
Predicta Lab
601 posts

Predicta Lab
@PredictaLabOff
Official account of Predicta Lab. Fight disinformation since 2020. Contact us at [email protected] Our articles 👉 https://t.co/LNUm9UOq2H
加入时间 Mart 2020
294 关注9.1K 粉丝
置顶推文

🚀 We just launched predictagraph.com!
Discover all its features in a quick article right here 👉 predictalab.medium.com/discover-predi…
English

🚨 On recrute chez @PredictaLabOff
3 postes ouverts :
→ Dev Frontend (React)
→ Dev Backend (Python, Go)
→ Apprenti Dev Backend
Tu veux bosser sur des projets OSINT avec une équipe passionnée ?
📩 CV + lettre de motiv → contact@predictalab.com
RT apprécié 🙏

Français
Predicta Lab 已转推

Cyberattaques : "La cybersécurité maximale n'existe pas"
Baptiste Robert, (@fs0c131y), chercheur en cybersécurité et PDG de @PredictaLabOff, au micro de @vincent_parizot #RTLSoir
Français
Predicta Lab 已转推
Predicta Lab 已转推

🔗 New in Predicta Graph: Merge Nodes
During an investigation, you often discover that two separate nodes are actually the same entity. Now you can merge them instantly.
What it does:
- Combine two nodes into one while preserving all connections
- Consolidate data from multiple sources on a single entity
- Keep your investigation graphs clean and readable
English
Predicta Lab 已转推

Le CBC 2025 c’est terminé !
Hier et aujourd’hui l’équipe @PredictaLabOff jouait à domicile. C’est toujours un plaisir d’échanger avec les acteurs de la filière, de rencontrer des nouvelles sociétés et de revoir les amis.




Français
Predicta Lab 已转推

🚀 On se retrouve au CBC 2025 !
L’équipe Predicta Lab sera présente à la Cybersecurity Business Convention les 26 et 27 novembre au MEETT de Toulouse.
👉 Deux jours pour plonger au cœur de l’OSINT et de la cybersécurité, échanger autour de vos enjeux, et découvrir nos solutions en action à travers des démos live et des retours d’expérience concrets.
💡 Rendez-vous au stand C13 : venez tester nos produits, poser toutes vos questions et repartir avec des idées (et des outils !) pour renforcer votre veille et votre sécurité.
🎙️ Et ne manquez pas ma conférence « IA : le vrai changement, c’est maintenant », le 26 novembre à 9h30 à l’espace démo.
📅 Envie d’échanger plus en détail ?
Vous pouvez dès à présent réserver votre créneau sur la plateforme CBC pour planifier un rendez-vous avec nous.
À très vite dans la plus belle ville du monde !

Français
Predicta Lab 已转推

L’IA est déjà en train de changer la donne.
📅 CBC Toulouse – 26 novembre à 9h30
Je prendrai la parole à l’espace démo autour du thème : « IA : le vrai changement, c’est maintenant ».
Nous parlerons des transformations concrètes que l’IA apporte à la cybersécurité et de son impact direct sur les métiers de l’OSINT et de l’investigation numérique, plus généralement.
Envie d’aller plus loin ?
👉 Retrouvez l’équipe @PredictaLabOff au stand C13 pour poursuivre la discussion.

Français
Predicta Lab 已转推

📢 [JOB ALERT] Analyste OSINT
@PredictaLabOff recherche un(e) analyste OSINT pour compléter les rangs de notre équipe déjà existante.
👉 Vos missions :
- Réalisation de rapports d’empreintes numériques et d'investigations dirigées.
- Veille professionnelle du milieu cyber et des méthodes/outils d’OSINT
- Rédaction d’une newsletter mensuelle
- Création de supports de formations OSINT
- Transmission de vos connaissances professionnelles à des apprenants de tous niveaux.
👉 Votre profil :
- Une expérience professionnelle préalable en OSINT est fortement valorisée
- Compétences intermédiaire à avancées en recherche en sources ouvertes
- Maîtrise du cycle du renseignement
- Connaissance de l’environnement OSINT français
- Excellent niveau d’anglais
- Autonomie, rigueur, initiative
👉 Vos avantages :
- Poste à 100% en télétravail
- Diversité des missions
- Opportunité de montées en compétences
- Présence à des évènements professionnels
- Convention collective Syntec
📩 Comment postuler ?
Envoyez votre CV, une lettre de motivation et si possible un cas d'usage à : contact@predictalab.com

Français
Predicta Lab 已转推

The official Python library for Predicta Search is out!
github.com/predictalab/pr…
Baptiste Robert@fs0c131y
The official Python library for Predicta Search is now available on GitHub! It’s easier than ever to add email or phone search to your favorite scripts or OSINT tools: 🔹 Grab your API key from Predicta Search 🔹 Run "pip install predictasearch" And you're done! 🚀
English

We're excited to introduce a new integration in Predicta Graph! 🚀
Access the full range of telemetryapp.io features directly on PredictaGraph.com.
Sign up now for free and collaborate with your team on investigations!
English

Come visit us at the @FIC_eu stand C7-10! 🎉
The Predicta team is ready to showcase our products, answer all your questions, and share a 🍻 with you! See you there!

English

Spotted Predicta Graph in a John Hammond video! Big thanks to Oleg Lypko from @flaresystems for creating it!
Check out the video here: youtube.com/watch?v=cH7BYW…
Start building your own graph for free at predictagraph.com!

YouTube

Flare@flaresystems
An unexpected turn on February 20, 2025 led the cybersecurity world to intriguing insights about the infamous Black Basta ransomware group. Dive into our latest blog unveiling more about their internal infrastructure here: flare.io/learn/resource… #Cybersecurity #Flare #BlackBasta
English
Predicta Lab 已转推

A group called “Dark Storm Team” has claimed responsibility for the breach, according to Baptiste Robert, CEO of the France-based company Predicta Lab. #ThreatStatus
ow.ly/qwRU50Vhn46
English

🔍 Predicta Search is now on Telegram!
Search any email or phone number to get corresponding profiles in seconds.
Try it for free at t.me/predictasearch…
English
Predicta Lab 已转推
Predicta Lab 已转推

🚀 Join our "Deanonymizing Threat Actors" Workshop by Flare and @PredictaLabOff! 🚀
📅 March 18, 2025
🕒 11 AM - 1 PM (ET)
🌐 Virtual
Dive into methodologies and tools to track and unmask malicious actors while keeping OPSEC intact.

English

🎉 300K visitors! 🚀
dorkgpt.com has just hit an incredible milestone with 300,000 unique visitors this month!
A huge thank you to our community for the support and feedback that keeps us pushing forward.

English
Predicta Lab 已转推

🚨 Gravy Analytics Breach: The Unfolding Story and Lessons Learned So Far
The unfolding story of the Gravy Analytics breach has captured global attention, particularly with reports of potential sensitive data exposure, including geolocation information tied to millions worldwide. As we continue to monitor developments, here’s a recap and some insights:
Timeline of Events:
🗓️ [January 4, 2025] Gravy Analytics identified unauthorized access to its AWS cloud storage, attributed to a "misappropriated access key."
🗓️ [January 5, 2025] A user, “nightly,” on the Russian-speaking XSS forum, notified others of the alleged breach and shared purported data samples as evidence. Shortly afterward, data leak samples, the post and the entire thread vanished.
🗓️ [January 10, 2025] Gravy Analytics confirmed the incident through a non-compliance report submitted to the Norwegian Data Protection Authority. The report stated that some files were accessed, but the investigation into their contents (and whether personal data is included) remains ongoing.
🗓️ [January 13, 2025] "nightly" dismissed the breach claim, calling it disinformation. They alleged someone impersonated their alias, stating: “They just wrote my nickname using the element code. Disinformation.”
🔍 Baptiste Robert ( @fs0c131y ), the CEO of the
@PredictaLabOff conducted a detailed assessment of the leaked dataset samples. Based on his investigation, the dataset contained over 30 million location data points, including devices located at The White House in Washington D.C., the Kremlin in Moscow, Vatican City, and military bases worldwide. (Baptiste's thread: x.com/fs0c131y/statu…)
🔍 This leak and claim of impersonation by “nightly” adds a complex twist. Whether intentional or not, this could be a calculated move by actors to amplify pressure on Gravy Analytics by fueling public scrutiny.
Actors know forums like XSS are closely monitored and use them strategically - whether for legitimate claims or disinformation - to draw attention to their claims, amplifying their impact.
The alleged posting of stolen data on a ransomware data leak site, or in this case on a Dark Web forum, highlights a recurring tactic: leveraging sensitive data for coercion and applying pressure on victims.
⁉️ Unknowns Remain: No additional data samples have been leaked by the actors, and no known ransomware groups have claimed responsibility (publicly) so far. This leaves questions about the actors behind the breach and its true nature.
💡 This incident serves as a critical reminder: organizations must remain vigilant against evolving threats. From bolstering cybersecurity measures to maintaining transparency during incidents, every step matters.
Stay informed, stay alert with @Analyst1 🦅

English
