WhatsApp OSINT: The Hidden Intelligence Behind “Online” Status
It was late at night when I stumbled across a GitHub repository that made me pause for a moment. Continue reading on OSINT Team »
It was late at night when I stumbled across a GitHub repository that made me pause for a moment. Continue reading on OSINT Team »
How X Business Was Taken Down by a “Ghost-in-the-Printer” Attack Continue reading on OSINT Team »
Fiverr Freelancers Scam Alert ❗ — How I Almost Fell for a Phishing Attack At first, you feel that familiar excitement…“Wow! I got my first Fiverr order!” 🎉 But sometimes, that excitement can be exploited. Recently, I encountered a phishing attempt targeting Fiverr freelancers, and it’s an experience every freelancer should be aware of. How the Scam Works It starts innocently: … Read more
Introduction Continue reading on OSINT Team »
LinkedIn is a targeting broadcast. The platform’s default is visibility-to prospective recruiters, business contacts, potential customers. But visibility to legitimate audiences is visibility to adversaries too. A profile that properly signals authority to clients also signals authority to attackers. The question is not whether information leaks; it is what intelligence actually matters for phishing, vishing, … Read more
This project aims to expand our cybersecurity lab by installing Windows 10 as our second Virtual Machine in VirtualBox. Continue reading on OSINT Team »
Author: Berend Watchus. Independent non profit AI & Cyber Security Researcher. [Publication for OSINT TEAM, online magazine] March 11 2026 image copyright: https://www.sloww.co/homunculus-fallacy/ The Hard Problem Was Never Hard — Part 2 Central Experience, the Insula, and the Three Rooms Nobody Connected Berend F. Watchus — Independent Researcher, Arnhem Area, Netherlands — March 2026 part 1 WORLD FIRST!: CHALMERS’ HARD PROBLEM OF CONSCIOUSNESS DISSOLVED … Read more
The malware loader that takes VM/sandbox evasion seriously. Original image from OpenClaw’s GitHub repo. Image modified by Copilot. Surprise, surprise… during a time when you can’t even type the letter “o” in a search engine without immediately seeing it include “-penclaw” in the suggestions, threat actors have been trying to capitalize on the popularity of this … Read more
Videos/Webinars/Podcasts/Conferences/Training:How I Geolocated Taliban Special Forces in the Afghan Desert: Let’s Geolocate #8Ben Strick | March 9, 2026https://www.youtube.com/watch?v=7t9gXDuWyKg Investigating Fraud Without Leaving a Digital Trace | Intel DropAuthentic8 | March 10, 2026https://www.youtube.com/watch?v=-j-1Uck5pTU Articles/Blogs (Corporate or Personal):What is Managed Attribution, and How Does it Improve Online Investigation?Shannon Ragan | March 6, 2026https://www.authentic8.com/blog/what-is-managed-attribution Why Passive Threat Intelligence … Read more
We’re delighted to announce that the new Videris Investigative Assistant (VIA) is now available. Designed to help the human investigator pinpoint key insights faster in large, complex OSINT cases, VIA is an AI-enabled chat assistant that analyses case data at speed – and is already transforming investigative productivity and insights.