Passive Open Source Intelligence (OSINT) this method allows forces to gather information from publicly available sources without raising any alarms.
Continue ReadingReports
History of Codebreaking
This journey through the history of codebreaking reveals a silent relentless battle of minds that has at times dramatically altered the course of human events.
Continue ReadingSocial Engineering Recruitment
Social engineering this fascinating and often chilling art form is not merely a tool for cybercriminals it is the very bedrock of agent recruitment.
Continue ReadingMachine Learning IPS
Intrusion Prevention Systems (IPS) these vital sentinels are being supercharged by the analytical prowess of machine learning (ML).
Continue ReadingAT&T to Pay $177 Million
Telecommunications giant AT&T has agreed to a $177 million settlement resolving a class action lawsuit stemming from two separate data breaches.
Continue ReadingNorth Carolina Woman Loses $17,500
North Carolina woman has been left reeling after falling victim to a sophisticated scam that saw her hand over a staggering $17,500.
Continue ReadingThe Lost Cell Phone Scam
Two St. Albert women reporting recent encounters where individuals claimed their lost cell phone was tracking to the victim’s address.
Continue ReadingOperation Cyber Storm
A global crackdown spearheaded by investigations from India Today has brought a transnational cyber fraud syndicate to its knees.
Continue ReadingCambodia’s Cybercrime Empire
Cybercrime and abject human cruelty is flourishing with Cambodia emerging as a critical cybercrime nexus. Huione Pay stands accused of being the linchpin.
Continue ReadingSt Paul Interlock Ransomware Attack
The City of St. Paul is grappling with the aftermath of a significant cyber attack with the Interlock ransomware group claiming responsibility.
Continue ReadingUnmasking Russia’s Cyber Shadow
A pattern has emerged time and again when investigators follow the breadcrumbs of a major cyber attack the trail seems to converge on one nation Russia.
Continue ReadingChina’s Elite Hackers
In the ever-escalating landscape of hackers one nation consistently stands out for the sophistication and scale of its cyber operations China.
Continue ReadingThe Reality of Malware
The word malware conjures images of an annoying computer virus, a pop-up warning or perhaps a spam email. But malware is far more sinister.
Continue Reading