OSINT and Maps: A Curious Case of Open-Source Intelligence in Action 10 December 2024·1386 words·7 mins by: OSINT Curious Discover the power and risks of OSINT through this fascinating case study, where a researcher uncovered sensitive data using Google Maps and open sources.
The Forgotten Value of Personality Traits in Cybersecurity 12 November 2024·1586 words·8 mins by: AgnÄ— BrilingaitÄ— Uncover why personality traits are crucial yet often overlooked in cybersecurity. This insightful post delves into how understanding human behavior can fortify cybersecurity strategies.
The Decline of SSL VPN: Why Ivanti Connect Secure is Abandonware 8 October 2024·1177 words·6 mins by: Lari Huttunen Learn why SSL VPNs such as Ivanti Connect Secure are becoming obsolete. Explore the history of ownership changes, recurring severe vulnerabilities, and inadequate security measures that have led to the decline of this technology.
Protecting Your Backups: The First Step to Recovering from Ransomware 10 September 2024·1169 words·6 mins by: Lari Huttunen Wondering if your data is safe from ransomware? Discover why securing your backups is the crucial first step toward a successful recovery and explore strategies to protect your data effectively.
The Fallacy of Security Through Obscurity 13 August 2024·1319 words·7 mins by: Lari Huttunen Why Hiding Software Banners Fails as a Defense: Understand why concealing software identifiers doesn’t stop attacks and leaves your systems vulnerable.
A Tour through the SPAM Fighting State-of-the-Art 9 July 2024·2127 words·10 mins by: Lari Huttunen Explore a somewhat opinionated and mildly rebellious take on anti-SPAM solutions for self-hosted email services.
Reality Check: AI and Its Actual Role in Cyber Crime 11 June 2024·1574 words·8 mins by: Laura Kankaala AI is increasingly being used by cybercriminals to deceive and manipulate vulnerable individuals, blurring the lines between reality and digital threats.
Audio Deepfakes and Voice Cloning - When you can't trust your own ears 14 May 2024·1448 words·7 mins by: Manuel Werka An overview of the state-of-the-art in audio deepfakes, whether based on text-to-speech or voice cloning.
Black Sheep Wall: Clearing the Fog-of-War for Cyber Intelligence Collection 9 April 2024·1640 words·8 mins by: Dr. Bernhards Blumbergs Strengthen situational awareness and intelligence collection with a multi-viewpoint approach, ensuring a cohesive perspective.
Exploring the Realm of Cyber Early Warning Systems 12 March 2024·1358 words·7 mins by: Lari Huttunen Unlocking the Potential of Cyber Early Warning Systems with UNDRR Four-Field Methodology.