FAQ

Why don’t you have a contact form or email address on this site?

Due to the nature of this site, we’ve removed potential risks associated with forms and emails. These can be exploited by threat actors, so we’ve minimised those entry points to enhance security. The best way to contact us is via our X (formerly Twitter) page.

How do you research these threats?

We use a variety of reputable sources, from well-known cybersecurity news websites and advisory services to threat databases that track malware and ransomware activity. Additionally, we utilise tools to validate and investigate new threats. Our advisories are formatted to ensure they’re consistent, simplified, and focused on providing clear, actionable information.

Do you use AI in your research?

Yes, we do. To stay ahead of threat actors, AI is essential. However, we always ensure that AI-generated content is verified by humans before publishing. AI won’t take your job—people who know how to use AI effectively might!

How often do you research new threats?

We research new threats twice a day, once in the morning and again in the evening. Additionally, we use real-time alerting systems to notify us of any notable active threats, allowing us to respond as quickly as possible.

Why don’t you offer a membership or newsletter service?

We previously offered a free membership and email newsletter, but we’ve discontinued these to prioritise both privacy and security. While newsletters were a convenient way to engage with our readers, we found that removing the need to collect personal data, such as email addresses, allowed us to focus on delivering high-quality advisories without the added risk of storing sensitive information. You can still stay updated with our content through our RSS feed or by following us on X, ensuring you never miss important updates.

Do you provide cybersecurity consultancy services?

At this stage, no. The Cybersec Sentinel website was created to share the insights we’ve already been working on. While we’re happy to offer advice via X, we recommend reaching out to your country’s government cybersecurity agency or major cybersecurity providers like Microsoft’s Security Response Center, Trend Micro, or Fortinet for professional services.

Would you work with a security provider?

While we’re not actively seeking partnerships, we’re always open to meaningful discussions. If the right opportunity arises where we can contribute proactively to a worthwhile initiative, we’d certainly consider it. Feel free to reach out to us via X (formerly Twitter). Once we validate that the request is genuine and aligned with our goals, we’ll provide more formal contact details to continue the conversation. Using X helps us maintain an air gap against bots, spam, and phishing attempts, ensuring that only legitimate requests get through.