fbpx
Home OSINT

OSINT

tinfoleak – Information gathering Over Twitter

Information gathering, the first and the most important step of penetration testing/ ethical hacking; the more you know about your target, more the chances...

Social Media Monitoring Tool as an OSINT Platform for Intelligence

P { margin-bottom: 0.08in; } Conducting OSINT for wider intelligence, counter-terrorism and risk management work has become a complex and increasingly resource intensive task for both Government and...

OSINT Tools Worth Sharing

P { margin-bottom: 0.08in; }A:link { } Open source intelligence is the next big thing, it will change the processes and systems of current intelligence...

Open Source Intelligence (OSINT) – Practicle Approach

H1 { margin-bottom: 0.08in; }H1.western { font-family: "Liberation Serif",serif; }H1.cjk { font-family: "Droid Sans"; }H1.ctl { font-family: "FreeSans"; }P { margin-bottom: 0.08in; }A:link {...
- Advertisment -

Most Read

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...

Cyber Physical Systems for Smart Grid Applications

The smart grid is an emerging paradigm for more reliable and efficient power delivery. It requires monitoring, controlling, and managing the power grid in...

How Is Hospital Critical Infrastructure Protected?

Hospitals hold a lot of sensitive data. When they are hacked, patient information is exposed, putting patients at risk because the hackers can use...

Software Engineering for Cyber-Physical Systems

Cyber-physical systems (CPS) are engineered systems that integrate computation, networking, and physical process. CPS classifies in many ways, including their scale, embeddedness, and the...