Cleafy Labs, a cybersecurity company, has discovered a new Android botnet called Nexus, which is capable of performing various malicious activities on infected devices. This discovery has raised concerns about the security of Android devices and the increasing threat of botnets. According to Cleafy Labs, Nexus has been active sinceContinue Reading

Open Source Intelligence (OSINT) is a valuable tool for gathering information about individuals, organizations, and events from publicly available sources. One of the most popular OSINT techniques is web scraping, which involves automatically extracting data from websites. In this article, I will explain what web scraping is, how it works,Continue Reading

Social media has become a powerful tool for OSINT professionals to gather information about individuals, companies, and organizations. Social media platforms such as Twitter, Facebook, LinkedIn, and Instagram can provide valuable insights into a target’s behavior, preferences, interests, and connections. In this article, we will explore how to perform socialContinue Reading

Open-source intelligence (OSINT) platforms like MISP and OpenCTI are designed to help organizations collect, analyze, and share threat intelligence data. These platforms offer a range of features and capabilities, but there are significant differences between them. In this article, we’ll explore the differences between MISP and OpenCTI, so you canContinue Reading

Ransomware attacks are a growing threat to organizations around the world, with cybercriminals using increasingly sophisticated tactics to infiltrate computer systems and hold valuable data hostage. In the aftermath of an attack, businesses and organizations are often left with a difficult decision: should they pay the ransom demanded by theContinue Reading

Insider threats have always been a concern for organizations. Employees, contractors, or third-party vendors with authorized access to sensitive information can cause significant harm to an organization’s reputation and financial well-being. In today’s digital world, cloud computing has become a ubiquitous part of most organizations’ IT infrastructures, making it evenContinue Reading

The Cybersecurity and Infrastructure Security Agency (CISA) recently issued an alert urging organizations to increase their vigilance in the wake of the one-year anniversary of Russia’s invasion of Ukraine. The alert warns that cyber threats from Russian state-sponsored actors are likely to increase and that organizations should take steps toContinue Reading