The Ultimate OSINT Handbook on Personal Information
SOCRadar » OSINT
by SOCRadar XTI
1y ago
OSINT is a term that refers to the process of gathering information from publically accessible sources. These sources include but are not limited to newspapers, television, blogs, tweets, social media, photos, podcasts, and videos that are publicly available, free, and legal.  OSINT is not restricted to the sphere of cybersecurity. However, corporate, military intelligence, sales, marketing, and product management use OSINT tactics to increase productivity while providing public services.  This article will discuss utilizing open-source intelligence (OSINT) to find and acquire a ..read more
Visit website
OSINT Framework Tools as Our Friends
SOCRadar » OSINT
by SOCRadar XTI
1y ago
What is OSINT? Open-source intelligence, abbreviated as OSINT, is the gathering of information from publicly available sources that can be analyzed and turned into actionable intelligence. OSINT is commonly used in penetration testing and is a part of the reconnaissance step of real cyber attacks. OSINT is not only about Cybersecurity In addition to penetration testing and being a part of actual cyber-attacks, open-source intelligence has other use cases in different areas such as law enforcement or national security. Government officials use OSINT to detect threats against national security ..read more
Visit website
How To Track APT Groups and Get Fresh IOC/TTP?
SOCRadar » OSINT
by rootsun
1y ago
50% of Fortune 500 companies have been compromised by APTs.[1] More than 90% of intrusions aren’t even discovered by the victims themselves but through third-party notification. Open Source Intelligence (OSINT) is not only useful but crucial to security teams for analyzing advanced persistent threats. Through OSINT analysis, it is possible to discover clues to APT attack methods, their tactics, techniques and procedures (TTPs), and IoCs (Indication of Compromise). Security researchers have shown time and again that cyber actors frequently recycle effective attack methods. These attack methods ..read more
Visit website
OSINT for Digital Asset Discovery
SOCRadar » OSINT
by rootsun
1y ago
OSINT(Open Source Intelligence) can be used by attackers to identify assets and gather other useful information before the attack is initiated. Asset discovery takes a constructive approach which allows companies to recognize prior risk areas. In order to collect data types and the gain to make better decisions on business development, the discovery of digital assets is necessary. It is easy to understand what assets are used to classify the instruments that need vigilance in order to reduce and avoid interruptions. Digital asset discovery is very important for Shadow IT as well. Shadow IT is ..read more
Visit website
The Role of Cyber Threat Intelligence Analyst
SOCRadar » OSINT
by rootsun
1y ago
Who are CTI analysts? Cyber threat analysts are specialists in cyber threat, who use their analytical and technological skills to address complex cyber threat challenge issues, generate detailed reports, and brief the company on short and long-term security concerns. This work involves effort, creativity, research, and technical skills. Cyber threat intelligence analysts perform an all-source analysis of an attacker that is aimed to exploit against an organization’s data networks, sensitive infrastructure, and cyber-related interests to identify, track, analyze and counter threats posed by gl ..read more
Visit website
Using Google Dorks for Threat Intelligence Operations
SOCRadar » OSINT
by rootsun
1y ago
Enterprises have to deal with a range of mass campaigns as well as advanced attacks that target a specific industry or company. Threat actors use ever-changing methods to reach their target, and always research before proceeding with the operation. To protect themselves from targeted attacks, enterprises should leverage real-time threat intelligence feeds, or use other sources to get information from an outside perspective. Gathering information is a significant stage of the threat intelligence lifecycle. The volume of the data or information gathered can be tremendous, thus it lowers the eff ..read more
Visit website
How To Track APT Groups and Get Fresh IOC/TTP?
SOCRadar » OSINT
by rootsun
1y ago
50% of Fortune 500 companies have been compromised by APTs.[1] More than 90% of intrusions aren’t even discovered by the victims themselves but through third-party notification. Open Source Intelligence (OSINT) is not only useful but crucial to security teams for analyzing advanced persistent threats. Through OSINT analysis, it is possible to discover clues to APT attack methods, their tactics, techniques and procedures (TTPs), and IoCs (Indication of Compromise). Security researchers have shown time and again that cyber actors frequently recycle effective attack methods. These attack methods ..read more
Visit website
The Ultimate OSINT Handbook on Personal Information
SOCRadar » OSINT
by SOCRadar XTI
1y ago
OSINT is a term that refers to the process of gathering information from publically accessible sources. These sources include but are not limited to newspapers, television, blogs, tweets, social media, photos, podcasts, and videos that are publicly available, free, and legal.  OSINT is not restricted to the sphere of cybersecurity. However, corporate, military intelligence, sales, marketing, and product management use OSINT tactics to increase productivity while providing public services.  This article will discuss utilizing open-source intelligence (OSINT) to find and acquire a ..read more
Visit website
OSINT Framework Tools as Our Friends
SOCRadar » OSINT
by SOCRadar XTI
1y ago
What is OSINT? Open-source intelligence, abbreviated as OSINT, is the gathering of information from publicly available sources that can be analyzed and turned into actionable intelligence. OSINT is commonly used in penetration testing and is a part of the reconnaissance step of real cyber attacks. OSINT is not only about Cybersecurity In addition to penetration testing and being a part of actual cyber-attacks, open-source intelligence has other use cases in different areas such as law enforcement or national security. Government officials use OSINT to detect threats against national security ..read more
Visit website
How To Leverage OSINT To Monitor APT Groups and Get Fresh IOC/TTP?
SOCRadar » OSINT
by rootsun
1y ago
50% of Fortune 500 companies have been compromised by APTs.[1] More than 90% of intrusions aren’t even discovered by the victims themselves but through third-party notification. Open Source Intelligence (OSINT) is not only useful but crucial to security teams for analyzing advanced persistent threats. Through OSINT analysis, it is possible to discover clues to APT attack methods, their tactics, techniques and procedures (TTPs), and IoCs (Indication of Compromise). Security researchers have shown time and again that cyber actors frequently recycle effective attack methods. These attack methods ..read more
Visit website

Follow SOCRadar » OSINT on FeedSpot

Continue with Google
Continue with Apple
OR