Keeping you informed with the latest developments and news in the cyber security and intelligence sectors.
Online influence campaigns are becoming increasingly common as political parties and state actors around the world seek to manipulate public opinion.
To most people, online influence operations involve competing ideologies battling it out in the public sphere.
Last week, Russian President Vladimir Putin complained that former Fox News anchor Tucker Carlson had been too soft; saying Carlson avoided “sharp questions” during their interview on 06 February.
Over the past few weeks, thousands of farmers across Europe have taken to the streets to voice their anger over government policies which they claim are destroying agriculture and making the industry nonviable.
Taylor Swift is the latest target of a far-right conspiracy theory that claims her and NFL boyfriend, Travis Kelce, are part of a ‘psyop’ (psychological operation).
Cyber security; when everything is going well, it’s easy for non-tech and non-risk people to underestimate the value of the services they’re paying for and the controls that have been put in place.
Metricising harm often boils down to looking at two things: intent and capability. What is your threat actor trying to do, and how good are they at doing it.
The other day, my friends and I were discussing how truly difficult it is to stay anonymous online. As digital investigators who rely on open-source intelligence to gain information, we’ve come to realise how much of our personal lives are floating around for anyone to come find.
2024 is set to be a monumental year for democracy; with over two billion people across 50 countries going to the polls to elect representatives at local, national, and intra-continental levels.
The concept of cost imposition sits at the core of plenty a cybersecurity strategy. The idea is that you make life as operationally, financially, or existentially difficult for your adversary as you can.
Open-source intelligence (OSINT) has always been a precarious concept: gathering freely accessible data from open sources, often using free or inexpensive tools.
For our last digest, my colleague wrote about how difficult it is for digital investigations analysts and OSINT researchers to ‘switch off’ during the holidays, especially knowing that there’s no similar break for online threat actors.