How Title the AttackSurfaceMapper
of YouTube video OSINT often Tool goes Helps over Pen two Testers lines
WATCH
WATCH NOW NOW
“ For example , it can be used to monitor Dark-Web and hacker forums to identify whether a company ’ s information is being discussed or sold ,” says Skelton . “ Similarly , OSINT can be used to identify loose ends in the digital footprint of a company , such as unprotected servers or employees sharing sensitive info online . This could be the company ’ s own infrastructure , or over services that a company uses . A great example of this , is monitoring GitHub to ensure that contractors , and employees alike , haven ’ t inadvertently disclosed company secrets , or passwords .”
OSINT increasingly a pivotal aspect of cyber defence strategies Describing it as a ‘ force multiplier ’ in traditional cybersecurity practices Skelton explains how OSINT can enable a more proactive approach .
“ Traditionally , cybersecurity focused mainly on protecting internal systems and reacting to network-based attacks ,” he says . “ With the proliferation of OSINT , security professionals now can proactively gather information about potential threats and attackers , and take a more proactive approach to security .
46 November 2023