Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Nihad A. Hassan

Latest blogs

Topic : Nihad A. Hassan
  • --Any--

OSINT tips to detect phishing websites

Successful detection is crucial in defending organizations against cyberattacks. Learn how your SOC can leverage OSINT to identify phishing…

How AI and ML can be used for SOCMINT

Artificial intelligence and machine learning technologies can improve the collection and analysis of social media data and the…

Phishing attacks 101: common attack types and how to investigate

Knowing where to look and what to look for is critical in the successful detection and investigation of phishing attacks.

What is typosquatting? Attack examples and defense strategies

Defending against typosquatting requires constant vigilance and swift action. Learn the basics of this form of attack and defense…

OSINT for beginners: A practical guide to getting started

Every OSINT expert was once a beginner. Learn these the need-to-know OSINT basics to jump start your OSINT journey.

Leveraging OSINT in risk assessment

Risk assessments are critical to business functions across the board. Learn what OSINT methodology and dozens of resources can bring to…

Using OSINT to identify AI-generated content

15 techniques plus tons of tools to spot AI-generated text, videos, images and audio in OSINT investigations.

Leveraging OSINT techniques for email investigations

From an OSINT perspective, searching for emails can provide a treasure trove of information about your target entity. In this guide, we…

Open-source intelligence (OSINT) gathering

OSINT gathering can be a daunting task, but if you have a framework, create a plan and harness the right techniques, you can find the…

Blog updates

Stay updated with the latest posts from the blog
Close
Close