top of page
Search


Exploits and vulnerabilities in the second quarter of 2024
Exploits and vulnerabilities in the second quarter of 2024.
In this report, we will showcase a number of interesting statistical and analyti
ADVISOR BM
May 25, 202411 min read


Cybersecurity 2024, nine major trends.
9 cybersecurity trends for 2024
ADVISOR BM
Jan 26, 20248 min read


How cyber threat actors coordinate PSYOPS campaigns and kinetic warfare, cyber attacks, consequences
#OpIsrael, #FreePalestine And #OpSaudiArabia - How Cyber-Threat Actors Coordinate PSYOPS Campaigns With Kinetic Military Actions The...
Resecurity
Oct 15, 20238 min read


Businesses need to know this or the basics of information security!
In this article, I would like to talk about information that needs to be protected from attackers planning to harm your business. Please...
ADVISOR BM
Sep 26, 20235 min read


How can you incorporate social engineering into an investigation?
How can you incorporate social engineering into an investigation?
his article is about IPLogger and other little tricks ........
ADVISOR BM
Sep 18, 20234 min read


Catching the scammer through cryptocurrency tracking. OSINT & CRYPTOCURRENCY.
His nostrils were permanently flared, as though he sniffed invisible winds of art and commerce. William Gibson, "Count Zero" In this...

ADVISOR B&M
Nov 28, 20227 min read


What is Open Source Intelligence (OSINT)?
Open source intelligence is a term originally coined by intelligence services. OSINT uses freely available, open sources such as print...

ADVISOR B&M
Dec 24, 20214 min read
bottom of page
