Nihad A. Hassan

1.2K posts

Nihad A. Hassan banner
Nihad A. Hassan

Nihad A. Hassan

@DarknessGate

Author, Privacy Consultant, Cyber security professional, OSINT expert (https://t.co/KkRlpHVBhk). Official Twitter Handle for https://t.co/viZBFxTn42

Katılım Mayıs 2012
1.8K Takip Edilen2.5K Takipçiler
Nihad A. Hassan retweetledi
Cyber Detective💙💛
Cyber Detective💙💛@cyb_detective·
OSINT tips to detect phishing websites Detailed guide by @DarknessGate: The anatomy of a phishing website Detecting phishing websites using OSINT techniques Examine social media profiles How Silo fast-tracks phishing incident response authentic8.com/blog/leveragin…
Cyber Detective💙💛 tweet media
English
1
15
81
4.8K
Nihad A. Hassan retweetledi
Cyber Detective💙💛
Cyber Detective💙💛@cyb_detective·
The Linkedin OSINT Investigation Guide LinkedIn OSINT Collection Techniques Analyzing Individual Profiles Analyzing Posts & Engagement Analyzing Company Pages Defensible Evidence Collection WebPreserver for LinkedIn blog.pagefreezer.com/linkedin-osint… By Nihad A. Hassan @DarknessGate
Cyber Detective💙💛 tweet media
English
0
33
172
8.5K
Nihad A. Hassan retweetledi
OSINT.Link
OSINT.Link@onlineosint·
Twitter OSINT resources and comprehensive investigation guide #osint #twitter #x #search #socmint #twitter" target="_blank" rel="nofollow noopener">osint.link/social-media-i…
OSINT.Link tweet media
English
0
25
120
6K
Nihad A. Hassan retweetledi
Authentic8
Authentic8@Authentic8·
The dark web has become a critical intel source for cybersecurity teams, fraud analysts and CTI professionals who need to spot and stop threats before they strike. 🔍 Proactive dark web monitoring can uncover breaches early, surface vital threat intel, support regulatory compliance and help protect customer trust. Here is what you need to know before diving into dark web forums: bit.ly/47IAj0n #darkweb #threatintel
Authentic8 tweet media
English
0
3
5
404
Nihad A. Hassan retweetledi
Authentic8
Authentic8@Authentic8·
From boosting incident response and reducing false positives to enabling automated threat mitigation and fueling proactive threat hunting, cyber threat intelligence (CTI) data can help SOC teams stop modern attacks before they escalate.💡 Explore the different benefits acquired from integrating threat data into SOC operations: bit.ly/40K0VtE #threatintelligence #SOC
Authentic8 tweet media
English
0
2
3
335