Technical Tips & Training

Practical and How-to Guides

Illuminating Context with Timeline Analysis

By Amy Mortlock / July 29, 2024

In our training courses, we push ideas and investigative methodology more than we push our tools. Tools will change, but proper investigative methods will not change. Asking the right questions […]

Stopping an Active Shooter with OSINT: How Publicly Available Information Becomes Actionable Intelligence

By Amy Mortlock / December 6, 2023

[First printed in the December 2023 edition of Security Technology] 

OSINT Investigator Training 101: Building a Foundation for Success

By Olivia Gransback / June 20, 2023

Today’s investigators and analysts using online sources to investigate cases are often so focused on where to click, that they don’t even realize what their tools are doing in the […]

APT33 CircleOfTruth

Additional Insights into Iranian Cyber Espionage | APT33

By Amy Mortlock / April 24, 2020

Earlier this week FireEye/Mandiant had released a blog entitled “Insights into Iranian Cyber Espionage”detailing the targets within the Aerospace and Energy sectors being targeted. To compliment their post we wanted […]

unmasking carder07

Unmasking a carder with OSINT

By Sandy M / February 19, 2020

Today, we will be exploring the world of carding a bit and following the path of a kid on his way to becoming a full-fledged carder.  I spent about an […]

Charming Kitten Cyberespionage

Buckle up for Insight into Charming Kitten Cyberespionage Attacks

By Amy Mortlock / January 26, 2018

The horrors of cybercrime can make even the savviest tech person shudder. Much like an accident on the side of the road, however, we just can’t help rubbernecking. That’s why […]

Scroll to Top