OSINT Mastodon OSINT: A Comprehensive Introduction Part one in our series on Mastodon, focused on gathering OSINT from the platform's users, instances and network.
TECHNICAL Data Destruction 101 This article will teach you everything you need to know to cover your digital traces when using Windows.
OSINT A Guide To Social Media Intelligence Gathering (SOCMINT) A guide to leveraging forward thinking OSINT techniques for intelligence collection from social media sites.
TECHNICAL Ransomware: Attack Techniques and Countermeasures Learn more about ransomware attack techniques and countermeasures with infosec author Nihad Hassan.
OSINT Tracking The OSINT Hunter Gathering open-source intelligence, when done properly, should be an anonymous affair, it simply will not do to leave your digital footprints behind.
TECHNICAL Attacking Encryption Systems Cryptography is the science of secret writing, its usage dates back to ancient civilizations. It has two main components, encryption and steganography.
INFOSEC How To Choose A Virtual Private Network (VPN) Provider This article will help you cut through the VPN vendor marketing confusion and help you choose a provider who is serious about your privacy.
CYBERSEC Playing In The Dark Corners Of Windows With Alternative Data Streams In this article we look at the exploitation of ADS in the NTFS file system to conceal data secretly using the Stealth Alternative Data Stream, which cannot easily be detected.
INFOSEC Hiding In Plain Sight With NTFS Steganography Steganography is the art of hiding data in plain sight, in this article Nihad Hassan takes a closer look at hiding data using the NTFS file system.
OSINT An Introduction To Open Source Intelligence (OSINT) Gathering An introduction to open source intelligence (OSINT) gathering, from renowned OSINT author Nihad Hassan.