Cyber Social Hub Blog

Tips, Tools and Techniques for Using Open Sources in Threat Intelligence

Tips, Tools and Techniques for Using Open Sources in Threat IntelligenceBy: Jeff Phillips Published on: 12/12/2022

Open-source intelligence doesn’t just refer to the accessibility of information. OSINT is the practice of collecting information from publicly available sources that is widely used by analysts in nearly every type of organization — from government and law enforcement to financial crime analysts, fraud and brand misuse investigations, and particularly cybersecurity.

How To ArticleHub Article
Tips, Tools and Techniques for Using Open Sources in Threat Intelligence

How Managed Attribution Empowers Online Researchers

How Managed Attribution Empowers Online ResearchersBy: Jeff Phillips Published on: 08/12/2022

Chances are, anyone involved in online research – cybersecurity specialists, fraud and brand misuse analysts, law enforcement investigators – has heard of the concept of managing attribution in order to stay safe and anonymous online.

Hub Article
How Managed Attribution Empowers Online Researchers

Why and How You Should Include the Dark Web in Your Research

Why and How You Should Include the Dark Web in Your ResearchBy: Jeff Phillips Published on: 09/11/2022

The dark web is an area of the internet that’s not accessible using regular commercial browsers. It is most notoriously known for the illegal activity it facilitates. However, for online investigators, the dark web can be a tremendous resource for gathering information, researching their adversaries and following up on threat indicators.

Hub Article
Why and How You Should Include the Dark Web in Your Research

Top Online Tools for Law Enforcement Investigations

Top Online Tools for Law Enforcement InvestigationsBy: Jeff Phillips Published on: 02/11/2022

Federal and local law enforcement agencies have dedicated divisions for fighting cybercrime, and naturally, most of their time is spent browsing the internet — gathering intelligence on cyber terrorists, investigating computer-based crimes, and following up on reports of fraud, hacks and stolen data.

Hub Article
Top Online Tools for Law Enforcement Investigations