PinnedJared DouvilleCrypto’s past, present and future: What are the risks?By Jared Douville — April 20, 2023.4 min read·Apr 24, 2023----
Jared DouvilleUntangling Dependency Confusion: Exploring Threats and ProtectionsIn the realm of software development, dependencies play a pivotal role, acting as essential components that facilitate program…3 min read·Mar 9, 2024----
Jared DouvilleFrom Shadows to Spotlight: China’s Data Leak Sheds Light on Cyber TacticsRecent revelations have unveiled the clandestine operations of China’s cyber mercenary firms, highlighting a world where state-backed…2 min read·Feb 25, 2024----
Jared DouvilleNavigating Post-APT China Threats in 2024: Insights and StrategiesIn the world of cybersecurity, the emergence of Advanced Persistent Threats (APTs) has posed significant challenges for organizations…3 min read·Feb 21, 2024----
Jared DouvilleIntegrating X and Slack for Instant Notifications Using PythonBy Jared Douville2 min read·Feb 12, 2024----
Jared DouvilleLockBit Reigns Supreme in Soaring Ransomware Landscape: A Look into 2023’s Trends and 2024…The year 2023 witnessed a dramatic surge in ransomware campaigns, with LockBit emerging as the dominant threat group, according to a report…3 min read·Feb 6, 2024----
Jared DouvilleUnprecedented Cybersecurity Breach Shakes Global Affairs Canada — Ongoing Probe Unveils Disturbing…Published on Medium3 min read·Feb 3, 2024----
Jared DouvilleCanada Grapples with Chinese Election Interference: Leaked Intelligence Sparks ControversyIn the realm of cybersecurity, the delicate balance between national security and transparency is frequently put to the test. Recent leaks…3 min read·Feb 3, 2024----
Jared DouvilleDispelling the Myth: Gen Z, Not Boomers, Faces Heightened Vulnerability to Cybersecurity ThreatsBelieving that boomers are the most susceptible to cybersecurity attacks is a misconception. Contrary to popular belief, it’s actually…2 min read·Jan 31, 2024----
Jared DouvilleThe Evolving Landscape of LLM Prompt Injection Attacks in 2024In the ever-changing realm of cybersecurity, attackers are constantly devising new strategies to exploit vulnerabilities and gain…3 min read·Jan 31, 2024----