Skip to content
Home
Blog
Computer Forensics
Blockchain forensics
Cybercrime
Catfishing
Conspiracy theories
Cyberbullying
Cyberwarfare
Dark markets
Deepfakes
Doxxing
Fraud
Hacking
Hacktivism
Harassment
Hate speech
Hoaxes
Human Trafficking
Identity theft
Impersonation
Money laundering
Psychological manipulation
Radicalization
Recruitment
Romance scams
SWATting
Cyberpsychology
Certifications
Mental health
Online communities
Online gaming
Social media
Sociology and Anthropology
Virtual worlds
Cybersecurity
Cloud security
Compliance and Regulations
Ethical hacking
Identity and access control
Industrial systems
Security Frameworks
Tools
Vulnerabilities
Digital investigations
Crime analysis
OSINT Tools
Solved cases
Unsolved cases
Life at Negative PID
Other
Featured
Easy Reads
Foundational Articles
Geek Zone
Technical Articles
Coding
IoT
Home
Blog
Computer Forensics
Blockchain forensics
Cybercrime
Catfishing
Conspiracy theories
Cyberbullying
Cyberwarfare
Dark markets
Deepfakes
Doxxing
Fraud
Hacking
Hacktivism
Harassment
Hate speech
Hoaxes
Human Trafficking
Identity theft
Impersonation
Money laundering
Psychological manipulation
Radicalization
Recruitment
Romance scams
SWATting
Cyberpsychology
Certifications
Mental health
Online communities
Online gaming
Social media
Sociology and Anthropology
Virtual worlds
Cybersecurity
Cloud security
Compliance and Regulations
Ethical hacking
Identity and access control
Industrial systems
Security Frameworks
Tools
Vulnerabilities
Digital investigations
Crime analysis
OSINT Tools
Solved cases
Unsolved cases
Life at Negative PID
Other
Featured
Easy Reads
Foundational Articles
Geek Zone
Technical Articles
Coding
IoT
Linkedin-in
Facebook-f
Youtube
PID Perspectives
Archive
START READING
Tag: Malware
Cybercrime
Operation Pacifier and the use of NIT
Read More »
December 1, 2025
No Comments
Cybercrime
Botnet for profit: Jeanson James Ancheta
Read More »
September 1, 2025
No Comments
Computer Forensics
Steganography, the art of digital hiding
Read More »
July 13, 2025
No Comments
Cybercrime
Cyberwarfare: the invisible war
Read More »
June 14, 2025
No Comments
Cybercrime
The Colonial Pipeline Ransomware Attack
Read More »
June 13, 2025
No Comments
Cybercrime
The SolarWinds Supply Chain Attack
Read More »
June 6, 2025
No Comments
Computer Forensics
OSs for cybersecurity professionals
Read More »
May 24, 2025
No Comments
Cybercrime
The WannaCry Ransomware Attack
Read More »
May 23, 2025
No Comments
Cybercrime
The Target Data Breach
Read More »
May 9, 2025
No Comments
Back to Blog