Christina LekatiOSINT Techniques for Sensitive Documents That Have Escaped Into The Clear WebI have been working full-time in this industry for about 8 years. Part of my work involves conducting vulnerability assessments for…Mar 6Mar 6
Christina LekatiWhy For Today’s Cyber Investigations We Need to Combine Intelligence Disciplinesby Christina Lekati & Samuel LolagarOct 27, 20231Oct 27, 20231
Christina LekatiCorporate OSINT for Social Engineering: Physical SecurityThere are many reasons why a threat actor may want to access an organization’s premises. They most usually boil down to installing…Oct 11, 20233Oct 11, 20233
Christina LekatiCorporate OSINT for Social EngineeringIf your work involves protecting organizations from social engineering attacks, you will most probably also be required to conduct…Feb 6, 20233Feb 6, 20233
Christina LekatiYou See, But Do You Observe?How Observation Skills and Inferences Can Aid Investigations & Analytic WorkJul 30, 20211Jul 30, 20211
Christina LekatiCyber Terror Campaigns Against High Value Individuals & Public FiguresIt was quite some time ago that my phone first rang to bring me in contact with this issue.May 17, 2021May 17, 2021
Christina LekatiFrom Sock Puppets to Puppet MastersCreating honeypot sock puppet accountsFeb 13, 2021Feb 13, 2021