ORNA2 days ago4 mingovernmentCan the U.S. Withstand a Cyberwar?Until recently, the US has taken a rather passive approach as it relates to securing potential internet access points from threat actors.
ORNAJun 204 mincybersecurityNew Charity Ransomware Forces Victims to Commit Good Deeds The GoodWill ransom group requires the victims to complete three mandatory objectives that are to be performed socially.
ORNAJun 106 mincybersecurityAll Out War on the Cyber Frontier: A Hacker’s ThoughtsAs hacktivists, we can't categorize an entire country as the enemy. We can respond intelligently to the actions of the aggressors.
ORNAMay 175 minblack hat insightsHacking the Human Mind: The Art of ManipulationWhat started as a low-key social experiment ultimately evolved into one of the biggest operations of an ex-hacker's life.
ORNAMay 95 mincybersecurityThe Quest for the Righteous HackThe need to seek attention from others usually is the hacker’s greatest weakness.
ORNAMay 34 mincybersecurityTo Catch an Online PredatorEmploying a variety of online OSINT tools to deanonymize predators and report them to actionable authorities.
ORNAApr 224 mincybersecurityCyber Heists and FIN7 HackersIt goes without saying how risky bank heists are. But the days of Bonnie and Clyde are tapering off, replaced by cybercrime.