top of page

Business of Security

ORNA
May 17, 20225 min read
Hacking the Human Mind: The Art of Manipulation
What started as a low-key social experiment ultimately evolved into one of the biggest operations of an ex-hacker's life.
145 views

ORNA
May 9, 20225 min read
The Quest for the Righteous Hack
The need to seek attention from others usually is the hacker’s greatest weakness.
185 views

ORNA
May 2, 20224 min read
To Catch an Online Predator
Employing a variety of online OSINT tools to deanonymize predators and report them to actionable authorities.
503 views
bottom of page