8th Layer Insights cover image

Open Source Intelligence (OSINT): The Data We Leak

8th Layer Insights

00:00

Social Engineering Attacks - How Do They Use Open Source Intelligence?

My focus is on social engineering attacks. And we saw almost every social engineering attack exploiting some sort of information found online. That could be opportunistic, for example, they might say that a company just had a picnic and decide to impersonate one of the members in that gathering. Or they can actually thoroughly profile their target and we have seen this in certain targeted attacks. You base your approach and you profile the target based on the information you find online about them. If you know what if you have seen online what they like, what their hobbies are, you will use those hobbies to initiate conversation.

Play episode from 04:36
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app