The secret service is responsible for protecting the president and other high level government officials. Their tactics and methods are amazing!
Continue ReadingThreat Research
Microsoft Digital Defense Report 2022
Microsoft Digital Defense Report presents data and insights about the current state of cybercrime, nation state threats, cyber influence operations, and more.
Continue ReadingVulnerability FortiOS SSL-VPN
Alert is relevant to organisations who deploy Fortinet FortiOS to facilitate remote access for their users.
Continue ReadingCybercrime Crisis
Cybercrime is surging across the country, with criminal cyber gangs targeting governments, businesses, and you. But how do we stop it?
Continue Reading2030 Future of Cybercrime
It’s the year 2030 and Cybercrime has evolved. How can individuals and industries protect themselves in the near future?
Continue ReadingAdvanced Persistent Threats
Watch some insight on the workings of Advanced Persistent Threats (APTs) from evidence collected from an actual attack.
Continue ReadingLandscape for Ransomware Attacks
This report aims to bring new insights into the reality of ransomware incidents through mapping and studying ransomware incidents from May 2021 to June 2022.
Continue ReadingACSC Information Security Manual
The Australian Cyber Security Centre (ACSC) produces the Information Security Manual (ISM).
Continue ReadingENISA Threat Landscape 2022
This is the tenth edition of the ENISA Threat Landscape (ETL) report, an annual report on the status of the cybersecurity threat landscape.
Continue ReadingCIA Cipher Brief Threat Conference
Jennifer Ewbank is the Deputy Director of CIA for Digital Innovation, responsible for accelerating the development and integration of digital and cyber.
Continue ReadingArtificial Intelligence Technology
Artificial Intelligence can either enhance our lives or create a future where we are controlled by the Artificial Intelligence.
Continue ReadingAFP Recruit Skilled Cyber Personnel
AFP Cyber Command Assistant Commissioner cybercrime is on the rise, and it is important to recruit cyber resources to have highly skilled personnel.
Continue ReadingProfiling Hackers
What motivates hackers? What are their psychological manipulation techniques? How can we become a human firewall?
Continue Reading








