
Hacking scandal of Hungarian KRÉTA public education administration system
As a member of the socially responsible professional community, Black Cell would like to raise awareness on best practices to improve an organization’s overall compliance posture with a case study from Hungary on the occasion of World Data Protection Day. On 7...

ChatGPT for Offensive and Defensive Cyber
ChatGPT for Offensive and Defensive Cyber There has been a lot of talk recently about ChatGPT and its implications for a wide range of industries. Potential applications are vast, including creative design, technical writing, and programming. In this article,...

Forensic Pattern Of Life Analysis
Forensic Pattern Of Life Analysis Pattern of life analysis isn’t a new concept to anyone who’s ever been involved with intelligence, in particular surveillance. It’s all about the habits that people — suspects, persons of interest, crime victims, or those...

Top 10 Cybersecurity Reports 2022
Top 10 Cybersecurity Reports 2022 We have collected the most relevant cybersecurity reports of 2022 that are worth checking. Crowdstrike 2022 Crowdstrike Global Threat Report ENISA (European Union Agency for Cybersecurity) ENISA Threat Landscape 2022 Forbes...

Cybersquatting | Infographic
Cybersquatting encompasses many techniques such as those that can be seen in the table below. Each example shows a cybersquatted version of “google.com”

Iranian APT Targets US With Spyware via GitHub
Iranian APT Targets US With Spyware via GitHub The custom malware used by the state-backed Iranian threat group Drokbk has so far flown under the radar by using GitHub as a "dead-drop resolver" to more easily evade detection. A subgroup of the state-backed Iranian...

The issue of lacking OT operators and security professionals
The issue of lacking OT operators and security professionals30 November is the computer security day. Computer security can only be ensured if one is aware of its mistakes and shortcomings. The purpose of this blogpost is to highlight the importance of lacking OT...

Detecting and Fingerprinting Infostealer Malware-as-a-Service platforms
Detecting and Fingerprinting Infostealer Malware-as-a-Service platforms Cyber threat intelligence largely involves the tracking and studying of the adversaries outside of your network. Gaining counterintelligence about your adversaries' capabilities and weaponry is...

“Hack Friday” 2022 Edition | InfoSec Black Friday Deals
"Hack Friday" 2022 Edition | InfoSec Black Friday Deals Newsletters Cybersecurity Weekly Newsletter https://letsdefend.io/cybersecurity-news.html 99% off ($1 instead of $100) with code: BLCKFRDY-NEWS Deal ends: December Tools Nessus (Professional or Expert)...