ShadowDragon Podcast #07 - Matt Devost Interview | Disinformation Attacks Against Institutions of Trust, Turing Assessments for Datasets, Exploration of Red Teaming Innovation

ShadowDragon Podcast #07 - Matt Devost Interview | Disinformation Attacks Against Institutions of Trust, Turing Assessments for Datasets, Exploration of Red Teaming Innovation

By Admin | Jan 21, 2020 10:20:04 AM

Risk management strategies that work are hard to find in such a noisy infosec buzzword filled industry. Our guest Matt Devost, offers perspective on subjects which will be helpful for beginners,...

ShadowDragon Podcast #08 - Blake Butler Interview | Active Shooters, Actor Engagement, and Hack Back

ShadowDragon Podcast #08 - Blake Butler Interview | Active Shooters, Actor Engagement, and Hack Back

By Admin / Jan 21, 2020 10:20:04 AM

Actor engagement and physical security intersect when active shooter situations or heightened security threats are targeted against executives or physical locations. Naturally, the topic of...

Iran and OSINT Hunting for Fun & Profit.

Iran and OSINT Hunting for Fun & Profit.

By Elliott Anderson / Jan 15, 2020 12:00:00 AM

Today, I’m going to go on a very basic hunting adventure. Every so often, I do stuff like this for “fun”.  There’s no deep takeaway here –– just some basic searching and the techniques involved. ...

What Will OSINT/PAI and Collection at Scale Look like for 2020?

What Will OSINT/PAI and Collection at Scale Look like for 2020?

By Daniel Clemens / Jan 11, 2020 12:00:00 AM

2020 will be eventful and likely one of the most historical years containing change, balancing the tension between change, conflict, and hopefully peace in a long time. When reflecting on the...

Iran Hype - Past and Present Recollections and Historical Lore on Iranian Al-Qassam Cyber Fighters Assault on US Banks in 2012/2013

Iran Hype - Past and Present Recollections and Historical Lore on Iranian Al-Qassam Cyber Fighters Assault on US Banks in 2012/2013

By Daniel Clemens / Jan 6, 2020 12:00:00 AM

On September 11th, 2012, US embassies had been hit with attacks known as the “Benghazi Attacks.” In online correlation, attacks that had been referenced as “Operation Ababil” had begun as a supposed...

Forget About Deep and Dark Web Hype

Forget About Deep and Dark Web Hype

By Elliott Anderson / Jun 12, 2019 12:00:00 AM

Everyone has a different use case that needs to be monitored, and we enable a vast amount of use cases for tailored collection and monitoring with OIMonitor at a very high scale and have been doing...

Continued OSINT Collection Innovation for Expansive 24/7 Monitoring on Chat Platforms, Forums, and Social Media

Continued OSINT Collection Innovation for Expansive 24/7 Monitoring on Chat Platforms, Forums, and Social Media

By Daniel Clemens / Mar 29, 2019 12:00:00 AM

Catching the backscatter of conversation, keywords and data dumps have always been one of the driving goals in our OIMonitor project. While others have been quick to highlight one particular...

Investigator Methodology | Strategic & Tactical Vs. a Hopeful Change

Investigator Methodology | Strategic & Tactical Vs. a Hopeful Change

By Daniel Clemens / Aug 31, 2018 12:00:00 AM

If the world has a plethora of investigators and the success of prosecutors is hovering around 90% success rate  — why do we struggle with an increase in more complex crime, a rise in international...

Scroll to Top