-
Sep 22, 2024
Disclaimer: The following story is entirely fictional. Before we embark on this rollercoaster ride of hypothetical incompetence, let me assure you that any resemblance to actual persons, living or dead, or actual events is purely coincidental. Really. I mean it.… read more »
-
Sep 18, 2024
As phishing attacks become more sophisticated, investigators and security professionals need innovative techniques to identify and combat these threats. In this article, we look at an often overlooked method: using favicon hashes in conjunction with Shodan to uncover potential phishing… read more »
-
Sep 14, 2024
Disclaimer The following story is a work of fiction. Any resemblance to actual persons, living or dead, or actual events is purely coincidental. …Or is it? In the midst of the COVID-19 pandemic, when remote work had become the norm,… read more »
-
Sep 10, 2024
With Apple’s upcoming release of macOS Sequoia on September 16th, the field of Digital Forensics and Incident Response faces new challenges and opportunities. Introduction to macOS Sequoia macOS Sequoia, the latest iteration of Apple’s desktop operating system, brings a host… read more »
-
Sep 8, 2024
As teams grow more diverse and projects become increasingly complex, managers face the challenge of ensuring that every team member contributes, develops, and feels valued. My mantra in these situations is “No one should be left behind”. Understanding the “No… read more »
-
Sep 5, 2024
Incident response and digital forensics play crucial roles in understanding, mitigating, and preventing security events. However, a common pitfall that can undermine even the most sophisticated investigative efforts is the practice of “cherry picking” – selectively choosing evidence that supports… read more »
-
Sep 1, 2024
In recent years, ChromeOS has gained significant traction as a lightweight, cloud-focused operating system, particularly in educational and enterprise environments. The simplicity and security of ChromeOS make it an appealing choice for many users, but these same features pose unique… read more »
-
Aug 28, 2024
Working in cybersecurity for a large corporation often means your colleagues look to you as their personal tech guru, answering questions ranging from “Which password manager should I use?” to “Can hackers steal my money if I answer a call… read more »
-
Aug 26, 2024
Telegram, once a symbol of free speech and privacy, has increasingly found itself at the center of controversy. With its robust encryption and user-friendly interface, it has become a haven for various illicit activities. This article delves into how Telegram… read more »
-
Aug 24, 2024
In today’s fast-paced tech world, it’s easy to get caught up in the latest and greatest devices. But what if I told you that sometimes, the old can be made new again? That’s exactly what I discovered when I decided… read more »
-
Aug 23, 2024
In the field of corporate management, few names resonate with the same visionary reverence as Adriano Olivetti. Known for his forward-thinking approach to industrial management, Olivetti’s philosophy transcended mere profit maximization, focusing instead on the well-being of his employees, the… read more »
-
Aug 22, 2024
Disclaimer: A Totally Fictional Account What you’re about to read is, of course, a completely made-up story. Any resemblance to actual IT disasters is purely coincidental. After all, no real IT professional would ever prop open a fire door with… read more »
-
Aug 20, 2024
As digital forensics experts, we constantly find ourselves in a technological arms race. On one side, we have device manufacturers and software developers continuously enhancing privacy and security features. On the other, we have the need to access and analyze… read more »
-
Aug 17, 2024
I can’t call myself an “influencer” by any stretch of the imagination. In fact, I view social media as a necessary evil—a double-edged sword that’s incredibly useful for sharing and discovering valuable content, but also a place where we often… read more »
-
Aug 16, 2024
Picture this: You’re a hotshot manager or team leader in the tech world, tasked with finding the next rockstar to join your crew. You’ve got a stack of resumes taller than your morning coffee order, and you’re ready to separate… read more »
-
Aug 15, 2024
As smartphones continue to be an integral part of our daily lives, they also become increasingly valuable sources of digital evidence in investigations. Android, being one of the most widely used mobile operating systems, is often at the forefront of… read more »
-
Aug 14, 2024
Disclaimer: This post is purely satirical and should not be taken seriously. Any resemblance to actual management advice is purely coincidental. Discretion (and a sense of humour) is advised. Alert! A new plague sweeps through tech offices worldwide. Not malware,… read more »
-
Aug 4, 2024
A few days ago, while working on my highly customized Linux environment (which I detailed in my previous post about my tech setup), I realized that I was missing a key component: a robust clipboard manager. For those unfamiliar, a… read more »
-
Jul 30, 2024
In a departure from my usual topics of technology and cybersecurity, today I’d like to explore one of my other passions: music. While my blog typically delves into the intricacies of digital landscapes and security protocols, music has always held… read more »
-
Jul 25, 2024
Leadership, like a fingerprint, is unique to each individual who practices it. There’s no universal playbook, no one-size-fits-all approach to being an effective manager. However, throughout my career journey - both as a team member yearning for inspiring leadership and… read more »