top of page
Search
ADVISOR BM
May 2511 min read
Exploits and vulnerabilities in the second quarter of 2024
Exploits and vulnerabilities in the second quarter of 2024.
In this report, we will showcase a number of interesting statistical and analyti
15 views0 comments
ADVISOR BM
Jan 268 min read
Cybersecurity 2024, nine major trends.
9 cybersecurity trends for 2024
28 views0 comments
Resecurity
Oct 15, 20238 min read
How cyber threat actors coordinate PSYOPS campaigns and kinetic warfare, cyber attacks, consequences
#OpIsrael, #FreePalestine And #OpSaudiArabia - How Cyber-Threat Actors Coordinate PSYOPS Campaigns With Kinetic Military Actions The...
52 views0 comments
ADVISOR BM
Sep 26, 20235 min read
Businesses need to know this or the basics of information security!
In this article, I would like to talk about information that needs to be protected from attackers planning to harm your business. Please...
19 views0 comments
ADVISOR BM
Sep 18, 20234 min read
How can you incorporate social engineering into an investigation?
How can you incorporate social engineering into an investigation?
his article is about IPLogger and other little tricks ........
40 views0 comments
ADVISOR B&M
Nov 28, 20227 min read
Catching the scammer through cryptocurrency tracking. OSINT & CRYPTOCURRENCY.
His nostrils were permanently flared, as though he sniffed invisible winds of art and commerce. William Gibson, "Count Zero" In this...
282 views0 comments
ADVISOR B&M
Dec 24, 20214 min read
What is Open Source Intelligence (OSINT)?
Open source intelligence is a term originally coined by intelligence services. OSINT uses freely available, open sources such as print...
129 views0 comments
bottom of page