Why Natural Language Processing Is Crucial for Open-Source Intelligence Analysts

Why Natural Language Processing Is Crucial for Open-Source Intelligence Analysts

As the volume of data continues to grow, it's important to have tools that can help derive meaningful insights from this data. Natural language processing (NLP) is one such tool that's becoming ...
Basic Persistent Threat (Monitoring)

OSINT APIs for Mere Mortals

When it comes to OSINT research, APIs can be mightily helpful. Here are three ways to create custom capabilities using APIs without much programming experience. The post OSINT APIs for Mere Mortals ...
Grep Is Dead And Ripgrep Is Here To Replace It

OSINT Tools Library

A constantly updated list of OSINT tools and techniques from across the open-source intelligence community, curated by Flashpoint The post OSINT Tools Library appeared first on Flashpoint ...

The Benefits of Sock Puppets in Open-Source Intelligence (OSINT)

A Sock Puppet is fake persona, or an alternative online identity used to collect and investigate open-source information on a target. The post The Benefits of Sock Puppets in Open-Source Intelligence (OSINT) ...
What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat Landscape

What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat Landscape

Open-source intelligence, or OSINT, refers to the process of gathering information from public, legal data sources to serve a specific function. Some open sources might include social media, blogs, news, and the ...
What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat Landscape

What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat Landscape

Open-source intelligence, or OSINT, refers to the process of gathering information from public, legal data sources to serve a specific function. Some open sources might include social media, blogs, news, and the ...
What is Open Source Intelligence (OSINT)? The OSINT Tools, Techniques and Framework Explained

What is Open-Source Intelligence (OSINT)?  

What is OSINT? In “Breaking the Kill Chain: A Defensive Approach,” we took a look at the seven steps an attacker generally goes through in… The post What is Open-Source Intelligence (OSINT)? ...
Home is where the hack is

Home Is Where the Hack Is

Virtual home tours and posting pictures of your house put you at risk from bad actors. Learn more in our blog, "Home Is Where the Hack Is." The post Home Is Where ...
Social-Engineer Newsletter Vol 09 – Issue 116

Social-Engineer Newsletter Vol 09 – Issue 116

In This Issue: "A Beginner's Insight Into Vishing." How can someone become a successful visher? Social-Engineer recently hired two team members who have been accumulating tremendous success. We interviewed them and we ...
Assess Your Risks

Assess Your Risks

We talk a lot about phishing, vishing, smishing, and impersonation here at SECOM, and there is a good reason for that. Those are the primary services we provide as a company for ...

Secure Guardrails