Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Nihad A. Hassan

Latest blogs

Topic : Nihad A. Hassan
  • --Any--
  • A8 Team
  • AJ Nash
  • Aubrey Byron
  • Monica Brink
  • Nihad A. Hassan
  • Adam Huenke
  • Jared Campbell
  • Shannon Ragan
  • Abel Vandegrift
  • Amir Khashayar Mohammadi
  • Daniel Ben-Chitrit
  • Jeff Phillips
  • John K. Klassen
  • Justin Cleveland
  • Kurt Cunningham
  • Les Dunston
  • Matt Ashburn
  • Miguel Ramos
  • Ramesh Rajagopal
  • Scott Petry
  • Sean Heritage
  • Thom Kaye

Using OSINT to identify AI-generated content

15 techniques plus tons of tools to spot AI-generated text, videos, images and audio in OSINT investigations.

Leveraging OSINT techniques for email investigations

From an OSINT perspective, searching for emails can provide a treasure trove of information about your target entity. In this guide, we…

Open-source intelligence (OSINT) gathering

OSINT gathering can be a daunting task, but if you have a framework, create a plan and harness the right techniques, you can find the…

Uncovering individual backgrounds in financial crime investigations with OSINT

Solving financial crime plagues investigators, but open-source intelligence methods could be the key to saving billions annually.

Collecting OSINT on Discord: a guide

An in-depth guide for collecting publicly available information on the popular voice, video and text messaging app, Discord, for OSINT…

Counternarcotics OSINT: tracking online drug dealers

Drug dealers use social media, surface and dark websites to sell illegal narcotics. Learn how OSINT techniques and Silo for Research can…

How to use OSINT to uncover domain ownership: WHOIS, Reverse IP, and lookup techniques

Learn domain OSINT techniques to uncover the ownership of a website. Explore WHOIS lookups, reverse IP searches, and safe methods for…

Using OSINT to identify sanctioned entities

A patchwork of enforcement bodies, evasion by targeted entities and the volume of information can make understanding who is subject to…

Mitigating data breaches with OSINT techniques

OSINT is an indispensable tool to identify weaknesses within your organization to mitigate data breaches and uncover leaked data before bad…

Blog updates

Stay updated with the latest posts from the blog
Close
Close