top of page

Business of Security

ORNA
Dec 13, 20225 min read
The CyberPartisans: Vigilantes Strongly Supported by the People of Belarus
The story of a group of IT specialists who formed a cyber vigilante group in a fight to secure the pursuit of justice and equity in Belarus.
12 views

ORNA
Dec 8, 20225 min read
Practical Open Source Intelligence For the Everyday Person
Open-source Intelligence (OSINT) is an investigative skill based on collecting and analyzing open or publicly available information....
21 views

ORNA
Dec 6, 20224 min read
Hackers Distribute Malware by Targeting Apps Popular Among Children
Most criminals I have encountered in my life have a code of conduct consisting of things they consider morally wrong when conducting...
16 views

ORNA
Dec 1, 20225 min read
Ransom DDoS Attacks as a Lucrative Attack Vector
Botnets are possibly the second most powerful leveraging weapon to zero-day exploits in the hands of hackers.
20 views

ORNA
Nov 29, 20225 min read
When I Gave Up Being an Ordinary User: Psychology of a Hacker
Hacking is the giant that crushes unbreakable stones.
21 views

ORNA
Nov 24, 20224 min read
Red Team: An Appendage to Incident Response
Compound a hacking addiction with an uncommonly high intellectual capacity, and it really does not matter what incident response you have.
22 views

ORNA
Nov 24, 20224 min read
Not The Last, But A Good Incident Management Checklist To Start With
You’ll be surprised to learn what we found out is the most important to incorporate into your Incident Management Checklist after getting...
16 views

ORNA
Nov 22, 20224 min read
How to Improve Your Incident Management
Imagine the following scenario. You are going to work, like any other day. But today is unlike other days because you are scheduled to...
25 views

ORNA
Nov 17, 20225 min read
Former Black Hat’s Perspective on Fundamentals of Incident Management
Incidents aren’t planned unless I was somehow involved, needless to say, you better have a plan. Whatever the circumstances, it is...
26 views

ORNA
Nov 15, 20224 min read
Can the US Withstand a Cyberwar?
Until now, the US has taken a rather passive approach as it relates to securing potential internet access points from threat actors.
18 views
bottom of page