When AI Goes Rogue: How Agentic AI Will Reshape Social Engineering AttacksCyber criminals are rarely late to the game when it comes to new technologies. In fact, they’re often among the first ones to experiment…May 21A response icon5May 21A response icon5
ELICITATION TECHNIQUESCovert Information Collection From Human SourcesJan 14A response icon1Jan 14A response icon1
OSINT Techniques for Sensitive Documents That Have Escaped Into The Clear WebI have been working full-time in this industry for about 8 years. Part of my work involves conducting vulnerability assessments for…Mar 6, 2024A response icon6Mar 6, 2024A response icon6
Why For Today’s Cyber Investigations We Need to Combine Intelligence Disciplinesby Christina Lekati & Samuel LolagarOct 27, 2023A response icon1Oct 27, 2023A response icon1
Corporate OSINT for Social Engineering: Physical SecurityThere are many reasons why a threat actor may want to access an organization’s premises. They most usually boil down to installing…Oct 11, 2023A response icon3Oct 11, 2023A response icon3
Corporate OSINT for Social EngineeringIf your work involves protecting organizations from social engineering attacks, you will most probably also be required to conduct…Feb 6, 2023A response icon4Feb 6, 2023A response icon4
You See, But Do You Observe?How Observation Skills and Inferences Can Aid Investigations & Analytic WorkJul 30, 2021A response icon1Jul 30, 2021A response icon1
Cyber Terror Campaigns Against High Value Individuals & Public FiguresIt was quite some time ago that my phone first rang to bring me in contact with this issue.May 17, 2021May 17, 2021