Christina LekatiOSINT Techniques for Sensitive Documents That Have Escaped Into The Clear WebI have been working full-time in this industry for about 8 years. Part of my work involves conducting vulnerability assessments for…7 min read·Mar 6, 2024----
Christina LekatiWhy For Today’s Cyber Investigations We Need to Combine Intelligence Disciplinesby Christina Lekati & Samuel Lolagar6 min read·Oct 27, 2023--1--1
Christina LekatiCorporate OSINT for Social Engineering: Physical SecurityThere are many reasons why a threat actor may want to access an organization’s premises. They most usually boil down to installing…11 min read·Oct 11, 2023--3--3
Christina LekatiCorporate OSINT for Social EngineeringIf your work involves protecting organizations from social engineering attacks, you will most probably also be required to conduct…7 min read·Feb 6, 2023--3--3
Christina LekatiYou See, But Do You Observe?How Observation Skills and Inferences Can Aid Investigations & Analytic Work11 min read·Jul 30, 2021--1--1
Christina LekatiCyber Terror Campaigns Against High Value Individuals & Public FiguresIt was quite some time ago that my phone first rang to bring me in contact with this issue.15 min read·May 17, 2021----
Christina LekatiFrom Sock Puppets to Puppet MastersCreating honeypot sock puppet accounts10 min read·Feb 13, 2021----