Corporate security compliance is a critical part of operating in today’s regulatory environment. Whether you’re handling healthcare records, financial data, or cloud infrastructure for government clients, regulators expect proof that your security controls are working and that you understand the risks tied to your systems and data. This guide breaks down the key regulations businesses […]
Stopping an Active Shooter with OSINT: How Publicly Available Information Becomes Actionable Intelligence
[First printed in the December 2023 edition of Security Technology] You Might Also Enjoy… OSINT Investigator Training 101: Building a Foundation for Success Additional Insights into Iranian Cyber Espionage | […]
The Significance of AI and ML in OSINT to Human Investigators
Artificial Intelligence (AI) and Machine Learning (ML) excel in processing vast amounts of data swiftly. During open-source intelligence (OSINT) investigations, you almost always gather information in overwhelming volumes. AI algorithms […]
Unleashing the Power of Social Media Analysis Tools in Investigations
[Originally on Kaseware.com] In this fast-paced digital age, utilizing data from social media platforms has become essential for uncovering crucial information in investigations. Digital footprints left by individuals and entities […]
ShadowDragon Commentary: How to Scale Investigations Using Open-Source Intelligence
Recently, ShadowDragon CEO, dclemens, contributed an article to Security Management Magazine for their October 2023 organized crime issue. In the piece, he offers firsthand insights into how investigators can improve […]
How OSINT Differs from Traditional Cyber Threat Intelligence?
While there may be some minor overlap, there are major distinctions between traditional Cyber Threat Intelligence (CTI) and the more advanced Open Source Intelligence (OSINT). The efficiency, effectiveness, and approach […]
OSINT Investigator Training 101: Building a Foundation for Success
Today’s investigators and analysts using online sources to investigate cases are often so focused on where to click, that they don’t even realize what their tools are doing in the […]
OSINT Methods To Investigate Suspected AI Generated Content
The proliferation of content generated by artificial intelligence (AI) is just beginning. Recent years haveseen online accounts, run by bots, create fake news articles, divisive social media posts, fraudulentproduct reviews, […]
ShadowDragon Commentary: OSINT vs Classified Secrets
In a recent opinion piece for The Cipher Brief, Gregory Sims, former CIA Clandestine Service for over thirty years, including multiple field tours as Chief and Deputy Chief of CIA […]
Sportradar Case Study: Deep Background Checks, Organizational Integrity, and Fraud Investigations
Investigating integrity and criminality in commerce is a daunting task that requires access to vast amounts of information and complex organizational analysis. The scale rises considerably when investigations are international […]
OSINT Observations from ShadowDragon Experts: Moldova
NicoDekens, Director of Intelligence and Innovation Collection, ShadowDragon You Might Also Enjoy… The Significance of AI and ML in OSINT to Human Investigators ShadowDragon Commentary: OSINT vs Classified Secrets Diving […]
Diving Deeper: What Past Attackers Tell Us About Bryan Kohberger
After six weeks of investigation, on Dec. 30, 2022 authorities arrested Bryan Kohberger as the key suspect in the quadruple murders of four University of Idaho students. This case (which […]
Additional Insights into Iranian Cyber Espionage | APT33
Earlier this week FireEye/Mandiant had released a blog entitled “Insights into Iranian Cyber Espionage”detailing the targets within the Aerospace and Energy sectors being targeted. To compliment their post we wanted […]
Background Checks & Due Diligence
Many years ago, when I was in college, I had a job at a large retailer. It involved all of the normal retail-y things: stocking, checking, unloading trucks, helping customers, […]
Heat Maps: Form Over Function
Since movies took over displaying intelligence, we have seen crazy maps and charts attempt to display intelligence and seem “futuristic.” Here, we can see an example of a heat map: […]
Unmasking a carder with OSINT
Today, we will be exploring the world of carding a bit and following the path of a kid on his way to becoming a full-fledged carder. I spent about an […]
Iran and OSINT Hunting for Fun & Profit.
Today, I’m going to go on a very basic hunting adventure. Every so often, I do stuff like this for “fun”. There’s no deep takeaway here –– just some basic […]
Job Post: Training and Curriculum Specialist
ShadowDragon is a privately-held software development company seeking a full-time training and curriculum specialist. ShadowDragon provides cyber security software tools to commercial entities, government and law enforcement agencies around the […]
Timeline Analysis | Epstein Death Reported on 4Chan Before Announced
In my last entitled Illuminating Context with Timeline Analysis, I gave a rough sketch of the basics. In this post I will share a few specifics. The primary point to […]
Understanding Link Analysis and Using it in Investigations
I started using link analysis for investigations somewhere around 2009/2010 when we were developing the first version of SocialNet. A longtime friend, Roelof from Paterva, shared his vision for a […]
Buckle up for Insight into Charming Kitten Cyberespionage Attacks
The horrors of cybercrime can make even the savviest tech person shudder. Much like an accident on the side of the road, however, we just can’t help rubbernecking. That’s why […]
- « Previous
- 1
- 2