Look for any podcast host, guest or anyone
Showing episodes and shows of

Maltego Technologies

Shows

CyberSecurity SummaryCyberSecurity SummaryAn Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackersThis collection of Book originates from a Book titled "An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments" published by Packt Publishing Ltd. in December 2022, and authored by cybersecurity expert Kushantha Gunawardana. The excerpts cover various aspects of online privacy and anonymity, detailing how sensitive information is defined and exposed, the methods attackers use to compromise systems and collect data, and techniques and tools for maintaining anonymity. Topics range from understanding different forms of sensitive data and the risks associated with social media and unsecure connections, to exploring...2025-04-2731 minCyberWire DailyCyberWire DailyScammers celebrate with a bang.Money laundering runs rampant in Cambodia. Privacy advocates question a new data sharing EO from the White House. An NYU website hack exposes the data of millions. A game demo gets pulled from Steam after users report infostealing malware. The Cloak ransomware group claims a cyberattack on the Virginia Attorney General’s Office. 23andMe files for Chapter 11 bankruptcy. Medusa ransomware is using a malicious driver to disable security tools on infected systems. Clearview AI settles a class-action lawsuit over privacy violations. A look back at the CVE program. In today’s Industry Voices segment, we are joined by Joe Ryan...2025-03-2441 minTechnically UTechnically UOpen Source Intelligent - OSINT - A Critical Cybersecurity ToolIn this episode on OSINT, we dive into the fascinating world of Open-Source Intelligence (OSINT)—a critical tool for cybersecurity, intelligence gathering, and digital investigations. Learn how OSINT is used to track cyber threats, uncover hidden data, and enhance online security.🚀 What You’ll Learn:✅ What is OSINT and why was it created?✅ How OSINT helps cybersecurity professionals, journalists, and businesses.✅ The best OSINT tools like Shodan, Maltego, Google Dorking, and SpiderFoot.✅ Real-world applications of OSINT in threat intelligence and penetration testing.✅ The ethical and legal challenges...2025-03-1513 minDecoded: The Cybersecurity PodcastDecoded: The Cybersecurity PodcastPart 2 - CEH v12 Practice Questions: Reconnaissance & Footprinting FundamentalsPart 2: Reconnaissance & Footprinting (15 Questions) 1. What is the main goal of the reconnaissance phase in ethical hacking? • A) Exploiting vulnerabilities • B) Identifying security controls • C) Gathering target information • D) Delivering payloadsAnswer: C) Gathering target informationExplanation: Reconnaissance involves collecting details like domains, IPs, employee info, and network architecture. 2. Which is an example of passive reconnaissance? • A) Nmap port scan • B) Social media monitoring • C) Phishing attack • D) SQL injection...2025-03-1410 minBare Metal Cyber Presents: Dot OneBare Metal Cyber Presents: Dot OneOpen Source IntelligenceOn this Bare Metal Cyber episode, we’re cracking open Open Source Intelligence (OSINT)—the art of turning public data from tweets, news, or court filings into a cybersecurity superpower for spotting threats cheap and legal. We dig into how it works: gathering overt info, analyzing it for insights like phishing trends or hacker chatter, and using it for everything from strategic planning to real-time defense. It’s a game-changer for staying ahead of risks, meeting regs like GDPR, and cutting reliance on pricey covert intel.We’ll guide you through building your OSINT game—pic...2025-03-0113 minFuture of Threat IntelligenceFuture of Threat IntelligenceMaltego's Ben April on Using Commander's Intent for Remote Team SuccessWhen Ben April started managing remote teams in 2005, the concept was nearly unheard of. Now, as CTO of Maltego, he brings nearly two decades of distributed team leadership experience, which he shares with David in this episode of The Future of Threat Intelligence. From implementing Commander's Intent for clear direction to ensuring mental health support during the pandemic, Ben brings practical wisdom about building strong remote cultures that transcend time zones and technology challenges. His unique perspective on hybrid versus fully remote environments reveals why seemingly simple choices about communication tools and meeting structures can make or...2025-01-3018 minCyberSecurity SummaryCyberSecurity SummaryCuckoo Malware AnalysisThe provided Book is an excerpt from the book "Cuckoo Malware Analysis" by Digit Oktavianto and Iqbal Muhardianto. The excerpt primarily focuses on Cuckoo Sandbox, an open-source automated malware analysis system, providing instructions on its installation, configuration, and usage. It explores various features of Cuckoo Sandbox, such as analyzing different file types like Word documents, PDF files, and executables, along with performing memory forensics using Volatility. The excerpt also touches upon advanced topics, including hardening Cuckoo Sandbox against VM detection, integrating it with the Maltego project using Cuckooforcanari, and automating email attachment analysis with Cuckoo MX.2024-11-2215 minCyberWire DailyCyberWire DailyHacked, attacked, and sued.The Internet Archive gets breached and DDoSed. Dutch police arrest the alleged proprietors of an illicit online market. Fidelity Investments confirms a data breach. Marriott settles for $52 million over a multi-year data breach. Critical updates from Mozilla, FortiNet, Palo Alto Networks, VMWare, and Apple. Mongolian Skimmer targets Magento installations. On our Industry Voices segment, we speak with Ben April, Chief Technology Officer at Maltego Technologies GMBH, about "Overcoming information overload: Challenges in social media investigations." Bankruptcy pulls back the curtain on a data brokerage firm. Remember to leave us a 5-star rating and review in your favorite p...2024-10-1034 minThe CybersecurityOS PodcastThe CybersecurityOS Podcast082524 - Cyber Threats: Major Wins & UpdatesExplore the latest in cybersecurity with host LL on CybersecurityOS. Dive into AI SPERA's integration with Maltego, the FBI's ransomware takedown, high-profile breaches, Kiteworks' funding, and CISA's new initiatives. Stay safe, stay secure, and keep those shields up!2024-08-2503 minDavid BombalDavid Bombal#475: Real World OSINT and Cyber Threat Intelligence Tips and TricksBig thank you to Brilliant for sponsoring this video! To try Brilliant for free (for 30 days) and to get a 20% discount, visit: https://Brilliant.org/davidbombal // Gary Ruddell’s SOCIALS // Twitter / X: https://x.com/thegaryruddell LinkedIn: / thegaryruddell YouTube: / @thegaryruddell Newsletter: https://www.switchfire.co/newsletter Instagram: / thegaryruddell // YouTube Playlist REFERENCE // Three Minute Thursday: • My FREE Cyber Threat Intelligence Not... // YouTube video REFERENCE // Top 10 Free OSINT Tools: • Top 10 FREE OSINT tools (with demos) ... // David SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidb...2024-08-081h 11Breaking BadnessBreaking Badness[Mini Series] The Art of the Possible: Ben April and Allan LiskaIn our second iteration of our mini-series, we'll speak with Ben April of Maltego and Allan Liska of Recorded Future. We'll cover topics such as AI, the LockBit ransomware gang, cybersecurity comic books, and more!2024-05-2252 minBreaking BadnessBreaking BadnessThe Art of the Possible Mini-Series TrailerWe're back on the road at RSA 2024 talking with thought leaders in the infosecurity space! Be sure to check in weekly as we share nine interviews with folks from Recorded Future, Gutsy, Maltego, Aembit, MITRE, EmberOT, Optery, Rubrik, and NINJIO.2024-05-1501 minHAQ.NEWSHAQ.NEWS2024-04-04 : Daily : Gracie FolkinsTechniques for stealing AD CS certificates include exporting and bypassing restrictions using tools like Mimikatz. DLL Proxy Loading is a method where an attacker substitutes a legitimate DLL with a fake one to execute malicious code. Secator is a tool that automates security assessments by integrating multiple security commands. ST Smart Things Sentinel is for IoT security, scanning for vulnerabilities and adding devices to a network for monitoring. Portr is an open-source tool for secure SSH tunneling. A privilege escalation bug in Microsoft Intune has been patched by Microsoft. Steganography is used to embed malicious shellcode into images to...2024-04-0403 minOSINT CocktailOSINT CocktailEpisode 15: Patrick RusOSINT Cocktail is a podcast about the tools of the trade for online investigations. Whether you are a new investigator, a seasoned professional, or even in an adjacent field such as investigative journalism, sourcing, or marketing, we will be interviewing professionals to find out what they use day-to-day. Stay tuned! (all episodes are pre-recorded) Links Mentioned in this episode  Forensic OSINT UBI Key Hunchly KASM TOR Proton Mail Purism Telegram Maltego Virtual Box  Un...2024-02-0532 minBrigada OsintBrigada OsintExplorando la Privacidad, Ciberseguridad y Más ️‍♂️En el episodio más reciente del podcast Brigada Osint, abordamos una serie de temas cruciales y de actualidad en el mundo de la ciberseguridad y la privacidad. Desde las aplicaciones con bugs críticos hasta el manejo del ciberbullying, este episodio está cargado de información valiosa y análisis profundos. Temas destacados del episodio: Privacidad y Apps con Bugs Irreparables: Exploramos cómo algunas aplicaciones populares presentan vulnerabilidades serias además de discutir el uso y el posible malgasto de fondos públicos en tecnología deficiente. Webs de Ciberestafas y Falta de Control: Analizamos cómo operan algunas pá...2023-12-2029 minLEARN PodcastLEARN PodcastTurning Customer Ed Programs Into Revenue Streams with Joe Ryan, Training Program Manager at Maltego (Ep. 25)While customer education is still in its early stages, it shouldn’t be an afterthought. If businesses want to succeed, they need to make customer education a clear priority for everyone.“Customer education does need to be viewed as something that touches every part of the customer life cycle and the customer journey. There needs to be a conscious effort to ensure that all parts of an organization are working together to incorporate customer education into what they do,” says Joe Ryan, Training Program Manager at Maltego & Founder of Customer Education Newsletter.In this episode, Joe di...2023-12-1430 minThe PivotThe PivotJezer Ferreira: The Evolution of OSINT and Digital Safety StrategiesA passionate professor with recognized expertise in OSINT, Jezer Ferreira has made significant contributions to the field. He was pivotal in the inception of the Cyber Hunter Group, which subsequently led to the founding of the Osintomático Conference, which is the largest OSINT and Social Engineering event in Europe. Recognizing the synergy between OSINT and social engineering, he underscores their combined potential. He serves as the Coordinator of Cyber Intelligence trainings at the Cyber Hunter Academy and is also a distinguished professor of OSINT and CySA in the Master of Cybersecurity and Cyber D...2023-11-1558 minThe PivotThe PivotDaniel Card: A Real Deep Dive into the World of CybersecurityDaniel is a seasoned technology and cybersecurity professional who has worked with organizations globally to help protect, detect, and respond to cyber threats. He is active in the UK cyber community, serving on the UK Government Cyber Security Advisory Board. You can usually find him online conducting innovative research and seeking new ways to combat cybercrime. In this episode, we draw upon Daniel's extensive experience and expertise as we delve into the world of cybersecurity together. We discuss some of the challenges posed by laws, the lack of understanding or misunderstanding from the public...2023-09-151h 38The PivotThe PivotJane Frankland: Women In Cyber and IN Security MovementJane is a tech entrepreneur, book author, international speaker, and passionate women's change agent. She is the founder of the IN Security Movement and the author of In Security: Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe. With more than 25 years of experience in the field, Jane has built her own penetration company and held senior executive roles at information technology organizations. Today she is represented by The London Speaking Bureau and is committed to establishing women in security as a standard, not an exception, through...2023-08-151h 08Girls Talk CyberGirls Talk CyberPiecing together your online footprint with OSINTWhat information about you resides on the internet today that anyone can access? In this episode we give you the tools to answer that question and walk you through the definition of Open Source Intelligence (OSINT). We look at how it can benefit our lives and how it can also be used in a borderline creepy way. Jules and I also give you some tools to perform OSINT on yourself, and while it may be confronting to see a bunch of information about yourself strewn across the internet, we believe if the bad guys know it exists...2023-08-0322 minThe PivotThe PivotKevin Limonier: Exploring the world of Geopolitics and OSINTKevin Limonier is an expert in geopolitics. He holds the position of an associate professor in Geography and Slavic Studies at the French Institute of Geopolitics (Paris 8 University), serves as the deputy director of GEODE, and is a founding partner of Cassini, a company specializing in cartography and territorial intelligence. Previously, he worked as a lecturer at the Russian State University of Humanities (RGGU, Moscow) for several years. As a specialist in the Russian-speaking internet and territorial innovation policies in the USSR and contemporary Russia, Kevin's geopolitical research focuses on developing new methods of...2023-07-151h 02The PivotThe PivotHenri Beek from DataExpert: Senior Law Enforcement OSINT TrainerHenri Beek has more than 13 years of professional experience working in the Open-Source Intelligence (OSINT) space. Within his career, he has used OSINT for different types of investigations, ranging from fraud and employment screening to family protection, red teaming and cyber threat intelligence. Henri currently works at a company where he provides OSINT training and consultancy to law enforcement and related entities throughout Europe. In this episode, we peek into OSINT investigations from back in 2008, when it was still called "desk research" and conducted with plenty of paperwork. Extending the topic, Henri also brings...2023-06-1558 minCiberseguretatCiberseguretatCarlos Fragoso - Gestionar una ciberguerraCarlos Fragoso és expert en intel·ligència cibergovernamental. Com es gestiona la ciberguerra? Treballa sota pressió. Sent passió per guanyar l'enemic. Està al dia de l'actualitat en ciberatacs i en geopolítica mundial i actualment gestiona un programari que permet fer investigacions, Maltego. Al tip de seguretat, Tomàs Roy ens detalla què són els simuladors i de quina manera es pot formar una persona que ha de lidiar amb un atac entre governs.2023-06-1439 minCiberseguretatCiberseguretatCarlos Fragoso. Gestionar una ciberguerraCarlos Fragoso és expert en intel·ligència cibergovernamental. Com es gestiona la ciberguerra? Treballa sota pressió. Sent passió per guanyar l'enemic. Està al dia de l'actualitat en ciberatacs i en geopolítica mundial i actualment gestiona un programari que permet fer investigacions, Maltego. Al tip de seguretat, Tomàs Roy ens detalla què són els simuladors i de quina manera es pot formar una persona que ha de lidiar amb un atac entre governs.2023-06-1439 minBreaking BadnessBreaking Badness[Mini Series] Stronger Together: Katie Nickels, Don Jeter, Ben April, Lesley Carhart & Jeff StoutWe’ve made it to the third installment of our Stronger Together Mini Series! In this episode we’re joined by researchers, threat analysts, and C-Suites including Katie Nickels from Red Canary and the SANS Institute, Don Jeter from Torq, Ben April from Maltego, Lesley Carhart from Dragos, and Jeff Stout from Akamai. We have some great discussions on the pros and cons of AI, protecting industrial control systems, imposter syndrome, and more.2023-05-1753 minThe PivotThe PivotNico Dekens from ShadowDragon: Make The World A Safer Place With OSINTNico Dekens, known as the Dutch_OsintGuy online, is an All Source Analyst specializing in Open Source Intelligence (OSINT), online Human Intelligence (HUMINT) and Online investigations. He has over 20 years of experience as an all source Intelligence Analyst at Dutch Law Enforcement. Nico eats, sleeps, and lives everything which has to do with OSINT, online investigations, Intelligence gathering and Analysis. He is very active within the OSINT community, being the Co-founder of the OSINTCurio.us project and a SANS Institute instructor. Currently, Nico is working as the Director of Intelligence, Collection Innovation at ShadowDragon.2023-05-151h 02Enterprise Security Weekly (Video)Enterprise Security Weekly (Video)Zombie Birds, Amazon AI LLM, Zscaler Beef, & Comcast Security!?! - ESW #314In the Enterprise Security News, Lots of funding announcements and new companies, Private Equity acquires Maltego, Cinven acquires RSA Archer Comcast launches a security product, Zscaler has beef with Gartner, CISA releases updated Zero Trust Model, Amazon jumps into the AI LLM fray, AutoGPT stretches the imagination and potential use cases, The Ever Changing API security market, New security books just released, Zombie birds!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw314 2023-04-211h 03Security Weekly Podcast Network (Audio)Security Weekly Podcast Network (Audio)ESW #314 - Ernie Bio, Sandy CarielliDiscuss observations and trends across the venture capital ecosystem as it pertains to cybersecurity. This will include a re-cap in how 2022 ended, what we saw in Q12023, and what we expect from an investing standpoint. Segment Resources: https://forgepointcap.com/   With over 1 billion records exposed in just the top 35 breaches, over $2.6 billion stolen in the top nine cryptocurrency breaches, and over $2.7 billion in fines levied to the top 35 violators, lessons abound for security teams. We will walk through some of the biggest trends in last year's data breaches and privacy violations, a...2023-04-212h 36Enterprise Security Weekly (Audio)Enterprise Security Weekly (Audio)ESW #314 - Ernie Bio, Sandy CarielliDiscuss observations and trends across the venture capital ecosystem as it pertains to cybersecurity. This will include a re-cap in how 2022 ended, what we saw in Q12023, and what we expect from an investing standpoint. Segment Resources: https://forgepointcap.com/   With over 1 billion records exposed in just the top 35 breaches, over $2.6 billion stolen in the top nine cryptocurrency breaches, and over $2.7 billion in fines levied to the top 35 violators, lessons abound for security teams. We will walk through some of the biggest trends in last year's data breaches and privacy violations, a...2023-04-212h 36The PivotThe PivotHakan Tanriverdi from Bayerischer Rundfunk: Cybersecurity & Ethical Hacking JournalistHakan Tanriverdi is a reporter at the German public broadcaster, Bayerischer Rundfunk. He covers information and cybersecurity, mainly focusing on hacking groups and who they're working for. The investigations tend to be more on the technical side and are assisted by scripts, scrapers, and databases. He is also the producer of the podcast series, Der Mann in Merkels Rechner - Jagd auf Putins Hacker (The Man In Merkel’s Computer – Hunting Down Putin’s Hackers), uncovering the German parliament hack, which went viral later. In this episode, Hakan elaborates on how he unfolds the world...2023-04-1547 minThe PivotThe PivotZaid Sabih from zSecurity: Looking at Hacking From Another AngleZaid Sabih is an ethical hacker, a computer scientist, and the founder and CEO of zSecurity. He has valuable & tremendous experience in the field of ethical hacking. In 2013, he started teaching his first network hacking course, which led him to publish a number of online ethical hacking courses, each focusing on a specific topic, all of which are dominating ethical hacking. Now, Zaid has more than 800,000 students worldwide. In this episode, Zaid sits down with Maltego host Bradley Taylor, recalling what led him into cybersecurity and infosec, later establishing his own company, zSecurity. He also talks about...2023-03-1544 minThe PivotThe PivotPalenath: OPSEC & How to Secure Your Own Privacy in OSINT InvestigationsPalenath is an OSINT & hacking enthusiast and a speaker at Barbhack, UnlockYourBrain, Stack Overflow, Barbhack as well as Lehack. He coded several OSINT software and published them on GitHub. He also proactively participated in several OSINT CTFs, winning competitions held by Trace Labs, Maltego, and UnlockYourBrain.   In this episode, Palenath walks us through his journey on how he comes to program OSINT tools as well as his own experience of getting support from OSINT community, recommending websites and communities for beginners. He also shares with us his opinions on OPSEC and provides basic hygiene guidelines for r...2023-02-1544 minThe PivotThe PivotTeresa Walsh from FS-ISAC: Mapping Threat Intelligence Landscape WorldwideTeresa Walsh leads the FS-ISAC’s Global Intelligence Office (GIO) to protect the financial sector against cyber threats by delivering actionable strategic, operational, and tactical intelligence products. Based in the United Kingdom, she oversees FS-ISAC’s global member-sharing operations and a team of regional intelligence officers and analysts who monitor emerging threats. Teresa began her career as a civilian intelligence analyst with the US Naval Criminal Investigative Service (NCIS) and holds a master’s in political science with a focus on international relations from the University of Missouri-Columbia. In this interview, Teresa shares with us her work as a G...2023-01-1549 minThe PivotThe PivotGisela Perez de Acha: Data Privacy Lawyer Ascended Investigative ReporterGisela is a a human rights lawyer, an open source researcher at Berkeley Law’s Human Rights Center Investigations Lab, and a trainer at Amnesty International’s Digital Verification Corps, a global network of volunteers who fact-checks social media posts about war crimes and human rights violations. She reports on extremism and other topics for the Investigative Reporting Program with a focus on digital forensics and network analysis. She is also cybersecurity expert and a digital safety trainer with PEN America. In this interview, Gisela talks about the knowledge she gained from several  OSINT investigations, which later led t...2022-12-1546 minThe PivotThe PivotLéa Ronzaud from Graphika: Internet Mapping & State Operations RecognitionLéa is an investigator at Graphika, specializing in online investigations, state influence operations, and European extremist groups. She was a known part of the team that exposed Secondary Infection as well as the recent competing Russian and French influence operations in the Central African Republic. Léa holds a dual Master's degree in Geopolitics of the post-Soviet space from the French Institute of Geopolitics and the Russian State University for the Humanities. In this episode, Léa elaborates on the projects she has done with Graphika, including how she conducts internet mapping and recognizes state operations. She...2022-11-151h 01The PivotThe PivotVicente Diaz from VirusTotal: Exploring the World of Threat HuntingVicente Diaz is a specialist in Threat Intelligence and Threat Hunting. He works in the VirusTotal team in Google as Threat Intelligence Strategist and holds a degree in Computer Science and an MSc in Artificial Intelligence. On the latest The Pivot episode, Vicente shares his threat hunting journey and what threat intelligence means to him. By introducing us to his work in VirusTotal and his role within the company, Vicente shares some of his most interesting and relevant investigations, the toolkits he uses the most, and how anyone can get started with threat hunting. Vicente also gives...2022-10-1552 minThe PivotThe PivotRae Baker: Graphic Designer Turned Senior OSINT Analyst & EducatorAfter spending more than 15 years as a graphic designer, Rae Baker decided that it was time for a career change. Now, she is passionate about corporate reconnaissance as well as scam/fraud tracking and currently works as a Senior Open Source Intelligence Analyst for a large consulting firm. As an OSINT Curious Advisory Board member, Rae also works closely with other OSINT practitioners in the field to educate and inspire those within the OSINT community. Additionally, she is the Open Source Intelligence team lead with Operation Safe Escape, which is a 501(c)(3) non-profit comprising of security professionals...2022-09-1528 minEddy der InfoSec Frosch - Der kinderleichte Cyber Awareness PodcastEddy der InfoSec Frosch - Der kinderleichte Cyber Awareness PodcastEp 51: Eddy, OSINT und die Mail über die Netzwerksicherheit von MGMEddy und Sebastian sind verliebt in Maltego. Dies ist ein Open Source Intelligence (OSINT) Tool, mit dem du ungeahnte Dinge über dich und andere erfahren kannst. Sie erklären dir wie du deine persönlichen Daten besser schützen kannst und sie entwickeln Theorien, was es mit einer Nachricht von MGM über deren Netzwerksicherheit auf sich haben könnte. Schalte ein beim CyberAwareness Podcast mit dem Frosch! Eddys Tipps von Montag bis Freitag auf Twitter und jeden Sonntag als Podcast. Eddy auf Twitter: https://twitter.com/eddy_infosec infoeddy.de2022-09-0409 minThe PivotThe PivotKatie Paxton-Fear: The Bug Bounty Hunter & YouTube CreatorDr. Katie Paxton-Fear is a Cybersecurity Lecturer at Manchester Metropolitan University and Technical Community Manager at Bugcrowd, but she’s probably most well known for her hobby: In her free time, she’s a hacker and a YouTube educator. Since 2019, she has found more than 30 vulnerabilities in real software in production, when she first got into hacking “accidentally.” She got her start in security thanks to a mentorship at a HackerOne live hacking event in 2019 where she found her first two bugs in Uber, despite it being her first-time hacking. After being invited as a mentee again in Vegas...2022-08-1844 minThe PivotThe PivotJulie Jones: How To Become A World-Class InvestigatorAfter working as a police detective, undercover operator, and behavioral and geographic profiler for 10 years, Julie Jones enters the intelligence unit and develops her passion for technology by using the internet to investigate crimes. As an Intelligence Specialist, Julie uses all-source intelligence with a focus on online OSINT, social media intelligence, and ethical and proportionate practices for covert and undercover investigations to solve complex problems for corporations, governments, law enforcement, and non-profits worldwide.  In this episode, Julie shares what leads her into internet investigations, how she keeps up with the curve, her experiences in international investigations, the t...2022-07-2157 minThe PivotThe PivotMicah Hoffman from The OSINT Curious Project: Sharing OSINT Techniques with the WorldDevoting himself to the OSINT world for more than decades, Micah Hoffman is a highly active member of the Cyber Security and OSINT communities. Micah works with the federal government, commercial, and internal customers and conducts many different Cyber Security tasks, such as penetration testing, OSINT investigations, and risk assessment. Micah is also the president of The OSINT Curious Project, the Principal Investigator and owner of Spotlight Infosec, the founder of the My OSINT Training, and the co-founder of the OSINT Games CTF Experience. In this episode, Micah talks about: How he lands in...2022-06-1746 minThe PivotThe PivotChild Sexual Abuse Material & How to Investigate CSAMHomeland Security Investigations (HSI), the investigative unit of Immigration and Customs Enforcement (ICE), announced it initiated 4,224 child exploitation cases during the 2019 fiscal year, which began in October 2018 and concluded at the end of September. Those cases led to a total of 3,771 criminal arrests, and the identification or rescue of 1,066 victims. In this episode, The Pivot hosts and Maltego Subject Matter Experts Joe Ryan and Mario Rojas dive into the alarming topic: Child Sexual Abuse Material (CSAM) and how investigators and organizations can support the fight against it. They touch upon the following topics: 1. What technologies...2022-05-191h 17OSINT CocktailOSINT CocktailEpisode 7: Julie Jones of Human-iWelcome to OSINT Cocktail! OSINT Cocktail is a podcast about the tools of the trade for online investigations. Whether you are a new investigator, a seasoned professional, or even in an adjacent field such as investigative journalism, sourcing, or marketing, we will be interviewing professionals to find out what they use day-to-day. Stay tuned! (All episodes are prerecorded) Links mentioned in this episode: https://plessas.net/ https://twitter.com/kirbstr https://twitter.com/finnegansway https://human-i.org https://echosec.com https...2022-04-2934 minBreadcrumbs by Trace LabsBreadcrumbs by Trace LabsEpisode 18. - Eat Your Own Dog Food - Talking Tools with Roelof TemminghToday we're joined by Roelof Temmingh. Roelof is the creator of OSINT tools you've certainly heard of such as Maltego and Vortimo. Roelof recently got to test Vortimo in the context of a Trace Labs CTF and his team placed very well. In this episode we discuss the history/inception of these tools as well as CTFs vs Real World investigations. Vortimo: https://www.vortimo.com/Blog post about competing in the CTF: https://www.vortimo.com/competing-in-the-tracelabs-ctf-26-march-2022/Want to learn more about Open Source Intelligence?Follow us on Twitter...2022-04-261h 01The PivotThe PivotKicks & Chips: Deep Dive into Scalper BotsScalper bots are designed to automatically buy a large amount of an exclusive item such as tickets, sneakers, or GPUs, often to resell them for profit. In this episode, The Pivot host, Bradley Taylor sits down with Maltego Subject Matter Experts Mathieu Gaucheler and Threat Intelligence Analyst Liv Rowley to explore the following aspects of the scalper bot world: How scalper bots work Trends & details of the products targeted by scalper bots Pricing & plans of the bots on the market Ways the bots bypass counter-measures 0:00 Welcome! 0:33 Tell us about yourself! 1:29 What...2022-04-2142 minOSINT CocktailOSINT CocktailEpisode 6: Justin Seitz of HunchlyWelcome to OSINT Cocktail! OSINT Cocktail is a podcast about the tools of the trade for online investigations. Whether you are a new investigator, a seasoned professional, or even in an adjacent field such as investigative journalism, sourcing, or marketing, we will be interviewing professionals to find out what they use day-to-day. Stay tuned! (All episodes are prerecorded) Links mentioned in this episode: https://plessas.net/ https://twitter.com/kirbstr https://twitter.com/finnegansway https://hunch.ly https://www.yubico.com (Yubikey) 2022-04-1438 minThe PivotThe PivotRitu Gill from OSINT Techniques: Everything about OSINTRitu Gill is an Intelligence Analyst with 14 years of experience working in open-source intelligence (OSINT). After a 12-year career with the Royal Canadian Mounted Police (RCMP), Ritu set up a consulting business providing OSINT training and research to law enforcement and related entities across North America. In this episode, Ritu shares her OSINT research, projects, journey, and experiences with The Pivot hosts Bradley Taylor and Maltego Subject Matter Expert Carlos Fragoso. 0:00 Welcome! 0:45 Tell us about yourself! 1:05 What got you into OSINT? 2:21 What were the resources you started with? 2022-03-1748 minOSINT CocktailOSINT CocktailEpisode 1: Welcome to OSINT Cocktail. Let's talk tools.Welcome to OSINT Cocktail! OSINT Cocktail is a podcast about the tools of the trade for online investigations. Whether you are a new investigator, a seasoned professional, or even in an adjacent field such as investigative journalism, sourcing, or marketing, we will be interviewing professionals to find out what they use day-to-day. Stay tuned! (All episodes are prerecorded) Links mentioned in this episode: https://plessas.net/ https://twitter.com/kirbstr https://twitter.com/finnegansway https://brave.com/ https://noscript.net/ https...2022-03-0126 min雜學士(8呆學科學)雜學士(8呆學科學)雜學士聊科技- Episodes23-視覺化圖表的好處幾乎所有著名的武俠小說都有插畫,一個插畫給人多少瑕想,我的志願不是寫出武俠小說,而是看完蜀山劍俠傳,可惜這本巨著還沒有結尾,有待大俠續寫,書中的內容不論是二雲三英,隨手取一段出來都可以品味半天,裏面的插畫也活靈活現,一圖表千言啊。最近我找到幾個比較有趣的視覺化分析軟體,每一套都有各自的優點及共同點,經過粗略的使用大致會把IBM 的i2、Maltego這類型的拿來比較一下。這次更新拖太久了,深感抱歉。謝謝! Have a nice day!2021-10-3108 minWhich professionWhich profession#7: Head of Customer Success | CybersecurityIn this episode I am talking to Aishwarya, who is a Head of Customer Success at Maltego, a cybersecurity company. In the interview she will tell you what she does in her daily professional life, how she ended up becoming a Head of Customer Successes, and more about her background in Electrical and Power Engineering as well as her passion for computers. We will also touch upon a topic of women in tech and how to encourage more participation of women in the tech industry.Movie mentioned in the interview: The Current War (2017)Link to...2021-07-0854 minSANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)ISC StormCast for Friday, October 9th 2020Hashicorp Vault Vulnerabilities https://googleprojectzero.blogspot.com/2020/10/enter-the-vault-auth-issues-hashicorp-vault.html Ryuk Ransomware Writeup https://thedfirreport.com/2020/10/08/ryuks-return/ Ricky Tan: Zeek Log Reconnaissance with Netowrk Graphs Using Maltego Casefile https://www.sans.org/reading-room/whitepapers/securityanalytics/zeek-log-reconnaissance-network-graphs-maltego-casefile-398152020-10-0919 minThe OSINT Curious ProjectThe OSINT Curious ProjectEpisode 44: Guest Julia Bayer, Geolocating without Street View and Google Maps, SOCMINT on foreign social media, FOCA for OSINT, DNS researchThis week’s guest is Julia Bayer (@bayer_julia) Julia Bayer is an investigative journalist, innovation manager and trainer at Deutsche Welle. At DW´s Investigative unit she is diving deep online collecting publicly available sources to uncover the (in)visible using OSINT. Before that she researched and verified UGC for (breaking) news at DW´s Social Media Newsroom. People in this Episode Nico Dekens (@DutchOSINTGuy) Matthias Wilson (@mwOsint) Lorand Bodo (@LorandBodo) Nixintel (@nixintel) Sector035 (@sector035) Rae Baker (@wondersmith_rae) Links to what we discussed OSINTCurious blog post by Technisette: https://osintcurio.us/2...2020-10-0557 minThe OSINT Curious ProjectThe OSINT Curious ProjectEpisode 43: Guest Emmanuelle Welch, Maltego for Telegram, Google Account Finder, WIPO Database, Twitter Analysis FrameworkThis week’s guest is Emmanuelle Welch (@frenchpi) Emmanuelle Welch is a Licensed Private Investigator, Certified Fraud Examiner, and owner of French Connection Research, a private investigative agency in Brooklyn, NY, licensed in New York and Washington, DC. She specializes in white-collar crime investigations, cross-Atlantic litigation support and OSINT analysis. People in this Episode Nico Dekens (@DutchOSINTGuy) Lorand Bodo (@LorandBodo) Nixintel (@nixintel) Kirby Plessas (@kirbstr) John (@thegumshoo) Rae Baker (@wondersmith_rae) Links to what we discussed Emmanuelle’s OSINT tools/resources start.me page for dating apps: https://start.me/p...2020-10-0555 minHackers Toolkits BrHackers Toolkits BrToolkit - 12Vamos falar d OSINT vamos falar de MALTEGO hahaha2020-08-2712 minNerds of Law PodcastNerds of Law PodcastNerds of Law 11 – Der Hacker mit dem weißen HutNerds of Law 11 – Der Hacker mit dem weißen Hut Wenn Peter Echer von LemonPi zu Besuch kommt und aus dem Nähkästchen plaudert, ist der “Explicit-Tag” nicht weit. Von der Suche nach geldgierigen Vampiren zu untreuen Ehefrauen und der Frage: Sind Macs wirklich besser als PCs? Wir lernen auch viel über IT Security und was die Ausbildung zum White Hat Hacker mit der Rechtsanwaltsprüfung zu tun hat. LemonPi https://www.lemonpi.at Maltego https://www.maltego.com Kali Linux https://www.kali.org Burp Suite https://portswigger.net/burp Hack 5 https://sho...2020-06-1949 min401 Access Denied401 Access DeniedCybrary RSA Conference Battle Royale Episode #2Welcome to the Second episode of The Cybrary Battle Royale Podcast Series lead by Atlantic Data Forensics CEO Brian Dykstra. Speaking with Brian is, John Hall VP at CBRE, Linda Martinez the Director of Security and Privacy at Protiviti, and Philip Mayrhofer the CEO of Maltego. Brian leads this All Star live discussion recoded during an event at RSA about how seeing the smaller companies on the floor can be more beneficial than the larger booths. Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube! Check out Cybrary Now!!! 2020-03-1023 minThe OSINT Curious ProjectThe OSINT Curious ProjectEpisode 31: Jeff Lomas of BleuBloodHound, MWOsint demos the MSFT video indexer and more... People in this Episode: Micah Hoffman (WebBreacher)  Dutch_Osintguy  Matthias Wilson (MwOsint)  Nixintel  Sector035  Special Guest: Jeff Lomas (@BleuBloodHound)   Links to what we discussed: Jeff Lomas talked about his blog on cell tower info, DFIR and OSINT https://osintcurio.us/2019/08/19/making-sense-of-osint-cell-tower-data-for-dfir/  People being monitored by the geotagged social media trough Echosec https://twitter.com/KarlSwannie/status/1233092121822978048  An semi automated website for lookups on a domain, ip or email. Covers dns, location, whois and more. Opsec! don’t know if requests are tracked https://synapsint.com/  OSINT CTF that gives people a chance to practice their skills. It...2020-03-091h 08State of CybercrimeState of CybercrimeMaltego - Open-source Intelligence and ForensicsCheck out Maltego: https://www.maltego.com/Maltego Twitter: https://twitter.com/maltegohqCheck out Maltego use cases: https://docs.maltego.com/support/solutions/articles/15000012022-use-cases This podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cyber-workshop/ Want to join us live? Save a seat here: https://www.varonis.com/state-of-cybercrimeMore from Varonis ⬇️ Visit our website: https://www.varonis.comLinkedIn: https://www.linkedin.com/company/varoni...2020-01-2050 minCronache Digitali - Cyber SecurityCronache Digitali - Cyber Security[#19] Maltego. Intervista a Leonida Reitano. [OSINT]In questa puntata, ospite Leonida Reitano, che ci racconta cos'è Maltego.2020-01-0912 minMISP training and workshopsMISP training and workshopsVisualising MISP And Att&ck Data In Maltego - Christophe VandeplasVideo production by the excellent @Ministraitor (https://twitter.com/Ministraitor) 2019-10-2700 minThe OSINT Curious ProjectThe OSINT Curious ProjectEpisode 21: Live demo of mindmapping with Datascraper and Casefile and more...Webcast 20190922 – #21 People in this Episode Micah Dutch_OsintGuy Links to things we discussed: Tetris Challenge gives insight in governmental gear Airbnb – Reverse OSINT with Your Public Information Youtube tests user profile cards that show users comment history Blog on OSINT and psychology and bias Twitter thread with step by step OSINT methodology on identifying a location with detained protesters in Xinjiang Live demo Dutch_OsintGuy & Micah Live demo shows how one can use Mindmapping software to keep track of your investigative steps and thoughts. Second part of the live demo show...2019-09-3054 minPurple Squad SecurityPurple Squad SecurityEpisode 16 – OSINT with Joe Gray from Advanced Persistent SecurityThis week Joe Gray, host of the Advanced Persistent Security podcast, that friend you didn't recognize but added to Facebook anyway, and security researcher joins me to talk about OSINT.  This is a packed episode full of security goodness and definitely not one you want to miss! Some links of interest: Advanced Persistent Security - https://advancedpersistentsecurity.net/ @c_3pjoe Through The Hacking Glass @hackingglass @rainmain_a Peerlyst OSINT Tools Recon-NG OSINT Framework Maltego Hunch.ly Other Sites Indeed.com haveibeenpwned.com Innocent Lives Foundation Want to reach out to...2018-01-141h 00TalkCentralTalkCentralTalkCentral: Ep 187 - 'Just don't call them utilities'On TalkCentral this week, Duncan McLeod and Regardt van der Berg are joined by Andrew Fraser to chat about the week's biggest local and international technology news. On the menu this week: Icasa's attempts to deal with expiring data - is it going about it correctly? - and should the mobile operators be forced to open their networks to data resellers? Also, what’s happened to digital migration? And South Africa is getting a new mobile virtual network operator in the form of Lycamobile. Finally, the panel asks: what's going on at Dimension Data in Africa and the Middle Ea...2017-08-1854 minExotic LiabilityExotic Liability61: Maltego 3Rolaf&Andrew (Paterva) talk Maltego, Fun with trucks&guns, More Blue Lasers, Tiger Team Rip-off, Trying to take out Bin Laden, Drinking&Writing, and more of the EL you love Intro "Bottom Line" by Swollen Members Outro "Eat Da Poo Poo" by BartBaKer2015-08-071h 25Открытая безопасностьОткрытая безопасностьСоциальная инженерия и добыча информации из открытых источниковТема программы: Социальная инженерия и добыча информации из открытых источников. На связи с нами Эксперт по информационной безопасности компании BMS-Consulting(Украина), Владимир Стыран. Кроме действий цыган, мы рассматриваем следующие вопросы: * Что такое социальная инженерия - СИ? * Разведка на основании данных полученных из открытых источников. * Каков типовой сценарий для атак с помощью СИ * Конкурентная разведка. * Сбор данных для pentest. Что потребуется? * Как правильно проводить атаки с помощью СИ. * Типовые ошибки при атаках с помощью СИ. * Почему физическая доставка paylode эффективнее спама? * Как информация из открытых источников может помочь подобрать пароль к аккаунту соц.сети или почте цели? * Что искать в открытых источниках? (кр. системы заказчика, интересы, ФИО, каналы связи, координаты, авто) * Что могут рассказать социальные сети? А если закрыть аккаунт для просмотра НЕдрузей? * Google search vs Yandex search. * Инструменты для автоматизации поиска информации из поисковиков (FOCA, Maltego, сайты...) * Расследование преступлений с помощью открытой информации. * Как можно снизить эффективность атак с помощью СИ направленных против ВАС и ВАШЕЙ компании? Программу мне помогает вести Янкин Андрей. Голосуйте за подкаст "Открытая безопасность" в рейтинге ИБ блогов 2013 журнала BIS-expert. http://bis-expert.ru/golos2013/vote2014-01-2956 minОткрытая безопасностьОткрытая безопасностьСоциальная инженерия и добыча информации из открытых источников (8)Тема программы: Социальная инженерия и добыча информации из открытых источников. На связи с нами Эксперт по информационной безопасности компании BMS-Consulting(Украина), Владимир Стыран. Кроме действий цыган, мы рассматриваем следующие вопросы: * Что такое социальная инженерия - СИ? * Разведка на основании данных полученных из открытых источников. * Каков типовой сценарий для атак с помощью СИ * Конкурентная разведка. * Сбор данных для pentest. Что потребуется? * Как правильно проводить атаки с помощью СИ. * Типовые ошибки при атаках с помощью СИ. * Почему физическая доставка paylode эффективнее спама? * Как информация из открытых источников может помочь подобрать пароль к аккаунту соц.сети или почте цели? * Что искать в открытых источниках? (кр. системы заказчика, интересы, ФИО, каналы связи, координаты, авто) * Что могут рассказать социальные сети? А если закрыть аккаунт для просмотра НЕдрузей? * Google search vs Yandex search. * Инструменты для автоматизации поиска информации из поисковиков (FOCA, Maltego, сайты...) * Расследование преступлений с помощью открытой информации. * Как можно снизить эффективность атак с помощью СИ направленных против ВАС и ВАШЕЙ компании? Программу мне помогает вести Янкин Андрей. Голосуйте за подкаст "Открытая безопасность" в рейтинге ИБ блогов 2013 журнала BIS-expert. ссылка2014-01-2956 minNot Safe For WorkNot Safe For WorkNSFW022 Perforación o Muerte Dauer: 2:50:43 Tim Pritlove Twitter Website Amazon Wishlist Liberapay Generic Wishlist Paypal Holger Klein Twitter Website Amazon Wishlist Paypal Xenim Streaming Network Twitter Website Ein bisschen spät und ein wenig unmotiviert kommt die 22. Ausgabe von Not Safe For Work dabei. Auch wir können nicht Schenkelklopfer am Band produzieren, aber vermutlich ist trotzdem wieder etwas Unterhaltung dabei. Urteilt selbst! Themen: LOL, Internet; Jakob Bienenhalm; Schallplatten; Rick Astley; 4chan; Wetterfeen im Fernsehen; Medienradio; KR116 Hostel; Nordafrika und die Revolution; DLF Hintergrund zum Photovoltaik-Boom; Erdstrahlen aus dem Internet; Herrmann Scheer; Eurocats: Surfen Multimedia; Tim erklärt Holgi, wie...2011-02-192h 50InfoSec Daily PodcastInfoSec Daily PodcastInfoSec Daily Podcast Episode 302http://www.isdpodcast.com/episode-302 TSA Again, Smart Grid, Laptop Theft, Smart Phones, Missing Blogger & Maltego 2011-01-1835 minDEF CON 18 [Video] Speeches from the Hacker Convention.DEF CON 18 [Video] Speeches from the Hacker Convention.The Suggmeister - Social Networking Special Ops: Extending Data Visualization Tools for Faster PwnageIf you're ever in a position when you need to pwn criminals via social networks or see where Tony Hawk likes to hide skateboards around the world, this talk is for you.The talk is delivered in two parts, both of which are intended to shine a fun light on visual social network analysis.The first part introduces how you can extend the powerful data visualization tool, Maltego to speed up and automate the data mining and analysis of social networks. I'll show how I analyzed skateboard legend, Tony Hawk's twitter hunt and highlight how you...2010-10-0850 minSecuraBitSecuraBitSecuraBit Episode 8On this Episode of SecuraBit Jason Mueller Chris Gerling Anthony Gartner Back from three week hiatus. Defcon and BlackHat     Defcon Parties:         Core Impact Party         EthicalHacker.net party         Cisco Party         Isight Party         I-hacked Party         StillSecure Freakshow Party     ChicagoCon: Boot Camps: Oct 27 - 31 Conference: Oct 31 - Nov 1: http://www.chicagocon.com/     Defcon Badges         Ran out of Badges on first day: http://search.twitter.com/search?q=Defcon+badges+out         TV-B-Gone built into the badges: http://www.hackaday.com/2008/08/05/defcon-16-badge-details-released/   ...2008-08-1545 minSecuraBitSecuraBitSecuraBit Episode 8On this Episode of SecuraBit Jason Mueller Chris Gerling Anthony Gartner Back from three week hiatus. Defcon and BlackHat     Defcon Parties:         Core Impact Party         EthicalHacker.net party         Cisco Party         Isight Party         I-hacked Party         StillSecure Freakshow Party     ChicagoCon: Boot Camps: Oct 27 - 31 Conference: Oct 31 - Nov 1: http://www.chicagocon.com/     Defcon Badges         Ran out of Badges on first day: http://search.twitter.com/search?q=Defcon+badges+out         TV-B-Gone built into the badges: http://www.hackaday.com/2008/08/05/defcon-16-badge-details-released/   ...2008-08-1500 min