Exposing Forged Eviction Orders Targeting Indigenous Land Defenders

Last week a frantic message landed in my inbox: “They’re kicking us off ancestral land at 0600 tomorrow, but the signature on this eviction notice looks like Comic Sans.” Welcome to the front lines where fake eviction orders OSINT is the difference between a family sleeping in their own beds or under highway overpasses. Human […]
How SOCs Can Detect and Disrupt Bulletproof Hosting Networks

If you’re in the trenches of a security operations center (SOC), you know the drill. Alert volumes are monstrous, adversaries are crafty, and the infrastructure they hide behind is often ghost-like. Bulletproof hosting (BPH) is that sneaky shelter cybercriminals cherish, a provider that winkingly turns a blind eye to illicit activities while offering extreme resilience […]
Windows 10 EOL and Compliance: What GRC Teams Must Do Now to Avoid Audit Failures

Windows 10 reached EOL on October 14, 2025. Learn critical compliance risks for PCI DSS, HIPAA, and ISO 27001, plus actionable remediation steps for GRC teams.
Everyday OSINT 2: Protecting Your Family, Vehicles, and Home

After protecting yourself from dating scams and travel fraud, the next frontier is safeguarding what matters most: your family, home, and major investments. While personal verification focuses on immediate risks, family protection requires deeper due diligence and ongoing vigilance. The stakes are higher when children are involved, major purchases are at risk, or your home […]
Everyday OSINT: How to Stay Safer in Dating, Shopping, and Travel

Every day, millions of people fall victim to romance scams, fake online sellers, and travel-related fraud. In fact, the Federal Trade Commission reported that Americans lost over $547 million to romance scams alone in 2021. However, most of these incidents could be prevented with simple verification techniques that take just minutes to perform. Open Source […]