ChatGPT for Offensive and Defensive Cyber

ChatGPT for Offensive and Defensive Cyber

ChatGPT for Offensive and Defensive Cyber   There has been a lot of talk recently about ChatGPT and its implications for a wide range of industries. Potential applications are vast, including creative design, technical writing, and programming. In this article,...
Forensic Pattern Of Life Analysis

Forensic Pattern Of Life Analysis

Forensic Pattern Of Life Analysis   Pattern of life analysis isn’t a new concept to anyone who’s ever been involved with intelligence, in particular surveillance.  It’s all about the habits that people — suspects, persons of interest, crime victims, or those...
Top 10 Cybersecurity Reports 2022

Top 10 Cybersecurity Reports 2022

Top 10 Cybersecurity Reports 2022 We have collected the most relevant cybersecurity reports of 2022 that are worth checking.   Crowdstrike 2022 Crowdstrike Global Threat Report ENISA (European Union Agency for Cybersecurity) ENISA Threat Landscape 2022 Forbes...
Cybersquatting | Infographic

Cybersquatting | Infographic

Cybersquatting encompasses many techniques such as those that can be seen in the table below. Each example shows a cybersquatted version of “google.com”    
Iranian APT Targets US With Spyware via GitHub

Iranian APT Targets US With Spyware via GitHub

Iranian APT Targets US With Spyware via GitHub The custom malware used by the state-backed Iranian threat group Drokbk has so far flown under the radar by using GitHub as a “dead-drop resolver” to more easily evade detection. A subgroup of the state-backed...

Pin It on Pinterest