Category: Article
BFU – Seeing is Believing
MediaTek: A Short Story
Cell Site Analysis: Capturing a Snapshot of the Cellular Network’s Coverage
New Tools Deliver More Accurate Carrier Tower Information and Signal Identification, Saving Examiners and Network Operators Time and Resources By Bill Teel, Teel Technologies When…
Future-Proof Your Cyber Career
Cyber moves fast, so staying on top of everything can be difficult to impossible at times. So, to effectively future-proof your cyber career, you can…
3 Ways Programming Skills Can Help You Succeed in DFIR
I often come across this topic among those interested in digital forensics and incident response (DFIR). People seem to ask the same question – “Do…
Elevated Speed Performance with the Samsung 990 Pro
Non-Volatile Memory (NVMe) storage, which Wikipedia defines as a type of computer memory that can retain stored information even after power is removed, was developed…
Tips, Tools and Techniques for Using Open Sources in Threat Intelligence
Open-source intelligence doesn’t just refer to the accessibility of information. OSINT is the practice of collecting information from publicly available sources that is widely used…
The Rise of LokiNet
For those who know me, they will tell affirm I am bullish when it comes to evolving trends with dark nets. Moreso, I am the…
How Managed Attribution Empowers Online Researchers
Chances are, anyone involved in online research – cybersecurity specialists, fraud and brand misuse analysts, law enforcement investigators – has heard of the concept of…