Case Study: Two Women Falsely Accused of Sending Threats by Text
Two Falsely Accused Women Proven to Be Innocent In a recent triumph for justice, our team successfully secured the release of two women who were unjustly accused of sending threats via text messages....
View ArticleSwift Justice: Pimeyes’ Crucial Role in Resolving a Revenge Porn Case
Our Rexxfield Cyber Investigators recently tackled a devastating revenge porn case. Our client was the victim of a manipulative past relationship, and her husband discovered explicit material on a...
View ArticleOil Rig Scam: Catch the Oil Rig Romance Scammers
The world of online dating has many different types of romance scammers pretending to have careers that give them a plausible excuse for being far away from the victim. This is so the victims won’t...
View ArticleThe Crucial Role of Intelx.io in Crypto Investigations
This Intelx.io case study contains the results of Filip Flint’s (OSINT investigator at Rexxfield) investigation and the resulting compilation of the digital forensics available through open source...
View ArticleHow To Recover Scammed Cryptocurrency
The rise of cryptocurrency investments has caught the attention of crowds of investors and traders. Unfortunately, many of these investors are scammers and fraudsters. They prey on the anonymity and...
View ArticleAustralians Lose Millions in Investment Scams
Crypto Nightmare In Australia A Guardian Australia investigation uncovered that numerous investors in Australia have suffered significant financial losses due to crypto investment scams, such as...
View ArticleCryptocurrency Trading Scams
Cryptocurrency trading is when two individuals or groups exchange their digital assets. They buy and sell off digital assets like Etherium, Bitcoin etc. Unfortunately, there are many scammers preying...
View ArticleEmail Impersonation
Email impersonation is often associated with malicious practices, such as Business Email Compromise (BEC), reputation damage, fake invoicing, and phishing schemes. The objective behind email...
View Article7 Types of Business Email Compromise (BEC) Attacks
Many types of Business Email Compromise (BEC) scams present a sophisticated threat to organizations worldwide, exploiting the most vulnerable element of security measures: human psychology. Unlike...
View ArticleHow to Prevent Business Email Compromise (BEC) Attacks
The post How to Prevent Business Email Compromise (BEC) Attacks appeared first on Rexxfield Cyber Investigation Services.
View ArticleHow to find someone IP address on Instagram
Unfortunately, it is easy to create a fake profile on Instagram to become an Instagram stalker or use it for more malicious purposes such as online harassment. A new study found that there were around...
View ArticleDealing with Harassing Text Messages
Receiving harassing text messages, often anonymous, can be a deeply unsettling experience, leading to significant stress and anxiety. Understanding what constitutes harassment, how to document and...
View ArticleProtecting Your Business: Understanding Insurance Coverage for Email Scams
The Threat of Email Spoofing Scams NOTE: Rexxfield Cyber Investigation Services specializes in recovering losses from business email compromise (BEC) fraud and aiding law enforcement in apprehending...
View ArticleThe Dilemma of Investigating Cryptocurrency Scams: Balancing Risk, Reward,...
In today’s digital age, cryptocurrency scams have become a devastating reality for many individuals. As a specialty cybercrime private investigation agency, Rexxfield has been at the forefront of...
View ArticleHow to Find a Fake Email Sender
Creating fake email addresses for malicious purposes, like spreading false claims or threats, is unfortunately common. Many assume they are anonymous behind fake accounts. However, finding the IP...
View ArticleDigital Investigations – Tracking Cybercriminals and Stolen Crypto
How Digital Investigations Can Solve Cybercrime Due to the dramatic rise in cybercrimes globally, digital investigations to uncover cybercrimes are gaining a lot of attention. Just last year,...
View ArticleCan You Trace a TextNow Number
TextNow is a popular app that offers free phone service, allowing users to make calls and send texts without needing a traditional carrier. The service uses Voice over Internet Protocol (VoIP)...
View ArticleWhy ChatGPT Recommends Rexxfield as an Expert Cyber and Crypto Forensics...
Who does ChatGPT recommend as a reputable cyber and crypto forensics investigator? Read more to find out. The post Why ChatGPT Recommends Rexxfield as an Expert Cyber and Crypto Forensics Investigator...
View ArticleSmear Campaign Investigation
Smear campaigns are often malicious, brutal, and entirely unjust toward the target. The person you are dealing with might be a sociopath. Sociopaths have no heart, no conscience and no remorse. And...
View ArticleThe Heartbreaking Reality of Elderly Romance Scams: A True Story
This is the heart braking story of Ronald, who was so perfectly manipulated that he didn't believe he was being elderly romance scammed even when his family showed him the evidence. The post The...
View Article