All tags

HOME
AI Company News Op-Eds OSINT OSINT Case Study OSINT Events OSINT News OSINT Tools Product Updates SL API SL Crimewall SL Professional for i2 SL Professional for Maltego Use Сases
OSINT

OSINT135

Check out the latest posts

OSINT in Arms Trafficking: Mapping Illicit Networks

Arms trafficking networks no longer operate only in hidden warehouses or remote border crossings. Increasingly, they rely on public digital infrastructure. While enforcement concentrates on ports and customs checkpoints, traffickers coordinate on social media, advertise through online marketplaces, register shell companies in public databases, and move shipments along traceable maritime...

Military Intelligence: Operational Intelligence in the Multi-Domain Era

Modern defense operations depend on timely, reliable intelligence. Military intelligence transforms fragmented data from multiple domains into structured insight that informs strategic decisions. In an environment where threats span physical and digital terrain, this capability is foundational to effective command and control. In this article, we explain how military intelligence...

Fighting AI-Automated Crime: The New Defensive Paradigm

In 2024, a finance employee in Hong Kong transferred $25M after a video call with a deepfake CFO. The attacker? An AI agent trained to impersonate, manipulate, and execute. This wasn’t some anomaly; it was a glimpse into the future—a world where autonomous AI agents are weaponized for...

AI Agents and OSINT: The Future of Cyber Operations

Artificial intelligence is reshaping cyber operations. What began as basic automation and generative assistance is rapidly evolving into autonomous AI agents, often described as agentic AI systems or deployed within multi-agent architectures. These systems do more than generate content or respond to prompts. They plan objectives, execute multi-step actions, adapt...

Anticipating Risk: The Power of OSINT in Brand Intelligence

Brand intelligence once focused on tracking mentions, measuring sentiment, and monitoring media coverage. That model worked when brand risk moved slowly and stayed mostly reputational. Today, brands operate inside fragmented digital ecosystems where impersonation, fraud, misinformation, counterfeit activity, and coordinated manipulation can emerge and scale in days. A brand is...

OSINT in Cyber Threat Intelligence

Cyber threat intelligence (CTI) exists to turn technical security signals into meaningful understanding of who is operating, how attacks evolve, and where real risk persists over time. Modern environments generate massive volumes of alerts and indicators, but detection alone rarely explains intent, coordination, or continuity. Without that context, organizations respond...

You’ve successfully subscribed to Social Links — welcome to our OSINT Blog
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.