Phishing for Answers

Cybersecurity for every audience.

Not your typical cyber blog.

Welcome to Phishing for Answers, a site that provides information about cyber news, technology policy, and information security management.

This blog is intended to inform every type of reader, from experienced professionals to those with a general interest in cybersecurity. Because online data protection is first and foremost a human problem, Phishing for Answers strives to publish content that can be consumed by everyone.

Russia-Ukraine Conflict, Cyber Crime, News Kate Esprit Russia-Ukraine Conflict, Cyber Crime, News Kate Esprit

The Role of Underground Hacking Groups in the Russo-Ukrainian Cyber War

The Russian invasion of Ukraine has sparked involvement at every layer of the cyber world, including underground hacking groups. Within anonymized networks and dark web forums, hackers are increasingly engaging in Ukraine- and Russia-related activities. These cybercriminal groups are profiting by selling stolen data on the darknet and are even being recruited to aid in both sides of the war. Read more to learn about how covert hacking groups are playing an important role in the Russia-Ukraine conflict.

Read More
Industry Trends, News Kate Esprit Industry Trends, News Kate Esprit

2021 Capitol Attack: How the FBI Used Technology to Identify the Protesters

Exactly 1 year ago today, protesters attacked the US Capitol building. Since then, over 700 people have been arrested in connection to these events, but how did US law enforcement manage to track them down? Read more to find out how technology and social media aided the FBI’s investigations in the aftermath of the events at the Capitol.

Read More
Industry Trends, News Kate Esprit Industry Trends, News Kate Esprit

Log4j: The Security Vulnerability that Could Affect the Entire Internet

The cybersecurity world is currently reeling following the Apache Software Foundation’s public disclosure of the vulnerabilities in its Log4j software. Hundreds of millions of devices are potentially affected and hackers are rushing to exploit this zero day. Click to learn more about what is set to go down in history as one of the world’s largest cybersecurity events.

Read More