Fiverr Freelancers Scam Alert ❗ — How I Almost Fell for a Phishing Attack

Fiverr Freelancers Scam Alert ❗ — How I Almost Fell for a Phishing Attack At first, you feel that familiar excitement…“Wow! I got my first Fiverr order!” 🎉 But sometimes, that excitement can be exploited. Recently, I encountered a phishing attempt targeting Fiverr freelancers, and it’s an experience every freelancer should be aware of. How the Scam Works It starts innocently: … Read more

What a LinkedIn Profile Reveals to a Scammer

LinkedIn is a targeting broadcast. The platform’s default is visibility-to prospective recruiters, business contacts, potential customers. But visibility to legitimate audiences is visibility to adversaries too. A profile that properly signals authority to clients also signals authority to attackers. The question is not whether information leaks; it is what intelligence actually matters for phishing, vishing, … Read more

The Hard Problem Was Never Hard — Part 2

Author: Berend Watchus. Independent non profit AI & Cyber Security Researcher. [Publication for OSINT TEAM, online magazine] March 11 2026 image copyright: https://www.sloww.co/homunculus-fallacy/ The Hard Problem Was Never Hard — Part 2 Central Experience, the Insula, and the Three Rooms Nobody Connected Berend F. Watchus — Independent Researcher, Arnhem Area, Netherlands — March 2026 part 1 WORLD FIRST!: CHALMERS’ HARD PROBLEM OF CONSCIOUSNESS DISSOLVED … Read more

VMs Need Not Apply: NotOpenClaw Malware Analysis

The malware loader that takes VM/sandbox evasion seriously. Original image from OpenClaw’s GitHub repo. Image modified by Copilot. Surprise, surprise… during a time when you can’t even type the letter “o” in a search engine without immediately seeing it include “-penclaw” in the suggestions, threat actors have been trying to capitalize on the popularity of this … Read more

OSINT-Related Articles, 20260311

Videos/Webinars/Podcasts/Conferences/Training:How I Geolocated Taliban Special Forces in the Afghan Desert: Let’s Geolocate #8Ben Strick | March 9, 2026https://www.youtube.com/watch?v=7t9gXDuWyKg Investigating Fraud Without Leaving a Digital Trace | Intel DropAuthentic8 | March 10, 2026https://www.youtube.com/watch?v=-j-1Uck5pTU Articles/Blogs (Corporate or Personal):What is Managed Attribution, and How Does it Improve Online Investigation?Shannon Ragan | March 6, 2026https://www.authentic8.com/blog/what-is-managed-attribution Why Passive Threat Intelligence … Read more

❤️ Help Fight Human Trafficking
Support Larry Cameron's mission — 20,000+ victims rescued