Social Networks: Friends of Friends
Today we are going to look at how we can build a network from a single starting entity and use that network to identify the actors in the network that […]
OSINT Challenges & Opportunities, Methodology on starting your Hunt.
Every investigation is different, but what never changes is how you have to treat an investigation much like the challenge of building something with a bucket of Legos. With each […]
Link Analysis Presentation No Nos and How Long Should I Deep Dive?
In “Understanding Link Analysis and Using it Investigations,” I detailed how to get started and some fundamentals on link analysis. What I didn’t cover was how long you should be involved […]
Buckle up for Insight into Charming Kitten Cyberespionage Attacks
The horrors of cybercrime can make even the savviest tech person shudder. Much like an accident on the side of the road, however, we just can’t help rubbernecking. That’s why […]
OSINT Process, SocialNet and Breaking Bad Case Files
Our first artifact, begins with the email address rumored to be used by Jesse Pinkman, pivoting on one to one correlations between his favorite social media provider and others, we […]
Tracking GozNym Campaigns with MalNet
In 2007, Don Jackson while at SecureWorks had written about the Gozi Trojan, sharing details on the modularization and monetization strategies utilized by this family of malware. More recently, (04/04/16) […]
- « Previous
- 1
- 2
- 3