Blog

Threat intelligence platform concept showing digital alerts for cloud security, identity correlation, phishing, and external attack surface monitoring

21 Best Threat Intelligence Platforms (2025 Guide)

By Nico Dekens | September 5, 2025

Threat intelligence has become a critical function for security operations. With the rapid shift in attack tactics and a proliferation of threat signals on the surface, deep, and dark web, security teams need tools that help them filter out the noise, surface the real risks, and respond in an informed and targeted way. Threat Intelligence […]

Link analysis with OSINT, breach data, and intelligence in one comprehensive investigations toolkit

By Amy Mortlock / April 14, 2024

In a landscape where information is power, the ability to gather, analyze, and act upon open-source intelligence (OSINT) is paramount for organizations across all sectors. Recognizing this need, we have […]

ShadowDragon Wins 2024 Frost & Sullivan Best Practices Award for Excellence in Global Open-Source Intelligence

By Amy Mortlock / March 26, 2024

As a pioneer of open-source intelligence (OSINT) investigation tools dating back to 2009, ShadowDragon is honored by a recent award recognizing us as a transparent and reliable vendor that supports […]

ShadowDragon introduces Horizon™ Identity

ShadowDragon Enters Strategic Partnership with Collaboraite and Vestigo to Build Trust in OSINT

By Amy Mortlock / March 26, 2024

Global leaders in open-source intelligence and operational security partner to foster trust in data and technology HOOVER, ALABAMA – March 4, 2024 – ShadowDragon™, a provider of ethical open-source intelligence […]

The (Un)hidden Threat: Child Grooming on Social Media

By Amy Mortlock / March 25, 2024

Technative generations do not know life without the internet and even my one year old niece knows how to navigate a device. Whilst screen time can be good for learning […]

Stopping an Active Shooter with OSINT: How Publicly Available Information Becomes Actionable Intelligence

By Amy Mortlock / December 6, 2023

[First printed in the December 2023 edition of Security Technology]  You Might Also Enjoy… OSINT Investigator Training 101: Building a Foundation for Success Additional Insights into Iranian Cyber Espionage | […]

The Significance of AI and ML in OSINT to Human Investigators

By Nico Dekens / November 29, 2023

Artificial Intelligence (AI) and Machine Learning (ML) excel in processing vast amounts of data swiftly. During open-source intelligence (OSINT) investigations, you almost always gather information in overwhelming volumes. AI algorithms […]

Unleashing the Power of Social Media Analysis Tools in Investigations

By Sandy M / November 6, 2023

[Originally on Kaseware.com] In this fast-paced digital age, utilizing data from social media platforms has become essential for uncovering crucial information in investigations. Digital footprints left by individuals and entities […]

ShadowDragon Commentary: How to Scale Investigations Using Open-Source Intelligence

By Amy Mortlock / October 13, 2023

Recently, ShadowDragon CEO, dclemens, contributed an article to Security Management Magazine for their October 2023 organized crime issue. In the piece, he offers firsthand insights into how investigators can improve […]

How OSINT Differs from Traditional Cyber Threat Intelligence?

By Sandy M / July 25, 2023

While there may be some minor overlap, there are major distinctions between traditional Cyber Threat Intelligence (CTI) and the more advanced Open Source Intelligence (OSINT). The efficiency, effectiveness, and approach […]

OSINT Investigator Training 101: Building a Foundation for Success

By Olivia Gransback / June 20, 2023

Today’s investigators and analysts using online sources to investigate cases are often so focused on where to click, that they don’t even realize what their tools are doing in the […]

OSINT Methods To Investigate Suspected AI Generated Content

By Nico Dekens / May 19, 2023

The proliferation of content generated by artificial intelligence (AI) is just beginning. Recent years haveseen online accounts, run by bots, create fake news articles, divisive social media posts, fraudulentproduct reviews, […]

ShadowDragon Commentary: OSINT vs Classified Secrets

By Amy Mortlock / April 11, 2023

In a recent opinion piece for The Cipher Brief, Gregory Sims, former CIA Clandestine Service for over thirty years, including multiple field tours as Chief and Deputy Chief of CIA […]

Sportradar Case Study: Deep Background Checks, Organizational Integrity, and Fraud Investigations

By Sandy M / March 20, 2023

Investigating integrity and criminality in commerce is a daunting task that requires access to vast amounts of information and complex organizational analysis. The scale rises considerably when investigations are international […]

OSINT Observations from ShadowDragon Experts: Moldova

By Nico Dekens / March 15, 2023

NicoDekens, Director of Intelligence and Innovation Collection, ShadowDragon You Might Also Enjoy… The Significance of AI and ML in OSINT to Human Investigators ShadowDragon Commentary: OSINT vs Classified Secrets Diving […]

Diving Deeper: What Past Attackers Tell Us About Bryan Kohberger

By Amy Mortlock / January 11, 2023

After six weeks of investigation, on Dec. 30, 2022 authorities arrested Bryan Kohberger as the key suspect in the quadruple murders of four University of Idaho students. This case (which […]

APT33 CircleOfTruth

Additional Insights into Iranian Cyber Espionage | APT33

By Amy Mortlock / April 24, 2020

Earlier this week FireEye/Mandiant had released a blog entitled “Insights into Iranian Cyber Espionage”detailing the targets within the Aerospace and Energy sectors being targeted. To compliment their post we wanted […]

background checks

Background Checks & Due Diligence

By Sandy M / March 11, 2020

Many years ago, when I was in college, I had a job at a large retailer.  It involved all of the normal retail-y things: stocking, checking, unloading trucks, helping customers, […]

heatmaps

Heat Maps: Form Over Function

By Amy Mortlock / March 6, 2020

Since movies took over displaying intelligence, we have seen crazy maps and charts attempt to display intelligence and seem “futuristic.” Here, we can see an example of a heat map:  […]

unmasking carder07

Unmasking a carder with OSINT

By Sandy M / February 19, 2020

Today, we will be exploring the world of carding a bit and following the path of a kid on his way to becoming a full-fledged carder.  I spent about an […]

OSINT for Fun and Profit02

Iran and OSINT Hunting for Fun & Profit.

By Sandy M / January 15, 2020

Today, I’m going to go on a very basic hunting adventure. Every so often, I do stuff like this for “fun”.  There’s no deep takeaway here –– just some basic […]

screenshot

Job Post: Training and Curriculum Specialist

By Amy Mortlock / September 3, 2019

ShadowDragon is a privately-held software development company seeking a full-time training and curriculum specialist. ShadowDragon provides cyber security software tools to commercial entities, government and law enforcement agencies around the […]

1 1

Timeline Analysis | Epstein Death Reported on 4Chan Before Announced

By Amy Mortlock / August 10, 2019

In my last entitled Illuminating Context with Timeline Analysis, I gave a rough sketch of the basics. In this post I will share a few specifics. The primary point to […]

BostonBomber

Understanding Link Analysis and Using it in Investigations

By Amy Mortlock / June 21, 2018

I started using link analysis for investigations somewhere around 2009/2010 when we were developing the first version of SocialNet.  A longtime friend, Roelof from Paterva, shared his vision for a […]

Charming Kitten Cyberespionage

Buckle up for Insight into Charming Kitten Cyberespionage Attacks

By Amy Mortlock / January 26, 2018

The horrors of cybercrime can make even the savviest tech person shudder. Much like an accident on the side of the road, however, we just can’t help rubbernecking. That’s why […]

Scroll to Top