New Blog Entry

You want to build a Platform? ..What Platform Should I use?

By Daniel Clemens | August 9, 2020

The echo’s of investors had started the buzz of the need for new investigative / intelligence platforms a great deal more than there had been in the past few years.…

WhatsInAnEmail3

What’s in an email address?

By Elliott Anderson / December 17, 2019

A few weeks ago we went over an interesting way to pivot from breached data passwords to a target by virtue of the lazy way many people reuse the same…

technology keywords

The Problem with Technology Keywords

By Josh C / December 4, 2019

Big data, AI, machine learning, block chain, and every other cool new tech words are all really just that–words. To a developer or computer scientist, they are a type of…

GetRelatedMalwareSamplesFromDomain 1

Iranian Watering Holes. Target Centric Analysis & Looking for Additional IOCs Related to clear.co.ir | 79.127.125.179 with ShadowDragon MalNet & ProofPoint Data

By Daniel Clemens / December 1, 2019

Additional information is always needed on initial indicators for a SOC analyst or incident handler. In this case, initial indicators point to [ clear. co. ir and 79.127.125.179 ] engaging…

into the breach 03

Into the Breach

By Elliott Anderson / October 16, 2019

We’ve all heard the advice a million times, “Don’t use the same password on different websites.” Unfortunately, (or fortunately, depending on our motivations) many users make this exact mistake. In…

scaffolding

Scaffolding: The Basis of Everything

By Josh C / October 9, 2019

The first lesson I was ever taught in programming is the need for scaffolding. Just like painting a house, even if you are certain you can reach every nook and…

Screen Shot 2019 10 01 at 3.42.26 PM

The Vital Few and the Useful Many

By Brooks M / October 1, 2019

In 1896, at the University of Lausanne in Switzerland, a young economist by the name of Vilfredo Pareto published a paper showing how 80% of the land in Italy was…

screenshot

Job Post: Training and Curriculum Specialist

By Daniel Clemens / September 3, 2019

ShadowDragon is a privately-held software development company seeking a full-time training and curriculum specialist. ShadowDragon provides cyber security software tools to commercial entities, government and law enforcement agencies around the…

bad yelp review copy

Bad moods = Bad decisions

By Elliott Anderson / August 25, 2019

As a developer and OSINT investigator, I often come across other investigators that are researching a target online and have “hit a wall,” so to speak.  “I’ve hit a dead-end,…

1 1

Timeline Analysis | Epstein Death Reported on 4Chan Before Announced

By Daniel Clemens / August 10, 2019

In my last entitled Illuminating Context with Timeline Analysis, I gave a rough sketch of the basics. In this post I will share a few specifics. The primary point to…

200 Level Class 2.001

Illuminating Context with Timeline Analysis

By Daniel Clemens / July 29, 2019

In our training courses, we push ideas and investigative methodology more than we push our tools. Tools will change, but proper investigative methods will not change. Asking the right questions…

phone numbers search scrubbed

It’s Hard Out There for a Pimp

By Brooks M / June 24, 2019

Human trafficking, according to Wikipedia, is the trade of humans for forced labour. With the advent of the internet and high-speed communication, traffickers have found a new way to advertise…

shadowdragon share

Forget About Deep and Dark Web Hype

By Elliott Anderson / June 12, 2019

Everyone has a different use case that needs to be monitored, and we enable a vast amount of use cases for tailored collection and monitoring with OIMonitor at a very…

Scroll to Top