
Smart Home Devices: Concerns, Vulnerabilities, and How to Address Them
Author: Garrett Bell (Analyst, Security Consulting) The idea of a “smart home,” a home filled with connected devices that conveniently streamline entertainment, security, lighting, and

A Threat No One Can Ignore: The Threat of Ransomware Expands to Include Small and Medium Size Businesses
Author: Nick Nemtuda, Red Five OSINT Analyst You likely heard about, and may have been affected by, the Colonial Pipeline Company ransomware attack in May

5 Benefits of a Corporate Travel Risk Program
Authored by: Nikki Desai (Associate Director, Security Consulting) An effective travel risk program is a key tool in any company’s risk management effort. Travel risk

What Are Data Aggregators and How Do They Pose a Risk to Your Privacy and Security?
Authored by: Aaniyah Hicks, Red Five Investigative Intern What are Data Aggregators? Data aggregators, also known as people-finder sites, scour the internet looking for people’s personally

What’s The Big Deal About TikTok and What Can You Do to Protect Your Data
TikTok is an extremely popular short-form video social media platform that has attracted more than 150 million active users in the US. It has

Spotlight on Pegasus Spyware
Authored by: Kathryn McConaughy, Red Five Open Source Analyst In late 2021 and early 2022, Pegasus spyware garnered a flurry of media attention,

Evolution of Crypto & Geopolitical Risk
Authored by: Linda Gomez Cryptocurrencies and Web3 technologies have been on a crusade to disrupt legacy institutions like central banking since Bitcoin’s launch in

Artificial Intelligence Apps: Associated Privacy Risks and How to Address Them
Authored by: Jefferson Antwi-Agyei A few years ago, many people were quick to take part in the viral social media trend of uploading photos of

Rising Physical Security Threats to Cryptocurrency Leaders
Authored By: Garrett Bell When we think of crime involving cryptocurrency, we tend to think of scams and high-profile hacks in which bad actors steal

Five Common Cryptocurrency Scams and How to Avoid Them
Cryptocurrencies have seen an explosion of popularity in recent years and with good reason. “These assets aren’t going anywhere,” said Nick Gicinto, who joined

Child Safety Online – Important Things to Know
A child logs onto the internet for the first time every half-second, according to a UNICEF study. The internet has become increasingly more important in

3 Risks That Highlight Why Natural Disasters Should Factor into Your Organizations’ Business Continuity Plan
A Business Continuity Plan (BCP), also commonly referred to as a Continuity of Operations Plan (COOP), is an essential component for any corporate framework. A