Defending Against Social Engineering
A Guide for OSINT Investigators In the dynamic field of open source intelligence (OSINT), staying ahead in the cybersecurity game is crucial. One significant threat that often slips through the cracks is social engineering. Unlike traditional cyberattacks, social engineering is more insidious, exploiting not system vulnerabilities but human ones. As OSINT investigators, it’s vital to […]
Fake recruiters take to Linkedin
Security analyst, Pierlugi Paganini explains that the “exploitation of social networks for intelligence gathering, especially professional social media like LinkedIn, is a common practice of threat actors.” The perpetrators gain users trust by having a seemingly credible recruitment profile, including a picture and links to other platforms such as Twitter or Facebook. Isight Partners suggests […]