In the Mission Impossible and James Bond movies, finding ways to bypass biometric security systems often requires covert or gruesome acts to collect the needed fingerprints, retina, iris, or palm used by an identity scanner protecting some incredible secret. Plots involve a disk or USB drive containing the identities of hundreds or even thousands of deep cover agents or intelligence perso… Read more
I hope this will become a useful resource for Open-source Intelligence (OSINT) and to find and learn how to use osint tools. Chapter 1: Data gathering for intelligence purposes Chapter 2: Link analysis Chapter 3: Other data analysis Chapter 1: Data gathering for intelligence purposes With just cursory mention, any social media website such as Facebook, Twitter and… Read more
Joe Gray started a great podcast and was kind to mention us here: https://advancedpersistentsecurity.net/partners-and-causes/ Thanks Joe!
Of course first and foremost on this list of cybersecurity related podcasts is the BSides Las Vegas BSidesLV Radio podcast, proudly sponsored by Peerlyst: Note that this list is NOT ranked, it's merely numbered to count the many good Infosec podcasts out there! In English: The BSidsesLV Radio podcast is focused on news around Security BSides conferences and t… Read more