Decorative background

Latest Blog

Blog & articles

Data-driven Content on Cyber Security, Economies, Policy, and Innovations in Cryptocurrencies.

Region
Sort
Author
A Comprehensive Overview of the FATF's February 2024, Plenary Meeting pic
FATF.
A Comprehensive Overview of the FATF's February 2024, Plenary Meeting
The FATF February 2024, Plenary Meeting took place in Paris on February 23, 2024, marking a crucial event in global financial regulations and the fight against money laundering and terrorism...
A&D Forensics Concludes Crypto Compliance Specialist Training for February 2024 Cohort Picture
Press Release.
A&D Forensics Concludes Crypto Compliance Specialist Training for February 2024 Cohort.
About the Crypto Compliance Specialist Training The Crypto Compliance Specialist Training garnered significant participation from lawyers, compliance officers in traditional banks and exchanges, and...
The Law Enforcement Cryptocurrency Investigation Training, conducted by the EFCC in collaboration with Binance, sees participation from A&D Forensics.
Crypto Compliance Training.
The Law Enforcement Cryptocurrency Investigation Training, conducted by the EFCC in collaboration with Binance, sees participation from A&D Forensics.
A&D Forensics participated in the Law Enforcement Cryptocurrency Investigation training held on Monday, November 27, 2023. The training was organized by the Economic and Financial Crimes Commission...
Crypto Compliance Training.
A&D Forensics Receives The Best Blockchain Security Award.
A&D Forensics participated in the Law Enforcement Cryptocurrency Investigation training held on Monday, November 27, 2023. The training was organized by the Economic and Financial Crimes Commission...
Cybersecurity.
The Importance of Software Updates: Strengthening Your Digital Defense
Software updates are not just about new features; they’re essential shields against cyber threats. Learn what software updates are, why they matter, and how they protect you from security...
Cybersecurity.
How To Recognise and Stay Secured From Phishing Attacks
Phishing attacks are a pervasive and persistent threat in the digital landscape. By understanding what phishing attacks are, their effects, and how to identify and protect yourself against them, you...
Pig Butchering Scams: Key Notes From the FINCEN ALERT on the Rampant Cryptocurrency Investment Scam
Press Release.
Pig Butchering Scams: Key Notes From the FINCEN ALERT on the Rampant Cryptocurrency Investment Scam
Pig Butchering Scams are becoming rampant and in order to address this, the Financial Crimes Enforcement Network (“FinCEN”) issued an alert on September 8, 2023. This article discusses the 15 “red...
Press Release.
A&D Forensics Concludes Cybersecurity Training For CBN Staff at the CBN Training Institute, Abuja
The Cybersecurity training, under the title "Cybersecurity Risk and Surveillance," was conducted from Monday, August 14, 2023, to Friday, August 18, 2023, at the CBN International Training Institute...
AI in Cryptocurrency Investigations and Compliance
Crypto Compliance Training.
AI in Cryptocurrency Investigations and Compliance
The AI in Cryptocurrency Investigations and Compliance webinar held on Thursday August 10, 2023 by A&D Forensics was expertly covered by our Guest speaker, William Callahan from Blockchain...
AI in Cryptocurrency Investigations and Compliance
Press Release.
Crypto Compliance and Investigations: A&D Forensics Partners with Infusion Lawyers for Expert Training
A&D Forensics has partnered with Infusion Lawyers to train Participants on Crypto Compliance and Investigations. The Partnership was signed this July between the two parties duly represented by Mr....
Cybersecurity.
Empowering Start-ups Against Social Engineering: Insights from Our Cybersecurity Webinar
Social engineering is a significant cyber-enabled crime that preys on human psychology. Examples of social engineering techniques include romance scams and phishing attacks. Understanding these...
Cybersecurity.
Social engineering as a Cyber Security threat
social engineering is not a cyber attack but the art of persuasion, a psychological manipulation that either start by gaining the trust or uses threat to force a victim into taking malicious actions.