6

The Eyes and Ears of Threat Intelligence – How OSINT Helps Mitigate Cyber Risks

This chapter marks a turning point – the moment we transition from Open Source Intelligence (OSINT) theory into real-world cybersecurity application. The time has come to take our foundational knowledge and harness it practically to supercharge threat intelligence efforts.

In this chapter, we’ll cover the following aspects:

  • Introduction to threat intelligence and OSINT
  • Cyber threats and OSINT
  • Cyber threat intelligence platforms and OSINT integration
  • Building an OSINT-driven threat intelligence program
  • Case study: OSINT in a real-world cybersecurity incident

By the end of this chapter, you will be proficient in OSINT. You will understand its importance in identifying ...

Get The OSINT Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.