Latest blogs

Topic : Cybersecurity
  • --Any--
  • Anonymous research
  • Compliance
  • Cryptocurrency
  • Cybersecurity
  • Dark web basics
  • Dark web research
  • Digital fingerprint
  • Financial crime
  • Fraud and brand misuse
  • Law enforcement
  • OSINT news
  • OSINT research
  • Phishing/malware
  • Product info
  • Secure web access
  • SOC
  • Social media
  • Threat intelligence
  • Trust and safety
  • VPN
  • Zero-trust app access

OSINT news roundup: damage assessments, location data and, lagging intel strategies

Stay up to date with the latest OSINT news from around the world

A picture worth a thousand words: How EXIF data can further your research

Behind each image on the web is a story. Discovering the story may be easier than you think if you peel back the layers and peak behind the…

What can Ukraine tell us about Taiwan?

Many analysts are warning China is gearing up to invade Taiwan. Could Russia be a predictor of their strategy?

Dentists aren't heart surgeons: pitfalls of building an intel team

If you don't want your dentist operating on your leg, NeedleStack guest A.J. Nash asks, why are you putting incident response in charge of…

How OSINT can give you an outsider’s perspective of your network

OSINT is a powerful tool to identify vulnerabilities in your organization. But with all the information out there, how do you zero in on…

SOC analysts: 3 non-negotiable needs for online investigation

An unprecedented level of cyber attacks and phishing attempts makes the security needs of SOC teams greater than ever

generia blog

COMB makes billions of leaked credentials easily discoverable

The Compilation of Many Breaches (COMB) has been published on a surface web hacking forum, making 3.2 billion pairs of passwords and emails…

generia blog

Protecting against election interference in 2024

Despite near constant news around accusations of election interference, the 2020 general election has been called “the most secure in…

generia blog

Practice safe SECs: Cyber intelligence experts on building safe operational security and information security practices

What is operational security? Why is it important for the CISO? What’s an intelligence cycle, and how do you successfully execute its data…

Blog updates

Stay updated with the latest posts from the blog