OSINT

Social Media: How to Keep Yourself Safe
Social-Engineer | | Cybersecurity, Information Security, Newsletter, OSINT, security professionals, social engineering, social media
Human beings are social animals. We like to stay connected with friends, family and even workmates via social media. It […] ...

What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat Landscape
Flashpoint Team | | cyber threat intelligence, intelligence, Open Source Intelligence, OSINT, Threat Intelligence
Open-source intelligence, or OSINT, refers to the process of gathering information from public, legal data sources to serve a specific function. Some open sources might include social media, blogs, news, and the ...

What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat Landscape
Flashpoint Team | | cyber threat intelligence, intelligence, Open Source Intelligence, OSINT, Threat Intelligence
Open-source intelligence, or OSINT, refers to the process of gathering information from public, legal data sources to serve a specific function. Some open sources might include social media, blogs, news, and the ...

My First Three Years in the Social Engineering World
Social-Engineer | | Cybersecurity, Infosecurity, Newsletter, OSINT, Phishing, social engineering, vishing
As I enter my fourth year in the social engineering world, I have been reflecting on what I’ve learned so […] ...
OSINT: The privacy risks of sharing too much information
In the past, I’ve written about digital privacy and how much data we leak through our day to day interactions. I think this is an important topic to consider and really focus ...

NetworkMiner 2.7.3 Released
Erik Hjelmvik | | 6ece5ece4192683d2d84e25b0ba7e04f9cb7eb7c, Abuse.ch, BitRAT, carve, Cobalt Strike, CobaltStrike, DBSBL, DNSBL, Emotet, FileScan.IO, JA3, JoeSandbox, memdump, meterpreter, NetworkMiner, NetworkMinerCLI, OSINT, PIPI, Protocol Detection, Qbot, RFC8422, TrickBot, unfurl, X.509
NetworkMiner now extracts meterpreter payloads from reverse shells and performs offline lookups of JA3 hashes and TLS certificates. Our commercial tool, NetworkMiner Professional, additionally comes with a packet carver that extracts network ...

Who is Dancho Danchev?
Dancho Danchev | | cybercrime, Information Security, Malicious Software, OSINT, security, Technical Collection
Folks,Do you remember who I am? Do you need to do a historical check on the security industry including me as an individual including my personal blog and all the socially-oriented work ...

Exposing a Currently Active CoolWebSearch Rogue and Malicious Domains Portfolio – Part Three – An OSINT Analysis
Dear blog readers,I've decided to share with everyone yet another batch of currently active rogue and malicious CoolWebSearch domains with the idea to assist everyone in their cyber attack attribution campaigns including ...

Profiling a Currently Active Personal Email Address Portfolio of Members of Iran’s Ashiyane Digital Security Team – An OSINT Analysis
Dancho Danchev | | Ashiyane Digital Security Team, Behrooz Kamalian, cybercrime, Iran, OSINT, security, Technical Collection
Dear blog readers,I've decided to share with everyone a currently active personal email portfolio belonging to members of Iran's Ashiyane Digital Security Team with the idea to assist everyone in their cyber ...

Exposing a Currently Active CoolWebSearch Rogue and Malicious Domains Portfolio – Part Two – An OSINT Analysis
Dear blog readers,I've decided to share with everyone yet another batch of currently active rogue and malicious CoolWebSearch domains with the idea to assist everyone in their cyber attack attribution campaigns including ...