Open Source Intelligence refers to the amazing amount of information that’s out there on people and organisations - everything from the CEO’s email address to the version of Microsoft 365 they use can be used to create a phishing attack or exploit a vulnerability.
Open Source Intelligence refers to both the information that is openly available on individuals and organisations and the process for researching and collecting it. OSINT typically refers to publicly available information that doesn’t require specialist skills or tools to access.
In the context of cyber security, OSINT most often refers to combining such information to facilitate cyber attacks, such as phishing and ransomware.
Open Source Intelligence refers to both the information that is openly available on individuals and organisations and the process for researching and collecting it. OSINT typically refers to publicly available information that doesn’t require specialist skills or tools to access.
In the context of cyber security, OSINT most often refers to combining such information to facilitate cyber attacks, such as phishing and ransomware.
Criminals have always ‘cased’ or researched their targets, but modern search tools and the depth of information available online today makes their job much easier - or perhaps more difficult, if you consider the sheer volume of information they may have to trawl through.
Sources of OSINT include the obvious:
Some of the less obvious sources are equally available with only a little knowledge:
In today's digital landscape, data privacy is a critical concern governed by laws like GDPR. Privacy agreements, often accepted without thorough reading, apply to our online presence. Despite these measures, real criminals bypass such constraints. Automated scraping tools quickly extract vast information, while AI-powered tools identify valuable correlations.
Many unintentionally breach copyright laws online. However, true threats lie beyond checkboxes. Cybercriminals leverage technology to exploit vulnerabilities, emphasizing the need for robust cybersecurity strategies beyond conventional privacy agreements and legal frameworks.
Given the sheer volume of data that could be collected in an OSINT exercise, the critical thing is to focus on actionable intelligence - the material that might be used against you and may create a threat. We treat OSINT similar to a vulnerability scan where we triage and prioritise threat information. In a typical assessment we might:
There are many potential sources of information, both in the public domain and on the Dark Web and other slightly less public areas. As part of our initial scoping discussion we will agree with you what areas need focus and which might be prioritised at a lower level for longer term investigation.
The following is a far from exhaustive list of areas for investigation:
Explore the advantages of having an OSINT Risk Assessment, ensuring a proactive and robust defence against evolving cyber threats in today's dynamic digital landscape.
Gain confidence in your organisation's information profile through OSINT risk assessments, ensuring a robust defense against potential threats to sensitive data.
Implement continuous improvements and training for your staff based on insights from OSINT risk assessments, enhancing their ability to navigate and mitigate potential security risks.
Identify and comprehend risks associated with critical information, allowing proactive measures to safeguard against potential vulnerabilities and security breaches.
Benefit from a dedicated team of CREST Registered testers using the latest tools to protect you.
Criminals have always ‘cased’ or researched their targets, but modern search tools and the depth of information available online today makes their job much easier - or perhaps more difficult, if you consider the sheer volume of information they may have to trawl through.
Sources of OSINT include the obvious:
Some of the less obvious sources are equally available with only a little knowledge:
An OSINT Risk Assessment is really an extension to your standard business risk assessments. We follow the same paths that a genuine cyber criminal - or threat actor - might take when researching your company.
In the same way that we might perform a vulnerability scan or penetration test on your systems and software, an OSINT assessment looks for vulnerabilities caused by information that has been exposed to public access.
In today's digital landscape, data privacy is a critical concern governed by laws like GDPR. Privacy agreements, often accepted without thorough reading, apply to our online presence. Despite these measures, real criminals bypass such constraints. Automated scraping tools quickly extract vast information, while AI-powered tools identify valuable correlations.
Many unintentionally breach copyright laws online. However, true threats lie beyond checkboxes. Cybercriminals leverage technology to exploit vulnerabilities, emphasising the need for robust cybersecurity strategies beyond conventional privacy agreements and legal frameworks.
Given the sheer volume of data that could be collected in an OSINT exercise, the critical thing is to focus on actionable intelligence - the material that might be used against you and may create a threat. We treat OSINT similar to a vulnerability scan where we triage and prioritise threat information. In a typical assessment we might:
There are many potential sources of information, both in the public domain and on the Dark Web and other slightly less public areas. As part of our initial scoping discussion we will agree with you what areas need focus and which might be prioritised at a lower level for longer term investigation.
The following is a far from exhaustive list of areas for investigation:
Explore the advantages of having anOSINT Risk Assessment, ensuring a proactive and robust defence against evolving cyber threats in today's dynamic digital landscape.
Gain confidence in your organisation's information profile through OSINT risk assessments, ensuring a robust defence against potential threats to sensitive data.
Implement continuous improvements and training for your staff based on insights from OSINT risk assessments, enhancing their ability to navigate and mitigate potential security risks.
Identify and comprehend risks associated with critical information, allowing proactive measures to safeguard against potential vulnerabilities and security breaches.
Benefit from a dedicated team of CREST Registered testers using the latest tools to protect you.
Choose Precursor Security for penetration testing excellence—where industry-leading expertise, CREST accreditation, and a client-focused approach converge to fortify your digital defences with precision and reliability.
We are certified by the Council of Registered Security Testers (CREST). All of our penetration testers hold multiple industry certifications.
Trusted by hundreds of organisations annually, we provide security testing and proudly belong to the Business Resilience Center (BRC), a police-led national network dedicated to protecting businesses from online risk and fraud.
We have been penetration testing companies for over 6 years. Our clients range from small start-ups to large multinationals.
We don't leave any stone unturned – here are answers to our frequently asked questions about OSINT Risk Assessments...
Organisations need to keep track of the information that is out there on their business. However, the majority of that information is benign and, indeed, organisations want it to be found and read to generate new business.
A Risk Assessment finds the needles in haystacks - the inadvertent leaks and the unintended exposure of information that can be used by criminals to target your organisation. A Risk Assessment from Precursor will prioritise those issues that need urgent or eventual resolution.
The deliverable from any assessment is a complete report, detailing and contextualising each identified vulnerability against your business and relaying the risks that each issue poses to your systems, services and staff.
The report provides a complete description of what each identified issue is, specific remediation advice on how to address the issue, and detailed evidence, wherever necessary to verify the issues impact.
Improper handling of OSINT introduces potential negative impacts to your business. From reputational risks due to misunderstood information to security vulnerabilities through public data exploitation, there's a danger of competitive disadvantage based on misinterpretations and legal repercussions arising from non-compliance with privacy standards.
There are many potential sources of information, both in the public domain and on the Dark Web and other slightly less public areas. As part of our initial scoping discussion we will agree with you what areas need focus and which might be prioritised at a lower level for longer term investigation.
Get in touch with us for a free consultation or quote.