The Evolving Botnet Threat Landscape: A 4-Year Comparison

Botnets continue to pose significant risks to businesses, organizations, and individuals. In this blog post, I will compare the data gathered from a honeypot set up in 2019 with my recent findings from 2023. This comparison will provide insights into how the botnet threat landscape has evolved over the past four years and offer recommendations […]

The Evolving Botnet Threat Landscape: A 4-Year Comparison Read More »

The Sinister Web of Cybercrime: An Analysis of a Multi-Stage Attack Targeting High-Profile Individuals

Welcome to a world where sophisticated attackers weave their intricate webs, and the boundaries between the digital and physical realms blur. As a cyber security consultant, I’ve seen my fair share of cybercrime investigations, but this one truly stands out. Our story begins with my client, an international businessman, who finds himself the target of

The Sinister Web of Cybercrime: An Analysis of a Multi-Stage Attack Targeting High-Profile Individuals Read More »

Spam Filter Bypass Method in Phishing Attacks: Flirting

What is phishing? Phishing is a type of social engineering where an attacker sends a fraudulent message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software, such as ransomware, on the victim’s infrastructure. The most significant defence mechanism in phishing attacks is user awareness. However, a

Spam Filter Bypass Method in Phishing Attacks: Flirting Read More »