top of page
Search

OSINT Alert, BLASTPASS Zero-Day Targeting Apple Devices
A zero-click, zero-day exploit iPhone is in the wild. This exploit chain has the potential to compromise iPhones without user interaction.
Sep 7, 20232 min read

reSeeIt Changes Reputation Management on Twitter Forever
reSeeIt archives Tweets on blockchain, this will change your reputation management strategy forever.
Sep 6, 20232 min read


Elon Musk Rate Limits Twitter Views and Limits Crawling & Scraping
Elon Musk introduced a controversial Twitter restriction on daily views of tweets and blocked public crawling of profiles.
Jul 3, 20234 min read


Chaos Unfolds in France: Tracking the Riots on Telegram
France is experiencing a significant wave of civil unrest following the controversial police shooting of a 17-year-old known by his first...
Jun 30, 20232 min read


Supreme Court Rules for Stalker Convicted of Online Threats
The SCOTUS ruling in Counterman v. Colorado has now introduced a new benchmark for defining true threats.
Jun 28, 20233 min read


Tracking the Wagner Group Situation in Russia with OSINT
Tracking new OSINT from the rapidly developing Wagner Insurrection in Russia.
Jun 24, 20232 min read


Amplifying Security Services with OSINT & Threat Intelligence
In an era of heightened security concerns triggered by terrorism, political unrest, and social upheaval, organizations worldwide...
Jun 21, 20233 min read

Active Threat - KillNet Threatens Banking Transfer Systems SEPA, IBAN, WIRE, SWIFT, & WISE
There is credible cyber threat intelligence sourcing from a KillNet Telegram account with 104K subscribers that three cybercriminal...
Jun 16, 20232 min read

New: Profile Tracker, People Search, and the Archiver Browser Extension
We are introducing a new Profile Tracker Feature, People Search Feature, and the DigitalStakeout Archiver Browser Extension.
May 26, 20232 min read

AI-Powered Threat Detection: Why Guessing "Threat Terms" Is Obsolete
Moving away from traditional methods of relying on "threat terms" and embracing a more scalable, effective, and efficient approach.
May 2, 20234 min read

The Role of Digital Footprint Removal in Executive Protection
Executives should use a digital footprint removal service to discover and opt out of sites that share or sell personal information (PII).
Apr 25, 20232 min read

What is Threat Leakage?
Threat leakage can alert you to the intent of an individual to carry out a harmful act. Learn how to gain visibility to it.
Apr 18, 20232 min read


Digital Footprints: Watch Your Step!
Everyday use of the Internet leaves a trail of data that creates a digital footprint and poses risks for the user.
Apr 4, 20232 min read

Example Online Privacy Training in Executive Protection
Practical steps executive protection teams can train to reduce digital risk to protectee privacy and physical safety.
Feb 14, 20232 min read

Social Media Threat Assessment: A Guide for Security Professionals
A detailed step-by-step guide to help security professionals assess a social media threat.
Jan 17, 20233 min read


Understanding and Combating Social Media Threats: A Comprehensive Guide
In today's interconnected digital landscape, social media threats have become a significant concern for individuals and organizations...
Dec 8, 20224 min read


Platform Update to Support Tracking Mastodon
We've updated the DigitalStakeout platform to provide full coverage of all public Mastodon content.
Nov 28, 20222 min read


What Are the Most Common External Security Threats to Your Business?
Every organization has external threats. Learn about the most common external threats you need to prioritize and mitigate.
Nov 2, 20227 min read


Detecting Fake LinkedIn Social Media Profiles
DigitalStakeout's Web Presence Monitor enables organizations to detect fake LinkedIn accounts rapidly.
Oct 13, 20222 min read


Safeguarding Trust and Safety on Social Media: A Comprehensive Guide to Identifying and Addressing Key Threats
Alongside the countless benefits, social media platforms have dark sides that threaten safety, society and trust.
Sep 13, 20225 min read
Blog: Blog2
bottom of page