Smart Security: Fighting Financial Fraud with Open Source Intelligence
Financial fraud is rising, with consumers losing over $10 billion in 2023. OSINT solutions help organizations detect threats, analyze patterns, and identify attackers, offering a proactive defense against emerging fraud trends.
How Failing Faster Helps Catch Criminals: Exploring OSINT for Law Enforcement
In law enforcement, the ability to adapt quickly and learn from mistakes is crucial. This concept, often called “failing faster,” is not about accepting failure but about using it as […]
Where does operational security begin?
Over the course of the last few months, we’ve blogged about finding bad guys by guessing emails, mapping friends, understanding emotional behavior, and leveraging laziness and poor password habits. All […]
Becoming Dark Web Rambo
There’s a lot of mystery that surrounds the dark web–surprisingly, even in the information security space. I’ve met a huge swath of capable engineers and developers who can explain the […]
Cutting your teeth on ShadowDragon’s advanced CTF
We’ve talked in recent weeks about the importance of training and the methodology behind it. Much of the OSINT work we do is focused on the social aspects and footprint […]
Fishing with a Subaru
There comes a time in some OSINT investigations where we have accurately identified our target’s profiles, lifestyle, and communication platforms, but we still aren’t quite to the point of pinpointing […]
Background Checks & Due Diligence
Many years ago, when I was in college, I had a job at a large retailer. It involved all of the normal retail-y things: stocking, checking, unloading trucks, helping customers, […]
Unmasking a carder with OSINT
Today, we will be exploring the world of carding a bit and following the path of a kid on his way to becoming a full-fledged carder. I spent about an […]
Iran and OSINT Hunting for Fun & Profit.
Today, I’m going to go on a very basic hunting adventure. Every so often, I do stuff like this for “fun”. There’s no deep takeaway here –– just some basic […]
What’s in an email address?
A few weeks ago we went over an interesting way to pivot from breached data passwords to a target by virtue of the lazy way many people reuse the same […]
Into the Breach
We’ve all heard the advice a million times, “Don’t use the same password on different websites.” Unfortunately, (or fortunately, depending on our motivations) many users make this exact mistake. In […]