All tags

AI Company News Op-Eds OSINT OSINT Case Study OSINT Events OSINT News OSINT Tools Product Updates SL API SL Crimewall SL Professional for i2 SL Professional for Maltego Use Сases

Hey, we’re Social Links — welcome to our OSINT Blog. See our thoughts, stories and ideas.

See what we’ve
written lately
Social Links
Service
Guest Author
Ivan Shkvarun
Meet our author Meet our authors Meet our top authors

Risk Assessment for Cyber Security: Aligning Security with Strategy

Cybersecurity risk now extends far beyond IT environments. It directly affects business operations, regulatory compliance, data protection, and institutional resilience. As organizations rely more heavily on cloud infrastructure, interconnected systems, and digital workflows, a single vulnerability can translate into operational disruption, financial loss, or reputational damage. A structured risk assessment...

OSINT in Arms Trafficking: Mapping Illicit Networks

Arms trafficking networks no longer operate only in hidden warehouses or remote border crossings. Increasingly, they rely on public digital infrastructure. While enforcement concentrates on ports and customs checkpoints, traffickers coordinate on social media, advertise through online marketplaces, register shell companies in public databases, and move shipments along traceable maritime...

Military Intelligence: Operational Intelligence in the Multi-Domain Era

Modern defense operations depend on timely, reliable intelligence. Military intelligence transforms fragmented data from multiple domains into structured insight that informs strategic decisions. In an environment where threats span physical and digital terrain, this capability is foundational to effective command and control. In this article, we explain how military intelligence...

Digital Forensics in Cyber Security: From Incident to Evidence

Security tools aim to detect unusual behavior. Digital forensics aims to explain it. In modern environments—where activity spans cloud systems, endpoints, identity platforms, and hybrid infrastructure—detection alone does not provide enough clarity. Alerts indicate that something may be wrong, but they do not establish scope, reconstruct timelines, or...

Fighting AI-Automated Crime: The New Defensive Paradigm

In 2024, a finance employee in Hong Kong transferred $25M after a video call with a deepfake CFO. The attacker? An AI agent trained to impersonate, manipulate, and execute. This wasn’t some anomaly; it was a glimpse into the future—a world where autonomous AI agents are weaponized for...

Behind Financial Fraud: How Schemes Operate

Financial fraud continues to evolve faster than detection systems. As financial institutions digitize operations, fraud increasingly exploits fragmented controls and siloed data. Detection models built for isolated events struggle against coordinated campaigns. What once appeared as discrete incidents now operates as interconnected schemes spanning identities, accounts, and infrastructure—often remaining...

Recommended

You’ve successfully subscribed to Social Links — welcome to our OSINT Blog
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.