3 minRansomware: Build Your Own Ransomware, Part 1Welcome back, my aspiring cyberwarriors! Ransomware is rapidly becoming the most important form of malware afflicting our digital...
3 minOpen Source Intelligence (OSINT): OSINT Tools for Bitcoin InvestigationsWelcome back, my aspiring OSINT investigators! One of the most lucrative areas for OSINT investigators is the Bitcoin and cryptocurrency...
6 minThe Brief History of Russian Cyberattacks Against Ukraine and the Risks they Pose to the WestWelcome back, my cyber warriors! As the war in Ukraine rages on, it's important to keep in mind that this war didn't begin in February of...
4 minSCADA Hacking: The Key Differences between Security of SCADA and Traditional IT systemsFor those who are coming from a traditional IT or IT security background, SCADA/ICS systems security can prove prove daunting. Many of...