All tags

AI Company News Op-Eds OSINT OSINT Case Study OSINT Events OSINT News OSINT Tools Product Updates SL API SL Crimewall SL Professional for i2 SL Professional for Maltego Use Сases

Hey, we’re Social Links — welcome to our OSINT Blog. See our thoughts, stories and ideas.

See what we’ve
written lately
Social Links
Service
Guest Author
Ivan Shkvarun
Meet our author Meet our authors Meet our top authors

KYC and Due Diligence: Investigating Beyond Identity

The KYC process sits at the center of modern financial and compliance operations. Whether an organization is onboarding a customer, reviewing a partner, or looking into suspicious activity, KYC is meant to answer a basic question: who is this, and what kind of risk do they represent? The problem is...

Incident Response: What Containment Misses

Incident response is no longer just about stopping threats. The hard part today is not just containing an attack quickly. It is understanding what happened well enough to stop the same kind of attack from working again, improve detection, and learn from the attacker faster than they can adapt. Teams...

Criminal Investigation Tools: When Evidence Isn't Enough

The tools used in criminal investigations have expanded far beyond fingerprint kits and evidence bags. Modern cases now involve DNA analysis, digital forensics, network analysis, and intelligence platforms that can process huge volumes of evidence. But tools alone do not solve cases. A fingerprint may identify a person, but it...

Due Diligence Tools: Verification and Investigation

Due diligence tools are often treated as simple lookup systems: search a name, check a database, move on. In practice, effective due diligence is much closer to investigation than verification. A strong research tool can confirm that a company exists, but it cannot explain whether that company is legitimate, connected...

Financial Fraud Detection: When Alerts Aren't Enough

Financial fraud detection is no longer just about flagging suspicious transactions. The challenge now is not spotting anomalies. It is understanding which anomalies matter, why they happened, and whether they point to something bigger. Organizations are facing increasingly sophisticated schemes that combine technical manipulation, social engineering, and coordinated financial activity...

Recommended

You’ve successfully subscribed to Social Links — welcome to our OSINT Blog
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.