podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
Maltego
Shows
Human Element
Evershed Sutherland's Patrick Gilman on How Revenue Follows Purpose Instead of Driving It
Patrick Gilman, Lawyer, Partner, & Co-Head of National Security Practice at Eversheds Sutherland, points to a disconnect between how professional services firms measure success and what actually drives sustainable team performance. Instead of P&L and billable hours, Patrick focuses on whether his team receives diverse, challenging work that develops broad problem-solving capabilities across multiple legal domains rather than creating narrow subject matter experts. Patrick discusses the structural reasons lawyers fail at leadership. They transition from team member to team leader without formal training, law schools provide no leadership curriculum, and revenue pressure makes team development secondary to...
2025-12-23
42 min
Human Element
ConnectWise's Bryson Medlock on Leading without a Universal Playbook
Bryson Medlock's path to Threat Intelligence Evangelism Director, CW Research Unit at ConnectWise positioned him to address what actually creates high-performing security teams: treating people as individuals, maintaining psychological safety during crises, and building systems that eliminate months of manual work. Bryson shares how his leadership philosophy draws from a bit of nerdiness, including nearly two decades of running D&D campaigns where managing group dynamics requires constant attention to who's speaking and who needs encouragement to contribute. These frameworks translate directly into security team management, where recognizing that a fresh graduate needs hands-on guidance while a 15-year veteran...
2025-12-16
39 min
Human Element
CPPS' Jameson Ritter on Why 98% of Violence Prevention Starts with Human Behavior
The biggest security failures don't happen because teams miss warning signs in the data; they happen because no one reported the warning signs in the first place. Jameson Ritter, Director of Behavioral Threat Assessment and Management at CPPS, discovered this truth after years responding to terrorism events and workplace violence as a law enforcement officer. His transition from the Joint Terrorism Task Force to corporate security revealed a consistent pattern: in nearly every tragedy, people knew something was wrong but never reported it. The gap wasn't in security infrastructure or threat assessment capabilities, it was in organizational culture and...
2025-12-09
45 min
CyberCode Academy
Course 12 - Maltego Advanced Course | Episode 4: Custom Entity Design and Implementation in Maltego
In this lesson, you’ll learn about:How to create custom entities in MaltegoHow to name entities and assign unique type IDsHow entity properties, main properties, and data types workHow inheritance allows new entities to reuse transformsHow to use advanced features like calculated properties and visual overlaysHow to build dynamic, visually adaptive entities for specialized investigationsSummary of the Episode: This episode walks through the full process of designing and implementing custom entities in Maltego, beginning with basic creation and ad...
2025-12-05
14 min
Human Element
N-able's Kevin O'Connor on Why Hiring Smarter Than Yourself Scales Security Teams
Kevin O’Connor's decade at the NSA taught him that the path to effective security leadership runs counter to most instincts: hire people smarter than yourself, let experts drive decisions in their domains, and focus on empowering careers beyond your team rather than confirming what you already believe. As Director of Threat Research at N-able, Kevin now applies this bottom-up approach to protecting small and medium businesses. Ben and Kevin explore how mission-driven environments shape leadership styles that prioritize purpose over compensation, why mistakes become valuable only when you own the outcome and manage the recovery process, and...
2025-12-04
37 min
CyberCode Academy
Course 12 - Maltego Advanced Course | Episode 3: The Maltego Transform Hub: Finding, Installing, and Utilizing Data Integrations
In this lesson, you’ll learn about:What Hub Items are and how they expand MaltegoHow to navigate, search, filter, and evaluate items in the Transform HubPricing models and key requirements used by Maltego data partnersHow to install free, paid, and trial integrationsHow to learn and understand newly installed transforms using documentation and the Transform ManagerSummary of the Episode: This episode provides a full walkthrough of Maltego’s Transform Hub, explaining how investigators can expand Maltego with external data integrations known as hub...
2025-12-04
12 min
CyberCode Academy
Course 12 - Maltego Advanced Course | Episode 2: Maltego Infrastructure Entities, Transforms, and Footprinting Techniques
In this lesson, you’ll learn about:The core entities used in Maltego infrastructure investigationsHow transforms connect Domains, DNS names, IPs, Netblocks, and ASNsThe methodology of Level 1, L2, L3, and XL infrastructure footprintingKey transforms for pivoting forwards and backwards in infrastructure graphsThe difference between live DNS, passive DNS, and specialized DNS transformsSummary of the Episode: This episode provides a structured introduction to infrastructure investigations in Maltego, covering the foundational entities, essential transforms, and the systematic methods used for infrastructure footprinting. It explains ho...
2025-12-03
16 min
CyberCode Academy
Course 12 - Maltego Advanced Course | Episode 1: Maltiggo Transforms, Sets, and Essential Menu Actions
In this lesson, you’ll learn about:How transforms work in MaltegoTransform sets and how they organize large transform collectionsKey transform menu actions and shortcutsEssential bottom-row menu actions for efficient workflowSummary of the Episode: This episode explains the core mechanics of Maltego transforms, how to run them, how they are organized, and the essential menu actions available when working on a graph. 1. Understanding TransformsTransforms are functions that take one or more selected entities as input.They only appear if...
2025-12-02
11 min
Human Element
GetReal's Tom Cross on Goal Orientation That Sabotages First-Time Managers
The transition from individual contributor to manager destroys more promising security leaders than any technical challenge they'll face. Tom Cross, Head of Threat Research at GetReal, learned this while managing IBM's X-Force Research team, where his instinct to achieve goals directly conflicted with his responsibility to develop people until he harnessed that perspective. Tom reflects on why vulnerability researchers need dedicated time for self-directed projects independent of business priorities, and how that balance creates environments where people give 120% because they're doing what they love. Tom and Ben also explore how Dunning-Kruger effects create friction between security teams...
2025-11-25
41 min
Human Element
Fortified Health Security's T.J. Ramsey on Screening For Team Dynamics over Certifications
The transition from technical excellence to leadership excellence often requires unlearning the habits that made you successful. T.J. Ramsey, Sr. Director of Threat Operations at Fortified Health Security, learned this lesson first in Iraq when incomplete analysis nearly endangered troops, then climbing from vulnerability analyst to director by mastering every service line he now oversees. His approach to building security teams reveals why some organizations maintain elite performance with lean resources while others struggle despite heavy investment. T.J. discusses his framework for making rapid decisions under incomplete information, why he screens for personality traits before...
2025-11-19
41 min
Human Element
Tokio Marine’s Alex Bovicelli on Building Purpose over ROI
Managing threat intelligence for 20,000 companies reveals patterns invisible to most security leaders. Alex Bovicelli, Senior Director of Threat Intelligence at Tokio Marine HCC, sees hundreds of ransomware events monthly, giving him a perspective that challenges industry assumptions about modern threats. The sophisticated attacks making headlines aren't what's devastating smaller organizations. It's groups like Akira Ransomware perfecting SSL VPN brute forcing over years, targeting predictable gaps in authentication controls. Alex and Ben discuss how cyber insurance shifted from paper applications to technical risk assessment as ransomware as a service exploded, why Alex’s team focuses on native tools an...
2025-11-11
48 min
Human Element
DTCC’s Scott Scher on Structured Disagreement and Intellectual Humility in CTI Leadership
Scott Scher, Associate Director - Cyber Threat Intelligence, DTCC has built his career on a counterintuitive premise: effective intelligence teams provide justification for security decisions rather than predictions about future threats. This reframing shifts CTI from being blamed for "unforeseen events” towards being recognized as a core function that builds defensible risk management frameworks across entire security organizations. Scott discusses managing upward to leadership that lacks CTI expertise while maintaining technical rigor, the transition from tactical analyst to strategic leader, and why intelligence teams must proactively define AI integration rather than having it imposed by vendors promising to a...
2025-11-04
51 min
Human Element
Tidal Cyber’s Scott Small on Useful Self-Teaching Technical Security Skills
Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber, built his security career on self-taught technical skills while competitors relied on computer science degrees, proving that intelligence analysis fundamentals combined with relentless curiosity often produce superior threat researchers. Scott shares how his background in critical thinking and intelligence studies created stronger foundations than formal technical training and how diverse career backgrounds generate the different perspectives needed to stay ahead of evolving attackers. Scott also tells Ben why maintaining varied information feeds without getting distracted requires deliberate discipline, how he uses AI daily to process unstructured public...
2025-10-21
35 min
Human Element
SecurityScorecard's Jeremy Turner on Building Persistence into Your Culture
Most leaders avoid failure, but Jeremy Turner, VP of Threat Intelligence & Research at SecurityScorecard, has built his leadership philosophy around deliberately seeking challenges where failure is probable. His counterintuitive approach stems from a simple insight: advanced persistent threats succeed through persistence, not technical sophistication, so security teams must embody the same mindset to stay ahead. Jeremy shares how his failure-driven approach transforms team performance, from screening for initiative and persistence over technical credentials to creating remote work environments that mirror the knowledge transfer of on-site security operations centers.. His decision-making framework favors seeking independent input first, welcoming c...
2025-10-07
38 min
Human Element
Cedar Hill's Ely Reyes on How Operational Readiness Enables Effective Leadership
In the transition from Assistant Chief to Chief, Ely Reyes learned that while you do gain authority, you also lose the safety net of upward accountability. As Director of Public Safety & Chief of Police at Cedar Hill, Ely has also learned to center on treating small problems with the same attention as major crises, recognizing that what matters in the daily work of frontline officers must also matter to their leaders. This approach builds a culture where no task is too small,finger-pointing disappears, and the team’s standard —The Cedar Hill Way— is upheld. He tells Be...
2025-09-23
43 min
CyberWire Daily
Brute force break-in.
SonicWall confirms a breach in its cloud backup platform. Google patches a high-severity zero-day in Chrome. Updates on the Shai-Hulud worm. Chinese phishing emails impersonate the chair of the House China Committee. The UK’s NCA takes the reins of the Five Eyes Law Enforcement Group. RevengeHotels uses AI to deliver VenomRAT to Windows systems. A major VC shares details of a recent ransomware attack. A lawsuit targets automated license plate readers. Our guest is Brock Lupton, Product Strategist at Maltego, discussing the human side of intelligence work. From mic check to malware, a crypto phishing story. Re...
2025-09-18
28 min
Human Element
Unit 42 Palo Alto Networks’ Kyle Wilhoit on Making Time for Curiosity as a Technical Leader
Kyle Wilhoit, Technical Director of Threat Research at Unit 42 Palo Alto Networks, has an approach to leading threat intelligence teams that centers on two core practices that maintain both technical excellence and organizational trust. His "scheduling curiosity" framework dedicates one hour daily to pure research exploration, allowing him to ask "what if" questions that drive breakthrough thinking while staying grounded in hands-on technical work. Then, Kyle builds trust that operates up and out to other organizational teams through cross-collaboration, and down into his own team structure while he handles strategic business context. Kyle also tells B...
2025-09-09
45 min
Human Element
Fortinet’s Aamir Lakhani on Leading from the Bottom of the Ladder
The most damaging security breaches often happen not because of weak technology, but because overwhelmed human operators start cutting corners under pressure. Aamir Lakhani, Global Director of Threat Intelligence & AI at Fortinet, witnessed this firsthand when investigating a recent breach at a mature global organization that spent heavily on security but still fell victim when their SOC team began muting alerts instead of investigating them. His approach to building resilient security teams focuses on screening for emotional intelligence and persistence rather than pure technical ability, administering CTF challenges where he hires based on how candidates handle frustration and collaborate...
2025-08-26
38 min
Human Element
DomainTools' Daniel Schwalbe on Navigating Leadership Transitions
Most security organizations promote their best technical performers into leadership roles without any formal training, creating a pipeline of struggling managers who burn out trying to stay hands-on while scaling teams. Daniel Schwalbe, CISO & Head of Investigations, DomainTools, demonstrates why structured leadership development matters more than technical expertise when building security organizations that can handle both complex threats and human dynamics. Daniel tells Ben why security leadership demands different trust-building approaches, including creating "cone of silence" environments where teams can process high-stress investigations while maintaining strict operational security. He shares practical strategies for identifying natural leaders, implementing f...
2025-08-12
57 min
Human Element
Christopher Budd on Why Security Leaders Must Be Dispellers of Panic
When 90% of internet-connected systems worldwide depended on your software and a single vulnerability could crash entire sectors, crisis leadership took on existential importance. Christopher Budd, Founder & Principal at Christopher Budd Communications tells Ben that security success often means choosing between bad and worse outcomes. His experience building global incident response processes showcases why traditional leadership approaches fail during security crises and how to build organizational resilience that doesn't depend on individual heroics. Christopher also discusses his framework for crisis communications where managing panic becomes a core leadership responsibility not found in any job description. His approach to...
2025-07-29
42 min
Human Element
Armis's Michael Freeman on Leading Through Strategic Energy Allocation
The most sophisticated security tools fail when leaders don't understand the business context they're supposed to protect. Michael Freeman, Head of Threat Intelligence at Armis, learned this lesson during a major security incident where his team had the intelligence from day one but missed the breach because they didn't understand what was important to the business. The most effective security leaders aren't just technical experts, he tells Ben, they're business translators who understand that at the core of every decision lies human motivation. Michael discusses his evolution from pure technical execution to leadership through strategic energy management...
2025-07-15
34 min
Certified - CompTIA CYSA+ Audio Course
Episode 66: Network Scanning and Mapping Tools
Understanding your network begins with visibility—and that visibility is powered by scanning and mapping tools. In this episode, we introduce key network discovery tools such as Angry IP Scanner and Maltego. You’ll learn how these tools help identify live hosts, open ports, DNS records, and relationships between systems, giving analysts a clear picture of what’s exposed and where risks may reside.We also discuss how these tools are used in reconnaissance phases by attackers, and why defenders use them to preemptively detect gaps in visibility. Whether you’re scanning internal environments or simulating external threat v...
2025-07-15
13 min
CyberSecurity Summary
Ethical Hacking: A Hands-on Introduction to Breaking In
A guide for understanding cybersecurity principles and ethical hacking techniques. It covers setting up a virtual lab environment with tools like Kali Linux and Metasploitable, then progresses through network fundamentals such as ARP spoofing, traffic analysis with Wireshark, and crafting TCP shells and botnets. The material also explores cryptography, including ransomware creation and secure communication protocols like Diffie-Hellman, and delves into social engineering tactics, open-source intelligence (OSINT) with tools like Maltego and Shodan, and various exploitation methods like fuzzing for zero-day vulnerabilities, building Trojans and rootkits, and web-based attacks such as SQL and XSS injection. Furthermore, the book details...
2025-07-10
28 min
Human Element
Elastic's Darren LaCasse on Distributed Security Operations at Scale
The transition from technical security expert to effective people leader is way more challenging than it might sound. Darren LaCasse, Director of Threat Intelligence, Detection, & Response at Elastic, learned this lesson through a management mistake that almost cost him a team member and taught him the fundamental difference between managing work output and leading human beings. His journey from classified government security to distributed enterprise operations offers hard-won insights into building resilient security teams that can sustain month-long incident responses without burning out talented professionals. Ben sits down with Darren to explore how security leaders c...
2025-06-30
34 min
CyberSecurity Summary
Approach To Real World Hacking
Serves as a practical guide to various cybersecurity techniques, emphasizing ethical hacking. It systematically covers methods such as Cracking SSH, Wi-Fi Hacking using the "Evil Twin" method, and Doxxing with tools like Maltego. The guide also details Phishing attacks, including how to embed malicious links into applications, and explains bypassing CloudFlare protection to reveal real IP addresses. Furthermore, it explores Privilege Escalation techniques, setting up a Honeypot to catch attackers, performing Banner Grabbing, and executing ARP Poisoning attacks to intercept network traffic. Finally, the document concludes with instructions on securely sharing files over the Tor network, a basic Capture...
2025-06-19
19 min
Human Element
TIG’s Duaine Labno on Using Hostage Negotiation Skills to Lead Threat Intel Teams
Duaine Labno, Director of Special Investigations and Threat Intelligence at TIG Risk Services, shares with Ben how his background in law enforcement shaped his leadership and approach to building elite security teams, including the application of hostage negotiation techniques often overlooked in the industry. With 26 years of experience, Duaine shares how crisis psychology sharpens threat assessment, from recognizing psychological triggers to staying composed under pressure and separating facts from assumptions. His ethical decision-making framework and commitment to 260 hours of annual team training create what he calls "control during chaos" — a model where silence signals precision, not uncertainty. Li...
2025-06-17
29 min
Human Element
Trend Micro’s Robert McArdle on Building Trust Across Distributed Investigation Teams
The most effective security leaders don't abandon their technical foundation when they move into management — they transform it into strategic advantage while treating leadership itself as a discipline worthy of rigorous investigation. On this episode of Human Element, Robert McArdle, Director FTR & Cybercrime Research at Trend Micro, tells Ben how applying analytical thinking to human psychology and team dynamics creates more impactful security leadership than traditional management approaches. His teams investigate future threats and operational intelligence across distributed locations, requiring leadership methods that build genuine trust and collaboration without traditional hierarchical proximity. Robert's approach centers on l...
2025-06-03
34 min
Human Element
Cyberbit’s Caleb Barlow on Crisis Management Skills That Drive Security Forward
In today's security landscape, decisive leadership often matters more than technical expertise. Caleb Barlow, CEO of Cyberbit, brings a seemingly unconventional but surprisingly common perspective to security incident response, drawing from his background as an EMT and firefighter, where he learned to make consequential decisions with limited data. His conversation with Ben on this episode of Human Element reveals why the underwhelming decision-making by executive teams during a breach often causes more damage than the threat actor — a stark reality Caleb witnessed firsthand when a CISO asked for PowerPoint slides for next Thursday's meeting during an active bre...
2025-05-20
38 min
Human Element
Unit 221B’s Lance James on How Failure is the Leading Cause of Success
In this debut conversation on Human Element, Lance James, Chief Innovations Officer & Founder of Unit 221B, joins our host Ben April, CTO of Maltego, to explore the human side of security leadership and the transformative experiences that shape effective leaders in the industry. Lance shares his unique pattern recognition abilities that span from technical systems to human behavior, explains his first principles approach to complex security challenges, and details why deliberately slowing down during incident response leads to better outcomes than rushed decision-making. Through practical examples from his career journey, Lance illustrates how his background in music e...
2025-05-07
49 min
CyberSecurity Summary
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers
This collection of Book originates from a Book titled "An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments" published by Packt Publishing Ltd. in December 2022, and authored by cybersecurity expert Kushantha Gunawardana. The excerpts cover various aspects of online privacy and anonymity, detailing how sensitive information is defined and exposed, the methods attackers use to compromise systems and collect data, and techniques and tools for maintaining anonymity. Topics range from understanding different forms of sensitive data and the risks associated with social media and unsecure connections, to exploring...
2025-04-27
31 min
CyberWire Daily
Scammers celebrate with a bang.
Money laundering runs rampant in Cambodia. Privacy advocates question a new data sharing EO from the White House. An NYU website hack exposes the data of millions. A game demo gets pulled from Steam after users report infostealing malware. The Cloak ransomware group claims a cyberattack on the Virginia Attorney General’s Office. 23andMe files for Chapter 11 bankruptcy. Medusa ransomware is using a malicious driver to disable security tools on infected systems. Clearview AI settles a class-action lawsuit over privacy violations. A look back at the CVE program. In today’s Industry Voices segment, we are joined by Joe Ryan...
2025-03-24
41 min
Technically U
Open Source Intelligent - OSINT - A Critical Cybersecurity Tool
In this episode on OSINT, we dive into the fascinating world of Open-Source Intelligence (OSINT)—a critical tool for cybersecurity, intelligence gathering, and digital investigations. Learn how OSINT is used to track cyber threats, uncover hidden data, and enhance online security.🚀 What You’ll Learn:✅ What is OSINT and why was it created?✅ How OSINT helps cybersecurity professionals, journalists, and businesses.✅ The best OSINT tools like Shodan, Maltego, Google Dorking, and SpiderFoot.✅ Real-world applications of OSINT in threat intelligence and penetration testing.✅ The ethical and legal challenges...
2025-03-15
13 min
Decoded: The Cybersecurity Podcast
Part 2 - CEH v12 Practice Questions: Reconnaissance & Footprinting Fundamentals
Part 2: Reconnaissance & Footprinting (15 Questions) 1. What is the main goal of the reconnaissance phase in ethical hacking? • A) Exploiting vulnerabilities • B) Identifying security controls • C) Gathering target information • D) Delivering payloadsAnswer: C) Gathering target informationExplanation: Reconnaissance involves collecting details like domains, IPs, employee info, and network architecture. 2. Which is an example of passive reconnaissance? • A) Nmap port scan • B) Social media monitoring • C) Phishing attack • D) SQL injection...
2025-03-14
10 min
Mastering Cybersecurity: The Cyber Educational Audio Course
Open Source Intelligence
On this Bare Metal Cyber episode, we’re cracking open Open Source Intelligence (OSINT)—the art of turning public data from tweets, news, or court filings into a cybersecurity superpower for spotting threats cheap and legal. We dig into how it works: gathering overt info, analyzing it for insights like phishing trends or hacker chatter, and using it for everything from strategic planning to real-time defense. It’s a game-changer for staying ahead of risks, meeting regs like GDPR, and cutting reliance on pricey covert intel.We’ll guide you through building your OSINT game—pic...
2025-03-01
11 min
Future of Threat Intelligence
Maltego's Ben April on Using Commander's Intent for Remote Team Success
When Ben April started managing remote teams in 2005, the concept was nearly unheard of. Now, as CTO of Maltego, he brings nearly two decades of distributed team leadership experience, which he shares with David in this episode of The Future of Threat Intelligence. From implementing Commander's Intent for clear direction to ensuring mental health support during the pandemic, Ben brings practical wisdom about building strong remote cultures that transcend time zones and technology challenges. His unique perspective on hybrid versus fully remote environments reveals why seemingly simple choices about communication tools and meeting structures can make or...
2025-01-30
18 min
CyberSecurity Summary
Cuckoo Malware Analysis
The provided Book is an excerpt from the book "Cuckoo Malware Analysis" by Digit Oktavianto and Iqbal Muhardianto. The excerpt primarily focuses on Cuckoo Sandbox, an open-source automated malware analysis system, providing instructions on its installation, configuration, and usage. It explores various features of Cuckoo Sandbox, such as analyzing different file types like Word documents, PDF files, and executables, along with performing memory forensics using Volatility. The excerpt also touches upon advanced topics, including hardening Cuckoo Sandbox against VM detection, integrating it with the Maltego project using Cuckooforcanari, and automating email attachment analysis with Cuckoo MX.
2024-11-22
15 min
CyberWire Daily
Hacked, attacked, and sued.
The Internet Archive gets breached and DDoSed. Dutch police arrest the alleged proprietors of an illicit online market. Fidelity Investments confirms a data breach. Marriott settles for $52 million over a multi-year data breach. Critical updates from Mozilla, FortiNet, Palo Alto Networks, VMWare, and Apple. Mongolian Skimmer targets Magento installations. On our Industry Voices segment, we speak with Ben April, Chief Technology Officer at Maltego Technologies GMBH, about "Overcoming information overload: Challenges in social media investigations." Bankruptcy pulls back the curtain on a data brokerage firm. Remember to leave us a 5-star rating and review in your favorite p...
2024-10-10
34 min
The CybersecurityOS Podcast
082524 - Cyber Threats: Major Wins & Updates
Explore the latest in cybersecurity with host LL on CybersecurityOS. Dive into AI SPERA's integration with Maltego, the FBI's ransomware takedown, high-profile breaches, Kiteworks' funding, and CISA's new initiatives. Stay safe, stay secure, and keep those shields up!
2024-08-25
03 min
David Bombal
#475: Real World OSINT and Cyber Threat Intelligence Tips and Tricks
Big thank you to Brilliant for sponsoring this video! To try Brilliant for free (for 30 days) and to get a 20% discount, visit: https://Brilliant.org/davidbombal // Gary Ruddell’s SOCIALS // Twitter / X: https://x.com/thegaryruddell LinkedIn: / thegaryruddell YouTube: / @thegaryruddell Newsletter: https://www.switchfire.co/newsletter Instagram: / thegaryruddell // YouTube Playlist REFERENCE // Three Minute Thursday: • My FREE Cyber Threat Intelligence Not... // YouTube video REFERENCE // Top 10 Free OSINT Tools: • Top 10 FREE OSINT tools (with demos) ... // David SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidb...
2024-08-08
1h 11
Breaking Badness
[Mini Series] The Art of the Possible: Ben April and Allan Liska
In our second iteration of our mini-series, we'll speak with Ben April of Maltego and Allan Liska of Recorded Future. We'll cover topics such as AI, the LockBit ransomware gang, cybersecurity comic books, and more!
2024-05-22
52 min
Breaking Badness
The Art of the Possible Mini-Series Trailer
We're back on the road at RSA 2024 talking with thought leaders in the infosecurity space! Be sure to check in weekly as we share nine interviews with folks from Recorded Future, Gutsy, Maltego, Aembit, MITRE, EmberOT, Optery, Rubrik, and NINJIO.
2024-05-15
01 min
OSINT Cocktail
Episode 15: Patrick Rus
OSINT Cocktail is a podcast about the tools of the trade for online investigations. Whether you are a new investigator, a seasoned professional, or even in an adjacent field such as investigative journalism, sourcing, or marketing, we will be interviewing professionals to find out what they use day-to-day. Stay tuned! (all episodes are pre-recorded) Links Mentioned in this episode Forensic OSINT UBI Key Hunchly KASM TOR Proton Mail Purism Telegram Maltego Virtual Box Un...
2024-02-05
32 min
Embrace Repertoire of Full Audiobooks in Self Development, Health & Wellness
OSINT Cracking Tools: Maltego, Shodan, Aircrack-NG, Recon-NG - Rob Botwright
Listen to this audiobook in full for free onhttps://epod.spaceTitle: OSINT Cracking Tools: Maltego, Shodan, Aircrack-NG, Recon-NGAuthor: Rob BotwrightNarrator: Digital Voice Archie GFormat: UnabridgedLength: 8:29:57Language: EnglishRelease date: 01-07-2024Publisher: Findaway VoicesGenres: Non-Fiction, Science & Technology, Computers, Architecture & DesignSummary:This audiobook is narrated by a digital voice. Introducing the 'OSINT Cracking Tools' Book Bundle Are you ready to dive into the world of Open Source Intelligence (OSINT) and take your investigative skills to new heights? Look no...
2024-01-07
8h 29
Brigada Osint
Explorando la Privacidad, Ciberseguridad y Más ️♂️
En el episodio más reciente del podcast Brigada Osint, abordamos una serie de temas cruciales y de actualidad en el mundo de la ciberseguridad y la privacidad. Desde las aplicaciones con bugs críticos hasta el manejo del ciberbullying, este episodio está cargado de información valiosa y análisis profundos. Temas destacados del episodio: Privacidad y Apps con Bugs Irreparables: Exploramos cómo algunas aplicaciones populares presentan vulnerabilidades serias además de discutir el uso y el posible malgasto de fondos públicos en tecnología deficiente. Webs de Ciberestafas y Falta de Control: Analizamos cómo operan algunas pá...
2023-12-20
29 min
LEARN Podcast
Turning Customer Ed Programs Into Revenue Streams with Joe Ryan, Training Program Manager at Maltego (Ep. 25)
While customer education is still in its early stages, it shouldn’t be an afterthought. If businesses want to succeed, they need to make customer education a clear priority for everyone.“Customer education does need to be viewed as something that touches every part of the customer life cycle and the customer journey. There needs to be a conscious effort to ensure that all parts of an organization are working together to incorporate customer education into what they do,” says Joe Ryan, Training Program Manager at Maltego & Founder of Customer Education Newsletter.In this episode, Joe di...
2023-12-14
30 min
The Pivot
Jezer Ferreira: The Evolution of OSINT and Digital Safety Strategies
A passionate professor with recognized expertise in OSINT, Jezer Ferreira has made significant contributions to the field. He was pivotal in the inception of the Cyber Hunter Group, which subsequently led to the founding of the Osintomático Conference, which is the largest OSINT and Social Engineering event in Europe. Recognizing the synergy between OSINT and social engineering, he underscores their combined potential. He serves as the Coordinator of Cyber Intelligence trainings at the Cyber Hunter Academy and is also a distinguished professor of OSINT and CySA in the Master of Cybersecurity and Cyber D...
2023-11-15
58 min
The Pivot
Daniel Card: A Real Deep Dive into the World of Cybersecurity
Daniel is a seasoned technology and cybersecurity professional who has worked with organizations globally to help protect, detect, and respond to cyber threats. He is active in the UK cyber community, serving on the UK Government Cyber Security Advisory Board. You can usually find him online conducting innovative research and seeking new ways to combat cybercrime. In this episode, we draw upon Daniel's extensive experience and expertise as we delve into the world of cybersecurity together. We discuss some of the challenges posed by laws, the lack of understanding or misunderstanding from the public...
2023-09-15
1h 38
The Pivot
Jane Frankland: Women In Cyber and IN Security Movement
Jane is a tech entrepreneur, book author, international speaker, and passionate women's change agent. She is the founder of the IN Security Movement and the author of In Security: Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe. With more than 25 years of experience in the field, Jane has built her own penetration company and held senior executive roles at information technology organizations. Today she is represented by The London Speaking Bureau and is committed to establishing women in security as a standard, not an exception, through...
2023-08-15
1h 08
Girls Talk Cyber
Piecing together your online footprint with OSINT
What information about you resides on the internet today that anyone can access? In this episode we give you the tools to answer that question and walk you through the definition of Open Source Intelligence (OSINT). We look at how it can benefit our lives and how it can also be used in a borderline creepy way. Jules and I also give you some tools to perform OSINT on yourself, and while it may be confronting to see a bunch of information about yourself strewn across the internet, we believe if the bad guys know it exists...
2023-08-03
22 min
Girls Talk Cyber
05. Piecing together your online footprint with OSINT
What information about you resides on the internet today that anyone can access? In this episode we give you the tools to answer that question and walk you through the definition of Open Source Intelligence (OSINT). We look at how it can benefit our lives and how it can also be used in a borderline creepy way. Jules and I also give you some tools to perform OSINT on yourself, and while it may be confronting to see a bunch of information about yourself strewn across the internet, we believe if the bad guys know it exists...
2023-08-03
22 min
The Pivot
Kevin Limonier: Exploring the world of Geopolitics and OSINT
Kevin Limonier is an expert in geopolitics. He holds the position of an associate professor in Geography and Slavic Studies at the French Institute of Geopolitics (Paris 8 University), serves as the deputy director of GEODE, and is a founding partner of Cassini, a company specializing in cartography and territorial intelligence. Previously, he worked as a lecturer at the Russian State University of Humanities (RGGU, Moscow) for several years. As a specialist in the Russian-speaking internet and territorial innovation policies in the USSR and contemporary Russia, Kevin's geopolitical research focuses on developing new methods of...
2023-07-15
1h 02
The Pivot
Henri Beek from DataExpert: Senior Law Enforcement OSINT Trainer
Henri Beek has more than 13 years of professional experience working in the Open-Source Intelligence (OSINT) space. Within his career, he has used OSINT for different types of investigations, ranging from fraud and employment screening to family protection, red teaming and cyber threat intelligence. Henri currently works at a company where he provides OSINT training and consultancy to law enforcement and related entities throughout Europe. In this episode, we peek into OSINT investigations from back in 2008, when it was still called "desk research" and conducted with plenty of paperwork. Extending the topic, Henri also brings...
2023-06-15
58 min
Ciberseguretat
Carlos Fragoso - Gestionar una ciberguerra
Carlos Fragoso és expert en intel·ligència cibergovernamental. Com es gestiona la ciberguerra? Treballa sota pressió. Sent passió per guanyar l'enemic. Està al dia de l'actualitat en ciberatacs i en geopolítica mundial i actualment gestiona un programari que permet fer investigacions, Maltego. Al tip de seguretat, Tomàs Roy ens detalla què són els simuladors i de quina manera es pot formar una persona que ha de lidiar amb un atac entre governs.
2023-06-14
39 min
Ciberseguretat
Carlos Fragoso. Gestionar una ciberguerra
Carlos Fragoso és expert en intel·ligència cibergovernamental. Com es gestiona la ciberguerra? Treballa sota pressió. Sent passió per guanyar l'enemic. Està al dia de l'actualitat en ciberatacs i en geopolítica mundial i actualment gestiona un programari que permet fer investigacions, Maltego. Al tip de seguretat, Tomàs Roy ens detalla què són els simuladors i de quina manera es pot formar una persona que ha de lidiar amb un atac entre governs.
2023-06-14
39 min
Breaking Badness
[Mini Series] Stronger Together: Katie Nickels, Don Jeter, Ben April, Lesley Carhart & Jeff Stout
We’ve made it to the third installment of our Stronger Together Mini Series! In this episode we’re joined by researchers, threat analysts, and C-Suites including Katie Nickels from Red Canary and the SANS Institute, Don Jeter from Torq, Ben April from Maltego, Lesley Carhart from Dragos, and Jeff Stout from Akamai. We have some great discussions on the pros and cons of AI, protecting industrial control systems, imposter syndrome, and more.
2023-05-17
53 min
The Pivot
Nico Dekens from ShadowDragon: Make The World A Safer Place With OSINT
Nico Dekens, known as the Dutch_OsintGuy online, is an All Source Analyst specializing in Open Source Intelligence (OSINT), online Human Intelligence (HUMINT) and Online investigations. He has over 20 years of experience as an all source Intelligence Analyst at Dutch Law Enforcement. Nico eats, sleeps, and lives everything which has to do with OSINT, online investigations, Intelligence gathering and Analysis. He is very active within the OSINT community, being the Co-founder of the OSINTCurio.us project and a SANS Institute instructor. Currently, Nico is working as the Director of Intelligence, Collection Innovation at ShadowDragon.
2023-05-15
1h 02
Enterprise Security Weekly (Video)
Zombie Birds, Amazon AI LLM, Zscaler Beef, & Comcast Security!?! - ESW #314
In the Enterprise Security News, Lots of funding announcements and new companies, Private Equity acquires Maltego, Cinven acquires RSA Archer Comcast launches a security product, Zscaler has beef with Gartner, CISA releases updated Zero Trust Model, Amazon jumps into the AI LLM fray, AutoGPT stretches the imagination and potential use cases, The Ever Changing API security market, New security books just released, Zombie birds! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw314
2023-04-21
1h 03
Security Weekly Podcast Network (Audio)
ESW #314 - Ernie Bio, Sandy Carielli
Discuss observations and trends across the venture capital ecosystem as it pertains to cybersecurity. This will include a re-cap in how 2022 ended, what we saw in Q12023, and what we expect from an investing standpoint. Segment Resources: https://forgepointcap.com/ With over 1 billion records exposed in just the top 35 breaches, over $2.6 billion stolen in the top nine cryptocurrency breaches, and over $2.7 billion in fines levied to the top 35 violators, lessons abound for security teams. We will walk through some of the biggest trends in last year's data breaches and privacy violations, a...
2023-04-21
2h 36
Enterprise Security Weekly (Audio)
ESW #314 - Ernie Bio, Sandy Carielli
Discuss observations and trends across the venture capital ecosystem as it pertains to cybersecurity. This will include a re-cap in how 2022 ended, what we saw in Q12023, and what we expect from an investing standpoint. Segment Resources: https://forgepointcap.com/ With over 1 billion records exposed in just the top 35 breaches, over $2.6 billion stolen in the top nine cryptocurrency breaches, and over $2.7 billion in fines levied to the top 35 violators, lessons abound for security teams. We will walk through some of the biggest trends in last year's data breaches and privacy violations, a...
2023-04-21
2h 36
The Pivot
Hakan Tanriverdi from Bayerischer Rundfunk: Cybersecurity & Ethical Hacking Journalist
Hakan Tanriverdi is a reporter at the German public broadcaster, Bayerischer Rundfunk. He covers information and cybersecurity, mainly focusing on hacking groups and who they're working for. The investigations tend to be more on the technical side and are assisted by scripts, scrapers, and databases. He is also the producer of the podcast series, Der Mann in Merkels Rechner - Jagd auf Putins Hacker (The Man In Merkel’s Computer – Hunting Down Putin’s Hackers), uncovering the German parliament hack, which went viral later. In this episode, Hakan elaborates on how he unfolds the world...
2023-04-15
47 min
The Pivot
Zaid Sabih from zSecurity: Looking at Hacking From Another Angle
Zaid Sabih is an ethical hacker, a computer scientist, and the founder and CEO of zSecurity. He has valuable & tremendous experience in the field of ethical hacking. In 2013, he started teaching his first network hacking course, which led him to publish a number of online ethical hacking courses, each focusing on a specific topic, all of which are dominating ethical hacking. Now, Zaid has more than 800,000 students worldwide. In this episode, Zaid sits down with Maltego host Bradley Taylor, recalling what led him into cybersecurity and infosec, later establishing his own company, zSecurity. He also talks about...
2023-03-15
44 min
The Pivot
Palenath: OPSEC & How to Secure Your Own Privacy in OSINT Investigations
Palenath is an OSINT & hacking enthusiast and a speaker at Barbhack, UnlockYourBrain, Stack Overflow, Barbhack as well as Lehack. He coded several OSINT software and published them on GitHub. He also proactively participated in several OSINT CTFs, winning competitions held by Trace Labs, Maltego, and UnlockYourBrain. In this episode, Palenath walks us through his journey on how he comes to program OSINT tools as well as his own experience of getting support from OSINT community, recommending websites and communities for beginners. He also shares with us his opinions on OPSEC and provides basic hygiene guidelines for r...
2023-02-15
44 min
The Pivot
Teresa Walsh from FS-ISAC: Mapping Threat Intelligence Landscape Worldwide
Teresa Walsh leads the FS-ISAC’s Global Intelligence Office (GIO) to protect the financial sector against cyber threats by delivering actionable strategic, operational, and tactical intelligence products. Based in the United Kingdom, she oversees FS-ISAC’s global member-sharing operations and a team of regional intelligence officers and analysts who monitor emerging threats. Teresa began her career as a civilian intelligence analyst with the US Naval Criminal Investigative Service (NCIS) and holds a master’s in political science with a focus on international relations from the University of Missouri-Columbia. In this interview, Teresa shares with us her work as a G...
2023-01-15
49 min
The Pivot
Gisela Perez de Acha: Data Privacy Lawyer Ascended Investigative Reporter
Gisela is a a human rights lawyer, an open source researcher at Berkeley Law’s Human Rights Center Investigations Lab, and a trainer at Amnesty International’s Digital Verification Corps, a global network of volunteers who fact-checks social media posts about war crimes and human rights violations. She reports on extremism and other topics for the Investigative Reporting Program with a focus on digital forensics and network analysis. She is also cybersecurity expert and a digital safety trainer with PEN America. In this interview, Gisela talks about the knowledge she gained from several OSINT investigations, which later led t...
2022-12-15
46 min
The Pivot
Léa Ronzaud from Graphika: Internet Mapping & State Operations Recognition
Léa is an investigator at Graphika, specializing in online investigations, state influence operations, and European extremist groups. She was a known part of the team that exposed Secondary Infection as well as the recent competing Russian and French influence operations in the Central African Republic. Léa holds a dual Master's degree in Geopolitics of the post-Soviet space from the French Institute of Geopolitics and the Russian State University for the Humanities. In this episode, Léa elaborates on the projects she has done with Graphika, including how she conducts internet mapping and recognizes state operations. She...
2022-11-15
1h 01
The Pivot
Vicente Diaz from VirusTotal: Exploring the World of Threat Hunting
Vicente Diaz is a specialist in Threat Intelligence and Threat Hunting. He works in the VirusTotal team in Google as Threat Intelligence Strategist and holds a degree in Computer Science and an MSc in Artificial Intelligence. On the latest The Pivot episode, Vicente shares his threat hunting journey and what threat intelligence means to him. By introducing us to his work in VirusTotal and his role within the company, Vicente shares some of his most interesting and relevant investigations, the toolkits he uses the most, and how anyone can get started with threat hunting. Vicente also gives...
2022-10-15
52 min
The Pivot
Rae Baker: Graphic Designer Turned Senior OSINT Analyst & Educator
After spending more than 15 years as a graphic designer, Rae Baker decided that it was time for a career change. Now, she is passionate about corporate reconnaissance as well as scam/fraud tracking and currently works as a Senior Open Source Intelligence Analyst for a large consulting firm. As an OSINT Curious Advisory Board member, Rae also works closely with other OSINT practitioners in the field to educate and inspire those within the OSINT community. Additionally, she is the Open Source Intelligence team lead with Operation Safe Escape, which is a 501(c)(3) non-profit comprising of security professionals...
2022-09-15
28 min
Eddy der InfoSec Frosch - Der kinderleichte Cyber Awareness Podcast
Ep 51: Eddy, OSINT und die Mail über die Netzwerksicherheit von MGM
Eddy und Sebastian sind verliebt in Maltego. Dies ist ein Open Source Intelligence (OSINT) Tool, mit dem du ungeahnte Dinge über dich und andere erfahren kannst. Sie erklären dir wie du deine persönlichen Daten besser schützen kannst und sie entwickeln Theorien, was es mit einer Nachricht von MGM über deren Netzwerksicherheit auf sich haben könnte. Schalte ein beim CyberAwareness Podcast mit dem Frosch! Eddys Tipps von Montag bis Freitag auf Twitter und jeden Sonntag als Podcast. Eddy auf Twitter: https://twitter.com/eddy_infosec infoeddy.de
2022-09-04
09 min
The Pivot
Katie Paxton-Fear: The Bug Bounty Hunter & YouTube Creator
Dr. Katie Paxton-Fear is a Cybersecurity Lecturer at Manchester Metropolitan University and Technical Community Manager at Bugcrowd, but she’s probably most well known for her hobby: In her free time, she’s a hacker and a YouTube educator. Since 2019, she has found more than 30 vulnerabilities in real software in production, when she first got into hacking “accidentally.” She got her start in security thanks to a mentorship at a HackerOne live hacking event in 2019 where she found her first two bugs in Uber, despite it being her first-time hacking. After being invited as a mentee again in Vegas...
2022-08-18
44 min
The Pivot
Julie Jones: How To Become A World-Class Investigator
After working as a police detective, undercover operator, and behavioral and geographic profiler for 10 years, Julie Jones enters the intelligence unit and develops her passion for technology by using the internet to investigate crimes. As an Intelligence Specialist, Julie uses all-source intelligence with a focus on online OSINT, social media intelligence, and ethical and proportionate practices for covert and undercover investigations to solve complex problems for corporations, governments, law enforcement, and non-profits worldwide. In this episode, Julie shares what leads her into internet investigations, how she keeps up with the curve, her experiences in international investigations, the t...
2022-07-21
57 min
The Pivot
Micah Hoffman from The OSINT Curious Project: Sharing OSINT Techniques with the World
Devoting himself to the OSINT world for more than decades, Micah Hoffman is a highly active member of the Cyber Security and OSINT communities. Micah works with the federal government, commercial, and internal customers and conducts many different Cyber Security tasks, such as penetration testing, OSINT investigations, and risk assessment. Micah is also the president of The OSINT Curious Project, the Principal Investigator and owner of Spotlight Infosec, the founder of the My OSINT Training, and the co-founder of the OSINT Games CTF Experience. In this episode, Micah talks about: How he lands in...
2022-06-17
46 min
The Pivot
Child Sexual Abuse Material & How to Investigate CSAM
Homeland Security Investigations (HSI), the investigative unit of Immigration and Customs Enforcement (ICE), announced it initiated 4,224 child exploitation cases during the 2019 fiscal year, which began in October 2018 and concluded at the end of September. Those cases led to a total of 3,771 criminal arrests, and the identification or rescue of 1,066 victims. In this episode, The Pivot hosts and Maltego Subject Matter Experts Joe Ryan and Mario Rojas dive into the alarming topic: Child Sexual Abuse Material (CSAM) and how investigators and organizations can support the fight against it. They touch upon the following topics: 1. What technologies...
2022-05-19
1h 17
OSINT Cocktail
Episode 7: Julie Jones of Human-i
Welcome to OSINT Cocktail! OSINT Cocktail is a podcast about the tools of the trade for online investigations. Whether you are a new investigator, a seasoned professional, or even in an adjacent field such as investigative journalism, sourcing, or marketing, we will be interviewing professionals to find out what they use day-to-day. Stay tuned! (All episodes are prerecorded) Links mentioned in this episode: https://plessas.net/ https://twitter.com/kirbstr https://twitter.com/finnegansway https://human-i.org https://echosec.com https...
2022-04-29
34 min
The Pivot
Kicks & Chips: Deep Dive into Scalper Bots
Scalper bots are designed to automatically buy a large amount of an exclusive item such as tickets, sneakers, or GPUs, often to resell them for profit. In this episode, The Pivot host, Bradley Taylor sits down with Maltego Subject Matter Experts Mathieu Gaucheler and Threat Intelligence Analyst Liv Rowley to explore the following aspects of the scalper bot world: How scalper bots work Trends & details of the products targeted by scalper bots Pricing & plans of the bots on the market Ways the bots bypass counter-measures 0:00 Welcome! 0:33 Tell us about yourself! 1:29 What...
2022-04-21
42 min
OSINT Cocktail
Episode 6: Justin Seitz of Hunchly
Welcome to OSINT Cocktail! OSINT Cocktail is a podcast about the tools of the trade for online investigations. Whether you are a new investigator, a seasoned professional, or even in an adjacent field such as investigative journalism, sourcing, or marketing, we will be interviewing professionals to find out what they use day-to-day. Stay tuned! (All episodes are prerecorded) Links mentioned in this episode: https://plessas.net/ https://twitter.com/kirbstr https://twitter.com/finnegansway https://hunch.ly https://www.yubico.com (Yubikey)
2022-04-14
38 min
The Pivot
Ritu Gill from OSINT Techniques: Everything about OSINT
Ritu Gill is an Intelligence Analyst with 14 years of experience working in open-source intelligence (OSINT). After a 12-year career with the Royal Canadian Mounted Police (RCMP), Ritu set up a consulting business providing OSINT training and research to law enforcement and related entities across North America. In this episode, Ritu shares her OSINT research, projects, journey, and experiences with The Pivot hosts Bradley Taylor and Maltego Subject Matter Expert Carlos Fragoso. 0:00 Welcome! 0:45 Tell us about yourself! 1:05 What got you into OSINT? 2:21 What were the resources you started with?
2022-03-17
48 min
OSINT Cocktail
Episode 1: Welcome to OSINT Cocktail. Let's talk tools.
Welcome to OSINT Cocktail! OSINT Cocktail is a podcast about the tools of the trade for online investigations. Whether you are a new investigator, a seasoned professional, or even in an adjacent field such as investigative journalism, sourcing, or marketing, we will be interviewing professionals to find out what they use day-to-day. Stay tuned! (All episodes are prerecorded) Links mentioned in this episode: https://plessas.net/ https://twitter.com/kirbstr https://twitter.com/finnegansway https://brave.com/ https://noscript.net/ https...
2022-03-01
26 min
雜學士(8呆學科學)
雜學士聊科技- Episodes23-視覺化圖表的好處
幾乎所有著名的武俠小說都有插畫,一個插畫給人多少瑕想,我的志願不是寫出武俠小說,而是看完蜀山劍俠傳,可惜這本巨著還沒有結尾,有待大俠續寫,書中的內容不論是二雲三英,隨手取一段出來都可以品味半天,裏面的插畫也活靈活現,一圖表千言啊。最近我找到幾個比較有趣的視覺化分析軟體,每一套都有各自的優點及共同點,經過粗略的使用大致會把IBM 的i2、Maltego這類型的拿來比較一下。這次更新拖太久了,深感抱歉。謝謝! Have a nice day!
2021-10-31
08 min
Which profession
#7: Head of Customer Success | Cybersecurity
In this episode I am talking to Aishwarya, who is a Head of Customer Success at Maltego, a cybersecurity company. In the interview she will tell you what she does in her daily professional life, how she ended up becoming a Head of Customer Successes, and more about her background in Electrical and Power Engineering as well as her passion for computers. We will also touch upon a topic of women in tech and how to encourage more participation of women in the tech industry.Movie mentioned in the interview: The Current War (2017)Link to...
2021-07-08
54 min
The OSINT Curious Project
Episode 44: Guest Julia Bayer, Geolocating without Street View and Google Maps, SOCMINT on foreign social media, FOCA for OSINT, DNS research
This week’s guest is Julia Bayer (@bayer_julia) Julia Bayer is an investigative journalist, innovation manager and trainer at Deutsche Welle. At DW´s Investigative unit she is diving deep online collecting publicly available sources to uncover the (in)visible using OSINT. Before that she researched and verified UGC for (breaking) news at DW´s Social Media Newsroom. People in this Episode Nico Dekens (@DutchOSINTGuy) Matthias Wilson (@mwOsint) Lorand Bodo (@LorandBodo) Nixintel (@nixintel) Sector035 (@sector035) Rae Baker (@wondersmith_rae) Links to what we discussed OSINTCurious blog post by Technisette: https://osintcurio.us/2...
2020-10-05
57 min
The OSINT Curious Project
Episode 43: Guest Emmanuelle Welch, Maltego for Telegram, Google Account Finder, WIPO Database, Twitter Analysis Framework
This week’s guest is Emmanuelle Welch (@frenchpi) Emmanuelle Welch is a Licensed Private Investigator, Certified Fraud Examiner, and owner of French Connection Research, a private investigative agency in Brooklyn, NY, licensed in New York and Washington, DC. She specializes in white-collar crime investigations, cross-Atlantic litigation support and OSINT analysis. People in this Episode Nico Dekens (@DutchOSINTGuy) Lorand Bodo (@LorandBodo) Nixintel (@nixintel) Kirby Plessas (@kirbstr) John (@thegumshoo) Rae Baker (@wondersmith_rae) Links to what we discussed Emmanuelle’s OSINT tools/resources start.me page for dating apps: https://start.me/p...
2020-10-05
55 min
Hackers Toolkits Br
Toolkit - 12
Vamos falar d OSINT vamos falar de MALTEGO hahaha
2020-08-27
12 min
Nerds of Law Podcast
Nerds of Law 11 – Der Hacker mit dem weißen Hut
Nerds of Law 11 – Der Hacker mit dem weißen Hut Wenn Peter Echer von LemonPi zu Besuch kommt und aus dem Nähkästchen plaudert, ist der "Explicit-Tag" nicht weit. Von der Suche nach geldgierigen Vampiren zu untreuen Ehefrauen und der Frage: Sind Macs wirklich besser als PCs? Wir lernen auch viel über IT Security und was die Ausbildung zum White Hat Hacker mit der Rechtsanwaltsprüfung zu tun hat. LemonPi https://www.lemonpi.at Maltego https://www.maltego.com Kali Linux https://www.kali.org Burp Suite https://portswigger.net/burp Hack 5 https...
2020-06-19
49 min
401 Access Denied
Cybrary RSA Conference Battle Royale Episode #2
Welcome to the Second episode of The Cybrary Battle Royale Podcast Series lead by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, John Hall VP at CBRE, Linda Martinez the Director of Security and Privacy at Protiviti, and Philip Mayrhofer the CEO of Maltego. Brian leads this All Star live discussion recoded during an event at RSA about how seeing the smaller companies on the floor can be more beneficial than the larger booths. Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube! Check out Cybrary Now!!!
2020-03-10
23 min
The OSINT Curious Project
Episode 31: Jeff Lomas of BleuBloodHound, MWOsint demos the MSFT video indexer and more...
People in this Episode: Micah Hoffman (WebBreacher) Dutch_Osintguy Matthias Wilson (MwOsint) Nixintel Sector035 Special Guest: Jeff Lomas (@BleuBloodHound) Links to what we discussed: Jeff Lomas talked about his blog on cell tower info, DFIR and OSINT https://osintcurio.us/2019/08/19/making-sense-of-osint-cell-tower-data-for-dfir/ People being monitored by the geotagged social media trough Echosec https://twitter.com/KarlSwannie/status/1233092121822978048 An semi automated website for lookups on a domain, ip or email. Covers dns, location, whois and more. Opsec! don’t know if requests are tracked https://synapsint.com/ OSINT CTF that gives people a chance to practice their skills. It...
2020-03-09
1h 08
State of Cybercrime
Maltego - Open-source Intelligence and Forensics
Check out Maltego: https://www.maltego.com/Maltego Twitter: https://twitter.com/maltegohqCheck out Maltego use cases: https://docs.maltego.com/support/solutions/articles/15000012022-use-cases This podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cyber-workshop/ Want to join us live? Save a seat here: https://www.varonis.com/state-of-cybercrimeMore from Varonis ⬇️ Visit our website: https://www.varonis.comLinkedIn: https://www.linkedin.com/company/varoni...
2020-01-20
50 min