The cyber attack on Optus was apparently so unsophisticated, some analysts say a primary school student could have pulled it off.
Continue ReadingCase Studies
Super Rich’s Secret Doomsday Bunkers
Some of the richest people are building bunkers, preparing for a breakdown of civilization that they caused.
Continue ReadingThe DFIR Report Real Intrusions
Real Intrusions by Real Attackers, The Truth Behind the Intrusions.
Continue ReadingInside Amazon Web Services
Amazon Web Services providing the computational horsepower underpinning countless organizations from Netflix to BMW, Disney to GE, Tinder to the CIA.
Continue ReadingOpen Source Intelligence OSINT
Intelligence gathering usually starts with scraping information from public sources, collectively known as open source intelligence or OSINT.
Continue ReadingIsrael’s Cyber Security
On this episode of Insights Israel & the Middle East, host Mati Shoshani speaks with three key players in Israel’s cyberwar and cyber security.
Continue ReadingCrowdstrike Endpoint Protection
CrowdStrike endpoint protection security with the most advanced cloud native platform that protects and enables the people, processes and technologies.
Continue ReadingWiGLE Stats WiFi Wireless Networking
WiGLE Stats WiFi wireless networking a slow march to infinity.
Continue ReadingBinaryEdge Science and Technology
BinaryEdge Science and Technology Thoughts, stories and Ideas.
Continue ReadingPulsedive Threat Intelligence
Pulsedive Threat Intelligence Read. Learn. Defend.
Continue ReadingCybersecurity Jobs Millions of Openings
Cybersecurity Ventures’ prediction that there will be 3.5 million unfilled cybersecurity jobs globally by 2022, up from one million positions in 2014.
Continue ReadingTOP 20+ Advanced Persistent Threats
Advanced persistent threats refers to a State Sponsored attack that continues, secretively, using innovative and sophisticated hacking methods to access a system.
Continue ReadingTop 7 Elite Nation State Hackers
Ever wonder what countries make up the top 7 elite nation state hackers commonly known as Advanced Persistent Threats ?
Continue Reading









