Open-source intelligence is a wide set of tools and methods to collect publicly available information. For hackers and attack groups, OSINT based information is commonly used to guess passwords or create targeted phishing attacks.
Open-source intelligence (OSINT) research may be used for both legitimate purposes and by malicious intent. Tactics may vary from targeted reconnaissance by looking at social media platforms or other public sources of information such as government agencies, legal databases, or forums. A large number* of search engines are also available to scan wide domains for exposed cameras, unprotected networks, and vulnerable devices, or harvest legitimate emails of an ill-configured corporate email server.
With our Shadow IT Readiness Assessment, you can easily evaluate where your organization stands at the moment against Shadow IT risks. It's quick and anonymous, with instant results.