency tracking. OSINT & CRYPTOCURRENCY.His nostrils were permanently flared, as though he sniffed invisible winds of art and commerce. William Gibson, "Count Zero" In this...
ADVISOR B&MDec 24, 20214 min readWhat is Open Source Intelligence (OSINT)?Open source intelligence is a term originally coined by intelligence services. OSINT uses freely available, open sources such as print...