Tag: Cyber Security
-
From 4chan Trolling to Hacktivism
2003: Origins on 4chan Before the online collective of Hacktivists came to be known as Anonymous, their beginnings could be traced to a group of internet trolls on the once popular imageboard website, 4chan. It was here that users would conglomerate and share images alongside the infamous “Green Text”, comments saying any number of vicious… Read more
-
Click Here! Malvertising and its Effective Manipulation
“WARNING! Your iPhone is infected with virus and immediate urgent action is required!” – this was the pop-up that displayed itself on the face of Andrew Reed’s phone. A pop-up that was invoked because of an unintentional click to a website link that was displayed at the top of Google’s search results for “Cookie Recipes”.… Read more
-
Russia’s Persistent Threat to Cyberspace
Evidence from 2017-2025 Recently, there has been a surprising question circulating: ‘Is Russia a threat to the United States?’ The short answer is yes, and we will explain why—starting with the history of attacks carried out by Russian threat actors. In May 2024, a Russian-linked ransomware attack paralyzed a major U.S. energy provider, plunging thousands… Read more
-
The Future of Cybersecurity in 2025
Cybersecurity is always changing, with new threat actors and technologies emerging all the time. By 2025, we’ll see big shifts in how we protect our digital spaces. Key areas will include cloud security, AI, zero-trust systems, and the blending of cyber and physical threats. Staying ahead of this evolving landscape will require an understanding of… Read more
-
Is DeepSeek Lying to You? Unmasking the AI’s Data Deception
In the world we live in today, where Artificial Intelligence is gaining more prevalence in usage among the average user, trust is a subjective case in which one needs to maintain discipline & cordiality. DeepSeek is an AI platform that originated in China and has obtained a mass following in popularity with people around the… Read more
-
How the Mexican Drug Cartels Relate to Cybersecurity
Mexican drug cartels have adopted the same diversification strategies as successful business moguls like the investors of Shark Tank to safeguard their empires. They have ventured into 21st-century cybercrimes, including phishing, vishing, ransomware, and pig butchering scams. These Mexican cartels utilize both traditional fiat currencies and cryptocurrencies to conduct their illicit activities. The cartels have… Read more
-
Beware of the Toll Lane Fee Text Scam
In an increasingly digital world, scams are becoming more sophisticated and challenging to identify. From Postal Service smishing attacks to IT helpdesk vishing attacks, it has been nearly impossible to keep track of what is real and what is indeed falsified. As the start of the year unfolds, threat actors have rotated slightly to target… Read more
-
Bear in the Cyber Den
RUSSIA’S FANCY BEAR STRIKES AGAIN, AND WHY THIS IS JUST THE BEGINNING In recent months, the cyber threat landscape has been dominated by headlines in the cyber world, talking about a Fancy Bear. You might be asking yourself, “Who is this bear? What makes the bear fancy? Why is there a bear working with computers?”… Read more
-
The Chinese Communist Party’s Little Red Notebook
RedNote, known as Xiaohongshu, by its native Chinese consumers has experienced a surprising rise in popularity within the past few days in the United States. As an app that originally catered to Chinese shoppers looking for overseas products, it has since transformed into a complex social commerce platform that blends several elements of social media… Read more
-
Let’s Talk About Spyware and Pegasus Sextortion Scams
Before we dive into the sextortion scam that has been the spotlight of discussion since September, let’s cover what spyware and its related symptoms are. Spyware is a malicious software that infiltrates user devices without consent and secretly collects information. There are various types of spyware including Adware, Keyloggers, Trojan Horse Viruses, Rootkits and more.… Read more