In Focus: Dpose Ransomware — Technical Analysis and Mitigation StrategiesA newly identified ransomware variant, Dpose, is the latest addition to everyday cyber threats, using sophisticated encryption methods and…3d ago3d ago
Apple’s Removal of Advanced Data Protection in the UK: A Critical Shift in Digital Privacy and…In a surprising decision that has sparked global debate, Apple has chosen to discontinue its Advanced Data Protection (ADP) feature for…4d ago14d ago1
New Location of my BlogIn addition to the Medium account, I will also be hosting my own Site and Blog moving forward, for those who receive this as part of their…Feb 20Feb 20
Cybersecurity-as-a-Service (CaaS) Adoption in Southeast Asian Enterprises: Trends, Best Practices…The rapid digital transformation of Southeast Asia has made cybersecurity a top priority for enterprises in the region. With the rise of…Jan 16Jan 16
Published inOSINT TeamLeveraging Open Source Intelligence for Critical Infrastructure Protection in the PhilippinesLike any other country, the Philippines faces growing cybersecurity challenges in an increasingly interconnected world, particularly in…Jan 16Jan 16
Published inOSINT TeamOpen Source Intelligence in 2024: A Year of Transformation and GrowthThe Open Source Intelligence (OSINT) landscape underwent significant changes in 2024, marked by technological advancements, market growth…Dec 16, 2024Dec 16, 2024
Web Check: An Essential Tool for OSINT URL and Domain AnalysisOpen-source intelligence (OSINT) tools have become increasingly vital in today’s security landscape, playing an important role in…Aug 23, 2024Aug 23, 2024
A Review of Perplexity AI: Revolutionizing your Everyday SearchPerplexity AI has emerged as a formidable contender in the search space; yes, you heard that right, search space, challenging established…Aug 22, 2024Aug 22, 2024
OSINT Learning PathCreating a comprehensive Open Source Intelligence (OSINT) learning plan using free resources involves structuring the learning process from…Jul 13, 2024Jul 13, 2024
The Power of the Mandiant FLARE VM for Effective Malware AnalysisIn cybersecurity, effectively analyzing and mitigating threats is crucial. FLARE VM, a Windows-based security distribution, has shown to be…Mar 16, 2024Mar 16, 2024