Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Nihad A. Hassan

Latest blogs

Topic : Nihad A. Hassan
  • --Any--

Phishing attacks 101: common attack types and how to investigate

Knowing where to look and what to look for is critical in the successful detection and investigation of phishing attacks.

What is typosquatting? Attack examples and defense strategies

Defending against typosquatting requires constant vigilance and swift action. Learn the basics of this form of attack and defense…

OSINT for beginners: A practical guide to getting started

Every OSINT expert was once a beginner. Learn these the need-to-know OSINT basics to jump start your OSINT journey.

Leveraging OSINT in risk assessment

Risk assessments are critical to business functions across the board. Learn what OSINT methodology and dozens of resources can bring to…

Using OSINT to identify AI-generated content

15 techniques plus tons of tools to spot AI-generated text, videos, images and audio in OSINT investigations.

Leveraging OSINT techniques for email investigations

From an OSINT perspective, searching for emails can provide a treasure trove of information about your target entity. In this guide, we…

Open-source intelligence (OSINT) gathering

OSINT gathering can be a daunting task, but if you have a framework, create a plan and harness the right techniques, you can find the…

Uncovering individual backgrounds in financial crime investigations with OSINT

Solving financial crime plagues investigators, but open-source intelligence methods could be the key to saving billions annually.

Collecting OSINT on Discord: a guide

An in-depth guide for collecting publicly available information on the popular voice, video and text messaging app, Discord, for OSINT…

Blog updates

Stay updated with the latest posts from the blog
Close
Close