Finding Outdated and Vulnerable Systems in Russian Using Shodan

Welcome back, my cyberwarriors! The Russian invasion of Ukraine continues and the courageous people of Ukraine need our help. In previous posts, I have emphasized that there are many outdated and vulnerable systems around the world. Not everyone updates and upgrades their operating systems. These systems are particularly vulnerable to known attack vectors. Russia is […]

Continue Reading

Open Source Intelligence (OSINT): Using Google Earth Pro Satellite Imagery for Investigations

Welcome back, my aspiring investigators! Open Source Intelligence (OSINT) is a very broad field with a multitude of applications throughout information security and other fields. These applications include; Pentesting and security assessment Economic and financial assessments Environmental Assessments Crime investigations People Searches Thwarting hacks, scams, and other criminal activity Journalism The list could go on […]

Continue Reading

Ransomware, Part 1: History and Evolution of Ransomware and Ransomware Attacks

Welcome back, my aspiring cyberwarriors! Recent events have once again emphasized the importance of SCADA security! On May 7, 2021, Colonial Pipeline was attacked with ransomware and was forced the close down a pipeline carrying 45% of the gasoline to major US East Coast cities (NYC, Philadelphia, Washington DC, etc.). This set up gasoline shortages […]

Continue Reading

Certified Cloud Security Professional (CCSP) Earn the Most Respected Cloud Security Certification!

Welcome back, my aspiring cyberwarrior! The Certified Cloud Security Professional (CCSP) from ISC2 is the world’s most respected and sought-after cloud security certification. Now, you can take your career to the next level by becoming CCSP certified. Certification Magazine lists the top 75 certifications in its 2021 Annual Salary Survey. According to their survey, the […]

Continue Reading