Ohad ZaidenbergMar 28, 20235 minRansomware Gangs Exploit Regulations for Financial Gain: A Deep Dive into the Growing Trend and Its Data protection and privacy have never been more critical as ransomware gangs continue to evolve and exploit regulations to gain...
Ohad ZaidenbergNov 29, 202211 minVictimology Analysis and Data Leaks SiteThis blog will discuss different types of data leakage by threat actors.
Ohad ZaidenbergNov 17, 20223 minWhen the Researcher Became his Research SubjectTL;DR: Today one year ago (November 17th, 2021), a nation executed an influence operation against me in their most notorious media outlet...
Ohad ZaidenbergSep 20, 20228 minEffective Awareness Campaign - Social Engineering is a 'Why' QuestionTL;DR - in this blog post, I will review my approach to conducting effective social engineering awareness campaigns (phishing, vishing,...
Ohad ZaidenbergSep 14, 20221 minBreaking the Intelligence Cycle - Defcon PresentationDuring Defcon 30, I presented my talk 'Breaking the Intelligence Cycle' at the BioHacking Village. The deck is available here. About the...
Ohad ZaidenbergSep 11, 20221 minIntelligize your Red TeamIn the last year, my colleague & friend, Roei Sherman, and myself, can't stop speaking about creating fertile soil for red team...
Ohad ZaidenbergSep 11, 20222 minWelcome!Welcome to my blog! My name is Ohad Zaidenberg, and I consider myself an intelligence person. I loved information my whole life. During...