Latest Blog
Blog & articles
Data-driven Content on Cyber Security, Economies, Policy, and Innovations in Cryptocurrencies.
Region
Sort
Author
Crypto Compliance Training.
A&D Forensics Receives The Best Blockchain Security Award.
A&D Forensics participated in the Law Enforcement Cryptocurrency Investigation training held on Monday, November 27, 2023. The training was organized by the Economic and Financial Crimes Commission...
Cybersecurity.
The Importance of Software Updates: Strengthening Your Digital Defense
Software updates are not just about new features; they’re essential shields against cyber threats. Learn what software updates are, why they matter, and how they protect you from security...
Cybersecurity.
How To Recognise and Stay Secured From Phishing Attacks
Phishing attacks are a pervasive and persistent threat in the digital landscape. By understanding what phishing attacks are, their effects, and how to identify and protect yourself against them, you...

Press Release.
Pig Butchering Scams: Key Notes From the FINCEN ALERT on the Rampant Cryptocurrency Investment Scam
Pig Butchering Scams are becoming rampant and in order to address this, the Financial Crimes Enforcement Network (“FinCEN”) issued an alert on September 8, 2023. This article discusses the 15 “red...
Press Release.
A&D Forensics Concludes Cybersecurity Training For CBN Staff at the CBN Training Institute, Abuja
The Cybersecurity training, under the title "Cybersecurity Risk and Surveillance," was conducted from Monday, August 14, 2023, to Friday, August 18, 2023, at the CBN International Training Institute...

Crypto Compliance Training.
AI in Cryptocurrency Investigations and Compliance
The AI in Cryptocurrency Investigations and Compliance webinar held on Thursday August 10, 2023 by A&D Forensics was expertly covered by our Guest speaker, William Callahan from Blockchain...

Press Release.
Crypto Compliance and Investigations: A&D Forensics Partners with Infusion Lawyers for Expert Training
A&D Forensics has partnered with Infusion Lawyers to train Participants on Crypto Compliance and Investigations. The Partnership was signed this July between the two parties duly represented by Mr....
Cybersecurity.
Empowering Start-ups Against Social Engineering: Insights from Our Cybersecurity Webinar
Social engineering is a significant cyber-enabled crime that preys on human psychology. Examples of social engineering techniques include romance scams and phishing attacks. Understanding these...
Cybersecurity.
Social engineering as a Cyber Security threat
social engineering is not a cyber attack but the art of persuasion, a psychological manipulation that either start by gaining the trust or uses threat to force a victim into taking malicious actions.

AML Compliance.
Navigating Compliance in Nigeria: Insights from the NFIU Session for Financial Institutions, VASPs and Fintechs
The path towards compliance with the Nigerian Financial Intelligence Unit's (NFIU) AML/CFT requirements holds significant importance for both FinTech operators and Virtual Asset Service Providers...
AML Compliance.
Why SEC Nigeria is Prioritizing Asset-Backed Tokens Over Cryptocurrencies: Unpacking the Reasoning Behind the Disclosed New Digital Asset Rules
sed digital assets exchanges to list tokens backed by certain assets including equity, debt and property.
Why SEC Nigeria is Prioritizing Asset-Backed Tokens Over Cryptocurrencies: Unpacking the...
Press Release.
Ordinal Finance Exit Scam: How to Protect Yourself from Rug Pulls in DeFi
Ordinals Finance, a decentralized finance (DeFi) protocol built on the Ethereum Network which allows users to lend and borrow inscriptions, has been confirmed by Certik, to have performed an Exit...