Open-source intelligence (OSINT) hit a tipping point in 2025. From a support function that was once the domain of a few specialists, it is now at the center of risk work for governments, enterprises, and investigative teams. This shift happened as teams began to treat open-source data as operational intelligence rather than background research. The […]
Unmasking a carder with OSINT
Today, we will be exploring the world of carding a bit and following the path of a kid on his way to becoming a full-fledged carder. I spent about an […]
Iran and OSINT Hunting for Fun & Profit.
Today, I’m going to go on a very basic hunting adventure. Every so often, I do stuff like this for “fun”. There’s no deep takeaway here –– just some basic […]
Timeline Analysis | Epstein Death Reported on 4Chan Before Announced
In my last entitled Illuminating Context with Timeline Analysis, I gave a rough sketch of the basics. In this post I will share a few specifics. The primary point to […]
Understanding Link Analysis and Using it in Investigations
I started using link analysis for investigations somewhere around 2009/2010 when we were developing the first version of SocialNet. A longtime friend, Roelof from Paterva, shared his vision for a […]
Buckle up for Insight into Charming Kitten Cyberespionage Attacks
The horrors of cybercrime can make even the savviest tech person shudder. Much like an accident on the side of the road, however, we just can’t help rubbernecking. That’s why […]
- « Previous
- 1
- 2
- 3