Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Rising Tides: When Cybersecurity Becomes Personal – Inside the Work of an OSINT Investigator

Posted on December 22, 2025December 22, 2025 By CWS

“All of us matter, or none of us do,” a powerful assertion from Shannon Miller, OSINT Investigator and Privateness Advisor. For these of us who know Miller, it’s not the primary time we’ve heard that plea and it received’t be the final. Her important profession and non-profit work to assist victims of home hazard and different comparable malice discover security, she’s seen first-hand how the hazards are amplified for marginalized and weak teams who should not have as a lot entry to instruments, schooling, and different crucial sources to guard themselves and their households.

Miller’s work goes past people and households, nonetheless. Take into account the Fortune 500 or startup govt who might need a disgruntled former worker, or has caught the eye of a cybercriminal, or one other kind of stalker, who wants to guard themselves, their corporations, and their households.

The upside of all of the know-how and entry we have now can also be what creates a lot danger within the multitude of harmful conditions that Miller has seen and helped folks out of in probably the most environment friendly and least disruptive methods potential. However, we as a cyber neighborhood have to assist, however constructing ethics and integrity into our merchandise to allow them to be used much less maliciously in human circumstances; not merely information circumstances.

Something created can be utilized for good or it may be abused. Our neighborhood has an obligation to make sure tech is created with ethics, integrity and guardrails in place to attenuate the hurt.

Learn on to be taught extra about Miller’s crucial and spectacular work, how she takes it past her profession and does fundraising for individuals who need assistance and might’t afford it, and the place the road between her circumstances with stalkerware and cybersecurity abuse bridge her pure expertise as an OSINT investigator. She additionally talks about sustaining stability in a rapid-paced and in addition emotionally straining profession.

Oh, and if she wasn’t working in cyber she’d concentrate on equine remedy for folks with post-traumatic stress dysfunction (PTSD) and complex-PTSD (C-PTSD). That tracks.

Q. You’ve gotten an especially dynamic profile on-line. In case you had been to sum up all of you into a fast description, what would you say?

A. Tiny terrifying blonde with all the information. That’s the outline a pal gave me, I ran with it.

Q. You’re very vocal about your work in privateness consulting and digital security coaching, and also you cowl a major quantity of use circumstances. Which areas of privateness and security fulfill you most?

A. I discover circumstances of stalkerware and cyberstalking a few of the most attention-grabbing, as a result of there’s so many various methods I’ve seen it happen. The patterns are comparable, however function or causes for doing so fluctuate, relying on the person, nation state, or case.Commercial. Scroll to proceed studying.

Q. Are you able to present an instance of a state of affairs the place your work was pivotal in somebody’s security – provided that you are able to do so with out risking anybody’s anonymity?

A. Any of my cyberstalking or in-person stalking circumstances are a few of the most unhinged issues you’ll be able to think about. I’m very not often shocked by one thing, however discovering out the shopper I labored with was being focused by a number of people with various levels of obsession was positively new for me.

A very powerful factor with this explicit shopper was to make sure they had been secure. We had to have a look at their complete life, and uprooted a variety of it to get them to security. I do my finest to attenuate hurt to their life/livelihood, however typically circumstances require main modifications. The state of affairs resolved as finest it might. All that to say, every state of affairs is exclusive and lots of don’t require a whole transfer or life change, however you assess every one individually.

Q. What’s crucial message you’re hoping to convey by way of your on-line presence or work?

A. Maintain it easy. When the whole lot difficult is failing, return to fundamentals, and train them again and again, till the viewers strikes ahead. I’ve spent a decade doing this and nonetheless share the identical primary rules and security measures. Expertise modifications, so do folks, however typically the issues they want probably the most are to to be seen, heard and understood. This job is a variety of emotional assist and dealing by way of the issues the place the shopper will get hung up making a call, or transferring ahead.

Q. How did you get began on this, anyway? Inform us a bit about your profession.

A. It began once I was 16 and the supervisor of the bagel store I labored at instructed me I didn’t have the talents to promote bagels.

When somebody ready of authority tells you that you just aren’t adequate, or can’t do one thing, it’ll go one in every of two methods, it’ll crush you or encourage you. I can’t say I used to be impressed then, nevertheless it did set me on a path to get me the place I’m now. I used to be instructed many occasions by a boss I used to be an excessive amount of, too loud, too bold.

I landed in OSINT because of a layoff and a romance rip-off. A member of the family was scammed out of some huge cash and reached out to me for assist. I knew instantly what it was, however typically the particular person in the course of the rip-off doesn’t see it.

I took all the talents I discovered in my profession and commenced digging into OSINT. Seems my background and curiosity paired nicely to do investigations.

Q. How do you keep motivated and productive throughout difficult occasions? I think about the circumstances you’re employed on have to be emotionally grueling at occasions.

A. Some days I don’t keep motivated or productive and stare at a clean display screen. I’ve discovered quite a bit about working a enterprise and burnout the onerous method. I’d say crucial classes discovered are to have a great emotional assist system and set agency boundaries round your time, circumstances, and emotional bandwidth to assist others.

The quantity of vitality and time dedicated to circumstances has to have a stability. I say no to extra circumstances than I say sure, just because I don’t have the sources or time to do them. It’s why I’ve pivoted to instructing lessons, group teaching, and offering neighborhood workshops and never just one:1 companies.

Spreading out my workload and taking much less circumstances has helped immensely to guard my very own peace and psychological well being. I couldn’t do that work in any respect if I wasn’t mentally, bodily and emotionally succesful in my very own life. What’s that saying of not having the ability to pour from an empty cup, it’s important to fill yours first, earlier than you’ll be able to assist others.

Q. Along with your paid consulting I do know you do a variety of assist to assist NGOs or just folks and households in want. Will you please describe a few of that?

A. Because the world modifications, it’s important to adapt and shift your ways, supply, and capabilities to assist extra folks. Whereas folks wish to tussle over politics, I remind them, the whole lot is political. It’s no completely different in neighborhood care, mutual support, or non-profit work. If methods can’t or received’t assist communities, you’ve got a duty to assist construct parallel methods of care that may. This implies not leaving anybody behind, not sacrificing one group over one other. Everybody deserves dignity, meals, shelter, healthcare, and it’s why I assist fundraise and companion with organizations which can be already doing the work on points that matter to me.

Q. How do you see your function or function evolving sooner or later?

A. I’ve been organizing since highschool. I exploit these organizing abilities to pair individuals who can present mutual support, info share on-line and offline communities & present digital security coaching to orgs to allow them to assist extra folks.

I see the organizing evolving into extra grants to do extra work within the native communities. As you recognize, it’s particularly tough to get authorities grants now, funding has slowed or been pulled from many neighborhood organizations. This funding hole signifies that it’s important to get artistic with fundraising and discovering personal grants. My focus is de facto that communities can construct extra sustainable funding efforts so organizations can do their work.

It’s actually going to take much more of us to construct higher methods for everybody, and that features the federal government. I’m impressed by all of the folks working for native college boards, library boards, metropolis and city councils and native workplaces. It’s so essential you’ve got assist and partnership with authorities entities and neighborhood organizations for these efforts to construct sustainable neighborhood methods of care.

Q. When is the time in somebody’s life when they need to decide up the “Bat Telephone” and have interaction somebody such as you?

A. It might be nice if folks reached out to me earlier than they had been in a disaster or an pressing state of affairs, however oftentimes that doesn’t occur, or isn’t potential. I additionally acknowledge irrespective of how a lot I discuss privateness, security, and the steps folks can take, it’s inconvenient and never simple. The steps are easy, typically the implementation isn’t.

My trade and what I do is fairly distinctive as nicely, and visibility to the individuals who may want my assistance is difficult typically. Individuals don’t wish to put belief in somebody they’ve by no means met, labored with, don’t acknowledge or haven’t engaged with earlier than. It’s why a variety of the time, my circumstances or consultations are on a referral foundation.

I’m engaged on methods to increase my choices to assist extra folks, on a bigger scale, as a result of whereas I like the 1:1 work, extra folks need assistance now. Comply with me on my socials and bookmark my web site to get notified when all of the issues are reside.

Q. How can households create an emergency preparedness plan with cyber security in thoughts?

A. For cyber security planning, there are three issues I like to recommend each household have, a communications plan, an emergency escape plan (exits, routes, maps, roads & vacation spot in my thoughts) in case of pure catastrophe, and household code/security phrase if somebody is beneath duress, kidnapped, or in bother.

These plans can fluctuate within the stage of complexity. In case you’re already doing emergency preparedness, the objects you’ll need in your go-bag, embrace radios or walkie talkies, chargers & cables, battery packs or photo voltaic charger, emergency contact listing, essential paperwork (onerous & delicate copies), medical recordsdata & info for household/children/pets, a option to entry your passwords/methods, backup USB/microSD together with your essential paperwork, comms, protocols, and so forth.

There’s much more element I’d put into an emergency cyber security plan, however off the highest of my head these are the issues that I’d need. I say all this figuring out folks will add a dozen issues to that listing or take difficulty with what I prioritize. This listing is generic in nature, and will not replicate the wants, entry to sources, and state of affairs of each particular person or group.

Q. How can know-how be used to enhance home abuse safety and safety?

A. Give sources to underserved communities and weak teams. Not everybody has the identical entry to know-how, web, or the newest telephones, computer systems and methods. A part of serving to defend folks is making certain they’ve the instruments, information, and coaching to assist themselves and one another, and entry to these sources.

Sadly, know-how isn’t going to resolve the underlying issues related to home abuse, that could be a human drawback. Tech-enabled abuse is just an extension of the cycle of abuse skilled in intimate companion relationships or circumstances of home violence in different relationships.

What you are able to do with know-how is skill-share, prepare sufferer advocates, join folks to 1 one other who’ve sources, construct communities, set up safe communication networks offline, and manage regionally. Expertise performs an important function in all these methods.

Some of the efficient methods to assist folks in your personal neighborhood is to do in-person security coaching. Collect people regionally, and stroll by way of the fundamentals, collectively. Individuals postpone doing the safety/security steps with their units, however will do it with others. It’s neighborhood work, relationship constructing, and ability sharing all rolled into one occasion.

Q. What preventive measures could be taken to guard weak members of the family?

A. Communication is vital when speaking to chosen household/pals/children about potential threats and danger. Set up the principle issues for your loved ones unit with a few of these questions:

What are you making an attempt to guard?

Who or what are the threats?

Who has entry?

How may these threats influence your loved ones’s privateness or safety?

How probably is it that it’s going to occur?

How would they do it?

Answering these questions may help decide your personal menace mannequin and what a security plan seems to be like for your loved ones. There are not any proper or fallacious solutions, merely dedication of what you are attempting to guard, and who you’re defending it from. Understanding the implications should you’re focused, who may goal you, helps put together you for the way to reply in a disaster.

Q. How essential is safety neighborhood consciousness and involvement in home security?

A. One of many rules I train is menace modeling, whether or not you’re the particular person within the state of affairs, adjoining to it, or just have an curiosity in serving to. A part of menace modeling is figuring out how somebody is at-risk, the extent of monitoring/surveillance, the menace stage, what may occur, what’s prone to occur, what has occurred. Every state of affairs is exclusive, and requires a barely completely different response or plan.

It’s a must to consider the household/pals, their assist system, their capability, their funds, all issues required to maneuver somebody out of a harmful state of affairs. Moreover, does their partner/companion/stalker monitor their units and the way that impacts your potential to assist them.

The broader safety neighborhood understands menace modeling on the subject of cybersecurity, you’ll be able to apply those self same concepts to home abuse & stalking conditions. You’re doing an evaluation or audit of the instruments, menace actors, exercise, anticipated or anticipated outcomes.

Clearly I’m simplifying the issue fixing, however there are tangible and tactical methods to assist folks, and that begins with menace modeling, hurt discount, and assembly them the place they’re emotionally, bodily and mentally.

Q. In case you had one want for assist from the safety neighborhood to assist aiding in safety of probably the most weak folks, what would it not be?

A. Take heed to marginalized and weak folks once they let you know what they’ve skilled, the way to repair it, particularly on the subject of hurt discount. The concept we should always transfer quick and break issues means it comes at the price of different human beings, their dignity, their decisions, their rights, their autonomy, their humanity. The whole lot has a human price, particularly the place know-how is concerned.

Something created can be utilized for good or it may be abused. Our neighborhood has an obligation to make sure tech is created with ethics, integrity and guardrails in place to attenuate the hurt.

There’s so many alternatives to assist others with the talents folks within the safety neighborhood have. Educate somebody what you recognize, skill-share, present scholarships and mutual support, construct neighborhood.

All of us matter, or none of us do.

Security Week News Tags:Cybersecurity, Investigator, OSINT, Personal, Rising, Tides, Work

Post navigation

Previous Post: Sleeping Bouncer Vulnerability Impacts Motherboards from Gigabyte, MSI, ASRock and ASUS
Next Post: PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation

Related Posts

Cost of Data Breach in US Rises to $10.22 Million, Says Latest IBM Report Security Week News
Paragon ‘Graphite’ Spyware Linked to Zero-Click Hacks on Newest iPhones Security Week News
Firefox 145 and Chrome 142 Patch High-Severity Flaws in Latest Releases Security Week News
Israeli Cyber Fund Glilot Capital Raises $500 Million Security Week News
Auto Parts Giant LKQ Confirms Oracle EBS Breach Security Week News
ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens
  • BlindEagle Hackers Attacking Government Agencies with Powershell Scripts
  • PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation
  • Rising Tides: When Cybersecurity Becomes Personal – Inside the Work of an OSINT Investigator
  • Sleeping Bouncer Vulnerability Impacts Motherboards from Gigabyte, MSI, ASRock and ASUS

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens
  • BlindEagle Hackers Attacking Government Agencies with Powershell Scripts
  • PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation
  • Rising Tides: When Cybersecurity Becomes Personal – Inside the Work of an OSINT Investigator
  • Sleeping Bouncer Vulnerability Impacts Motherboards from Gigabyte, MSI, ASRock and ASUS

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark