I Tricked 2 Scammers Into Wasting 16 Hours - Ep. 1

Are Technical Support Scams Getting More Advanced?

| | csu, Phishing, security, tech support scams
Technical support scams (TSS) are responsible for a growing amount of financial losses year after year. Nevertheless, while the victims are losing more money than ever, the number of interactions between criminals ...

Five Eyes Cyber Security Predictions

| | csu, governance, security
What cyber threats the future brings to us? An analysis of the cybersecurity strategies of Canada, New Zealand, the UK, the US, and Australia. The post Five Eyes Cyber Security Predictions appeared ...
Ukraine Power Grid Cyberattacks

Ukraine Power Grid Cyberattacks

| | csu, security
How the Sandworm hacking team tried to disrupt power supply in Ukraine. An analysis of the three attacks in cyberspace. The post Ukraine Power Grid Cyberattacks appeared first on Rainbow and Unicorn ...
Cyberwar and Cyberterrorism: What is the Difference?

Cyberwar and Cyberterrorism: What is the Difference?

| | csu, security, technology
Introduction The terms cyberwarfare and cyberterrorism are both used since the 1990s for describing adverse events in cyberspace. Even though the three-decade history of cyberwarfare and cyberterrorism, academic communities could not agree ...

Dark Web Marketplace Vendor Forensics

| | csu, forensics, Privacy
Researchers claim that the majority of the dark web exist to facilitate criminal activities, including drug trade, financial fraud, and illegal pornography. This article explores the different methods researchers have experimented with ...
Taking Forensic Disk Images from the OVH Cloud

Taking Forensic Disk Images from the OVH Cloud

| | Breach, csu, DFIR, forensics
This article explains how a disk image can be taken from a virtual machine running on the public cloud. The acquired disk image can then be used with offline forensic tools like ...

Secure Guardrails