woman in black blazer holding smartphone

Corporate OSINT for Social Engineering

If your work involves protecting organizations from social engineering attacks, you will most probably also be required to conduct open-source intelligence on the organization and its people. Your task will be to find vulnerabilities or high-risk information that is likely to be exploited by attackers in a social engineering attack. Such information would include: identifying specific technologies, key people, and their relationships with internal or … Continue reading Corporate OSINT for Social Engineering

close up photo of assorted color of push pins on map

Location of an IP Address

The topic of finding the location of an IP address has been addressed multiple times in blog posts, Twitter threads and even in one of our webcasts. In this post we’ll talk about IP addresses, what dangers there are when trying to tie them to a location, and what are proper ways to determine a geographic area. Because tying a real world location to an … Continue reading Location of an IP Address

You Can Run, But You Can’t Hide

Guest blog post by Aleksander (@aleksanderrr_) and Intel Inquirer (@intel_inquirer) STRAVA is one of the worlds’ most popular social media platforms, used by more than 50 million people to monitor and share their cycling/running exercises. Since the platform’s initial launch in 2009, it has recorded more than 4 billion activity uploads and throughout the COVID-19 pandemic, the number of new users have soared as people … Continue reading You Can Run, But You Can’t Hide

Viewing Social Media Profiles Without Being Logged on

There can be a number of reasons why you want to view a profile on a social media platform without being logged on. Maybe your current work role prohibits you from using sock puppets (research profiles) during your investigation, or maybe you’re afraid that there might be a risk of compromise. Whatever the reason may be, we’ve got some tips lined up for you to … Continue reading Viewing Social Media Profiles Without Being Logged on

alphabet blur books close up

Staying Up to Date with OSINT Content

Open Source Intelligence is an ever-evolving field of work so it’s important to keep up-to-date with new techniques and tools available to us. Whether you’re new to OSINT or you have been engaged in the topic for a while, it’s natural to feel overwhelmed by the amount of OSINT resources shared online.  It’s important to note that while OSINT isn’t about collecting tools, and resources … Continue reading Staying Up to Date with OSINT Content

access app application apps

Facebook Tips #2

It happens very often that you open a Facebook profile and there is not a lot of information shown. Nothing on the About section, a couple of likes and maybe 3 or 4 photos and posts or even none. Since Facebook Graph stopped working it has become more difficult to extract viable information from semi-closed Facebook profiles but here we list you 5 basic tips … Continue reading Facebook Tips #2

close up photography of magnifying glass

Dressed NOT for Success

Guest blog by PaulSin95038741 Below follows an OSINT approach on how to search/identify clothes that you see online. Spoiler alert. This presentation will be different in that we will not find a clear-cut solution as opposed to many OSINT-articles presented by the OSINT Curious team. Never the less, in my opinion, a very important one. Background I’d say that most of us OSINT-people are very … Continue reading Dressed NOT for Success