top of page
![](https://static.wixstatic.com/media/11062b_c18db2b1461b46f2ad31bae61009fee1f000.jpg/v1/fill/w_1920,h_1080,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/11062b_c18db2b1461b46f2ad31bae61009fee1f000.jpg)
![](https://static.wixstatic.com/media/ea5f86_a2303e7b060843b5bdef00ed6f5cf762~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_a2303e7b060843b5bdef00ed6f5cf762~mv2.webp)
![Every Single Social Security Number, Phone, and Address Has Leaked on the Internet! 2.6 Billion Total](https://static.wixstatic.com/media/ea5f86_a2303e7b060843b5bdef00ed6f5cf762~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_a2303e7b060843b5bdef00ed6f5cf762~mv2.webp)
Rich Washburn
Aug 14, 20243 min read
Every Single Social Security Number, Phone, and Address Has Leaked on the Internet! 2.6 Billion Total
Data breaches have become the digital equivalent of a coffee spill on your keyboard—annoying, potentially disastrous, but seemingly...
18 views0 comments
![](https://static.wixstatic.com/media/ea5f86_f80a680b026c43c28a88e9b0b287074f~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_f80a680b026c43c28a88e9b0b287074f~mv2.webp)
![How John The Ripper Shapes Modern Password Safety](https://static.wixstatic.com/media/ea5f86_f80a680b026c43c28a88e9b0b287074f~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_f80a680b026c43c28a88e9b0b287074f~mv2.webp)
Rich Washburn
Apr 29, 20242 min read
How John The Ripper Shapes Modern Password Safety
John The Ripper, often abbreviated as "JtR" or simply "John," more than just a password cracker is also a comprehensive framework for...
1 view0 comments
![](https://static.wixstatic.com/media/ea5f86_7992b8a08be444b0997f611300faf495~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_7992b8a08be444b0997f611300faf495~mv2.webp)
![Automated Threats: How AI is Shaping the Future of Cybersecurity](https://static.wixstatic.com/media/ea5f86_7992b8a08be444b0997f611300faf495~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_7992b8a08be444b0997f611300faf495~mv2.webp)
Rich Washburn
Apr 29, 20242 min read
Automated Threats: How AI is Shaping the Future of Cybersecurity
Artificial intelligence (AI) has emerged as a double-edged sword in the realm of cybersecurity. Recent developments suggest that AI...
0 views0 comments
![](https://static.wixstatic.com/media/ea5f86_ef536bcf0aed4fcfb538fa18b7819414~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_ef536bcf0aed4fcfb538fa18b7819414~mv2.webp)
![Nation-State Backdoor Found in Cisco Firewalls (Again?)](https://static.wixstatic.com/media/ea5f86_ef536bcf0aed4fcfb538fa18b7819414~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_ef536bcf0aed4fcfb538fa18b7819414~mv2.webp)
Rich Washburn
Apr 29, 20242 min read
Nation-State Backdoor Found in Cisco Firewalls (Again?)
A recent concerning discovery has been made regarding Cisco's Adaptive Security Appliances (ASAs)—a series of security devices acting...
1 view0 comments
![](https://static.wixstatic.com/media/ea5f86_3aa2de96e51b4bb89c3acc42f82940a8~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_3aa2de96e51b4bb89c3acc42f82940a8~mv2.webp)
![Inside the Chinese Hacking Tools Giga Leak](https://static.wixstatic.com/media/ea5f86_3aa2de96e51b4bb89c3acc42f82940a8~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_3aa2de96e51b4bb89c3acc42f82940a8~mv2.webp)
Rich Washburn
Feb 21, 20242 min read
Inside the Chinese Hacking Tools Giga Leak
The recent discovery of a massive data leak, purportedly revealing the inner workings and cyber espionage tools of a Chinese company, has...
6 views0 comments
![](https://static.wixstatic.com/media/ea5f86_97679451ceb543c780541172614ffa09~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_97679451ceb543c780541172614ffa09~mv2.webp)
![Using PhoneInfoga for Digital Forensics](https://static.wixstatic.com/media/ea5f86_97679451ceb543c780541172614ffa09~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_97679451ceb543c780541172614ffa09~mv2.webp)
Rich Washburn
Dec 9, 20232 min read
Using PhoneInfoga for Digital Forensics
PhoneInfoga, a versatile tool for digital forensics and ethical hacking. PhoneInfoga is designed to uncover detailed information about...
44 views0 comments
![](https://static.wixstatic.com/media/ea5f86_2d40d0ef6d324b4fa47ab69660765641~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_2d40d0ef6d324b4fa47ab69660765641~mv2.webp)
![America is Pushing China Out of the Internet](https://static.wixstatic.com/media/ea5f86_2d40d0ef6d324b4fa47ab69660765641~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_2d40d0ef6d324b4fa47ab69660765641~mv2.webp)
Watchtower
Nov 21, 20232 min read
America is Pushing China Out of the Internet
Introduction: Undersea data cables, a pivotal component in global internet infrastructure, is at the heart of a burgeoning geopolitical...
7 views0 comments
![Digital Reconnaissance: Leveraging Open-Source Tools for Enhanced Security](https://static.wixstatic.com/media/ea5f86_91a2cd227d514c7a9c5693fe7d7a97be~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/ea5f86_91a2cd227d514c7a9c5693fe7d7a97be~mv2.webp)
Rich Washburn
Oct 22, 20232 min read
Digital Reconnaissance: Leveraging Open-Source Tools for Enhanced Security
When it comes to the cyber world, information is power. Open-Source Intelligence (OSINT) is all about obtaining this information from...
6 views0 comments
bottom of page