PinnedInvestigator515The Hazards of Demining: Understanding the Challenges in UkraineAs the counter offensive continues, there’s plenty of information and disinformation about mines and their effects.Aug 27, 20231Aug 27, 20231
PinnedInvestigator515inOSINT for allOSINT Investigator’s Guide to Self-Care and ResilienceInvestigator515 talks about managing mental health considerations when conducting online investigations and analysisOct 24, 2023Oct 24, 2023
PinnedInvestigator515inAge of AwarenessOSINT Unleashed: 5 Essential Tools for Cyber InvestigatorsWhen you’re using open source intelligence the ability to obtain and analyse information is key to achieving your goals. The correct tools…Jun 5, 20232Jun 5, 20232
Investigator515Historical Hacks: The Capital One Breach (2019)There is no state actor in today's historical hack because this one was almost an inside job.2d ago2d ago
Investigator515Cyber Warfare & The Civilian Hacker ArmyThe 2022 full-scale invasion led to some rapid developments in the cyber & information space.Sep 221Sep 221
Investigator515inRadio HackersFeedline Fundamentals: Coaxial CableFinding the right type of coaxial cable for your SDR station.Sep 211Sep 211
Investigator515inWhat the Tech?!What The Tech?! Open Source SoftwareOpen-source software helps power all types of systems the world over.Sep 16Sep 16
Investigator515Shadow Suppliers: The Uncomfortable Truth About Russian SanctionsDespite years of Russian Sanctions, foreign missiles continue to rain down on Ukraine.Sep 12Sep 12
Investigator515inRadio HackersRadio Hackers: BlueborneThis group of Bluetooth vulnerabilities affected millions of devicesSep 5Sep 5
Investigator515What The Tech: Biometric SecurityStarting off as a movie idea, Biometrics now have real-world applicationsAug 31Aug 31