Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Nihad A. Hassan

Latest blogs

Topic : Nihad A. Hassan
  • --Any--
  • A8 Team
  • Aubrey Byron
  • Monica Brink
  • Nihad A. Hassan
  • Adam Huenke
  • Jared Campbell
  • Shannon Ragan
  • Abel Vandegrift
  • Amir Khashayar Mohammadi
  • Daniel Ben-Chitrit
  • Jeff Phillips
  • John K. Klassen
  • Justin Cleveland
  • Kurt Cunningham
  • Les Dunston
  • Matt Ashburn
  • Miguel Ramos
  • Ramesh Rajagopal
  • Scott Petry
  • Sean Heritage
  • Thom Kaye

Investigating on Signal

Learn how Signal works and inspect the different ways in which OSINT gatherers can collect practical intelligence from the platform.

Advanced email phishing analysis: SOC investigation workflow

Discover how SOC security teams can investigate phishing emails using advanced methods beyond automated tools.

Investigating on GitHub

Discover how GitHub’s vast code repositories and social features make it a valuable OSINT resource for uncovering sensitive data, technical…

OSINT for border security: how analysts can deploy open-source techniques

Fortifying the frontline: A practical guide to using OSINT for modern border security

Cryptojacking 101

Explore how cybercriminals exploit cryptojacking to hijack computing resources for cryptocurrency mining, detailing attack methods, impacts…

Dark web monitoring: what threat analysts need to know for strengthening cybersecurity

Learn how dark web monitoring empowers security teams to detect threats early, protect sensitive data, and stay ahead of cybercriminals.

AI as an insider threat: threat points and mitigation strategies

Explore the different security risks associated with using AI technologies in a business context and the various mitigation strategies that…

Integrating threat intelligence into SOC operations

Explore the different benefits acquired from integrating threat data into SOC operations.

Understanding cyber threat hunting methodologies

Explore methodologies to help uncover stealthy attackers like advanced persistent threats (APTs) that bypass traditional security defenses…

Blog updates

Stay updated with the latest posts from the blog
Close
Close