Meta Global Threat Intelligence on the steps they took against fake accounts and hackers who tried to create the appearance of support for Russia’s war in Ukraine.
Continue ReadingReports
Ukrainian Hacker War Effort
Ukrainian hacker who is using his software engineering skills to attack Russian companies online.
Continue ReadingUkraine Hackers and Russian Secrets
The strategy of the Ukraine hackers, who they are targeting and why they have been so successful.
Continue ReadingOpen Source Intelligence OSINT
Intelligence gathering usually starts with scraping information from public sources, collectively known as open source intelligence or OSINT.
Continue ReadingMalaysian Death From Internet Scam
Investigators believe he was caught up in an internet scam and died from injuries and illness related to abuse he suffered during his ordeal.
Continue ReadingAnonymous Targets Western Companies Doing Business in Russia
Anonymous targets Western companies in Russia. Some of the companies targeted by Anonymous have since announced intentions to stop business in Russia.
Continue ReadingAnonymous Cyberattacks on Russia
Hacktivist group Anonymous has embarrassed Russian companies and government agencies. Anonymous has claimed to have hacked over 2,500 Russian sites.
Continue ReadingMajor Optus Data Breach
Major Optus Data Breach and Optus is in major damage control after hackers accessed the personal details of up to nine million current and past customers.
Continue ReadingRansomware is an Epidemic
All over the world, ransomware criminals are locking up important computer systems and demanding crypto as a ransom. Ransomware is mutating like a virus.
Continue ReadingPegasus The Spyware Technology
Pegasus spyware can pass your phone’s security with complete access including emails, messages, GPS location, photos, video, and your phone’s microphone.
Continue ReadingIsrael’s Cyber Security
On this episode of Insights Israel & the Middle East, host Mati Shoshani speaks with three key players in Israel’s cyberwar and cyber security.
Continue ReadingCrowdstrike Endpoint Protection
CrowdStrike endpoint protection security with the most advanced cloud native platform that protects and enables the people, processes and technologies.
Continue ReadingWiGLE Stats WiFi Wireless Networking
WiGLE Stats WiFi wireless networking a slow march to infinity.
Continue Reading







