Cyber Social Hub Blog

How to Get Social Media Evidence Admitted Into Court

How to Get Social Media Evidence Admitted Into CourtBy: SMI Aware Published on: 28/02/2025

Admitting social media and deep web findings into evidence is not difficult, but it does require ethical considerations and prompt action. Here's what you need to ensure you have to get social media evidence admitted into court.

How To ArticleHub Article
How to Get Social Media Evidence Admitted Into Court

Tips, Tools and Techniques for Using Open Sources in Threat Intelligence

Tips, Tools and Techniques for Using Open Sources in Threat IntelligenceBy: Jeff Phillips Published on: 12/12/2022

Open-source intelligence doesn’t just refer to the accessibility of information. OSINT is the practice of collecting information from publicly available sources that is widely used by analysts in nearly every type of organization — from government and law enforcement to financial crime analysts, fraud and brand misuse investigations, and particularly cybersecurity.

How To ArticleHub Article
Tips, Tools and Techniques for Using Open Sources in Threat Intelligence

The Rise of LokiNet

The Rise of LokiNetBy: Keven Hendricks Published on: 11/12/2022

Over the past few years, we’ve witnessed the advent of cryptocurrency and blockchain technology become the technological paragon and consequently, an investment zeitgeist. While you will find many polarizing views on cryptocurrency, you will find few (if any) naysayers or neophobic attitudes towards blockchain technology.

Hub Article
The Rise of LokiNet

How Managed Attribution Empowers Online Researchers

How Managed Attribution Empowers Online ResearchersBy: Jeff Phillips Published on: 08/12/2022

Chances are, anyone involved in online research – cybersecurity specialists, fraud and brand misuse analysts, law enforcement investigators – has heard of the concept of managing attribution in order to stay safe and anonymous online.

Hub Article
How Managed Attribution Empowers Online Researchers