Negative PID Inc.negativepid
2025-07-01

New to ISO 27001? In this essential guide, we summarize all you need to know to get certified, from the basics, to tips and advice to ace it the first time.

negativepid.blog/the-essential

Negative PID Inc.negativepid
2025-06-30

@jupiter_rowland thank you for sharing your point of view. Our article does cover the evolution of several virtual worlds, the technologies involved, their virtual economies and social environments, including the psychological and sociological aspects.

And yes, you can read the article for free by simply registering. We donโ€™t charge for most of our content, but we accept contributions to maintain a clean and readable space without ads and publish quality content.

Negative PID Inc.negativepid
2025-06-30

Do you remember Second Life? In the early 2000s, it promised a second chance at success. It is now a niche tool for creators, academics, and psychologists. Now, the Metaverse is promising to fix the flaws of Second Life, but has faults of its own. We have asked AI what an ideal virtual world would be like: here's the blueprint to happiness in a virtual world from where you might not want to ever disconnect.

negativepid.blog/digital-world

Negative PID Inc.negativepid
2025-06-27

The atrocities of wars are under the public eye. However, there are ongoing silent and more lethal battles constantly happening in the web. It's cyberwarfare, the invisible war happening in cyberspace e among sovereign countries. Discover what it is and how it's evolving with technology in our article.

negativepid.blog/cyberwarfare-

Negative PID Inc.negativepid
2025-06-26

Fuel moves the world: from airplanes to cars, gas pipelines determine the wealth of a country and its negotiating power. The Colonial Pipeline Ransomware Attack was one of the most dramatic attacks to the critical infrastructure of a country, so much so that the company did pay the ransom to the attackers. Here's how it happened and why.

negativepid.blog/the-colonial-

Negative PID Inc.negativepid
2025-06-25

Supply-chain attacks are a favourite in the toolbox of cyber warfare. The SolarWinds attack remains in the history books of cybersecurity for the clever use of patching as an attack vector to disrupt C2 infrastructure.

Read how it unfolded in our deep dive article! ๐Ÿ‘‡

negativepid.blog/the-solarwind

Negative PID Inc.negativepid
2025-06-24

Back in 2001, a British national breached into 97 US military and NASA computers seeking evidence of UFOs and other conspiracy theories. He was caught, but never convicted. This is the bizarre case of Gary McKinnon.

negativepid.blog/the-gary-mcki

Negative PID Inc.negativepid
2025-06-23

What if the ones who keep your more sensitive data are hacked? In 2017, Equifax discovered a leak that compromised the personal and financial data of 147 million Americans, 500k+ UK citizens, and 19k Canadians in what is remembered as the most devastating identity-theft episode in the history of the Internet.
Here's how it happened and who was behind it ๐Ÿ‘‰ negativepid.blog/the-equifax-d

Negative PID Inc.negativepid
2025-06-20

How do you track cybercriminals? Are their crimes truly invisible?
This article explains how criminologists can distinguish a cybercriminal's MO (Modus Operandi) to understand their motives and why they select their victims.

negativepid.blog/understanding

Negative PID Inc.negativepid
2025-06-19

If you work in cybersecurity you are probably familiar with Kali Linux. However, depending on your specific tasks, you might want to adopt an operating system that specializes in your tasks. From red teaming to reverse engineering and safe comms, we have gathered a comprehensive list of awesome operating systems that will make your work easier and safer!

negativepid.blog/oss-for-cyber

Negative PID Inc.negativepid
2025-06-18

The WannaCry ๐Ÿ˜ญ ransomware attack in 2017 is a case study in cybersecurity history as one of the most devastating weaponized exploits orchestrated by a North Korean state-sponsored hacking group. Here is how it happened.

negativepid.blog/the-wannacry-

Negative PID Inc.negativepid
2025-06-17

In any virtual place where people socialize and exchange anything of value, cybercriminals find a way to make the system work for them. In this article, we provide an overview of all the illicit activities that happen behind and within the most loved online video games, with users knowingly or unknowingly participating in them.

negativepid.blog/cybercrime-in

Negative PID Inc.negativepid
2025-06-16

Ready for one of the most chilling stories of the Internet? ๐Ÿฅถ The Lake City Quiet Pills enigma is yet to be solved.
Here is what we know about it. The evidence is still online... Is Milo real? Is he still alive? Or is he just a made-up character?
Read all about it on our blog and tell us what you think!

negativepid.blog/the-lake-city

Negative PID Inc.negativepid
2025-06-13

If you're the administrator of a WordPress website, there might be occasions when you get locked out of your own admin account. It happens more often than you think.
The good news? You don't need to pay for expensive professional services with your hosting provider to recover your access: in this article we explain you how to do it in a few minutes (for free!) with the WP-CLI, even if you don't have access to the C-Panel!

negativepid.blog/how-to-regain

Negative PID Inc.negativepid
2025-06-12

With the evolution of technology, criminology had to adapt and learn how to recognize and analyze cybercrime. Legislation had to do the same to prosecute crimes now committed across jurisdictions, which are evolving faster than ever.
Here is how criminologists built a framework to profile cybercriminals.

negativepid.blog/how-the-inter

Negative PID Inc.negativepid
2025-06-11

Ever wondered how SSH works? Before logging remotely into a machine with SSH, you must ensure your server is configured for that. This guide explains how to configure a start-to-end solution and provides a bash script to automate server provisioning. ๐Ÿ‘‡

negativepid.blog/how-to-instal

Negative PID Inc.negativepid
2025-06-10

Meet Kevin Mitnick, the most wanted hacker in the world. Mitnick's fascinating life has inspired generations of hackers and has defined the โ€œhacker" image in the public eye. From a master in social engineering, to prolific author, to Chief Hacking Officer, this is his story.

negativepid.blog/kevin-mitnick

Negative PID Inc.negativepid
2025-06-09

Some weeks ago, we attended a training session held by TXLEAN (Texas Law Enforcement Agency Network) on link analysis to investigate crime series with Power BI.
It was very interesting, but what about investigating cybercrime? In this article, we took the analysis a step further and replicated link analysis with R.

negativepid.blog/learning-link

Negative PID Inc.negativepid
2025-06-06

Imagine you're a journalist ๐Ÿ“ and start receiving classified information through an encrypted app. ๐Ÿ˜จ What would you do with that information?
It has happened recently, but it wasn't the first time. Before the POTUS accident, were the Edward Snowden leaks, one of the most famous cases of whistleblowing that got the U.S. into a lot of scrutiny.

Here's how it happened!

negativepid.blog/the-edward-sn

Negative PID Inc.negativepid
2025-06-05

The Internet offers many ways to make money. Online gaming ๐ŸŽฎ is one of these, and not just for professional players.
If you're a fan of MMORPGs and virtual worlds, here is where and how to earn a living with your online playing and social skills.

negativepid.blog/making-money-

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst