Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Nihad A. Hassan

Latest blogs

Topic : Nihad A. Hassan
  • --Any--
  • A8 Team
  • AJ Nash
  • Aubrey Byron
  • Monica Brink
  • Nihad A. Hassan
  • Adam Huenke
  • Jared Campbell
  • Shannon Ragan
  • Abel Vandegrift
  • Amir Khashayar Mohammadi
  • Daniel Ben-Chitrit
  • Jeff Phillips
  • John K. Klassen
  • Justin Cleveland
  • Kurt Cunningham
  • Les Dunston
  • Matt Ashburn
  • Miguel Ramos
  • Ramesh Rajagopal
  • Scott Petry
  • Sean Heritage
  • Thom Kaye

OSINT for beginners: A practical guide to OSINT basics

Learn OSINT basics fast — what OSINT means, how to start, essential tools, and proven steps for compliant, efficient open-source…

Exploring the surface, deep, and dark web: what investigators need to know

Understand the differences between the surface, deep, and dark web. Learn how investigators can safely access and analyze data across all…

How AI can be used for threat detection

Discover how AI can enhance the threat detection capabilities of the SOC team.

Collecting OSINT on Instagram: a guide

Learn how to collect OSINT from Instagram using advanced searches, profile analysis, and metadata tools to uncover hidden intelligence…

Investigating on Signal

Learn how Signal works and inspect the different ways in which OSINT gatherers can collect practical intelligence from the platform.

Advanced email phishing analysis: SOC investigation workflow

Discover how SOC security teams can investigate phishing emails using advanced methods beyond automated tools.

How to use GitHub for OSINT

Learn how analysts use GitHub for OSINT: compare Git vs. GitHub, master advanced search filters, map developer networks, and detect exposed…

OSINT for border security: how analysts can deploy open-source techniques

Fortifying the frontline: A practical guide to using OSINT for modern border security

What is cryptojacking?

Explore how cybercriminals exploit cryptojacking to hijack computing resources for cryptocurrency mining, detailing attack methods, impacts…

Blog updates

Stay updated with the latest posts from the blog
Close
Close