Cyber crimes: Hackers are Making Money using Digital Currencies

Cryptocurrency promised censorship-resistant, borderless money — and while it delivered on some of that, it also created a highly attractive highway for criminals. Over the past several years hackers and organized groups have taken billions of cryptocurrency and created sophisticated cash-out channels to convert digital thefts into cashable value. This article explains the way in which money […]
What’s next for cyber Policing: AI vs. Hackers

In this digital age it’s not always about the masked robbers and stolen wallets. It usually occurs in forms in the form of ransomware attack as well as phishing scams and data breaches that could cripple whole organizations. As cybercrime continues rising and increase, authorities as well as law enforcement agencies and private firms are turning to […]
Hacktivism against. Cybercrime: Where Do We Draw the line?

In this digital age hackers aren’t just shadowy characters who steal credit cards or distributing malware. Some call themselves hacktivists–individuals or groups who use hacking as a form of protest, political activism, or social justice. Here’s the issue One individual’s “digital protest” is another person’s cybercrime. What happens when hacktivism crosses the line and become criminal? What should businesses […]
The Dark Web Explained: Where Cybercrime Thrives — and How to Stay Safe

The term “dark web” has become an acronym for everything that is dark online, from cyber-criminal marketplaces, hacker forums and shady transactions. However, the reality is much more complex. It is element of a multi-layered internet ecosystem that is technologically fascinating, often beneficial for privacy, and, yes, often abused by criminals. This article will explain why the internet […]
Top 10 Cyber Crimes You’ve Probably Never Heard Of

When people think about cybercrime, they imagine the usual suspects: phishing emails ransomware or stolen credit cards. However, the cyberworld is much more imaginative and, sometimes downright absurd. Beyond the news, cybercriminals are operating sophisticated schemes that you’ve not heard of, but they are affecting both businesses and individuals daily. These are 10 cybercrimes that aren’t well-known which show […]
Cybersecurity in Remote Work: Your Home Is the New Attack Surface

The worldwide shift to hybrid and remote work has changed our way of life and how we conduct business. Instead of crowded offices with centralized IT security employees access their work from their bedrooms or kitchen tables and even coffee shops. Although this is a great way to gain advantages, it also brought a new and daunting […]
VPNs Demystified: What They Do and Why You Might Need One

If you’ve been online recently, you’ve likely seen advertisements for VPNs that promise security, privacy and the capability of being able to “unlock the internet.” However, with all the advertising, it’s difficult to separate the fact from the hype. What exactly is an VPN? What exactly is it? Do you really require one? Let’s look at it in […]
AI vs Hackers: Who’s Winning the Cyber Arms Race?

The battleground of cybersecurity isn’t just about antivirus software and firewalls. Nowadays, there’s an intense battle in which Artificial Intelligence (AI) and hackers. On one hand, businesses employ machine learning to identify and eliminate threats more quickly than they ever have before. On the other hand, cybercriminals are utilizing AI to unleash more sophisticated, devious attacks that are damaging and costly. […]
Cybersecurity Certifications: Which Ones Are Actually Worth It?

The job market in cybersecurity is expanding. From vulnerability testing through cloud security to penetration testing, companies are looking for experts who can safeguard their systems. With that comes a plethora of certifications, some highly regarded, others specialized and a few that are nothing more than costly sheets of paperwork. Which certifications are worthwhile and worth the […]
Pentesting Basics: What Tools I Use — and Why

The process of pentesting (penetration test) is a part art and science. It’s the process of attempting to attack the systems legal and monitored to identify and repair vulnerabilities before attackers actually exploit them. Over time, I’ve created a toolkit to help me traverse the typical pentest phases: scanning, reconnaissance after-exploitation, and reporting with safety, repeatability as well as documentation in […]