Key Challenges and Limitations of the OSINT Framework in the Context of Cybersecurity

D Govardhan, GGSH Krishna, V Charan… - … Conference on Edge …, 2023 - ieeexplore.ieee.org
In today's world, Open-Source Intelligence (OSINT) has gained popularity as a method of
gathering data, both for cyber-attacks and detecting cyber threats. It involves using publicly …

Review OSINT tool for social engineering

M Nobili - Frontiers in Big Data, 2023 - frontiersin.org
In recent years, we observed an increase in cyber threats, especially social engineering
attacks. By social engineering, we mean a set of techniques and tools to collect information …

Time for action: Automated analysis of cyber threat intelligence in the wild

G Siracusano, D Sanvito, R Gonzalez… - arXiv preprint arXiv …, 2023 - arxiv.org
Cyber Threat Intelligence (CTI) plays a crucial role in assessing risks and enhancing
security for organizations. However, the process of extracting relevant information from …

Mapping tools for open source intelligence with cyber kill chain for adversarial aware security

MM Yamin, M Ullah, H Ullah, B Katt, M Hijji… - Mathematics, 2022 - mdpi.com
Open-source intelligence (OSINT) tools are used for gathering information using different
publicly available sources. With the rapid advancement in information technology and …

Improving quality of indicators of compromise using STIX graphs

SS Chen, RH Hwang, A Ali, YD Lin, YC Wei… - Computers & Security, 2024 - Elsevier
Cybersecurity relies on Indicators of Compromise (IoCs) to detect and address threats.
Although Threat Intelligence Platforms (TIPs) and Open Source Intelligence (OSINT) are …

Enhancing Cyber Threat Intelligence with Named Entity Recognition Using BERT-CRF

SS Chen, RH Hwang, CY Sun, YD Lin… - … 2023-2023 IEEE …, 2023 - ieeexplore.ieee.org
Cyber Threat Intelligence (CTI) helps organizations understand the tactics, techniques, and
procedures used by potential cyber criminals to defend against cyber threats. To protect the …

Leveraging OSINT and Artificial Intelligence, Machine Learning to Identify and Protect Vulnerable Sections of Society

S Panda, O Rungta - Communication Technology and Gender Violence, 2023 - Springer
The internet today is the global hub for immeasurable amounts of data storage and sharing.
But certain sections of society are extremely vulnerable to cyberbullying, harassment, and …

[PDF][PDF] Anonymity in decentralized apps: Study of implications for cybercrime investigations

A Chetry, U Sharma - … Journal of Experimental Research and Review, 2023 - academia.edu
In the digital age, cybercrime facilitated by anonymous communication apps raises
significant concerns. Criminals exploit the anonymity provided by these apps, creating …

OSINT Clinic: Co-designing AI-Augmented Collaborative OSINT Investigations for Vulnerability Assessment

A Mukhopadhyay, K Luther - arXiv preprint arXiv:2409.11672, 2024 - arxiv.org
Small businesses need vulnerability assessments to identify and mitigate cyber risks.
Cybersecurity clinics provide a solution by offering students hands-on experience while …

A Comprehensive Review of Open Source Intelligence in Intelligent Transportation Systems

BE Uçar, Mİ Ecevit, H Dağ… - 2024 International …, 2024 - ieeexplore.ieee.org
This paper offers an insightful review of Open Source Intelligence (OSINT) within Intelligent
Transportation Systems (ITS), emphasizing its heightened importance amidst the digital and …