Blog

A Tragic Wake-Up Call for Businesses

By David Cook | December 9, 2024

Security is critical for businesses as executives face rising cyber and physical threats. Learn how robust measures, OSINT tools, and proactive strategies can mitigate risks, protect sensitive data, and ensure safety in a volatile landscape.

Featured MalNet Maltego Transforms with Proofpoint Data

MalNet Maltego Transforms with ProofPoint Data

By Daniel Clemens / May 10, 2016

MalNet accesses the Proofpoint ET Intelligence™ comprehensive database that contains current and historical malicious IP addresses and domains. In this blog post we share screenshots of Maltego 4 and a […]

Featured ShadowDragon Screenshots with Maltego M4 Release

ShadowDragon Screenshots with Maltego M4 Release

By Daniel Clemens / May 3, 2016

Below are a few screenshots of our flagship product SocialNet, integrated with the new Maltego M4 release. If you haven’t seen the video from Maltego, please go check it out […]

Featured OSINT Process SocialNet and Breaking Bad Case Files v2

OSINT Process, SocialNet and Breaking Bad Case Files

By Daniel Clemens / May 2, 2016

Our first artifact, begins with the email address rumored to be used by Jesse Pinkman, pivoting on one to one correlations between his favorite social media provider and others, we […]

Featured Tracking GozNym Campaigns with MalNet

Tracking GozNym Campaigns with MalNet

By Daniel Clemens / April 22, 2016

In 2007, Don Jackson while at SecureWorks had written about the Gozi Trojan, sharing details on the modularization and monetization strategies utilized by this family of malware. More recently, (04/04/16) […]

Featured Demonstration Tracking Malware Campaigns and Domains Using MalNet v2

Demonstration: Tracking Malware Campaigns and Domains Using MalNet

By Daniel Clemens / April 15, 2016

MalNet brings together the industry’s most up to date and extensive threat information from Proofpoint with Maltego link analysis capabilities from ShadowDragon. MalNet enables threat analysts and researchers to identify […]

The Cyber Crime Chronicles: Your Friendly Neighborhood Hacker

By Daniel Clemens / November 28, 2015

Just a couple of weeks ago the world was rocked by the news that CIA Director John Brennan’s AOL email account (apparently that’s still a thing) had been hacked. Immediately, […]

The Cybercrime Chronicles: Understanding The Actors

By Daniel Clemens / November 27, 2015

Cyber Threat Types and Motivations There are several types of cyberwars going on at any given time. There are plain old hacking attacks, criminally-targeted attacks, nation state cyberwar, and hacktivist […]

Why OSINT?

By Daniel Clemens / November 26, 2015

Ordinary Info to You; Opportunity to a Cyber Criminal As its name suggests, OSINT is intelligence gleaned from publicly available sources such as social media, company websites, news sites, even […]

Scroll to Top